@@ -240,11 +240,11 @@ choose a role yet--we'll come back to that in subsequent steps.
240240
241241In <<get-started-elastic-stack>>, you configured {ls} to listen for {metricbeat}
242242input and to send the events to {es}. You therefore need to create a user
243- that {ls} and {metricbeat} can use to communicate with {es}. Click *Create user*
244- and create a `metricbeat_internal ` user, for example:
243+ that {ls} can use to communicate with {es}. Click *Create user* and create a
244+ `logstash_internal ` user, for example:
245245
246246[role="screenshot"]
247- image::security/images/create-metricbeat -user.jpg["Creating a {metricbeat } user in {kib}"]
247+ image::security/images/create-logstash -user.jpg["Creating a {ls } user in {kib}"]
248248
249249[float]
250250[[gs-roles]]
@@ -294,15 +294,12 @@ Create a `metricbeat_writer` role that has `manage_index_templates` and `monitor
294294cluster privileges, as well as `write`, `delete`, and `create_index` privileges
295295on the `metricbeat-*` indices:
296296
297- // TBD: The Beats docs don't mention the need for the delete privilege, whereas
298- // the Logstash docs do. Which should be used in this case?
299-
300297[role="screenshot"]
301298image::security/images/create-writer-role.jpg["Creating another role in Kibana"]
302299
303300Now go back to the *Management / Security / Users* page and assign these roles
304301to the appropriate users. Assign the `metricbeat_reader` role to your personal
305- user. Assign the `metricbeat_writer` role to the `metricbeat_internal ` user.
302+ user. Assign the `metricbeat_writer` role to the `logstash_internal ` user.
306303
307304The list of users should now contain all of the built-in users as well as the
308305two you created. It should also show the appropriate roles for your users:
@@ -314,12 +311,11 @@ If you want to learn more about authorization and roles, see <<authorization>>.
314311
315312[float]
316313[[gs-logstash-security]]
317- === Add users in {ls}
314+ === Add user information in {ls}
318315
319316In order for {ls} to send data successfully to {es}, you must configure its
320- authentication credentials. You must configure credentials for each of the {es}
321- plugins in your {ls} configuration file. For example, update the
322- `demo-metrics-pipeline.conf` file in your {ls} directory:
317+ authentication credentials in the {ls} configuration file. For example, update
318+ the `demo-metrics-pipeline.conf` file in your {ls} directory:
323319
324320[source,ruby]
325321----
@@ -347,12 +343,12 @@ output {
347343 hosts => "localhost:9200"
348344 manage_template => false
349345 index => "%{[@metadata][beat]}-%{[@metadata][version]}-%{+YYYY.MM.dd}"
350- user => "metricbeat_internal " <1>
346+ user => "logstash_internal " <1>
351347 password => "your_password" <2>
352348 }
353349}
354350----
355- <1> Specify the `metricbeat_internal ` user that you created earlier in this tutorial.
351+ <1> Specify the `logstash_internal ` user that you created earlier in this tutorial.
356352<2> Specify the password that you chose for this user ID.
357353
358354If you prefer not to put your user ID and password in the configuration file,
@@ -372,7 +368,7 @@ set -o history
372368in an environment variable called `LOGSTASH_KEYSTORE_PASS`. For more information,
373369see {logstash-ref}/keystore.html#keystore-password[Keystore password].
374370
375- When prompted, specify the `metricbeat_internal ` user and its password for the
371+ When prompted, specify the `logstash_internal ` user and its password for the
376372`ES_USER` and `ES_PWD` values.
377373
378374NOTE: The {ls} keystore differs from the {kib} keystore. Whereas the {kib}
@@ -412,17 +408,12 @@ command:
412408To start {ls} as a service, see
413409{logstash-ref}/running-logstash.html[Running {ls} as a service on Debian or RPM].
414410
415- [float]
416- [[gs-metricbeat-security]]
417- === Add users in {metricbeat}
418-
419- If you were connecting directly from {metricbeat} to {es}, you would need to
420- configure authentication credentials for the {es} output in the {metricbeat}
421- configuration file.
422-
423- In <<get-started-elastic-stack>>, however, you configured {metricbeat} to send
424- the data to {ls} for additional parsing, so no extra settings are required in
425- {metricbeat}.
411+ TIP: If you were connecting directly from {metricbeat} to {es}, you would need
412+ to configure authentication credentials for the {es} output in the {metricbeat}
413+ configuration file. In <<get-started-elastic-stack>>, however, you configured
414+ {metricbeat} to send the data to {ls} for additional parsing, so no extra
415+ settings are required in {metricbeat}. For more information, see
416+ {metricbeat-ref}/securing-metricbeat.html[Securing {metricbeat}].
426417
427418Start {metricbeat} by using the appropriate method for your environment. For
428419example, on macOS, run the following command from the {metricbeat} directory:
0 commit comments