Skip to content

Commit 126dca3

Browse files
committed
fixes
1 parent eb3a2ec commit 126dca3

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

deploy-manage/users-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,9 +77,9 @@ Control access to your {{ece}} [orchestrator](/deploy-manage/deploy/cloud-enterp
7777
:serverless: all
7878
:::
7979

80-
As an extension of the [predefined instance access roles](/deploy-manage/users-roles/cloud-organization/user-roles#ec_instance_access_roles) offered for {{serverless-short}} projects, you can create custom roles at the project level to provide more granular control, and provide users with only the access they need within specific projects.
80+
As an extension of the [predefined instance access roles](/deploy-manage/users-roles/cloud-organization/user-roles.md#ec_instance_access_roles) offered for {{serverless-short}} projects, you can create custom roles at the project level to provide more granular control, and provide users with only the access they need within specific projects.
8181

82-
[Learn more about custom roles for {{serverless-full}} projects](/deploy-manage/users-roles/custom-roles).
82+
[Learn more about custom roles for {{serverless-full}} projects](/deploy-manage/users-roles/custom-roles.md).
8383

8484
## Cluster or deployment level
8585

deploy-manage/users-roles/custom-roles.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ You can manage custom roles from within your project, in **{{project-settings}}
3232

3333
Cluster privileges grant access to monitoring and management features in {{es}}. They also enable some stack management capabilities in your project.
3434

35-
:::{image} ../../../images/serverless-custom-roles-cluster-privileges.png
35+
:::{image} ../../images/serverless-custom-roles-cluster-privileges.png
3636
:alt: Create a custom role and define {{es}} cluster privileges
3737
:class: screenshot
3838
:::
@@ -44,7 +44,7 @@ Refer to [cluster privileges](/deploy-manage/users-roles/cluster-or-deployment-a
4444

4545
Each role can grant access to multiple data indices, and each index can have a different set of privileges. Typically, you will grant the `read` and `view_index_metadata` privileges to each index that you expect your users to work with. For example, grant access to indices that match an `acme-marketing-*` pattern:
4646

47-
:::{image} ../../../images/serverless-custom-roles-index-privileges.png
47+
:::{image} ../../images/serverless-custom-roles-index-privileges.png
4848
:alt: Create a custom role and define {{es}} index privileges
4949
:class: screenshot
5050
:::
@@ -63,7 +63,7 @@ Document-level and field-level security affords you even more granularity when i
6363

6464
When you create a custom role, click **Add Kibana privilege** to grant access to specific features. The features that are available vary depending on the project type. For example, in {{es-serverless}}:
6565

66-
:::{image} ../../../images/serverless-custom-roles-kibana-privileges.png
66+
:::{image} ../../images/serverless-custom-roles-kibana-privileges.png
6767
:alt: Create a custom role and define {{kib}} privileges
6868
:class: screenshot
6969
:::

raw-migrated-files/docs-content/serverless/observability-troubleshoot-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ You need permission to manage API keys
2626

2727
You need to either:
2828

29-
* Ask an administrator to update your user role to at least **Developer** by going to the user icon on the header bar and opening **Organization****Members**. Read more about user roles in [Assign user roles and privileges](general-manage-organization.md#general-assign-user-roles). After your use role is updated, restart the onboarding flow.
29+
* Ask an administrator to update your user role to at least **Developer** by going to the user icon on the header bar and opening **Organization****Members**. Read more about user roles in [](/deploy-manage/users-roles/cloud-organization/user-roles.md). After your use role is updated, restart the onboarding flow.
3030
* Get an API key from an administrator and manually add the API to the {{agent}} configuration. See [Configure the {{agent}}](observability-stream-log-files.md#observability-stream-log-files-step-3-configure-the-agent) for more on manually updating the configuration and adding the API key.
3131

3232

0 commit comments

Comments
 (0)