1. Packages
  2. Packages
  3. Elasticstack Provider
  4. API Docs
  5. KibanaSecurityRole
Viewing docs for elasticstack 0.15.0
published on Thursday, May 14, 2026 by elastic
Viewing docs for elasticstack 0.15.0
published on Thursday, May 14, 2026 by elastic

    Creates or updates a Kibana role. See the role management API documentation for more details.

    For Features, see the features API documentation.

    For Security Privileges, see the security privileges documentation.

    Example Usage

    Using base privileges

    import * as pulumi from "@pulumi/pulumi";
    import * as elasticstack from "@pulumi/elasticstack";
    
    const example = new elasticstack.KibanaSecurityRole("example", {
        name: "sample_role",
        elasticsearch: {
            clusters: ["create_snapshot"],
            indices: [{
                fieldSecurity: {
                    grants: ["test"],
                    excepts: [],
                },
                names: ["test"],
                privileges: [
                    "create",
                    "read",
                    "write",
                ],
            }],
            remoteIndices: [{
                fieldSecurity: {
                    grants: ["test"],
                    excepts: [],
                },
                names: ["test"],
                clusters: ["test-cluster"],
                privileges: [
                    "create",
                    "read",
                    "write",
                ],
            }],
        },
        kibanas: [{
            bases: ["all"],
            spaces: ["default"],
        }],
    });
    
    import pulumi
    import pulumi_elasticstack as elasticstack
    
    example = elasticstack.KibanaSecurityRole("example",
        name="sample_role",
        elasticsearch={
            "clusters": ["create_snapshot"],
            "indices": [{
                "field_security": {
                    "grants": ["test"],
                    "excepts": [],
                },
                "names": ["test"],
                "privileges": [
                    "create",
                    "read",
                    "write",
                ],
            }],
            "remote_indices": [{
                "field_security": {
                    "grants": ["test"],
                    "excepts": [],
                },
                "names": ["test"],
                "clusters": ["test-cluster"],
                "privileges": [
                    "create",
                    "read",
                    "write",
                ],
            }],
        },
        kibanas=[{
            "bases": ["all"],
            "spaces": ["default"],
        }])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/elasticstack/elasticstack"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := elasticstack.NewKibanaSecurityRole(ctx, "example", &elasticstack.KibanaSecurityRoleArgs{
    			Name: pulumi.String("sample_role"),
    			Elasticsearch: &elasticstack.KibanaSecurityRoleElasticsearchArgs{
    				Clusters: pulumi.StringArray{
    					pulumi.String("create_snapshot"),
    				},
    				Indices: elasticstack.KibanaSecurityRoleElasticsearchIndexArray{
    					&elasticstack.KibanaSecurityRoleElasticsearchIndexArgs{
    						FieldSecurity: &elasticstack.KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs{
    							Grants: pulumi.StringArray{
    								pulumi.String("test"),
    							},
    							Excepts: pulumi.StringArray{},
    						},
    						Names: pulumi.StringArray{
    							pulumi.String("test"),
    						},
    						Privileges: pulumi.StringArray{
    							pulumi.String("create"),
    							pulumi.String("read"),
    							pulumi.String("write"),
    						},
    					},
    				},
    				RemoteIndices: elasticstack.KibanaSecurityRoleElasticsearchRemoteIndexArray{
    					&elasticstack.KibanaSecurityRoleElasticsearchRemoteIndexArgs{
    						FieldSecurity: &elasticstack.KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs{
    							Grants: pulumi.StringArray{
    								pulumi.String("test"),
    							},
    							Excepts: pulumi.StringArray{},
    						},
    						Names: pulumi.StringArray{
    							pulumi.String("test"),
    						},
    						Clusters: pulumi.StringArray{
    							pulumi.String("test-cluster"),
    						},
    						Privileges: pulumi.StringArray{
    							pulumi.String("create"),
    							pulumi.String("read"),
    							pulumi.String("write"),
    						},
    					},
    				},
    			},
    			Kibanas: elasticstack.KibanaSecurityRoleKibanaArray{
    				&elasticstack.KibanaSecurityRoleKibanaArgs{
    					Bases: pulumi.StringArray{
    						pulumi.String("all"),
    					},
    					Spaces: pulumi.StringArray{
    						pulumi.String("default"),
    					},
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Elasticstack = Pulumi.Elasticstack;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Elasticstack.KibanaSecurityRole("example", new()
        {
            Name = "sample_role",
            Elasticsearch = new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchArgs
            {
                Clusters = new[]
                {
                    "create_snapshot",
                },
                Indices = new[]
                {
                    new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchIndexArgs
                    {
                        FieldSecurity = new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs
                        {
                            Grants = new[]
                            {
                                "test",
                            },
                            Excepts = new() { },
                        },
                        Names = new[]
                        {
                            "test",
                        },
                        Privileges = new[]
                        {
                            "create",
                            "read",
                            "write",
                        },
                    },
                },
                RemoteIndices = new[]
                {
                    new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchRemoteIndexArgs
                    {
                        FieldSecurity = new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs
                        {
                            Grants = new[]
                            {
                                "test",
                            },
                            Excepts = new() { },
                        },
                        Names = new[]
                        {
                            "test",
                        },
                        Clusters = new[]
                        {
                            "test-cluster",
                        },
                        Privileges = new[]
                        {
                            "create",
                            "read",
                            "write",
                        },
                    },
                },
            },
            Kibanas = new[]
            {
                new Elasticstack.Inputs.KibanaSecurityRoleKibanaArgs
                {
                    Bases = new[]
                    {
                        "all",
                    },
                    Spaces = new[]
                    {
                        "default",
                    },
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.elasticstack.KibanaSecurityRole;
    import com.pulumi.elasticstack.KibanaSecurityRoleArgs;
    import com.pulumi.elasticstack.inputs.KibanaSecurityRoleElasticsearchArgs;
    import com.pulumi.elasticstack.inputs.KibanaSecurityRoleKibanaArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new KibanaSecurityRole("example", KibanaSecurityRoleArgs.builder()
                .name("sample_role")
                .elasticsearch(KibanaSecurityRoleElasticsearchArgs.builder()
                    .clusters("create_snapshot")
                    .indices(KibanaSecurityRoleElasticsearchIndexArgs.builder()
                        .fieldSecurity(KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs.builder()
                            .grants("test")
                            .excepts()
                            .build())
                        .names("test")
                        .privileges(                    
                            "create",
                            "read",
                            "write")
                        .build())
                    .remoteIndices(KibanaSecurityRoleElasticsearchRemoteIndexArgs.builder()
                        .fieldSecurity(KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs.builder()
                            .grants("test")
                            .excepts()
                            .build())
                        .names("test")
                        .clusters("test-cluster")
                        .privileges(                    
                            "create",
                            "read",
                            "write")
                        .build())
                    .build())
                .kibanas(KibanaSecurityRoleKibanaArgs.builder()
                    .bases("all")
                    .spaces("default")
                    .build())
                .build());
    
        }
    }
    
    resources:
      example:
        type: elasticstack:KibanaSecurityRole
        properties:
          name: sample_role
          elasticsearch:
            clusters:
              - create_snapshot
            indices:
              - fieldSecurity:
                  grants:
                    - test
                  excepts: []
                names:
                  - test
                privileges:
                  - create
                  - read
                  - write
            remoteIndices:
              - fieldSecurity:
                  grants:
                    - test
                  excepts: []
                names:
                  - test
                clusters:
                  - test-cluster
                privileges:
                  - create
                  - read
                  - write
          kibanas:
            - bases:
                - all
              spaces:
                - default
    
    Example coming soon!
    

