Tutorial: Getting started with security

Tutorial: Getting started with securityedit

In this tutorial, you learn how to secure a cluster by configuring users and roles in Elasticsearch, Kibana, Logstash, and Metricbeat.

Before you beginedit

  1. Install and configure Elasticsearch, Kibana, Logstash, and Metricbeat as described in Getting started with the Elastic Stack.
  2. Stop Logstash. The method for starting and stopping Logstash varies depending on whether you are running it from the command line or running it as a service. For example, if you are running Logstash from the command line, you can stop it by entering Ctrl-C. See Shutting down Logstash.
  3. Stop Metricbeat. For example, enter Ctrl-C on the command line where it is running.
  4. Launch the Kibana web interface by pointing your browser to port 5601. For example,