IMPORTANT: No additional bug fixes or documentation updates
will be released for this version. For the latest information, see the
current release documentation.
Secure Metricbeat
editSecure Metricbeat
editThe following topics provide information about securing the Metricbeat process and connecting to a cluster that has security features enabled.
You can use role-based access control and optionally, API keys to grant Metricbeat users access to secured resources.
After privileged users have been created, use authentication to connect to a secured Elastic cluster.
On Linux, Metricbeat can take advantage of secure computing mode to restrict the system calls that a process can issue.