2017-12-19 33 views
4

키바 나에서 특정 대시 보드에만 액세스 할 수있는 일부 사용자를 제한하려고합니다. 키바나 버전 6.0.0을 사용하고 있습니다. 현재 사용자 인증을 위해 Searchguard를 사용하고 있지만 대시 보드에서 사용자를 제한 할 수는 없습니다. 아래는 현재 사용중인 elasticsearch.yml 파일입니다.특정 대시 보드에서 일부 키바나 사용자 제한

# ======================== Elasticsearch Configuration ========================= 
# 
# NOTE: Elasticsearch comes with reasonable defaults for most settings. 
#  Before you set out to tweak and tune the configuration, make sure you 
#  understand what are you trying to accomplish and the consequences. 
# 
# The primary way of configuring a node is via this file. This template lists 
# the most important settings you may want to configure for a production cluster. 
# 
# Please consult the documentation for further information on configuration options: 
# https://www.elastic.co/guide/en/elasticsearch/reference/index.html 
# 
# ---------------------------------- Cluster ----------------------------------- 
# 
# Use a descriptive name for your cluster: 
# 
#cluster.name: my-application 
# 
# ------------------------------------ Node ------------------------------------ 
# 
# Use a descriptive name for the node: 
# 
#node.name: node-1 
# 
# Add custom attributes to the node: 
# 
#node.attr.rack: r1 
# 
# ----------------------------------- Paths ------------------------------------ 
# 
# Path to directory where to store the data (separate multiple locations by comma): 
# 
#path.data: /path/to/data 
# 
# Path to log files: 
# 
#path.logs: /path/to/logs 
# 
# ----------------------------------- Memory ----------------------------------- 
# 
# Lock the memory on startup: 
# 
#bootstrap.memory_lock: true 
# 
# Make sure that the heap size is set to about half the memory available 
# on the system and that the owner of the process is allowed to use this 
# limit. 
# 
# Elasticsearch performs poorly when the system is swapping the memory. 
# 
# ---------------------------------- Network ----------------------------------- 
# 
# Set the bind address to a specific IP (IPv4 or IPv6): 
# 
#network.host: 192.168.0.1 
# 
# Set a custom port for HTTP: 
# 
#http.port: 9200 
# 
# For more information, consult the network module documentation. 
# 
# --------------------------------- Discovery ---------------------------------- 
# 
# Pass an initial list of hosts to perform discovery when new node is started: 
# The default list of hosts is ["127.0.0.1", "[::1]"] 
# 
#discovery.zen.ping.unicast.hosts: ["host1", "host2"] 
# 
# Prevent the "split brain" by configuring the majority of nodes (total number of master-eligible nodes/2 + 1): 
# 
#discovery.zen.minimum_master_nodes: 3 
# 
# For more information, consult the zen discovery module documentation. 
# 
# ---------------------------------- Gateway ----------------------------------- 
# 
# Block initial recovery after a full cluster restart until N nodes are started: 
# 
#gateway.recover_after_nodes: 3 
# 
# For more information, consult the gateway module documentation. 
# 
# ---------------------------------- Various ----------------------------------- 
# 
# Require explicit names when deleting indices: 
# 
#action.destructive_requires_name: true 

#action.auto_create_index: .security,.monitoring*,.watches,.triggered_watches,.watcher-history* 



######## Start Search Guard Demo Configuration ######## 
searchguard.ssl.transport.keystore_filepath: keystore.jks 
searchguard.ssl.transport.truststore_filepath: truststore.jks 
searchguard.ssl.transport.enforce_hostname_verification: false 
searchguard.ssl.http.enabled: true 
searchguard.ssl.http.keystore_filepath: keystore.jks 
searchguard.ssl.http.truststore_filepath: truststore.jks 
searchguard.authcz.admin_dn: 
- "CN=kirk,OU=client,O=client,L=test, C=de" 
- "CN=node-0.example.com, OU=SSL, O=Test, L=Test, C=DE" 
#searchguard.restapi.roles_enabled: ["sg_all_access"] 


cluster.name: searchguard_demo 
network.host: 0.0.0.0 
######## End Search Guard Demo Configuration ######## 

어떤 아이디어가 있다면 알려주십시오.

+0

더 나은 여기에 귀하의 질문을 :

X-팩과 같은 기능을 지원합니다 #! forum/search-guard –

답변