{"id":13598,"date":"2015-03-05T08:08:14","date_gmt":"2015-03-05T07:08:14","guid":{"rendered":"https:\/\/blog.trifork.com\/?p=13598"},"modified":"2015-03-05T08:08:14","modified_gmt":"2015-03-05T07:08:14","slug":"shield-your-kibana-dashboards","status":"publish","type":"post","link":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/","title":{"rendered":"Shield your Kibana dashboards"},"content":{"rendered":"<p>You work with sensitive data in Elasticsearch indices that you do not want everyone to see in their Kibana dashboards. Like a hospital with patient names. You could give each department their own Elasticsearch cluster in order to prevent all departments to see the patient&#8217;s names, for example.<\/p>\n<p>But wouldn&#8217;t it be great if there was only one Elasticsearch cluster and every departments could manage their own Kibana dashboards? And still have the security in place to prevent leaking of private data?<\/p>\n<p>With Elasticsearch Shield, you can create a configurable layer of security on top of your Elasticsearch cluster. In this article, we will explore a small example setup with Shield and Kibana.<\/p>\n<p><!--more--><\/p>\n<p>In this article, we&#8217;ll use Elasticsearch 1.4.4, Shield 1.0.1 and Kibana 4.0.0. These are at the time of writing the most-recent\u00a0 versions. Beginner knowledge of Elasticsearch is expected.<\/p>\n<p>Suppose we want to keep our patient&#8217;s names private. An index of patients will be available only for one department. An index of cases will be available to all departments.<\/p>\n<p>First, we&#8217;ll add some test data to the cluster. Create a file<code>hospital.json<\/code>with the following content:<\/p>\n<pre class=\"brush: jscript; title: ; notranslate\" title=\"\">\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;cases&quot;, &quot;_type&quot; : &quot;case&quot;, &quot;_id&quot; : &quot;101&quot; } }\n{ &quot;admission&quot; : &quot;2015-01-03&quot;, &quot;discharge&quot; : &quot;2015-01-04&quot;, &quot;injury&quot; : &quot;broken arm&quot; }\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;cases&quot;, &quot;_type&quot; : &quot;case&quot;, &quot;_id&quot; : &quot;102&quot; } }\n{ &quot;admission&quot; : &quot;2015-01-03&quot;, &quot;discharge&quot; : &quot;2015-01-06&quot;, &quot;injury&quot; : &quot;broken leg&quot; }\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;cases&quot;, &quot;_type&quot; : &quot;case&quot;, &quot;_id&quot; : &quot;103&quot; } }\n{ &quot;admission&quot; : &quot;2015-01-06&quot;, &quot;discharge&quot; : &quot;2015-01-07&quot;, &quot;injury&quot; : &quot;broken nose&quot; }\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;cases&quot;, &quot;_type&quot; : &quot;case&quot;, &quot;_id&quot; : &quot;104&quot; } }\n{ &quot;admission&quot; : &quot;2015-01-07&quot;, &quot;discharge&quot; : &quot;2015-01-07&quot;, &quot;injury&quot; : &quot;bruised arm&quot; }\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;cases&quot;, &quot;_type&quot; : &quot;case&quot;, &quot;_id&quot; : &quot;105&quot; } }\n{ &quot;admission&quot; : &quot;2015-01-08&quot;, &quot;discharge&quot; : &quot;2015-01-10&quot;, &quot;injury&quot; : &quot;broken arm&quot; }\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;patients&quot;, &quot;_type&quot; : &quot;patient&quot;, &quot;_id&quot; : &quot;101&quot; } }\n{ &quot;name&quot; : &quot;Adam&quot;, &quot;age&quot; : 28 }\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;patients&quot;, &quot;_type&quot; : &quot;patient&quot;, &quot;_id&quot; : &quot;102&quot; } }\n{ &quot;name&quot; : &quot;Bob&quot;, &quot;age&quot; : 45 }\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;patients&quot;, &quot;_type&quot; : &quot;patient&quot;, &quot;_id&quot; : &quot;103&quot; } }\n{ &quot;name&quot; : &quot;Carol&quot;, &quot;age&quot; : 34 }\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;patients&quot;, &quot;_type&quot; : &quot;patient&quot;, &quot;_id&quot; : &quot;104&quot; } }\n{ &quot;name&quot; : &quot;David&quot;, &quot;age&quot; : 14 }\n{ &quot;index&quot; : { &quot;_index&quot; : &quot;patients&quot;, &quot;_type&quot; : &quot;patient&quot;, &quot;_id&quot; : &quot;105&quot; } }\n{ &quot;name&quot; : &quot;Eddie&quot;, &quot;age&quot; : 72 }\n<\/pre>\n<p>Then bulk index these documents in the cluster:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ curl -X POST 'http:\/\/localhost:9200\/_bulk' --data-binary @.