Kibana is built into the Alibaba Cloud Elasticsearch (ES) console and provides a visual interface for exploring and analyzing your cluster data. A successful Kibana logon confirms a working connection to the cluster.
This topic covers all supported ways to access Kibana:
| Access method | Architecture | Network | Port |
|---|---|---|---|
| Public internet access (V3) | Cloud-native control (V3) | Internet | 443 |
| Private network access (V3) | Cloud-native control (V3) | VPC via PrivateLink | 5601 |
| Public internet access (V2) | Basic control (V2) | Internet | 5601 |
| Private network access (V2) | Basic control (V2) | VPC | 5601 |
| Nginx reverse proxy | V3 (example) | Internet or VPC | 80 |
To identify your deployment architecture (V2 or V3), see the FAQ section.
Log on to Kibana over the internet (V3)
Prerequisites
Before you begin, confirm the following:
-
The Kibana public endpoint is enabled by default. Get it from the Kibana configuration page in the ES console.
-
The port is fixed at 443.
-
The public access whitelist denies all IP addresses by default. Add your device's IP address before logging on.
-
The default authentication method is two-factor authentication: log on to your Alibaba Cloud account first, then authenticate with your ES instance credentials (username:
elasticand the corresponding password).
Add your IP address to the public whitelist
The IP address to whitelist depends on how you access Kibana:
| Scenario | IP address to add | How to get it |
|---|---|---|
| From an on-premises device | Public IP of the device. If the device is on a home network or corporate LAN, add the public egress IP of the LAN. | Run curl ipinfo.io/ip |
| From an ECS instance in a different VPC | Public IP of the ECS instance | Log on to the ECS console and find the public IP in the instance list |
-
Log on to the Alibaba Cloud Elasticsearch console and go to the Basic Information page of the target instance.
-
In the left navigation pane, click Data Visualization. In the Kibana area, click Modify Configuration.

-
In the Network Access Configuration section, find Public IP Address Whitelist and click Edit.


-
Click Configure to the right of the default group. In the dialog box that appears, add the IP addresses to allow.
-
To use a custom group name, click Add a new IP whitelist group. Groups are for IP address management only and do not affect access permissions.
IP address format
Configuration type Format and examples Notes IPv4 address Single IP: 192.168.0.1<br>CIDR block:192.168.0.0/24(merge scattered IPs into CIDR blocks where possible)<br>Up to 300 entries per cluster; separate multiple entries with a comma (no spaces)Default value 127.0.0.1denies all IPv4 addresses.<br>0.0.0.0/0allows all IPv4 addresses — high security risk, not recommended. Some clusters and regions do not support0.0.0.0/0; availability is shown in the console or error messages.
-
-
Click OK.
Configure the authentication method
The default authentication method is two-factor: log on to your Alibaba Cloud account first, then use your ES instance credentials (username: elastic and the corresponding password).
You can switch to ES instance credentials only (username: elastic and the corresponding password). This reduces cluster security and is not recommended.
Log on to Kibana
Click Access over Internet and enter your credentials on the Kibana logon page.
-
Username:
elastic(fixed) -
Password: The password you set when creating the ES cluster. To reset it, see Reset the password.
To create roles for fine-grained access control, use the Elasticsearch X-Pack plugin in Kibana.
Log on to Kibana over a private network (V3)
Prerequisites
Before enabling private network access, confirm the following:
-
Kibana node specification: 2-core 4 GB or higher. Private network access cannot be enabled on smaller node specifications.
-
Technology: Alibaba Cloud PrivateLink. Alibaba Cloud ES covers the PrivateLink endpoint costs.
-
The private endpoint is disabled by default. Enable it and configure a PrivateLink endpoint before logging on.
-
The port is fixed at 5601.
-
The default authentication method is two-factor authentication: log on to your Alibaba Cloud account first, then authenticate with your ES instance credentials.
Configure the private endpoint
-
On the Network Access Configuration page, turn on the Private Network Access switch.

-
Configure the endpoint parameters:
Parameter Description Endpoint name Auto-generated. Can be modified. VPC Same VPC as the ES instance. Check the Basic Information page for the VPC ID. Zone Check the Basic Information page for the zone. vSwitch Same vSwitch as the ES instance. Check the vSwitch ID on the Basic Information page. Security group Controls private network access to Kibana. Select an existing security group or create one. Manage security group rules in the ECS console: the destination port range must include 5601, and the source must include the IP address of the access device. When changing the security group, the type must remain the same (basic to basic; enterprise to enterprise). To quickly create a security group: click Create below the Security Group field, enter a name, and enter the private IP address of the device to authorize.Authentication method for private network access Default: two-factor authentication (Alibaba Cloud account + ES instance credentials). Switching to ES instance credentials only reduces security and is not recommended. 
-
Click OK. Configuration starts immediately. The endpoint is ready when its connection status shows Connected.