    Using feature privileges

    import * as pulumi from "@pulumi/pulumi";
    import * as elasticstack from "@pulumi/elasticstack";
    
    const example = new elasticstack.KibanaSecurityRole("example", {
        name: "sample_role",
        elasticsearch: {
            clusters: ["create_snapshot"],
            indices: [{
                fieldSecurity: {
                    grants: ["test"],
                    excepts: [],
                },
                names: ["test"],
                privileges: [
                    "create",
                    "read",
                    "write",
                ],
            }],
            remoteIndices: [{
                fieldSecurity: {
                    grants: ["test"],
                    excepts: [],
                },
                names: ["test"],
                clusters: ["test-cluster"],
                privileges: [
                    "create",
                    "read",
                    "write",
                ],
            }],
        },
        kibanas: [{
            features: [
                {
                    name: "actions",
                    privileges: ["read"],
                },
                {
                    name: "discover",
                    privileges: [
                        "minimal_read",
                        "url_create",
                        "store_search_session",
                    ],
                },
                {
                    name: "observabilityCases",
                    privileges: [
                        "minimal_read",
                        "cases_delete",
                    ],
                },
                {
                    name: "osquery",
                    privileges: [
                        "minimal_read",
                        "live_queries_all",
                        "run_saved_queries",
                        "saved_queries_read",
                        "packs_all",
                    ],
                },
                {
                    name: "rulesSettings",
                    privileges: [
                        "minimal_read",
                        "readFlappingSettings",
                    ],
                },
                {
                    name: "securitySolutionCases",
                    privileges: [
                        "minimal_read",
                        "cases_delete",
                    ],
                },
            ],
            spaces: ["default"],
        }],
    });
    