\/hospital.json\n<\/pre>\n<p>Without security, every user can access all documents. Let&#8217;s install Shield to add security.<\/p>\n<p>Directions on how to install Shield can be found at the\u00a0<a title=\"Elasticsearch Shield\" href=\"http:\/\/www.elasticsearch.org\/overview\/shield\" target=\"_blank\" rel=\"noopener\">Elasticsearch website<\/a>. We will do this step by step.<\/p>\n<p>Shield is a commercial product, so first we need to install the license manager:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ elasticsearch\/bin\/plugin -i elasticsearch\/license\/latest\n-&gt; Installing elasticsearch\/license\/latest...\nTrying http:\/\/download.elasticsearch.org\/elasticsearch\/license\/license-latest.zip...\nDownloading .....................................DONE\nInstalled elasticsearch\/license\/latest into \/home\/patrick\/blog\/elasticsearch\/plugins\/license\n<\/pre>\n<p>Now install Shield itself in the same manner:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ elasticsearch\/bin\/plugin -i elasticsearch\/shield\/latest\n-&gt; Installing elasticsearch\/shield\/latest...\nTrying http:\/\/download.elasticsearch.org\/elasticsearch\/shield\/shield-latest.zip...\nDownloading .....................................DONE\nInstalled elasticsearch\/shield\/latest into \/home\/patrick\/blog\/elasticsearch\/plugins\/shield\n<\/pre>\n<p>You will need to restart the nodes of your cluster to activate the plugins.<\/p>\n<p>In the logs of Elasticsearch you&#8217;ll see some messages from the new plugins:<\/p>\n<pre class=\"brush: plain; title: ; notranslate\" title=\"\">\n&#x5B;2015-02-12 08:18:01,347]&#x5B;INFO ]&#x5B;shield.license ] &#x5B;node0] enabling license for &#x5B;shield]\n&#x5B;2015-02-12 08:18:01,347]&#x5B;INFO ]&#x5B;license.plugin.core ] &#x5B;node0] license for &#x5B;shield] - valid\n&#x5B;2015-02-12 08:18:01,355]&#x5B;ERROR]&#x5B;shield.license ] &#x5B;node0]\n#\n# Shield license will expire on &#x5B;Saturday, March 14, 2015]. Cluster health, cluster stats and indices stats operations are\n# blocked on Shield license expiration. All data operations (read and write) continue to work. If you\n# have a new license, please update it. Otherwise, please reach out to your support contact.\n#\n<\/pre>\n<p>Notice that you will get a 30-day trial period to experiment with Shield.<br \/>\nNow all our data is protected. See what happens when we try to get a document:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ curl localhost:9200\/cases\/case\/101?pretty=true\n{\n    &quot;error&quot; : &quot;AuthenticationException&#x5B;missing authentication token for REST request &#x5B;\/cases\/case\/1]]&quot;,\n    &quot;status&quot; : 401\n}\n<\/pre>\n<p>We need to add some roles and users to configure the role-based access control of Shield. First we define the roles and their privileges. The definition of these are found in the <code>elasticsearch\/config\/shield\/roles.yml<\/code> file. Some roles, like admin and user are predefined:<\/p>\n<pre class=\"brush: ruby; title: ; notranslate\" title=\"\">\n# All cluster rights\n# All operations on all indices\nadmin:\n  cluster: all\n  indices:\n    '*': all\n\n# Read-only operations on indices\nuser:\n  indices:\n    '*': read\n<\/pre>\n<p>Let&#8217;s edit this <code>roles.yml<\/code> file to describe our needs. We do not want for every user to access all indices, so we&#8217;ll change <code>user.indices<\/code>. We&#8217;ll add the two roles needed for our organization: doctor and nurse. A doctor has more privileges than a nurse. Doctors can access all indices. Nurses can only access the cases index:<\/p>\n<pre class=\"brush: ruby; title: ; notranslate\" title=\"\">\n# Read-only operations on indices\n#user:\n#  indices:\n#    '*': read\n\n# Doctors can access all indices\ndoctor:\n  indices:\n    '*': read\n\n# Nurses can only access the cases index\nnurse:\n  indices:\n    'cases': read\n<\/pre>\n<p>Now that the roles are defined, we can create users that have these roles. Shield provides three realms to store the users: an internal realm, LDAP or Active Directory. For now, we use the internal realm. The realm is configured in <code>elasticsearch\/config\/elasticsearch.yml<\/code>. If nothing is explicitly configured, the internal realm is used.