This functionality is experimental and may be changed or removed completely in a
future release. Elastic will take a best effort approach to fix any issues, but
experimental features are not subject to the support SLA of official GA
features.
Configure Journalbeat to use security features
editConfigure Journalbeat to use security features
editIf you want Journalbeat to connect to a cluster that has security features enabled, there are extra configuration steps:
-
Grant users access to secured resources.
You can use role-based access control to grant Journalbeat users access to secured resources.
-
You can use API keys to grant access to Elasticsearch more securely.
-
Configure authentication credentials.
To interact with a secured cluster, Journalbeat must either provide basic authentication credentials or present a client certificate.
-
Configure Journalbeat to use encrypted connections.
If encryption is enabled on the cluster, you need to enable HTTPS in the Journalbeat configuration.
For more information about security features, see Secure a cluster.