    import pulumi
    import pulumi_elasticstack as elasticstack
    
    example = elasticstack.KibanaSecurityRole("example",
        name="sample_role",
        elasticsearch={
            "clusters": ["create_snapshot"],
            "indices": [{
                "field_security": {
                    "grants": ["test"],
                    "excepts": [],
                },
                "names": ["test"],
                "privileges": [
                    "create",
                    "read",
                    "write",
                ],
            }],
            "remote_indices": [{
                "field_security": {
                    "grants": ["test"],
                    "excepts": [],
                },
                "names": ["test"],
                "clusters": ["test-cluster"],
                "privileges": [
                    "create",
                    "read",
                    "write",
                ],
            }],
        },
        kibanas=[{
            "features": [
                {
                    "name": "actions",
                    "privileges": ["read"],
                },
                {
                    "name": "discover",
                    "privileges": [
                        "minimal_read",
                        "url_create",
                        "store_search_session",
                    ],
                },
                {
                    "name": "observabilityCases",
                    "privileges": [
                        "minimal_read",
                        "cases_delete",
                    ],
                },
                {
                    "name": "osquery",
                    "privileges": [
                        "minimal_read",
                        "live_queries_all",
                        "run_saved_queries",
                        "saved_queries_read",
                        "packs_all",
                    ],
                },
                {
                    "name": "rulesSettings",
                    "privileges": [
                        "minimal_read",
                        "readFlappingSettings",
                    ],
                },
                {
                    "name": "securitySolutionCases",
                    "privileges": [
                        "minimal_read",
                        "cases_delete",
                    ],
                },
            ],
            "spaces": ["default"],
        }])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/elasticstack/elasticstack"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := elasticstack.NewKibanaSecurityRole(ctx, "example", &elasticstack.KibanaSecurityRoleArgs{
    			Name: pulumi.String("sample_role"),
    			Elasticsearch: &elasticstack.KibanaSecurityRoleElasticsearchArgs{
    				Clusters: pulumi.StringArray{
    					pulumi.String("create_snapshot"),
    				},
    				Indices: elasticstack.KibanaSecurityRoleElasticsearchIndexArray{
    					&elasticstack.KibanaSecurityRoleElasticsearchIndexArgs{
    						FieldSecurity: &elasticstack.KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs{
    							Grants: pulumi.StringArray{
    								pulumi.String("test"),
    							},
    							Excepts: pulumi.StringArray{},
    						},
    						Names: pulumi.StringArray{
    							pulumi.String("test"),
    						},
    						Privileges: pulumi.StringArray{
    							pulumi.String("create"),
    							pulumi.String("read"),
    							pulumi.String("write"),
    						},
    					},
    				},
    				RemoteIndices: elasticstack.KibanaSecurityRoleElasticsearchRemoteIndexArray{
    					&elasticstack.KibanaSecurityRoleElasticsearchRemoteIndexArgs{
    						FieldSecurity: &elasticstack.KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs{
    							Grants: pulumi.StringArray{
    								pulumi.String("test"),
    							},
    							Excepts: pulumi.StringArray{},
    						},
    						Names: pulumi.StringArray{
    							pulumi.String("test"),
    						},
    						Clusters: pulumi.StringArray{
    							pulumi.String("test-cluster"),
    						},
    						Privileges: pulumi.StringArray{
    							pulumi.String("create"),
    							pulumi.String("read"),
    							pulumi.String("write"),
    						},
    					},
    				},
    			},
    			Kibanas: elasticstack.KibanaSecurityRoleKibanaArray{
    				&elasticstack.KibanaSecurityRoleKibanaArgs{
    					Features: elasticstack.KibanaSecurityRoleKibanaFeatureArray{
    						&elasticstack.KibanaSecurityRoleKibanaFeatureArgs{
    							Name: pulumi.String("actions"),
    							Privileges: pulumi.StringArray{
    								pulumi.String("read"),
    							},
    						},
    						&elasticstack.KibanaSecurityRoleKibanaFeatureArgs{
    							Name: pulumi.String("discover"),
    							Privileges: pulumi.StringArray{
    								pulumi.String("minimal_read"),
    								pulumi.String("url_create"),
    								pulumi.String("store_search_session"),
    							},
    						},
    						&elasticstack.KibanaSecurityRoleKibanaFeatureArgs{
    							Name: pulumi.String("observabilityCases"),
    							Privileges: pulumi.StringArray{
    								pulumi.String("minimal_read"),
    								pulumi.String("cases_delete"),
    							},
    						},
    						&elasticstack.KibanaSecurityRoleKibanaFeatureArgs{
    							Name: pulumi.String("osquery"),
    							Privileges: pulumi.StringArray{
    								pulumi.String("minimal_read"),
    								pulumi.String("live_queries_all"),
    								pulumi.String("run_saved_queries"),
    								pulumi.String("saved_queries_read"),
    								pulumi.String("packs_all"),
    							},
    						},
    						&elasticstack.KibanaSecurityRoleKibanaFeatureArgs{
    							Name: pulumi.String("rulesSettings"),
    							Privileges: pulumi.StringArray{
    								pulumi.String("minimal_read"),
    								pulumi.String("readFlappingSettings"),
    							},
    						},
    						&elasticstack.KibanaSecurityRoleKibanaFeatureArgs{
    							Name: pulumi.String("securitySolutionCases"),
    							Privileges: pulumi.StringArray{
    								pulumi.String("minimal_read"),
    								pulumi.String("cases_delete"),
    							},
    						},
    					},
    					Spaces: pulumi.StringArray{
    						pulumi.String("default"),
    					},
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Elasticstack = Pulumi.Elasticstack;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Elasticstack.KibanaSecurityRole("example", new()
        {
            Name = "sample_role",
            Elasticsearch = new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchArgs
            {
                Clusters = new[]
                {
                    "create_snapshot",
                },
                Indices = new[]
                {
                    new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchIndexArgs
                    {
                        FieldSecurity = new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs
                        {
                            Grants = new[]
                            {
                                "test",
                            },
                            Excepts = new() { },
                        },
                        Names = new[]
                        {
                            "test",
                        },
                        Privileges = new[]
                        {
                            "create",
                            "read",
                            "write",
                        },
                    },
                },
                RemoteIndices = new[]
                {
                    new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchRemoteIndexArgs
                    {
                        FieldSecurity = new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs
                        {
                            Grants = new[]
                            {
                                "test",
                            },
                            Excepts = new() { },
                        },
                        Names = new[]
                        {
                            "test",
                        },
                        Clusters = new[]
                        {
                            "test-cluster",
                        },
                        Privileges = new[]
                        {
                            "create",
                            "read",
                            "write",
                        },
                    },
                },
            },
            Kibanas = new[]
            {
                new Elasticstack.Inputs.KibanaSecurityRoleKibanaArgs
                {
                    Features = new[]
                    {
                        new Elasticstack.Inputs.KibanaSecurityRoleKibanaFeatureArgs
                        {
                            Name = "actions",
                            Privileges = new[]
                            {
                                "read",
                            },
                        },
                        new Elasticstack.Inputs.KibanaSecurityRoleKibanaFeatureArgs
                        {
                            Name = "discover",
                            Privileges = new[]
                            {
                                "minimal_read",
                                "url_create",
                                "store_search_session",
                            },
                        },
                        new Elasticstack.Inputs.KibanaSecurityRoleKibanaFeatureArgs
                        {
                            Name = "observabilityCases",
                            Privileges = new[]
                            {
                                "minimal_read",
                                "cases_delete",
                            },
                        },
                        new Elasticstack.Inputs.KibanaSecurityRoleKibanaFeatureArgs
                        {
                            Name = "osquery",
                            Privileges = new[]
                            {
                                "minimal_read",
                                "live_queries_all",
                                "run_saved_queries",
                                "saved_queries_read",
                                "packs_all",
                            },
                        },
                        new Elasticstack.Inputs.KibanaSecurityRoleKibanaFeatureArgs
                        {
                            Name = "rulesSettings",
                            Privileges = new[]
                            {
                                "minimal_read",
                                "readFlappingSettings",
                            },
                        },
                        new Elasticstack.Inputs.KibanaSecurityRoleKibanaFeatureArgs
                        {
                            Name = "securitySolutionCases",
                            Privileges = new[]
                            {
                                "minimal_read",
                                "cases_delete",
                            },
                        },
                    },
                    Spaces = new[]
                    {
                        "default",
                    },
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.elasticstack.KibanaSecurityRole;
    import com.pulumi.elasticstack.KibanaSecurityRoleArgs;
    import com.pulumi.elasticstack.inputs.KibanaSecurityRoleElasticsearchArgs;
    import com.pulumi.elasticstack.inputs.KibanaSecurityRoleKibanaArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new KibanaSecurityRole("example", KibanaSecurityRoleArgs.builder()
                .name("sample_role")
                .elasticsearch(KibanaSecurityRoleElasticsearchArgs.builder()
                    .clusters("create_snapshot")
                    .indices(KibanaSecurityRoleElasticsearchIndexArgs.builder()
                        .fieldSecurity(KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs.builder()
                            .grants("test")
                            .excepts()
                            .build())
                        .names("test")
                        .privileges(                    
                            "create",
                            "read",
                            "write")
                        .build())
                    .remoteIndices(KibanaSecurityRoleElasticsearchRemoteIndexArgs.builder()
                        .fieldSecurity(KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs.builder()
                            .grants("test")
                            .excepts()
                            .build())
                        .names("test")
                        .clusters("test-cluster")
                        .privileges(                    
                            "create",
                            "read",
                            "write")
                        .build())
                    .build())
                .kibanas(KibanaSecurityRoleKibanaArgs.builder()
                    .features(                
                        KibanaSecurityRoleKibanaFeatureArgs.builder()
                            .name("actions")
                            .privileges("read")
                            .build(),
                        KibanaSecurityRoleKibanaFeatureArgs.builder()
                            .name("discover")
                            .privileges(                        
                                "minimal_read",
                                "url_create",
                                "store_search_session")
                            .build(),
                        KibanaSecurityRoleKibanaFeatureArgs.builder()
                            .name("observabilityCases")
                            .privileges(                        
                                "minimal_read",
                                "cases_delete")
                            .build(),
                        KibanaSecurityRoleKibanaFeatureArgs.builder()
                            .name("osquery")
                            .privileges(                        
                                "minimal_read",
                                "live_queries_all",
                                "run_saved_queries",
                                "saved_queries_read",
                                "packs_all")
                            .build(),
                        KibanaSecurityRoleKibanaFeatureArgs.builder()
                            .name("rulesSettings")
                            .privileges(                        
                                "minimal_read",
                                "readFlappingSettings")
                            .build(),
                        KibanaSecurityRoleKibanaFeatureArgs.builder()
                            .name("securitySolutionCases")
                            .privileges(                        
                                "minimal_read",
                                "cases_delete")
                            .build())
                    .spaces("default")
                    .build())
                .build());
    
        }
    }
    
    resources:
      example:
        type: elasticstack:KibanaSecurityRole
        properties:
          name: sample_role
          elasticsearch:
            clusters:
              - create_snapshot
            indices:
              - fieldSecurity:
                  grants:
                    - test
                  excepts: []
                names:
                  - test
                privileges:
                  - create
                  - read
                  - write
            remoteIndices:
              - fieldSecurity:
                  grants:
                    - test
                  excepts: []
                names:
                  - test
                clusters:
                  - test-cluster
                privileges:
                  - create
                  - read
                  - write
          kibanas:
            - features:
                - name: actions
                  privileges:
                    - read
                - name: discover
                  privileges:
                    - minimal_read
                    - url_create
                    - store_search_session
                - name: observabilityCases
                  privileges:
                    - minimal_read
                    - cases_delete
                - name: osquery
                  privileges:
                    - minimal_read
                    - live_queries_all
                    - run_saved_queries
                    - saved_queries_read
                    - packs_all
                - name: rulesSettings
                  privileges:
                    - minimal_read
                    - readFlappingSettings
                - name: securitySolutionCases
                  privileges:
                    - minimal_read
                    - cases_delete
              spaces:
                - default
    
    Example coming soon!
    

