Show pageOld revisionsBacklinksODT exportBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. =====Overview===== Kibana is the so-called Front-end of your analyzing software. So it is important to be secured. I have also secured internal communication between Filebeat/Logstash to Elasticsearch, but this is a topic for another time. Let's start with securing Kibana's Front-end. =====Requirements===== You SHOULD have either: * Valid Certificate from Certification Authority (Let's encrypt is Free SSL CA) * Self-Signed Certificate(Not Recommended) =====Process===== Simple insert the following lines in the kibana.yml and all should be working normal: <sxh bash> server.ssl.enabled: true <- Enable SSL/TLS server.ssl.certificate: /root/SSLCert/cert.pem <- Provide the Certificate (Public key + CA Info) server.ssl.key: /root/SSLCert/key.pem <- Provide the key file </sxh> Congrats, you have SSL/TLS connection :) elkstack_ssl_kibana.txt Last modified: 2019/10/18 20:04by 127.0.0.1