New

The executive guide to generative AI

Read more

Secure Packetbeat

edit

The following topics provide information about securing the Packetbeat process and connecting to a cluster that has security features enabled.

You can use role-based access control and optionally, API keys to grant Packetbeat users access to secured resources.

After privileged users have been created, use authentication to connect to a secured Elastic cluster.

On Linux, Packetbeat can take advantage of secure computing mode to restrict the system calls that a process can issue.

Was this helpful?
Feedback