    Create KibanaSecurityRole Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new KibanaSecurityRole(name: string, args: KibanaSecurityRoleArgs, opts?: CustomResourceOptions);
    @overload
    def KibanaSecurityRole(resource_name: str,
                           args: KibanaSecurityRoleArgs,
                           opts: Optional[ResourceOptions] = None)
    
    @overload
    def KibanaSecurityRole(resource_name: str,
                           opts: Optional[ResourceOptions] = None,
                           elasticsearch: Optional[KibanaSecurityRoleElasticsearchArgs] = None,
                           description: Optional[str] = None,
                           kibana_connection: Optional[KibanaSecurityRoleKibanaConnectionArgs] = None,
                           kibana_security_role_id: Optional[str] = None,
                           kibanas: Optional[Sequence[KibanaSecurityRoleKibanaArgs]] = None,
                           metadata: Optional[str] = None,
                           name: Optional[str] = None)
    func NewKibanaSecurityRole(ctx *Context, name string, args KibanaSecurityRoleArgs, opts ...ResourceOption) (*KibanaSecurityRole, error)
    public KibanaSecurityRole(string name, KibanaSecurityRoleArgs args, CustomResourceOptions? opts = null)
    public KibanaSecurityRole(String name, KibanaSecurityRoleArgs args)
    public KibanaSecurityRole(String name, KibanaSecurityRoleArgs args, CustomResourceOptions options)
    
    type: elasticstack:KibanaSecurityRole
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    
    resource "elasticstack_kibanasecurityrole" "name" {
        # resource properties
    }

    Parameters

    name string
    The unique name of the resource.
    args KibanaSecurityRoleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args KibanaSecurityRoleArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args KibanaSecurityRoleArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args KibanaSecurityRoleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args KibanaSecurityRoleArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var kibanaSecurityRoleResource = new Elasticstack.KibanaSecurityRole("kibanaSecurityRoleResource", new()
    {
        Elasticsearch = new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchArgs
        {
            Clusters = new[]
            {
                "string",
            },
            Indices = new[]
            {
                new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchIndexArgs
                {
                    Names = new[]
                    {
                        "string",
                    },
                    Privileges = new[]
                    {
                        "string",
                    },
                    FieldSecurity = new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs
                    {
                        Excepts = new[]
                        {
                            "string",
                        },
                        Grants = new[]
                        {
                            "string",
                        },
                    },
                    Query = "string",
                },
            },
            RemoteIndices = new[]
            {
                new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchRemoteIndexArgs
                {
                    Clusters = new[]
                    {
                        "string",
                    },
                    Names = new[]
                    {
                        "string",
                    },
                    Privileges = new[]
                    {
                        "string",
                    },
                    FieldSecurity = new Elasticstack.Inputs.KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs
                    {
                        Excepts = new[]
                        {
                            "string",
                        },
                        Grants = new[]
                        {
                            "string",
                        },
                    },
                    Query = "string",
                },
            },
            RunAs = new[]
            {
                "string",
            },
        },
        Description = "string",
        KibanaConnection = new Elasticstack.Inputs.KibanaSecurityRoleKibanaConnectionArgs
        {
            ApiKey = "string",
            BearerToken = "string",
            CaCerts = new[]
            {
                "string",
            },
            Endpoints = new[]
            {
                "string",
            },
            Insecure = false,
            Password = "string",
            Username = "string",
        },
        KibanaSecurityRoleId = "string",
        Kibanas = new[]
        {
            new Elasticstack.Inputs.KibanaSecurityRoleKibanaArgs
            {
                Spaces = new[]
                {
                    "string",
                },
                Bases = new[]
                {
                    "string",
                },
                Features = new[]
                {
                    new Elasticstack.Inputs.KibanaSecurityRoleKibanaFeatureArgs
                    {
                        Name = "string",
                        Privileges = new[]
                        {
                            "string",
                        },
                    },
                },
            },
        },
        Metadata = "string",
        Name = "string",
    });
    
    example, err := elasticstack.NewKibanaSecurityRole(ctx, "kibanaSecurityRoleResource", &elasticstack.KibanaSecurityRoleArgs{
    	Elasticsearch: &elasticstack.KibanaSecurityRoleElasticsearchArgs{
    		Clusters: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Indices: elasticstack.KibanaSecurityRoleElasticsearchIndexArray{
    			&elasticstack.KibanaSecurityRoleElasticsearchIndexArgs{
    				Names: pulumi.StringArray{
    					pulumi.String("string"),
    				},
    				Privileges: pulumi.StringArray{
    					pulumi.String("string"),
    				},
    				FieldSecurity: &elasticstack.KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs{
    					Excepts: pulumi.StringArray{
    						pulumi.String("string"),
    					},
    					Grants: pulumi.StringArray{
    						pulumi.String("string"),
    					},
    				},
    				Query: pulumi.String("string"),
    			},
    		},
    		RemoteIndices: elasticstack.KibanaSecurityRoleElasticsearchRemoteIndexArray{
    			&elasticstack.KibanaSecurityRoleElasticsearchRemoteIndexArgs{
    				Clusters: pulumi.StringArray{
    					pulumi.String("string"),
    				},
    				Names: pulumi.StringArray{
    					pulumi.String("string"),
    				},
    				Privileges: pulumi.StringArray{
    					pulumi.String("string"),
    				},
    				FieldSecurity: &elasticstack.KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs{
    					Excepts: pulumi.StringArray{
    						pulumi.String("string"),
    					},
    					Grants: pulumi.StringArray{
    						pulumi.String("string"),
    					},
    				},
    				Query: pulumi.String("string"),
    			},
    		},
    		RunAs: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    	},
    	Description: pulumi.String("string"),
    	KibanaConnection: &elasticstack.KibanaSecurityRoleKibanaConnectionArgs{
    		ApiKey:      pulumi.String("string"),
    		BearerToken: pulumi.String("string"),
    		CaCerts: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Endpoints: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Insecure: pulumi.Bool(false),
    		Password: pulumi.String("string"),
    		Username: pulumi.String("string"),
    	},
    	KibanaSecurityRoleId: pulumi.String("string"),
    	Kibanas: elasticstack.KibanaSecurityRoleKibanaArray{
    		&elasticstack.KibanaSecurityRoleKibanaArgs{
    			Spaces: pulumi.StringArray{
    				pulumi.String("string"),
    			},
    			Bases: pulumi.StringArray{
    				pulumi.String("string"),
    			},
    			Features: elasticstack.KibanaSecurityRoleKibanaFeatureArray{
    				&elasticstack.KibanaSecurityRoleKibanaFeatureArgs{
    					Name: pulumi.String("string"),
    					Privileges: pulumi.StringArray{
    						pulumi.String("string"),
    					},
    				},
    			},
    		},
    	},
    	Metadata: pulumi.String("string"),
    	Name:     pulumi.String("string"),
    })
    
    resource "elasticstack_kibanasecurityrole" "kibanaSecurityRoleResource" {
      elasticsearch = {
        clusters = ["string"]
        indices = [{
          "names"      = ["string"]
          "privileges" = ["string"]
          "fieldSecurity" = {
            "excepts" = ["string"]
            "grants"  = ["string"]
          }
          "query" = "string"
        }]
        remote_indices = [{
          "clusters"   = ["string"]
          "names"      = ["string"]
          "privileges" = ["string"]
          "fieldSecurity" = {
            "excepts" = ["string"]
            "grants"  = ["string"]
          }
          "query" = "string"
        }]
        run_as = ["string"]
      }
      description = "string"
      kibana_connection = {
        api_key      = "string"
        bearer_token = "string"
        ca_certs     = ["string"]
        endpoints    = ["string"]
        insecure     = false
        password     = "string"
        username     = "string"
      }
      kibana_security_role_id = "string"
      kibanas {
        spaces = ["string"]
        bases  = ["string"]
        features {
          name       = "string"
          privileges = ["string"]
        }
      }
      metadata = "string"
      name     = "string"
    }
    
