- Auditbeat Reference: other versions:
- Overview
- Getting started with Auditbeat
- Breaking changes in 6.2
- Setting up and running Auditbeat
- Configuring Auditbeat
- Specify which modules to run
- Specify general settings
- Reload the configuration dynamically
- Configure the internal queue
- Configure the output
- Specify SSL settings
- Filter and enhance the exported data
- Parse data by using ingest node
- Set up project paths
- Set up the Kibana endpoint
- Load the Kibana dashboards
- Load the Elasticsearch index template
- Configure logging
- Use environment variables in the configuration
- YAML tips and gotchas
- Regular expression support
- HTTP Endpoint
- auditbeat.reference.yml
- Modules
- Exported fields
- Monitoring Auditbeat
- Securing Auditbeat
- Troubleshooting
- Contributing to Beats
Grant users access to Auditbeat indices
editGrant users access to Auditbeat indices
editTo enable users to access the indices Auditbeat creates, grant them read
and view_index_metadata
privileges on the Auditbeat indices. If they’re
using Kibana, they also need the kibana_user
role.
-
Create a reader role that has the
read
andview_index_metadata
privileges on the Auditbeat indices.You can create roles from the Management > Roles UI in Kibana or through the
role
API. For example, the following request creates a role namedauditbeat_reader
: -
Assign your users the reader role so they can access the Auditbeat indices. For Kibana users who need to visualize the data, also assign the
kibana_user
role:-
If you’re using the
native
realm, you can assign roles with the Management > Users UI in Kibana or through theuser
API. For example, the following request grantsauditbeat_user
theauditbeat_reader
andkibana_user
roles:POST /_xpack/security/user/auditbeat_user { "password" : "YOUR_PASSWORD", "roles" : [ "auditbeat_reader","kibana_user"], "full_name" : "Auditbeat User" }
-
If you’re using the LDAP, Active Directory, or PKI realms, you assign the roles in the
role_mapping.yml
configuration file. For example, the following snippet grantsAuditbeat User
theauditbeat_reader
andkibana_user
roles:auditbeat_reader: - "cn=Auditbeat User,dc=example,dc=com" kibana_user: - "cn=Auditbeat User,dc=example,dc=com"
For more information, see Using Role Mapping Files.
-