APM agent Key API
editAPM agent Key API
editThe APM agent Key API allows you to configure APM agent keys to authorize requests from APM agents to the APM Server.
The following APM agent key APIs are available:
- Create agent key to create an APM agent key
How to use APM APIs
editExpand for required headers, privileges, and usage details
Interact with APM APIs using cURL or another API tool. All APM APIs are Kibana APIs, not Elasticsearch APIs; because of this, the Kibana dev tools console cannot be used to interact with APM APIs.
For all APM APIs, you must use a request header.
Supported headers are Authorization, kbn-xsrf, and Content-Type.
-
Authorization: ApiKey {credentials} -
Kibana supports token-based authentication with the Elasticsearch API key service. The API key returned by the Elasticsearch create API key API can be used by sending a request with an
Authorizationheader that has a value ofApiKeyfollowed by the{credentials}, where{credentials}is the base64 encoding ofidandapi_keyjoined by a colon.Alternatively, you can create a user and use their username and password to authenticate API access:
-u $USER:$PASSWORD.Whether using
Authorization: ApiKey {credentials}, or-u $USER:$PASSWORD, users interacting with APM APIs must have sufficient privileges. -
kbn-xsrf: true -
By default, you must use
kbn-xsrffor all API calls, except in the following scenarios:-
The API endpoint uses the
GETorHEADoperations -
The path is allowed using the
server.xsrf.allowlistsetting -
XSRF protections are disabled using the
server.xsrf.disableProtectionsetting
-
The API endpoint uses the
-
Content-Type: application/json -
Applicable only when you send a payload in the API request.
Kibana API requests and responses use JSON.
Typically, if you include the
kbn-xsrfheader, you must also include theContent-Typeheader.