<br \/>\nTo add users the esusers command line tool can be used. Let&#8217;s create two users (both with abc123 as password), one for each role:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ elasticsearch\/bin\/shield\/esusers useradd alice -r nurse\n$ elasticsearch\/bin\/shield\/esusers useradd bob -r doctor\n<\/pre>\n<p>Just to check if the security works:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ curl --user alice:abc123 localhost:9200\/_count?pretty=true\n{\n  &quot;count&quot; : 5,\n  &quot;_shards&quot; : {\n    &quot;total&quot; : 1,\n    &quot;successful&quot; : 1,\n    &quot;failed&quot; : 0\n  }\n}\n$ curl --user bob:abc123 localhost:9200\/_count?pretty=true\n{\n  &quot;count&quot; : 10,\n  &quot;_shards&quot; : {\n    &quot;total&quot; : 2,\n    &quot;successful&quot; : 2,\n    &quot;failed&quot; : 0\n  }\n}\n<\/pre>\n<p>Alice can see the 5 cases in our cases index. Bob can see those 5 cases plus the 5 patients in the patients index.<\/p>\n<p>Now it&#8217;s time to add Kibana in the mix. Instructions to download and install Kibana 4 can be found on the <a title=\"Kibana download\" href=\"http:\/\/www.elasticsearch.org\/overview\/elkdownloads\" target=\"_blank\" rel=\"noopener\">Elasticsearch website<\/a>.<\/p>\n<p>When we start the Kibana server we notice that Kibana is not allowed access to the Elasticsearch cluster:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ kibana\/bin\/kibana\n{&quot;@timestamp&quot;:&quot;2015-02-26T08:24:48.958Z&quot;,&quot;level&quot;:&quot;fatal&quot;,&quot;message&quot;:&quot;AuthenticationException&#x5B;missing authentication token for REST request &#x5B;\/.kibana\/config\/_search]]&quot;,&quot;node_env&quot;:&quot;production&quot;,&quot;error&quot;:{&quot;message&quot;:&quot;AuthenticationException&#x5B;missing authentication token for REST request &#x5B;\/.kibana\/config\/_search]]&quot;,&quot;name&quot;:&quot;Error&quot;,&quot;stack&quot;:&quot;Error: AuthenticationException&#x5B;missing authentication token for REST request &#x5B;\/.kibana\/config\/_search]]\\n at respond (\/home\/patrick\/kibana\/src\/node_modules\/elasticsearch\/src\/lib\/transport.js:235:15)\\n at checkRespForFailure (\/home\/patrick\/kibana\/src\/node_modules\/elasticsearch\/src\/lib\/transport.js:203:7)\\n at HttpConnector. (\/home\/patrick\/kibana\/src\/node_modules\/elasticsearch\/src\/lib\/connectors\/http.js:156:7)\\n at IncomingMessage.bound (\/home\/patrick\/kibana\/src\/node_modules\/elasticsearch\/node_modules\/lodash-node\/modern\/internals\/baseBind.js:56:17)\\n at IncomingMessage.emit (events.js:117:20)\\n at _stream_readable.js:944:16\\n at process._tickCallback (node.js:442:13)\\n&quot;}}\n<\/pre>\n<p>We need to tell Shield that Kibana is allowed to access our cluster. Extra information of how to let Kibana work with Shield can be found in the <a title=\"Shield with Kibana 4\" href=\"https:\/\/www.elasticsearch.org\/guide\/en\/shield\/current\/_shield_with_kibana_4.html\" target=\"_blank\" rel=\"noopener\">Elasticsearch guide<\/a>.<\/p>\n<p>Shield is shipped with a default configuration for Kibana 4. We find the following role definition in <code>elasticsearch\/config\/shield\/roles.yml<\/code>.