New

The executive guide to generative AI

Read more
IMPORTANT: This documentation is no longer updated. Refer to Elastic's version policy and the latest documentation.

Secure Heartbeat

edit

The following topics provide information about securing the Heartbeat process and connecting to a cluster that has security features enabled.

You can use role-based access control and optionally, API keys to grant Heartbeat users access to secured resources.

After privileged users have been created, use authentication to connect to a secured Elastic cluster.

On Linux, Heartbeat can take advantage of secure computing mode to restrict the system calls that a process can issue.

Was this helpful?
Feedback