Skip to content

Commit

Permalink
[DOCS] Added beats_system user (elastic#6541)
Browse files Browse the repository at this point in the history
This PR documents the new beats_system built-in user and how it is configured for use with X-Pack monitoring.
  • Loading branch information
lcawl authored and ruflin committed Mar 14, 2018
1 parent 96dba6b commit dd2983d
Show file tree
Hide file tree
Showing 12 changed files with 40 additions and 7 deletions.
1 change: 1 addition & 0 deletions auditbeat/docs/securing-auditbeat.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ and other products in the Elastic stack:

* <<securing-communication-elasticsearch>>
* <<configuring-ssl-logstash>>
* <<securing-beats>>

//sets block macro for https.asciidoc included in next section

Expand Down
1 change: 1 addition & 0 deletions filebeat/docs/securing-filebeat.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ The following topics describe how to secure communication between Filebeat and o

* <<securing-communication-elasticsearch>>
* <<configuring-ssl-logstash>>
* <<securing-beats>>

//sets block macro for https.asciidoc included in next section

Expand Down
1 change: 1 addition & 0 deletions heartbeat/docs/securing-heartbeat.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ and other products in the Elastic stack:

* <<securing-communication-elasticsearch>>
* <<configuring-ssl-logstash>>
* <<securing-beats>>

//sets block macro for https.asciidoc included in next section

Expand Down
8 changes: 4 additions & 4 deletions libbeat/docs/monitoring/monitoring-beats.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -24,8 +24,8 @@ information, see
To configure {beatname_uc} to collect and send monitoring metrics:

. Create a user that has appropriate authority to send system-level monitoring
data to {es}. For example, you can use the built-in `logstash_system` user or
assign the built-in `logstash_system` role to another user. For more
data to {es}. For example, you can use the built-in `beats_system` user or
assign the built-in `beats_system` role to another user. For more
information, see
{xpack-ref}/setting-up-authentication.html[Setting Up User Authentication] and
{xpack-ref}/built-in-roles.html[Built-in Roles].
Expand All @@ -51,8 +51,8 @@ xpack.monitoring:
enabled: true
elasticsearch:
hosts: ["https://example.com:9200", "https://example2.com:9200"]
username: elastic
password: changeme
username: beats_system
password: beatspassword
--------------------

--
Expand Down
2 changes: 1 addition & 1 deletion libbeat/docs/security/basic-auth.asciidoc
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[role="xpack"]
[[beats-basic-auth]]
=== Configuring Authentication Credentials for {beatname_uc}
=== Configuring authentication credentials for {beatname_uc}

When sending data to a secured cluster through the `elasticsearch`
output, {beatname_uc} must either provide basic authentication credentials
Expand Down
23 changes: 23 additions & 0 deletions libbeat/docs/security/beats-system.asciidoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
[role="xpack"]
[[beats-system-user]]
=== Configuring the built-in user for {beatname_uc}

{security} provides built-in user credentials in {es} that have a fixed set of
privileges. In 6.3.0 and later releases, there is a `beats_system` built-in user,
which {beatname_uc} uses to store monitoring information in {es}.

The initial passwords for all of the built-in users are set by using the
`setup-passwords` tool in {es}. Thereafter, you can change the passwords by
using the *Management > Users* page in Kibana or the
{ref}/security-api-change-password.html[Change Password API].

IMPORTANT: If you upgraded from {es} version 6.2 or earlier, you will not
have set a password for the `beats_system` user. A user with the
`manage_security` privilege must change the password for this built-in user.

For more
information, see:

* {xpack-ref}/setting-up-authentication.html[Setting Up User Authentication]
* {xpack-ref}/built-in-roles.html[Built-in Roles]
* <<monitoring>>
4 changes: 4 additions & 0 deletions libbeat/docs/security/securing-beats.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -17,9 +17,13 @@ In addition to configuring authentication credentials for the {beatname_uc}
itself, you need to grant authorized users permission to access the indices it
creates. See <<beats-user-access>>.

If you plan to monitor {beatname_uc} in Kibana, you must also
<<beats-system-user,configure the `beats_system` built-in user>>.

For more information about {security}, see
{xpack-ref}/xpack-security.html[Securing {es} and {kib}].

include::basic-auth.asciidoc[]
include::user-access.asciidoc[]
include::tls.asciidoc[]
include::beats-system.asciidoc[]
2 changes: 1 addition & 1 deletion libbeat/docs/security/tls.asciidoc
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[role="xpack"]
[[beats-tls]]
=== Configuring {beatname_uc} to use Encrypted Connections
=== Configuring {beatname_uc} to use encrypted connections

If encryption is enabled on the {es} cluster, you need to connect to {es} via
HTTPS. If the certificate authority (CA) that signed your node certificates
Expand Down
2 changes: 1 addition & 1 deletion libbeat/docs/security/user-access.asciidoc
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[role="xpack"]
[[beats-user-access]]
=== Granting Users Access to {beatname_uc} Indices
=== Granting users access to {beatname_uc} indices

To enable users to access the indices a {beatname_uc} creates, grant them `read`
and `view_index_metadata` privileges on the {beatname_uc} indices:
Expand Down
1 change: 1 addition & 0 deletions metricbeat/docs/securing-metricbeat.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ The following topics describe how to secure communication between

* <<securing-communication-elasticsearch>>
* <<configuring-ssl-logstash>>
* <<securing-beats>>

//sets block macro for https.asciidoc included in next section

Expand Down
1 change: 1 addition & 0 deletions packetbeat/docs/securing-packetbeat.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ The following topics describe how to secure communication between Packetbeat and

* <<securing-communication-elasticsearch>>
* <<configuring-ssl-logstash>>
* <<securing-beats>>

//sets block macro for https.asciidoc included in next section

Expand Down
1 change: 1 addition & 0 deletions winlogbeat/docs/securing-winlogbeat.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ The following topics describe how to secure communication between Winlogbeat and

* <<securing-communication-elasticsearch>>
* <<configuring-ssl-logstash>>
* <<securing-beats>>

//sets block macro for https.asciidoc included in next section

Expand Down

0 comments on commit dd2983d

Please sign in to comment.