<\/p>\n<pre class=\"brush: ruby; title: ; notranslate\" title=\"\">\n# The required role for kibana 4 users\nkibana4:\n  cluster: cluster:monitor\/nodes\/info\n  indices:\n    '*':\n      - indices:admin\/mappings\/fields\/get\n      - indices:admin\/validate\/query\n      - indices:data\/read\/search\n      - indices:data\/read\/msearch\n      - indices:admin\/get\n    '.kibana':\n      - indices:admin\/exists\n      - indices:admin\/mapping\/put\n      - indices:admin\/mappings\/fields\/get\n      - indices:admin\/refresh\n      - indices:admin\/validate\/query\n      - indices:data\/read\/get\n      - indices:data\/read\/mget\n      - indices:data\/read\/search\n      - indices:data\/write\/delete\n      - indices:data\/write\/index\n      - indices:data\/write\/update\n<\/pre>\n<p>When the Kibana Server starts it needs to access the .kibana index. So we need to create a user in Shield for Kibana to connect with:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ elasticsearch\/bin\/shield\/esusers useradd kibana -r kibana4\n<\/pre>\n<p>This account must be configured in Kibana. Modify <code>kibana\/conf\/kibana.yml<\/code>:<\/p>\n<pre class=\"brush: ruby; title: ; notranslate\" title=\"\">\n# If your Elasticsearch is protected with basic auth, this is the user credentials\n# used by the Kibana server to perform maintence on the kibana_index at statup. Your Kibana\n# users will still need to authenticate with Elasticsearch (which is proxied thorugh\n# the Kibana server)\nkibana_elasticsearch_username: kibana\nkibana_elasticsearch_password: abc123\n<\/pre>\n<p>The Kibana users must have the kibana4 role to be able to work with Kibana. They must be able to store their visualizations and dashboards in the .kibana index:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ elasticsearch\/bin\/shield\/esusers roles alice -a kibana4\n$ elasticsearch\/bin\/shield\/esusers roles bob -a kibana4\n<\/pre>\n<p>Since the default kibana4 role has read access on all indices, alice and bob will be granted all access on all indices. Therefore the role permissions must be modified:<\/p>\n<pre class=\"brush: ruby; title: ; notranslate\" title=\"\">\n# Doctors can access all indices\ndoctor:\n  indices:\n    'cases,patients':\n      - indices:admin\/mappings\/fields\/get\n      - indices:admin\/validate\/query\n      - indices:data\/read\/search\n      - indices:data\/read\/msearch\n      - indices:admin\/get\n\n# Nurses can only access the cases index\nnurse:\n  indices:\n    'cases':\n      - indices:admin\/mappings\/fields\/get\n      - indices:admin\/validate\/query\n      - indices:data\/read\/search\n      - indices:data\/read\/msearch\n      - indices:admin\/get\n\n# The required role for kibana 4 users\nkibana4:\n  cluster:\n      - cluster:monitor\/nodes\/info\n      - cluster:monitor\/health\n  indices:\n    '.kibana':\n      - indices:admin\/exists\n      - indices:admin\/mapping\/put\n      - indices:admin\/mappings\/fields\/get\n      - indices:admin\/refresh\n      - indices:admin\/validate\/query\n      - indices:data\/read\/get\n      - indices:data\/read\/mget\n      - indices:data\/read\/search\n      - indices:data\/write\/delete\n      - indices:data\/write\/index\n      - indices:data\/write\/update\n      - indices:admin\/create\n<\/pre>\n<p>With this configuration any user with the kibana4 role is able to use Kibana but only sees data that he or she has the proper clearance for.<\/p>\n<p>We can now start the Kibana Server and see that it runs as it should:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n$ kibana\/bin\/kibana\n{&quot;@timestamp&quot;:&quot;2015-02-26T08:53:18.961Z&quot;,&quot;level&quot;:&quot;info&quot;,&quot;message&quot;:&quot;Listening on 0.0.0.0:5601&quot;,&quot;node_env&quot;:&quot;production&quot;}\n<\/pre>\n<p>We can open a browser and head to localhost:5601 to open the Kibana web interface. Log in as Alice:<\/p>\n<p><a href=\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-13609\" src=\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice-300x152.png\" alt=\"kibana-dialog-alice\" width=\"300\" height=\"152\" \/><\/a><\/p>\n<p>After logging in, Kibana will ask for the index pattern. We&#8217;ll keep it simple:<\/p>\n<p><a href=\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-configure-index-pattern.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-13610\" src=\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-configure-index-pattern-300x115.png\" alt=\"kibana-configure-index-pattern\" width=\"300\" height=\"115\" \/><\/a><\/p>\n<p>Then in the discover tab you can add fields to your view. Notice that Alice only sees cases:<\/p>\n<p><a href=\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/03\/kibana-discover-alice.