    var kibanaSecurityRoleResource = new KibanaSecurityRole("kibanaSecurityRoleResource", KibanaSecurityRoleArgs.builder()
        .elasticsearch(KibanaSecurityRoleElasticsearchArgs.builder()
            .clusters("string")
            .indices(KibanaSecurityRoleElasticsearchIndexArgs.builder()
                .names("string")
                .privileges("string")
                .fieldSecurity(KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs.builder()
                    .excepts("string")
                    .grants("string")
                    .build())
                .query("string")
                .build())
            .remoteIndices(KibanaSecurityRoleElasticsearchRemoteIndexArgs.builder()
                .clusters("string")
                .names("string")
                .privileges("string")
                .fieldSecurity(KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs.builder()
                    .excepts("string")
                    .grants("string")
                    .build())
                .query("string")
                .build())
            .runAs("string")
            .build())
        .description("string")
        .kibanaConnection(KibanaSecurityRoleKibanaConnectionArgs.builder()
            .apiKey("string")
            .bearerToken("string")
            .caCerts("string")
            .endpoints("string")
            .insecure(false)
            .password("string")
            .username("string")
            .build())
        .kibanaSecurityRoleId("string")
        .kibanas(KibanaSecurityRoleKibanaArgs.builder()
            .spaces("string")
            .bases("string")
            .features(KibanaSecurityRoleKibanaFeatureArgs.builder()
                .name("string")
                .privileges("string")
                .build())
            .build())
        .metadata("string")
        .name("string")
        .build());
    
    kibana_security_role_resource = elasticstack.KibanaSecurityRole("kibanaSecurityRoleResource",
        elasticsearch={
            "clusters": ["string"],
            "indices": [{
                "names": ["string"],
                "privileges": ["string"],
                "field_security": {
                    "excepts": ["string"],
                    "grants": ["string"],
                },
                "query": "string",
            }],
            "remote_indices": [{
                "clusters": ["string"],
                "names": ["string"],
                "privileges": ["string"],
                "field_security": {
                    "excepts": ["string"],
                    "grants": ["string"],
                },
                "query": "string",
            }],
            "run_as": ["string"],
        },
        description="string",
        kibana_connection={
            "api_key": "string",
            "bearer_token": "string",
            "ca_certs": ["string"],
            "endpoints": ["string"],
            "insecure": False,
            "password": "string",
            "username": "string",
        },
        kibana_security_role_id="string",
        kibanas=[{
            "spaces": ["string"],
            "bases": ["string"],
            "features": [{
                "name": "string",
                "privileges": ["string"],
            }],
        }],
        metadata="string",
        name="string")
    
    const kibanaSecurityRoleResource = new elasticstack.KibanaSecurityRole("kibanaSecurityRoleResource", {
        elasticsearch: {
            clusters: ["string"],
            indices: [{
                names: ["string"],
                privileges: ["string"],
                fieldSecurity: {
                    excepts: ["string"],
                    grants: ["string"],
                },
                query: "string",
            }],
            remoteIndices: [{
                clusters: ["string"],
                names: ["string"],
                privileges: ["string"],
                fieldSecurity: {
                    excepts: ["string"],
                    grants: ["string"],
                },
                query: "string",
            }],
            runAs: ["string"],
        },
        description: "string",
        kibanaConnection: {
            apiKey: "string",
            bearerToken: "string",
            caCerts: ["string"],
            endpoints: ["string"],
            insecure: false,
            password: "string",
            username: "string",
        },
        kibanaSecurityRoleId: "string",
        kibanas: [{
            spaces: ["string"],
            bases: ["string"],
            features: [{
                name: "string",
                privileges: ["string"],
            }],
        }],
        metadata: "string",
        name: "string",
    });
    
    type: elasticstack:KibanaSecurityRole
    properties:
        description: string
        elasticsearch:
            clusters:
                - string
            indices:
                - fieldSecurity:
                    excepts:
                        - string
                    grants:
                        - string
                  names:
                    - string
                  privileges:
                    - string
                  query: string
            remoteIndices:
                - clusters:
                    - string
                  fieldSecurity:
                    excepts:
                        - string
                    grants:
                        - string
                  names:
                    - string
                  privileges:
                    - string
                  query: string
            runAs:
                - string
        kibanaConnection:
            apiKey: string
            bearerToken: string
            caCerts:
                - string
            endpoints:
                - string
            insecure: false
            password: string
            username: string
        kibanaSecurityRoleId: string
        kibanas:
            - bases:
                - string
              features:
                - name: string
                  privileges:
                    - string
              spaces:
                - string
        metadata: string
        name: string
    

    KibanaSecurityRole Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The KibanaSecurityRole resource accepts the following input properties:

    Elasticsearch KibanaSecurityRoleElasticsearch
    Elasticsearch cluster and index privileges.
    Description string
    Optional description for the role
    KibanaConnection KibanaSecurityRoleKibanaConnection
    Kibana connection configuration block.
    KibanaSecurityRoleId string
    The ID of this resource.
    Kibanas List<KibanaSecurityRoleKibana>
    The list of objects that specify the Kibana privileges for the role.
    Metadata string
    Optional meta-data.
    Name string
    The name for the role.
    Elasticsearch KibanaSecurityRoleElasticsearchArgs
    Elasticsearch cluster and index privileges.
    Description string
    Optional description for the role
    KibanaConnection KibanaSecurityRoleKibanaConnectionArgs
    Kibana connection configuration block.
    KibanaSecurityRoleId string
    The ID of this resource.
    Kibanas []KibanaSecurityRoleKibanaArgs
    The list of objects that specify the Kibana privileges for the role.
    Metadata string
    Optional meta-data.
    Name string
    The name for the role.
    elasticsearch object
    Elasticsearch cluster and index privileges.
    description string
    Optional description for the role
    kibana_connection object
    Kibana connection configuration block.
    kibana_security_role_id string
    The ID of this resource.
    kibanas list(object)
    The list of objects that specify the Kibana privileges for the role.
    metadata string
    Optional meta-data.
    name string
    The name for the role.
    elasticsearch KibanaSecurityRoleElasticsearch
    Elasticsearch cluster and index privileges.
    description String
    Optional description for the role
    kibanaConnection KibanaSecurityRoleKibanaConnection
    Kibana connection configuration block.
    kibanaSecurityRoleId String
    The ID of this resource.
    kibanas List<KibanaSecurityRoleKibana>
    The list of objects that specify the Kibana privileges for the role.
    metadata String
    Optional meta-data.
    name String
    The name for the role.
    elasticsearch KibanaSecurityRoleElasticsearch
    Elasticsearch cluster and index privileges.
    description string
    Optional description for the role
    kibanaConnection KibanaSecurityRoleKibanaConnection
    Kibana connection configuration block.
    kibanaSecurityRoleId string
    The ID of this resource.
    kibanas KibanaSecurityRoleKibana[]
    The list of objects that specify the Kibana privileges for the role.
    metadata string
    Optional meta-data.
    name string
    The name for the role.
    elasticsearch KibanaSecurityRoleElasticsearchArgs
    Elasticsearch cluster and index privileges.
    description str
    Optional description for the role
    kibana_connection KibanaSecurityRoleKibanaConnectionArgs
    Kibana connection configuration block.
    kibana_security_role_id str
    The ID of this resource.
    kibanas Sequence[KibanaSecurityRoleKibanaArgs]
    The list of objects that specify the Kibana privileges for the role.
    metadata str
    Optional meta-data.
    name str
    The name for the role.
    elasticsearch Property Map
    Elasticsearch cluster and index privileges.
    description String
    Optional description for the role
    kibanaConnection Property Map
    Kibana connection configuration block.
    kibanaSecurityRoleId String
    The ID of this resource.
    kibanas List<Property Map>
    The list of objects that specify the Kibana privileges for the role.
    metadata String
    Optional meta-data.
    name String
    The name for the role.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the KibanaSecurityRole resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing KibanaSecurityRole Resource

