WARNING: Version 6.1 of Auditbeat has passed its EOL date.
This documentation is no longer being maintained and may be removed. If you are running this version, we strongly advise you to upgrade. For the latest information, see the current release documentation.
Configuring Authentication Credentials for Auditbeat
editConfiguring Authentication Credentials for Auditbeat
editWhen sending data to a secured cluster through the elasticsearch
output, Auditbeat must either provide basic authentication credentials
or present a client certificate.
To configure authentication credentials for Auditbeat:
-
Create a role that has the
manage_index_templatesandmonitorcluster privileges, andread,write, andcreate_indexprivileges for the indices that Auditbeat creates. You can create roles from the Management / Roles UI in Kibana or through theroleAPI. For example, the following request creates aauditbeat_writerrole: -
Assign the writer role to the user that Auditbeat will use to connect to Elasticsearch:
-
To authenticate as a native user, create a user for the Auditbeat to use internally and assign it the writer role. You can create users from the Management / Users UI in Kibana or through the
userAPI. For example, the following request creates aauditbeat_internaluser that has theauditbeat_writerrole:POST /_xpack/security/user/auditbeat_internal { "password" : "x-pack-test-password", "roles" : [ "auditbeat_writer"], "full_name" : "Internal Auditbeat User" } -
To authenticate using PKI authentication, assign the writer role to the internal Auditbeat user in the
role_mapping.ymlconfiguration file. Specify the user by the distinguished name that appears in its certificate.auditbeat_writer: - "cn=Internal Auditbeat User,ou=example,o=com"
For more information, see Using Role Mapping Files.
-
-
Configure authentication credentials for the
elasticsearchoutput in the Auditbeat configuration file:-
To use basic authentication, configure the
usernameandpasswordsettings. For example, the following Auditbeat output configuration uses the nativeauditbeat_internaluser to connect to Elasticsearch:output.elasticsearch: hosts: ["localhost:9200"] index: "auditbeat" username: "auditbeat_internal" password: "x-pack-test-password" -
To use PKI authentication, configure the
certificateandkeysettings:
-