2020-03-18 18:23:41 -04:00
|
|
|
[role="xpack"]
|
|
|
|
[[transform-setup]]
|
|
|
|
=== Set up {transforms}
|
|
|
|
++++
|
|
|
|
<titleabbrev>Setup</titleabbrev>
|
|
|
|
++++
|
|
|
|
|
|
|
|
To use the {transforms}, you must have the
|
|
|
|
{subscriptions}[appropriate license] and at least one
|
|
|
|
<<transform-setup-nodes,{transform} node>> in your {es} cluster. If {stack}
|
|
|
|
{security-features} are enabled, you must also ensure your users have the
|
|
|
|
<<transform-privileges,necessary privileges>>.
|
|
|
|
|
|
|
|
[discrete]
|
|
|
|
[[transform-setup-nodes]]
|
|
|
|
==== {transform-cap} nodes
|
|
|
|
|
2020-07-07 16:54:54 -04:00
|
|
|
To use {transforms}, there must be at least one {transform} node in your cluster.
|
|
|
|
If you want to control which nodes run {transforms}, add or remove `transform`
|
|
|
|
from the `node.roles` setting on some nodes. For more information, see
|
|
|
|
<<modules-node>> and <<transform-settings>>.
|
2020-03-18 18:23:41 -04:00
|
|
|
|
|
|
|
[discrete]
|
|
|
|
[[transform-privileges]]
|
|
|
|
==== Security privileges
|
|
|
|
|
|
|
|
The {es} {security-features} provide <<built-in-roles,built-in roles>>
|
|
|
|
and <<security-privileges,privileges>> that make it easier to control
|
2020-03-24 12:33:29 -04:00
|
|
|
which users can manage or view {transforms}.
|
2020-03-18 18:23:41 -04:00
|
|
|
|
2020-03-24 12:33:29 -04:00
|
|
|
To _view_ the configuration and status of {transforms}, you must have:
|
|
|
|
|
2020-05-05 10:40:49 -04:00
|
|
|
* `transform_user` built-in role or `monitor_transform`
|
2020-03-24 12:33:29 -04:00
|
|
|
cluster privileges
|
|
|
|
|
|
|
|
To _manage_ {transforms}, you must have:
|
|
|
|
|
2020-05-05 10:40:49 -04:00
|
|
|
* `transform_admin` built-in role or `manage_transform`
|
2020-03-24 12:33:29 -04:00
|
|
|
cluster privileges
|
|
|
|
* `read` and `view_index_metadata` index privileges on source indices
|
|
|
|
* `read`, `create_index`, and `index` index privileges on destination indices
|
2020-05-05 10:40:49 -04:00
|
|
|
|
|
|
|
For more information, see <<security-privileges>> and <<built-in-roles>>.
|