Back to Beats

Secure Metricbeat [securing-metricbeat]

docs/reference/metricbeat/securing-metricbeat.md

9.4.0987 B
Original Source

Secure Metricbeat [securing-metricbeat]

The following topics provide information about securing the Metricbeat process and connecting to a cluster that has {{security-features}} enabled.

You can use role-based access control and optionally, API keys to grant Metricbeat users access to secured resources.

After privileged users have been created, use authentication to connect to a secured Elastic cluster.

On Linux, Metricbeat can take advantage of secure computing mode to restrict the system calls that a process can issue.