- Legacy APM Server Reference:
- Overview
- Installing APM Server
- Upgrading APM Server
- Setting up and running APM Server
- Configuring APM Server
- General configuration options
- Configure the output
- Parse data using ingest node pipelines
- Specify SSL settings
- Load the Elasticsearch index template
- Manual index lifecycle management
- Configure logging
- Set up the Kibana endpoint
- Load the Kibana dashboards
- Set up Real User Monitoring (RUM) support
- Use environment variables in the configuration
- Set up project paths
- Securing APM Server
- Monitoring APM Server
- Real User Monitoring (RUM)
- Tune Data Ingestion
- Storage Management
- Intake API
- Exploring data in Elasticsearch
- Exported fields
- Troubleshooting
- Release notes
- APM Server version 6.8
- APM Server version 6.8.23
- APM Server version 6.8.22
- APM Server version 6.8.21
- APM Server version 6.8.20
- APM Server version 6.8.19
- APM Server version 6.8.18
- APM Server version 6.8.17
- APM Server version 6.8.16
- APM Server version 6.8.15
- APM Server version 6.8.14
- APM Server version 6.8.13
- APM Server version 6.8.12
- APM Server version 6.8.11
- APM Server version 6.8.10
- APM Server version 6.8.9
- APM Server version 6.8.8
- APM Server version 6.8.7
- APM Server version 6.8.6
- APM Server version 6.8.5
- APM Server version 6.8.4
- APM Server version 6.8.3
- APM Server version 6.8.2
- APM Server version 6.8.1
- APM Server version 6.8.0
- APM Server version 6.7
- APM Server version 6.6
- APM Server version 6.5
- APM Server version 6.4
- APM Server version 6.3
- APM Server version 6.2
- APM Server version 6.1
- APM Server version 6.8
NOTE: You are looking at documentation for an older release. For the latest information, see the current release documentation.
Configure authentication credentialsedit
When sending data to a secured cluster through the elasticsearch
output, APM Server must either provide basic authentication credentials
or present a client certificate.
To configure authentication credentials for APM Server:
-
Create a writer role that has the following privileges:
-
Cluster:
manage_index_templates
andmonitor
-
Index:
write
andcreate_index
on the APM Server indices
You can create roles from the Management / Roles UI in Kibana or through the
role
API. For example, the following request creates a role namedapm_writer
: -
Cluster:
-
Assign the writer role to the user that APM Server will use to connect to Elasticsearch. If you plan to load the pre-built Kibana dashboards, also assign the
kibana_user
role.-
To authenticate as a native user, create a user for APM Server to use internally and assign it the writer role, plus any other roles that are needed.
You can create users from the Management / Users UI in Kibana or through the
user
API. For example, following request creates a user namedapm_internal
that has theapm_writer
andkibana_user
roles:POST /_xpack/security/user/apm_internal { "password" : "YOUR_PASSWORD", "roles" : [ "apm_writer","kibana_user"], "full_name" : "Internal APM Server User" }
-
To use PKI authentication, assign the writer role, plus any other roles that are needed, in the
role_mapping.yml
configuration file. Specify the user by the distinguished name that appears in its certificate:apm_writer: - "cn=Internal APM Server User,ou=example,o=com" kibana_user: - "cn=Internal APM Server User,ou=example,o=com"
For more information, see Using Role Mapping Files.
-
-
In the APM Server configuration file, specify authentication credentials for the
elasticsearch
output:-
To use basic authentication, configure the
username
andpassword
settings. For example, the following APM Server output configuration uses the nativeapm_internal
user to connect to Elasticsearch:You created this user earlier.
The example shows a hard-coded password, but you should store sensitive values in the secrets keystore.
-
To use PKI authentication, configure the
certificate
andkey
settings:
-