- APM Guide: other versions:
- What is APM?
- Components and documentation
- Quick start
- Data Model
- Features
- How-to guides
- Manage storage
- Input settings
- Secure communication with APM agents
- API
- Troubleshooting
- Upgrade
- Release notes
- Legacy APM Overview
- Components and documentation
- Quick start guide
- Data Model
- Features
- Troubleshooting
- Breaking changes
- 7.15.0 APM Breaking changes
- 7.14.0 APM Breaking changes
- 7.13.0 APM Breaking changes
- 7.12.0 APM Breaking changes
- 7.11.0 APM Breaking changes
- 7.10.0 APM Breaking changes
- 7.9.0 APM Breaking changes
- 7.8.0 APM Breaking changes
- 7.7.0 APM Breaking changes
- 7.6.0 APM Breaking changes
- 7.5.0 APM Breaking changes
- 7.4.0 APM Breaking changes
- 7.3.0 APM Breaking changes
- 7.2.0 APM Breaking changes
- 7.1.0 APM Breaking changes
- 7.0.0 APM Breaking changes
- 6.8.0 APM Breaking changes
- 6.7.0 APM Breaking changes
- 6.6.0 APM Breaking changes
- 6.5.0 APM Breaking changes
- 6.4.0 APM Breaking changes
- Legacy APM Server Reference
- Get started
- Set up
- How-to guides
- Configure
- Secure
- Monitor
- API
- Explore data in Elasticsearch
- Exported fields
- APM Application Metrics fields
- APM Error fields
- APM Profile fields
- APM Sourcemap fields
- APM Span fields
- APM Span Metrics fields
- APM Transaction fields
- APM Transaction Metrics fields
- APM Transaction Metrics fields
- Beat fields
- Cloud provider metadata fields
- Docker fields
- ECS fields
- Host fields
- Kubernetes fields
- Process fields
- System Metrics fields
- Troubleshoot
Secure APM Server
editSecure APM Server
editThis documentation refers to configuring the standalone (legacy) APM Server. This method of running APM Server will be deprecated and removed in a future release. Please consider upgrading to Fleet and the APM integration. If you’re using Fleet and the Elastic APM integration, please see Secure communication with APM agents instead.
The following topics provide information about securing the APM Server process and connecting to a cluster that has security features enabled.
You can use role-based access control and optionally, API keys to grant APM Server users access to secured resources.
After privileged users have been created, use authentication to connect to a secured Elastic cluster.
For secure communication between APM Server and APM Agents, see Secure communication with APM agents.
On Linux, APM Server can take advantage of secure computing mode to restrict the system calls that a process can issue.
A reference of all available SSL configuration settings is also available.
Security Overview
editAPM Server exposes an HTTP endpoint, and as with anything that opens ports on your servers, you should be careful about who can connect to it. Firewall rules are recommended to ensure only authorized systems can connect.
On this page