Tutorial: Getting started with securityedit

In this tutorial, you learn how to secure a cluster by configuring users and roles in Elasticsearch, Kibana, Logstash, and Metricbeat.

Before you beginedit

  1. Install and configure Elasticsearch, Kibana, Logstash, and Metricbeat as described in Getting started with the Elastic Stack.

    To complete this tutorial, you must install the default Elasticsearch and Kibana packages, which include role-based access control (RBAC) and native authentication security features. When you install these products, they apply basic licenses with no expiration dates. All of the subsequent steps in this tutorial assume that you are using a basic license. For more information, see https://www.elastic.co/subscriptions and License management.

  2. Stop Logstash. The method for starting and stopping Logstash varies depending on whether you are running it from the command line or running it as a service. For example, if you are running Logstash from the command line, you can stop it by entering Ctrl-C. See Shutting down Logstash.
  3. Stop Metricbeat. For example, enter Ctrl-C on the command line where it is running.
  4. Launch the Kibana web interface by pointing your browser to port 5601. For example,