127.0.0.1 kerberos.test.elastic.co
[libdefaults]
default_realm = TEST.ELASTIC.CO
[realms]
TEST.ELASTIC.CO = {
admin_server = kerberos.test.elastic.co
kdc = kerberos.test.elastic.co
default_principal_flags = +preauth
}
[domain_realm]
localhost = TEST.ELASTIC.CO
./run.sh
input the ES and Kibana hosts when prompted- Upload the resultant
krb-bundle.zip
to as a custom user bundle - Deployments -> Select your deployment -> Edit
-
Elasticsearch user settings overrides
xpack.security.authc.realms.kerberos.kerb1.keytab.path: es.keytab
-
Select custom user bundle
-
Kibana user settings overrides
xpack.security.authProviders: ['kerberos', 'basic']
-
./map-roles.sh
input the ES host and the password for theelastic
user
./run.sh
input the ES and Kibana hosts when prompted- Upload the resultant
krb-bundle.zip
to Google Storage - Deployments -> Select your deployment -> Edit -> Use the advanced Elasticsearch configuration
- Add the following:
"elasticsearch": { ... "user_bundles": [ { "name": "krb", "url": "https://storage.googleapis.com/kobelb/krb-bundle.zip", "elasticsearch_version": "7.3.0" } ] }
- Save
- Add the following:
- Edit
- Elasticsearch user settings overrides
xpack.security.authc.realms.kerberos.kerb1.keytab.path: es.keytab
- Kibana user settings overrides
xpack.security.authProviders: ['kerberos', 'basic']
- Elasticsearch user settings overrides
./map-roles.sh
input the ES host and the password for theelastic
user