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13680 size-medium\" src=\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/03\/kibana-discover-alice-300x104.png\" alt=\"\" width=\"300\" height=\"104\" \/><\/a><\/p>\n<p>When we log in as Bob our discover tab shows both cases and patients:<\/p>\n<p><a href=\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/03\/kibana-discover-bob.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13682 size-medium\" src=\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/03\/kibana-discover-bob-300x125.png\" alt=\"\" width=\"300\" height=\"125\" srcset=\"https:\/\/trifork.nl\/blog\/wp-content\/uploads\/sites\/3\/2015\/03\/kibana-discover-bob-300x125.png 300w, https:\/\/trifork.nl\/blog\/wp-content\/uploads\/sites\/3\/2015\/03\/kibana-discover-bob-1024x427.png 1024w, https:\/\/trifork.nl\/blog\/wp-content\/uploads\/sites\/3\/2015\/03\/kibana-discover-bob-768x320.png 768w, https:\/\/trifork.nl\/blog\/wp-content\/uploads\/sites\/3\/2015\/03\/kibana-discover-bob.png 1203w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>To summarize: we added security to Elasticsearch with Shield and configured some users and roles. There&#8217;s nothing more to it!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You work with sensitive data in Elasticsearch indices that you do not want everyone to see in their Kibana dashboards. Like a hospital with patient names. You could give each department their own Elasticsearch cluster in order to prevent all departments to see the patient&#8217;s names, for example. But wouldn&#8217;t it be great if there [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[15,65],"tags":[61,92,404],"class_list":["post-13598","post","type-post","status-publish","format-standard","hentry","category-enterprise-search","category-big_data_search","tag-elasticsearch","tag-kibana","tag-shield"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shield your Kibana dashboards - Trifork Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shield your Kibana dashboards - Trifork Blog\" \/>\n<meta property=\"og:description\" content=\"You work with sensitive data in Elasticsearch indices that you do not want everyone to see in their Kibana dashboards. Like a hospital with patient names. You could give each department their own Elasticsearch cluster in order to prevent all departments to see the patient&#8217;s names, for example. But wouldn&#8217;t it be great if there [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/\" \/>\n<meta property=\"og:site_name\" content=\"Trifork Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-05T07:08:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice-300x152.png\" \/>\n<meta name=\"author\" content=\"Patrick Kik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Kik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/\",\"url\":\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/\",\"name\":\"Shield your Kibana dashboards - Trifork Blog\",\"isPartOf\":{\"@id\":\"https:\/\/trifork.nl\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice-300x152.png\",\"datePublished\":\"2015-03-05T07:08:14+00:00\",\"author\":{\"@id\":\"https:\/\/trifork.nl\/blog\/#\/schema\/person\/804a91e87bb08ce5fa231668f9a4f347\"},\"breadcrumb\":{\"@id\":\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#primaryimage\",\"url\":\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice-300x152.png\",\"contentUrl\":\"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice-300x152.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trifork.nl\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shield your Kibana dashboards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trifork.nl\/blog\/#website\",\"url\":\"https:\/\/trifork.nl\/blog\/\",\"name\":\"Trifork Blog\",\"description\":\"Keep updated on the technical solutions Trifork is working on!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trifork.nl\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/trifork.nl\/blog\/#\/schema\/person\/804a91e87bb08ce5fa231668f9a4f347\",\"name\":\"Patrick Kik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/trifork.nl\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a09a7d756b544d2b48846fe320107ebc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a09a7d756b544d2b48846fe320107ebc?s=96&d=mm&r=g\",\"caption\":\"Patrick Kik\"},\"url\":\"https:\/\/trifork.nl\/blog\/author\/patrickk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shield your Kibana dashboards - Trifork Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/","og_locale":"en_US","og_type":"article","og_title":"Shield your Kibana dashboards - Trifork Blog","og_description":"You work with sensitive data in Elasticsearch indices that you do not want everyone to see in their Kibana dashboards. Like a hospital with patient names. You could give each department their own Elasticsearch cluster in order to prevent all departments to see the patient&#8217;s names, for example. But wouldn&#8217;t it be great if there [&hellip;]","og_url":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/","og_site_name":"Trifork Blog","article_published_time":"2015-03-05T07:08:14+00:00","og_image":[{"url":"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice-300x152.png","type":"","width":"","height":""}],"author":"Patrick Kik","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patrick Kik","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/","url":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/","name":"Shield your Kibana dashboards - Trifork Blog","isPartOf":{"@id":"https:\/\/trifork.nl\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#primaryimage"},"image":{"@id":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#primaryimage"},"thumbnailUrl":"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice-300x152.png","datePublished":"2015-03-05T07:08:14+00:00","author":{"@id":"https:\/\/trifork.nl\/blog\/#\/schema\/person\/804a91e87bb08ce5fa231668f9a4f347"},"breadcrumb":{"@id":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#primaryimage","url":"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice-300x152.png","contentUrl":"https:\/\/trifork.nl\/articles\/wp-content\/uploads\/sites\/3\/2015\/02\/kibana-dialog-alice-300x152.png"},{"@type":"BreadcrumbList","@id":"https:\/\/trifork.nl\/blog\/shield-your-kibana-dashboards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trifork.nl\/blog\/"},{"@type":"ListItem","position":2,"name":"Shield your Kibana dashboards"}]},{"@type":"WebSite","@id":"https:\/\/trifork.nl\/blog\/#website","url":"https:\/\/trifork.nl\/blog\/","name":"Trifork Blog","description":"Keep updated on the technical solutions Trifork is working on!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trifork.nl\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/trifork.nl\/blog\/#\/schema\/person\/804a91e87bb08ce5fa231668f9a4f347","name":"Patrick Kik","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trifork.nl\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a09a7d756b544d2b48846fe320107ebc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a09a7d756b544d2b48846fe320107ebc?s=96&d=mm&r=g","caption":"Patrick Kik"},"url":"https:\/\/trifork.nl\/blog\/author\/patrickk\/"}]}},"_links":{"self":[{"href":"https:\/\/trifork.nl\/blog\/wp-json\/wp\/v2\/posts\/13598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trifork.nl\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trifork.nl\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trifork.nl\/blog\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/trifork.nl\/blog\/wp-json\/wp\/v2\/comments?post=13598"}],"version-history":[{"count":0,"href":"https:\/\/trifork.nl\/blog\/wp-json\/wp\/v2\/posts\/13598\/revisions"}],"wp:attachment":[{"href":"https:\/\/trifork.nl\/blog\/wp-json\/wp\/v2\/media?parent=13598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trifork.nl\/blog\/wp-json\/wp\/v2\/categories?post=13598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trifork.nl\/blog\/wp-json\/wp\/v2\/tags?post=13598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}