Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Situation Awareness
Managed Threat Detection
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
SoftWare Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive

Logging In to an Elasticsearch Cluster Using Kibana

Updated on 2025-01-23 GMT+08:00

With CSS, Elasticsearch clusters provide Kibana by default. Users can access Kibana in one click without installing anything. Additionally, the Elasticsearch clusters in CSS support the visualization and Elasticsearch statistics analysis capabilities of open-source Kibana.

Kibana supports multiple access methods. Steps needed to log in to an Elasticsearch cluster vary depending on the access method you choose. For details, see Table 1.

Table 1 Methods for logging in to an Elasticsearch cluster through Kibana

Kibana Access Method

Constraints

Details

One-click access to Kibana from the service console

N/A

Logging In to an Elasticsearch Cluster by Accessing Kibana Through the Console

Accessing Kibana using a public IP address

  • Only clusters in security mode support Kibana access through a public IP address.

Logging In to an Elasticsearch Cluster by Accessing Kibana Using a Public IP Address

Accessing Kibana using a private network address

Only servers in the same VPC can access Kibana using a private network address of the Elasticsearch cluster.

Logging In to an Elasticsearch Cluster by Accessing Kibana Using a Private Network Address

In-house built Kibana

  • The local environment must support access from external networks.
  • Kibana is deployed using an ECS that is in the same VPC as the Elasticsearch cluster, in which case, Kibana can be accessed using a public IP address.
  • Only Kibana images of the OSS version can be connected to Elasticsearch clusters in CSS.

How Do I Connect the User-Built Kibana to Elasticsearch on CSS?

Constraints on Kibana Usage

  • You can customize the username, role name, and tenant name in Kibana.
  • With an Elasticsearch 7.10.2 cluster (the image version is 7.10.2_24.3.3_* or later), you can switch between Chinese and English on Kibana.

    In the upper right corner of the Kibana console, click , select a language, and confirm the language change.

Logging In to an Elasticsearch Cluster by Accessing Kibana Through the Console

  1. Log in to the CSS management console.
  2. On the Clusters page, locate the target cluster and click Access Kibana in the Operation column to go to the Kibana login page.
    • Non-security cluster: The Kibana console is displayed without asking for a username and password.
    • Security cluster: Enter the username and password on the login page and click Log In to log in to the Kibana console. The default username is admin and the password is the one specified during cluster creation.
  3. After the login is successful, you can access clusters through Kibana.

Logging In to an Elasticsearch Cluster by Accessing Kibana Using a Public IP Address

NOTE:
  • Only clusters in security mode support Kibana access through a public IP address.
  • If you disable Kibana public network access and then re-enable it, the public IP address for accessing Kibana may change. Exercise caution.
  1. Log in to the CSS management console.
  2. Enable Kibana public network access for the Elasticsearch cluster. You can do that either when creating an Elasticsearch cluster or afterwards.
    • For how to enable Kibana public network access when creating an Elasticsearch cluster, see Creating an Elasticsearch Cluster.
    • To enable public network access for Kibana for an existing cluster, perform the following steps:
      1. Choose Clusters in the navigation pane. On the Clusters page, click the name of the target cluster.
      2. Click the Kibana Public Access tab, and enable Kibana Public Access.
      3. On the displayed page, set parameters. If Kibana public network access is already enabled, you can modify relevant settings.
        Table 2 Configuring public network access for Kibana

        Parameter

        Description

        Bandwidth

        Bandwidth for accessing Kibana through a public IP address

        Value range: 1 to 100.

        Unit: Mbit/s

        Access Control

        If you disable this function, all IP addresses can access Kibana through the public IP address. If you enable this function, only IP addresses or IP address ranges in the whitelist can access Kibana through the public IP address.

        Whitelist

        IP addresses or IP address ranges allowed to access the cluster. Use commas (,) to separate multiple IP addresses or ranges. This parameter can be configured only when Access Control is enabled.

        You are advised to enable the whitelist.

        NOTE:

        The whitelist that controls Kibana public network access depends on whitelist support by the ELB service. After you update the whitelist, the new settings take effect immediately for new connections. For existing persistent connections using the IP addresses that have been removed from the whitelist, the new settings take effect in approximately 1 minute after these connections are disconnected.

      4. Click OK.
  3. After Kibana public network access is enabled, obtain the Kibana public IP address on the Kibana Public Access page.
    Figure 1 Obtaining the Kibana public IP address
  4. Enter the public IP address for Kibana in the browser address box to go to the Kibana login page.

    Enter the username and password on the login page and click Log In to log in to the Kibana console. The default username is admin and the password is the administrator password you specified during cluster creation.

  5. After the login is successful, you can access the Elasticsearch cluster through Kibana.

Logging In to an Elasticsearch Cluster by Accessing Kibana Using a Private Network Address

NOTE:

Only servers in the same VPC can access Kibana using a private network address of the Elasticsearch cluster.

  1. Log in to the CSS management console.
  2. On the Clusters page, click the name of a cluster. The Cluster Information page is displayed.
  3. On the Cluster Information page, obtain the cluster's private network address.
    Figure 2 Obtaining the private IP address
  4. Change the port number in the cluster's private network address from 9200 to 5601, which becomes the private network address of Kibana. For example, if the cluster's private network IPv4 address is 192.168.0.***:9200, the private network address of Kibana is 192.168.0.***:5601.
  5. On the server, enter the private network address of Kibana to go to the Kibana login page.
    • Non-security cluster: The Kibana console is displayed without asking for a username and password.
    • Security cluster: Enter the username and password on the login page and click Log In to log in to the Kibana console. The default username is admin and the password is the one specified during cluster creation.
  6. After the login is successful, you can access the Elasticsearch cluster through Kibana.

More: Configuring a Custom Kibana Base Path for Public Network Access

With Elasticsearch 7.10.2, you can configure a custom Base Path for Kibana access after Kibana public network access is enabled. Or you can use the default Kibana Base Path instead.

NOTICE:
  • This feature is available for Elasticsearch 7.10.2 clusters (the image version is 7.10.2_24.3.3_* or later) where Kibana public network access is enabled.
  • Only the cluster administrator admin under Global Tenant has the permission to configure a custom Kibana Base Path, which applies globally.
  1. Log in to the CSS management console.
  2. Choose Clusters > Elasticsearch in the navigation pane. On the Clusters page, locate the target cluster and click Access Kibana in the Operation column.
  3. Log in to Kibana using an administrator account.
    • Username: admin (default administrator account)
    • Password: Enter the administrator password you set when creating the cluster in security mode.
  4. After a successful login, choose Stack Management in the left navigation pane of the Kibana console.
  5. Choose Advanced Settings on the left of the Stack Management page.
  6. On the Settings page, set Base Path Alias. The value must start with a slash (/) and must not end with one. A multi-layer path is allowed, but its length cannot exceed 255 characters.
    Figure 3 Custom Base Path
  7. Click Save changes. The saved changes take effect in approximately 10 seconds.
  8. Access Kibana using the Kibana public network address plus Base Path Alias.

    For example, if the Kibana public network address of the Elasticsearch cluster is https://xx.xx.xx.xx:5601 and the configured Base Path Alias is /test, you can access Kibana via https://xx.xx.xx.xx:5601/test from the public network.

We use cookies to improve our site and your experience. By continuing to browse our site you accept our cookie policy. Find out more

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback