With Amazon Web Services offering of Elasticsearch you can secure your search domain using resource-based, IP-Based, and IAM user and role-based access policies.
However, these do not apply for Kibana. You can secure your endpoint using IP-Based access policies, and with no VPC support, in order to look into a workaround, you can implement a EC2 Instance that serves as a reverse proxy to your search domain endpoint.
In this post, we will use an EC2 instance, using NGINX as a reverse proxy and using Basic HTTP auth to authenticate clients for Kibana.
Note: ES5 with Kibana Config has been added at the bottom page
Installing Nginx:
$ sudo yum update -y
$ sudo yum install nginx httpd-tools -y
Nginx Configuration:
We will configure the following configuration files on Nginx:
/etc/nginx/nginx.conf
/etc/nginx/conf.d/kibana.conf
You will need to replace the values of:
server_name
proxy_pass
,proxy_redirect
# Config: /etc/nginx/nginx.conf
worker_processes 1;
error_log /var/log/nginx/error.log;
pid /var/run/nginx.pid;
include /usr/share/nginx/modules/*.conf;
events {
worker_connections 1024;
}
http {
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
access_log /var/log/nginx/access.log main;
server_names_hash_bucket_size 128;
sendfile on;
tcp_nopush on;
tcp_nodelay on;
keepalive_timeout 65;
types_hash_max_size 2048;
include /etc/nginx/mime.types;
default_type application/octet-stream;
include /etc/nginx/conf.d/*.conf;
index index.html index.htm;
server {
listen 8080 default_server;
listen [::]:8080 default_server;
server_name localhost;
root /usr/share/nginx/html;
include /etc/nginx/default.d/*.conf;
location / {
}
error_page 404 /404.html;
location = /40x.html {
}
error_page 500 502 503 504 /50x.html;
location = /50x.html {
}
}
}
# Config: /etc/nginx/conf.d/kibana.conf
server {
listen 80;
server_name myproxy.mydomain.com;
location / {
proxy_pass http://search-domain.eu-west-1.es.amazonaws.com/;
proxy_redirect http://search-domain.eu-west-1.es.amazonaws.com/ /;
proxy_http_version 1.1;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header Authorization "";
proxy_hide_header Authorization;
auth_basic "Username and Password are required";
auth_basic_user_file /etc/nginx/.htpasswd;
}
}
With the above configuration, your Nginx server will listen on port 80 for your reverse proxy, and port 8080 for your normal web server.
Elasticsearch Service Access Policy:
Below is a example policy, that will allow access to the Elasticsearch Domain from 1 IP Address:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "",
"Effect": "Allow",
"Principal": {
"AWS": "*"
},
"Action": "es:*",
"Resource": "arn:aws:es:eu-west-1:123456789012:domain/search-domain/*",
"Condition": {
"IpAddress": {
"aws:SourceIp": [
"196.10.12.13"
]
}
}
}
]
}
Once you saved the policy, allow the service about 15 minutes to make the changes before its in service.
Adding Users to Authenticate:
$ sudo htpasswd -c /etc/nginx/.htpasswd admin
Start Nginx:
$ /etc/init.d/nginx restart
$ chkconfig nginx on
Once the Nginx service has started, when accessing your proxy on: http://<myproxy>.<mydomain>.com/_plugin/kibana/
you should be prompted for credentials, and after successful login, you should be presented with your Kibana UI.
Update:
Example Nginx Config of Elasticsearch 5 with Kibana can be found on my Nginx Config Repo
Comments