logo
icon

Elasticsearch Single Node with Kibana (v9)

Production-ready single-node Elasticsearch with Kibana, using official images. Password and SSL enabled by default.

template cover
Implementado1 veces
EditorzeaburZeabur
Creado2025-12-27
Servicios
service icon
service icon
Etiquetas
SearchAnalyticsElasticsearchKibanaSingle Node

Elasticsearch Single Node with Kibana

This template deploys a secure, production-ready single-node Elasticsearch with Kibana, using official Elastic images. Password and SSL are enabled by default.

Features

  • Single-node Elasticsearch with security enabled
  • Kibana with secure connection to Elasticsearch
  • Password and port auto-configured
  • Suitable for production and development

Usage

ELK does not provide a one-click deployment. You should follow the instructions below to get a secured instance of ELK:

  1. Deploy the stack

  2. Run the following command in "Terminal" to create a service account token for Kibana.

    $ ./bin/elasticsearch-service-tokens create elastic/kibana kibana
    SERVICE_TOKEN elastic/kibana/kibana2 = <your-service-token>
    
  3. Fill the service token to the Kibana environment variable ELASTICSEARCH_SERVICEACCOUNTTOKEN.

  4. Restart the Kibana service.

  5. Generate the encryption keys for Kibana. Run the following command in "Terminal":

    $ bin/kibana-encryption-keys generate
    ## Kibana Encryption Key Generation Utility
    
    The 'generate' command guides you through the process of setting encryption keys for:
    
    xpack.encryptedSavedObjects.encryptionKey
        Used to encrypt stored objects such as dashboards and visualizations
        https://www.elastic.co/guide/en/kibana/current/xpack-security-secure-saved-objects.   html#xpack-security-secure-saved-objects
    
    xpack.reporting.encryptionKey
        Used to encrypt saved reports
        https://www.elastic.co/guide/en/kibana/current/reporting-settings-kb.   html#general-reporting-settings
    
    xpack.security.encryptionKey
        Used to encrypt session information
        https://www.elastic.co/guide/en/kibana/current/security-settings-kb.   html#security-session-and-cookie-settings
    
    
    Already defined settings are ignored and can be regenerated using the --force flag.  Check the    documentation links for instructions on how to rotate encryption keys.
    Definitions should be set in the kibana.yml used configure Kibana.
    
    Settings:
    xpack.encryptedSavedObjects.encryptionKey: <XPACK_ENCRYPTEDSAVEDOBJECTS_ENCRYPTIONKEY>
    xpack.reporting.encryptionKey: <XPACK_REPORTING_ENCRYPTIONKEY>
    xpack.security.encryptionKey: <XPACK_SECURITY_ENCRYPTIONKEY>
    
    1. Fill the generated encryption keys to the Kibana environment variable XPACK_ENCRYPTEDSAVEDOBJECTS_ENCRYPTIONKEY, XPACK_REPORTING_ENCRYPTIONKEY, and XPACK_SECURITY_ENCRYPTIONKEY.
    2. Restart the Kibana service.
    3. Access Elasticsearch at https://<your-elasticsearch-domain>:9200
    4. Access Kibana at https://<your-kibana-domain>:5601 (Web-based visualization interface)

    Default Credentials

    Check the instruction section of the Kibana service to get the default credentials.

    Login to Kibana using the elastic username and the auto-generated password to start exploring, visualizing, and managing your Elasticsearch data through the intuitive web interface.

    Official Docs