IMPORTANT: No additional bug fixes or documentation updates
will be released for this version. For the latest information, see the
current release documentation.
Configure Auditbeat to use security features
editConfigure Auditbeat to use security features
editIf you want Auditbeat to connect to a cluster that has security features enabled, there are extra configuration steps:
-
Grant users access to secured resources.
You can use role-based access control to grant Auditbeat users access to secured resources.
-
You can use API keys to grant access to Elasticsearch more securely.
-
Configure authentication credentials.
To interact with a secured cluster, Auditbeat must either provide basic authentication credentials or present a client certificate.
-
Configure Auditbeat to use encrypted connections.
If encryption is enabled on the cluster, you need to enable HTTPS in the Auditbeat configuration.
For more information about security features, see Secure a cluster.