    Get an existing KibanaSecurityRole resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: KibanaSecurityRoleState, opts?: CustomResourceOptions): KibanaSecurityRole
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            description: Optional[str] = None,
            elasticsearch: Optional[KibanaSecurityRoleElasticsearchArgs] = None,
            kibana_connection: Optional[KibanaSecurityRoleKibanaConnectionArgs] = None,
            kibana_security_role_id: Optional[str] = None,
            kibanas: Optional[Sequence[KibanaSecurityRoleKibanaArgs]] = None,
            metadata: Optional[str] = None,
            name: Optional[str] = None) -> KibanaSecurityRole
    func GetKibanaSecurityRole(ctx *Context, name string, id IDInput, state *KibanaSecurityRoleState, opts ...ResourceOption) (*KibanaSecurityRole, error)
    public static KibanaSecurityRole Get(string name, Input<string> id, KibanaSecurityRoleState? state, CustomResourceOptions? opts = null)
    public static KibanaSecurityRole get(String name, Output<String> id, KibanaSecurityRoleState state, CustomResourceOptions options)
    resources:  _:    type: elasticstack:KibanaSecurityRole    get:      id: ${id}
    import {
      to = elasticstack_kibanasecurityrole.example
      id = "${id}"
    }
    
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Description string
    Optional description for the role
    Elasticsearch KibanaSecurityRoleElasticsearch
    Elasticsearch cluster and index privileges.
    KibanaConnection KibanaSecurityRoleKibanaConnection
    Kibana connection configuration block.
    KibanaSecurityRoleId string
    The ID of this resource.
    Kibanas List<KibanaSecurityRoleKibana>
    The list of objects that specify the Kibana privileges for the role.
    Metadata string
    Optional meta-data.
    Name string
    The name for the role.
    Description string
    Optional description for the role
    Elasticsearch KibanaSecurityRoleElasticsearchArgs
    Elasticsearch cluster and index privileges.
    KibanaConnection KibanaSecurityRoleKibanaConnectionArgs
    Kibana connection configuration block.
    KibanaSecurityRoleId string
    The ID of this resource.
    Kibanas []KibanaSecurityRoleKibanaArgs
    The list of objects that specify the Kibana privileges for the role.
    Metadata string
    Optional meta-data.
    Name string
    The name for the role.
    description string
    Optional description for the role
    elasticsearch object
    Elasticsearch cluster and index privileges.
    kibana_connection object
    Kibana connection configuration block.
    kibana_security_role_id string
    The ID of this resource.
    kibanas list(object)
    The list of objects that specify the Kibana privileges for the role.
    metadata string
    Optional meta-data.
    name string
    The name for the role.
    description String
    Optional description for the role
    elasticsearch KibanaSecurityRoleElasticsearch
    Elasticsearch cluster and index privileges.
    kibanaConnection KibanaSecurityRoleKibanaConnection
    Kibana connection configuration block.
    kibanaSecurityRoleId String
    The ID of this resource.
    kibanas List<KibanaSecurityRoleKibana>
    The list of objects that specify the Kibana privileges for the role.
    metadata String
    Optional meta-data.
    name String
    The name for the role.
    description string
    Optional description for the role
    elasticsearch KibanaSecurityRoleElasticsearch
    Elasticsearch cluster and index privileges.
    kibanaConnection KibanaSecurityRoleKibanaConnection
    Kibana connection configuration block.
    kibanaSecurityRoleId string
    The ID of this resource.
    kibanas KibanaSecurityRoleKibana[]
    The list of objects that specify the Kibana privileges for the role.
    metadata string
    Optional meta-data.
    name string
    The name for the role.
    description str
    Optional description for the role
    elasticsearch KibanaSecurityRoleElasticsearchArgs
    Elasticsearch cluster and index privileges.
    kibana_connection KibanaSecurityRoleKibanaConnectionArgs
    Kibana connection configuration block.
    kibana_security_role_id str
    The ID of this resource.
    kibanas Sequence[KibanaSecurityRoleKibanaArgs]
    The list of objects that specify the Kibana privileges for the role.
    metadata str
    Optional meta-data.
    name str
    The name for the role.
    description String
    Optional description for the role
    elasticsearch Property Map
    Elasticsearch cluster and index privileges.
    kibanaConnection Property Map
    Kibana connection configuration block.
    kibanaSecurityRoleId String
    The ID of this resource.
    kibanas List<Property Map>
    The list of objects that specify the Kibana privileges for the role.
    metadata String
    Optional meta-data.
    name String
    The name for the role.

