Securing Kibana and ElasticSearch without X-Pack-Security plugin

0

A customer integrated the ELK stack into their application. If they run their own ES cluster, or use the managed service provided by elastic.co, they can lock down access to Kibana and ES using the X-Pack-Security plugin.

They're aware of the approach outlined in https://aws.amazon.com/blogs/security/how-to-control-access-to-your-amazon-elasticsearch-service-domain/, but want to avoid the need to run a proxy to handle authentication between Kibana & ES.

Do we have any alternative suggestion?

已提问 7 年前468 查看次数
1 回答
0
已接受的回答

Rather than use a proxy server that is allowed access via IP which requires you running an extra instance, you can enable IAM access and use the aws-es-kibana proxy which runs locally on the client and uses the clients IAM credentials to do the SigV4 signing. Here's another local proxy that supports IAM roles which the first one I mentioned doesn't.

AWS
专家
Adam_W
已回答 7 年前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则