This functionality is experimental and may be changed or removed completely in a future release. Elastic will take a best effort approach to fix any issues, but experimental features are not subject to the support SLA of official GA features.
The following topics provide information about securing the Journalbeat process and connecting to a cluster that has security features enabled.
You can use role-based access control and optionally, API keys to grant Journalbeat users access to secured resources.
After privileged users have been created, use authentication to connect to a secured Elastic cluster.
On Linux, Journalbeat can take advantage of secure computing mode to restrict the system calls that a process can issue.
Intro to Kibana
ELK for Logs & Metrics