    Supporting Types

    KibanaSecurityRoleElasticsearch, KibanaSecurityRoleElasticsearchArgs

    Clusters List<string>
    List of the cluster privileges.
    Indices List<KibanaSecurityRoleElasticsearchIndex>
    A list of indices permissions entries.
    RemoteIndices List<KibanaSecurityRoleElasticsearchRemoteIndex>
    A list of remote indices permissions entries. Remote indices are effective for remote clusters configured with the API key based model. They have no effect for remote clusters configured with the certificate based model.
    RunAs List<string>
    A list of usernames the owners of this role can impersonate.
    Clusters []string
    List of the cluster privileges.
    Indices []KibanaSecurityRoleElasticsearchIndex
    A list of indices permissions entries.
    RemoteIndices []KibanaSecurityRoleElasticsearchRemoteIndex
    A list of remote indices permissions entries. Remote indices are effective for remote clusters configured with the API key based model. They have no effect for remote clusters configured with the certificate based model.
    RunAs []string
    A list of usernames the owners of this role can impersonate.
    clusters list(string)
    List of the cluster privileges.
    indices list(object)
    A list of indices permissions entries.
    remote_indices list(object)
    A list of remote indices permissions entries. Remote indices are effective for remote clusters configured with the API key based model. They have no effect for remote clusters configured with the certificate based model.
    run_as list(string)
    A list of usernames the owners of this role can impersonate.
    clusters List<String>
    List of the cluster privileges.
    indices List<KibanaSecurityRoleElasticsearchIndex>
    A list of indices permissions entries.
    remoteIndices List<KibanaSecurityRoleElasticsearchRemoteIndex>
    A list of remote indices permissions entries. Remote indices are effective for remote clusters configured with the API key based model. They have no effect for remote clusters configured with the certificate based model.
    runAs List<String>
    A list of usernames the owners of this role can impersonate.
    clusters string[]
    List of the cluster privileges.
    indices KibanaSecurityRoleElasticsearchIndex[]
    A list of indices permissions entries.
    remoteIndices KibanaSecurityRoleElasticsearchRemoteIndex[]
    A list of remote indices permissions entries. Remote indices are effective for remote clusters configured with the API key based model. They have no effect for remote clusters configured with the certificate based model.
    runAs string[]
    A list of usernames the owners of this role can impersonate.
    clusters Sequence[str]
    List of the cluster privileges.
    indices Sequence[KibanaSecurityRoleElasticsearchIndex]
    A list of indices permissions entries.
    remote_indices Sequence[KibanaSecurityRoleElasticsearchRemoteIndex]
    A list of remote indices permissions entries. Remote indices are effective for remote clusters configured with the API key based model. They have no effect for remote clusters configured with the certificate based model.
    run_as Sequence[str]
    A list of usernames the owners of this role can impersonate.
    clusters List<String>
    List of the cluster privileges.
    indices List<Property Map>
    A list of indices permissions entries.
    remoteIndices List<Property Map>
    A list of remote indices permissions entries. Remote indices are effective for remote clusters configured with the API key based model. They have no effect for remote clusters configured with the certificate based model.
    runAs List<String>
    A list of usernames the owners of this role can impersonate.

    KibanaSecurityRoleElasticsearchIndex, KibanaSecurityRoleElasticsearchIndexArgs

    Names List<string>
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    Privileges List<string>
    The index level privileges that the owners of the role have on the specified indices.
    FieldSecurity KibanaSecurityRoleElasticsearchIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    Query string
    A search query that defines the documents the owners of the role have read access to.
    Names []string
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    Privileges []string
    The index level privileges that the owners of the role have on the specified indices.
    FieldSecurity KibanaSecurityRoleElasticsearchIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    Query string
    A search query that defines the documents the owners of the role have read access to.
    names list(string)
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges list(string)
    The index level privileges that the owners of the role have on the specified indices.
    field_security object
    The document fields that the owners of the role have read access to.
    query string
    A search query that defines the documents the owners of the role have read access to.
    names List<String>
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges List<String>
    The index level privileges that the owners of the role have on the specified indices.
    fieldSecurity KibanaSecurityRoleElasticsearchIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    query String
    A search query that defines the documents the owners of the role have read access to.
    names string[]
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges string[]
    The index level privileges that the owners of the role have on the specified indices.
    fieldSecurity KibanaSecurityRoleElasticsearchIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    query string
    A search query that defines the documents the owners of the role have read access to.
    names Sequence[str]
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges Sequence[str]
    The index level privileges that the owners of the role have on the specified indices.
    field_security KibanaSecurityRoleElasticsearchIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    query str
    A search query that defines the documents the owners of the role have read access to.
    names List<String>
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges List<String>
    The index level privileges that the owners of the role have on the specified indices.
    fieldSecurity Property Map
    The document fields that the owners of the role have read access to.
    query String
    A search query that defines the documents the owners of the role have read access to.

    KibanaSecurityRoleElasticsearchIndexFieldSecurity, KibanaSecurityRoleElasticsearchIndexFieldSecurityArgs

    Excepts List<string>
    List of the fields to which the grants will not be applied.
    Grants List<string>
    List of the fields to grant the access to.
    Excepts []string
    List of the fields to which the grants will not be applied.
    Grants []string
    List of the fields to grant the access to.
    excepts list(string)
    List of the fields to which the grants will not be applied.
    grants list(string)
    List of the fields to grant the access to.
    excepts List<String>
    List of the fields to which the grants will not be applied.
    grants List<String>
    List of the fields to grant the access to.
    excepts string[]
    List of the fields to which the grants will not be applied.
    grants string[]
    List of the fields to grant the access to.
    excepts Sequence[str]
    List of the fields to which the grants will not be applied.
    grants Sequence[str]
    List of the fields to grant the access to.
    excepts List<String>
    List of the fields to which the grants will not be applied.
    grants List<String>
    List of the fields to grant the access to.

    KibanaSecurityRoleElasticsearchRemoteIndex, KibanaSecurityRoleElasticsearchRemoteIndexArgs

    Clusters List<string>
    A list of cluster aliases to which the permissions in this entry apply.
    Names List<string>
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    Privileges List<string>
    The index level privileges that the owners of the role have on the specified indices.
    FieldSecurity KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    Query string
    A search query that defines the documents the owners of the role have read access to.
    Clusters []string
    A list of cluster aliases to which the permissions in this entry apply.
    Names []string
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    Privileges []string
    The index level privileges that the owners of the role have on the specified indices.
    FieldSecurity KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    Query string
    A search query that defines the documents the owners of the role have read access to.
    clusters list(string)
    A list of cluster aliases to which the permissions in this entry apply.
    names list(string)
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges list(string)
    The index level privileges that the owners of the role have on the specified indices.
    field_security object
    The document fields that the owners of the role have read access to.
    query string
    A search query that defines the documents the owners of the role have read access to.
    clusters List<String>
    A list of cluster aliases to which the permissions in this entry apply.
    names List<String>
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges List<String>
    The index level privileges that the owners of the role have on the specified indices.
    fieldSecurity KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    query String
    A search query that defines the documents the owners of the role have read access to.
    clusters string[]
    A list of cluster aliases to which the permissions in this entry apply.
    names string[]
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges string[]
    The index level privileges that the owners of the role have on the specified indices.
    fieldSecurity KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    query string
    A search query that defines the documents the owners of the role have read access to.
    clusters Sequence[str]
    A list of cluster aliases to which the permissions in this entry apply.
    names Sequence[str]
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges Sequence[str]
    The index level privileges that the owners of the role have on the specified indices.
    field_security KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurity
    The document fields that the owners of the role have read access to.
    query str
    A search query that defines the documents the owners of the role have read access to.
    clusters List<String>
    A list of cluster aliases to which the permissions in this entry apply.
    names List<String>
    A list of indices (or index name patterns) to which the permissions in this entry apply.
    privileges List<String>
    The index level privileges that the owners of the role have on the specified indices.
    fieldSecurity Property Map
    The document fields that the owners of the role have read access to.
    query String
    A search query that defines the documents the owners of the role have read access to.

    KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurity, KibanaSecurityRoleElasticsearchRemoteIndexFieldSecurityArgs

    Excepts List<string>
    List of the fields to which the grants will not be applied.
    Grants List<string>
    List of the fields to grant the access to.
    Excepts []string
    List of the fields to which the grants will not be applied.
    Grants []string
    List of the fields to grant the access to.
    excepts list(string)
    List of the fields to which the grants will not be applied.
    grants list(string)
    List of the fields to grant the access to.
    excepts List<String>
    List of the fields to which the grants will not be applied.
    grants List<String>
    List of the fields to grant the access to.
    excepts string[]
    List of the fields to which the grants will not be applied.
    grants string[]
    List of the fields to grant the access to.
    excepts Sequence[str]
    List of the fields to which the grants will not be applied.
    grants Sequence[str]
    List of the fields to grant the access to.
    excepts List<String>
    List of the fields to which the grants will not be applied.
    grants List<String>
    List of the fields to grant the access to.

    KibanaSecurityRoleKibana, KibanaSecurityRoleKibanaArgs

    Spaces List<string>
    The spaces to apply the privileges to. To grant access to all spaces, set to ["*"], or omit the value.
    Bases List<string>
    A base privilege. When specified, the base must be ["all"] or ["read"]. When the base privileges are specified, you are unable to use the "feature" section.
    Features List<KibanaSecurityRoleKibanaFeature>
    List of privileges for specific features. When the feature privileges are specified, you are unable to use the "base" section.
    Spaces []string
    The spaces to apply the privileges to. To grant access to all spaces, set to ["*"], or omit the value.
    Bases []string
    A base privilege. When specified, the base must be ["all"] or ["read"]. When the base privileges are specified, you are unable to use the "feature" section.
    Features []KibanaSecurityRoleKibanaFeature
    List of privileges for specific features. When the feature privileges are specified, you are unable to use the "base" section.
    spaces list(string)
    The spaces to apply the privileges to. To grant access to all spaces, set to ["*"], or omit the value.
    bases list(string)
    A base privilege. When specified, the base must be ["all"] or ["read"]. When the base privileges are specified, you are unable to use the "feature" section.
    features list(object)
    List of privileges for specific features. When the feature privileges are specified, you are unable to use the "base" section.
    spaces List<String>
    The spaces to apply the privileges to. To grant access to all spaces, set to ["*"], or omit the value.
    bases List<String>
    A base privilege. When specified, the base must be ["all"] or ["read"]. When the base privileges are specified, you are unable to use the "feature" section.
    features List<KibanaSecurityRoleKibanaFeature>
    List of privileges for specific features. When the feature privileges are specified, you are unable to use the "base" section.
    spaces string[]
    The spaces to apply the privileges to. To grant access to all spaces, set to ["*"], or omit the value.
    bases string[]
    A base privilege. When specified, the base must be ["all"] or ["read"]. When the base privileges are specified, you are unable to use the "feature" section.
    features KibanaSecurityRoleKibanaFeature[]
    List of privileges for specific features. When the feature privileges are specified, you are unable to use the "base" section.
    spaces Sequence[str]
    The spaces to apply the privileges to. To grant access to all spaces, set to ["*"], or omit the value.
    bases Sequence[str]
    A base privilege. When specified, the base must be ["all"] or ["read"]. When the base privileges are specified, you are unable to use the "feature" section.
    features Sequence[KibanaSecurityRoleKibanaFeature]
    List of privileges for specific features. When the feature privileges are specified, you are unable to use the "base" section.
    spaces List<String>
    The spaces to apply the privileges to. To grant access to all spaces, set to ["*"], or omit the value.
    bases List<String>
    A base privilege. When specified, the base must be ["all"] or ["read"]. When the base privileges are specified, you are unable to use the "feature" section.
    features List<Property Map>
    List of privileges for specific features. When the feature privileges are specified, you are unable to use the "base" section.

    KibanaSecurityRoleKibanaConnection, KibanaSecurityRoleKibanaConnectionArgs

    ApiKey string
    API Key to use for authentication to Kibana
    BearerToken string
    Bearer Token to use for authentication to Kibana
    CaCerts List<string>
    A list of paths to CA certificates to validate the certificate presented by the Kibana server.
    Endpoints List<string>
    Insecure bool
    Disable TLS certificate validation
    Password string
    Password to use for API authentication to Kibana.
    Username string
    Username to use for API authentication to Kibana.
    ApiKey string
    API Key to use for authentication to Kibana
    BearerToken string
    Bearer Token to use for authentication to Kibana
    CaCerts []string
    A list of paths to CA certificates to validate the certificate presented by the Kibana server.
    Endpoints []string
    Insecure bool
    Disable TLS certificate validation
    Password string
    Password to use for API authentication to Kibana.
    Username string
    Username to use for API authentication to Kibana.
    api_key string
    API Key to use for authentication to Kibana
    bearer_token string
    Bearer Token to use for authentication to Kibana
    ca_certs list(string)
    A list of paths to CA certificates to validate the certificate presented by the Kibana server.
    endpoints list(string)
    insecure bool
    Disable TLS certificate validation
    password string
    Password to use for API authentication to Kibana.
    username string
    Username to use for API authentication to Kibana.
    apiKey String
    API Key to use for authentication to Kibana
    bearerToken String
    Bearer Token to use for authentication to Kibana
    caCerts List<String>
    A list of paths to CA certificates to validate the certificate presented by the Kibana server.
    endpoints List<String>
    insecure Boolean
    Disable TLS certificate validation
    password String
    Password to use for API authentication to Kibana.
    username String
    Username to use for API authentication to Kibana.
    apiKey string
    API Key to use for authentication to Kibana
    bearerToken string
    Bearer Token to use for authentication to Kibana
    caCerts string[]
    A list of paths to CA certificates to validate the certificate presented by the Kibana server.
    endpoints string[]
    insecure boolean
    Disable TLS certificate validation
    password string
    Password to use for API authentication to Kibana.
    username string
    Username to use for API authentication to Kibana.
    api_key str
    API Key to use for authentication to Kibana
    bearer_token str
    Bearer Token to use for authentication to Kibana
    ca_certs Sequence[str]
    A list of paths to CA certificates to validate the certificate presented by the Kibana server.
    endpoints Sequence[str]
    insecure bool
    Disable TLS certificate validation
    password str
    Password to use for API authentication to Kibana.
    username str
    Username to use for API authentication to Kibana.
    apiKey String
    API Key to use for authentication to Kibana
    bearerToken String
    Bearer Token to use for authentication to Kibana
    caCerts List<String>
    A list of paths to CA certificates to validate the certificate presented by the Kibana server.
    endpoints List<String>
    insecure Boolean
    Disable TLS certificate validation
    password String
    Password to use for API authentication to Kibana.
    username String
    Username to use for API authentication to Kibana.

    KibanaSecurityRoleKibanaFeature, KibanaSecurityRoleKibanaFeatureArgs

    Name string
    Feature name.
    Privileges List<string>
    Feature privileges.
    Name string
    Feature name.
    Privileges []string
    Feature privileges.
    name string
    Feature name.
    privileges list(string)
    Feature privileges.
    name String
    Feature name.
    privileges List<String>
    Feature privileges.
    name string
    Feature name.
    privileges string[]
    Feature privileges.
    name str
    Feature name.
    privileges Sequence[str]
    Feature privileges.
    name String
    Feature name.
    privileges List<String>
    Feature privileges.

    Import

    The pulumi import command can be used, for example:

    $ pulumi import elasticstack:index/kibanaSecurityRole:KibanaSecurityRole example_role <role name>
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    elasticstack elastic/terraform-provider-elasticstack
    License
    Notes
    This Pulumi package is based on the elasticstack Terraform Provider.
    Viewing docs for elasticstack 0.15.0
    published on Thursday, May 14, 2026 by elastic
      Try Pulumi Cloud free. Your team will thank you.