After the endpoint is created:
-
Only the endpoint name can be modified. To manage security groups, go to the ECS console.
-
Turning off Private Network Access automatically releases the associated PrivateLink endpoint resources. Re-enabling the feature requires creating new endpoint resources. The Kibana access address remains unchanged.
Verify the connection
VNC connection (Windows ECS instance)
Connect to the ECS instance via VNC, open a browser, and enter the private Kibana endpoint URL. Log on with your credentials.
-
Username:
elastic(fixed) -
Password: The password you set when creating the ES cluster. To reset it, see Reset the password.
Workbench (command line)
Connect to an ECS instance via Workbench and run:
curl.exe -u elastic:<password> -k -I "https://es-cn-xxxxxxxxxxxxxxxxx-kibana.internal.elasticsearch.aliyuncs.com:5601/"
A successful connection returns:
Log on to Kibana over the internet (V2)
Prerequisites
Before you begin, confirm the following:
-
The Kibana public endpoint is enabled by default. Get it from the Kibana configuration page in the ES console.
-
The port is fixed at 5601.
-
The public access whitelist denies all IP addresses by default. Add your device's IP address before logging on.
-
The authentication method is ES instance credentials (username:
elasticand the corresponding password).
Add your IP address to the public whitelist
The IP address to whitelist depends on how you access Kibana:
| Scenario | IP address to add | How to get it |
|---|---|---|
| From an on-premises device | Public IP of the device. If the device is on a home network or corporate LAN, add the public egress IP of the LAN. | Run curl ipinfo.io/ip |
| From an ECS instance in a different VPC | Public IP of the ECS instance | Log on to the ECS console and find the public IP in the instance list |
-
Log on to the Alibaba Cloud Elasticsearch console and go to the Basic Information page of the target instance.
-
In the left navigation pane, click Data Visualization. In the Kibana area, click Modify Configuration.

-
In the Network Access Configuration section, find the public IP address whitelist and click Modify.
-
Click Configure to the right of the default group. In the dialog box that appears, add the IP addresses to allow.
-
To use a custom group name, click Add a new IP whitelist group. Groups are for IP address management only and do not affect access permissions.
IP address format
Configuration type Format and examples Notes IPv4 address Single IP: 192.168.0.1<br>CIDR block:192.168.0.0/24(merge scattered IPs into CIDR blocks where possible)<br>Up to 300 entries per cluster; separate multiple entries with a comma (no spaces)Default value 127.0.0.1denies all IPv4 addresses.<br>0.0.0.0/0allows all IPv4 addresses — high security risk, not recommended. Some clusters and regions do not support0.0.0.0/0; availability is shown in the console or error messages.IPv6 address (Hangzhou region only) Single IP: 2401:XXXX:1000:24::5<br>CIDR block:2401:XXXX:1000::/48<br>Up to 300 entries per cluster; separate multiple entries with a comma (no spaces)::1denies all IPv6 addresses.<br>::/0allows all IPv6 addresses — high security risk, not recommended. Some cluster versions do not support::/0; availability is shown in the console or error messages. -
-
Click OK.
Log on to Kibana
Click Access over Internet and enter your credentials on the Kibana logon page.
-
Username:
elastic(fixed) -
Password: The password you set when creating the ES cluster. To reset it, see Reset the password.
To create roles for fine-grained access control, use the Elasticsearch X-Pack plugin in Kibana.
Log on to Kibana over a private network (V2)
Prerequisites
Before enabling private network access, confirm the following:
-
Kibana node specification: 2-core 4 GB or higher. Private network access cannot be enabled on smaller node specifications.
-
The private endpoint is disabled by default. Enable it and configure the whitelist before logging on.
-
The port is fixed at 5601.
-
The private access whitelist denies all IP addresses by default.
-
The authentication method is ES instance credentials (username:
elasticand the corresponding password).
Enable private access and configure the whitelist
The ECS instance you use to access Kibana must be in the same virtual private cloud (VPC) as the ES cluster. Add the instance's private IP address to the whitelist.
| Scenario | IP address to add | How to get it |
|---|---|---|
| From an ECS instance in the same VPC | Private IP of the ECS instance | Log on to the ECS console and find the private IP in the instance list |
-
In the left navigation pane, click Data Visualization. In the Kibana area, click Modify Configuration.
-
In the Network Access Configuration section, turn on the Private Network Access switch.
-
Find Private IP Address Whitelist and click Modify.
-
Click Configure to the right of the default group. In the dialog box that appears, add the private IP addresses to allow.
-
To use a custom group name, click Add a new IP whitelist group. Groups are for IP address management only and do not affect access permissions.
IP address format
Configuration type Format and examples Notes IPv4 address Single IP: 192.168.0.1<br>CIDR block:192.168.0.0/24(merge scattered IPs into CIDR blocks where possible)<br>Up to 300 entries per cluster; separate multiple entries with a comma (no spaces)Default value 127.0.0.1denies all IPv4 addresses.<br>0.0.0.0/0allows all IPv4 addresses — high security risk, not recommended. Some clusters and regions do not support0.0.0.0/0; availability is shown in the console or error messages. -
-
Click OK.
Verify the connection
Connect to an ECS instance via Workbench and run:
curl.exe -u elastic:<password> -k -I "https://es-xx-xxxxxxxxxxxxxxxxx-kibana.internal.elasticsearch.aliyuncs.com:5601/"
A successful connection returns:
Access Kibana through an Nginx reverse proxy (V3 example)
When to use this approach
Kibana is a JavaScript application — requests originate from the user's browser, not from a fixed server IP. If users access Kibana from many different locations, maintaining a per-user IP whitelist becomes impractical. An Nginx reverse proxy consolidates all client traffic through a single server IP, so you only need to whitelist that one IP address.
Prerequisites
Before you begin, confirm the following:
-
Configure the Kibana endpoint the proxy will connect to:
-
Private endpoint: Follow the Log on to Kibana over a private network (V3) section. Set the authentication method to ES instance access password only.
-
Public endpoint: Follow the Log on to Kibana over the internet (V3) section. Set the authentication method to ES instance access password only.
-
-
Public access port: 443. Private access port: 5601. The Nginx server listens on port 80.
-
Add the on-premises device IP and port 80 to the security group of the ECS instance running Nginx. Manage security group rules in the ECS Security Group console. For rule configuration details, see Modify security group rules.
Configure Nginx
Update the Nginx configuration on the proxy server. The key parameters are:
-
server_name: The domain name of the proxy server. Replace with your actual domain name. -
proxy_pass: The backend Kibana endpoint (private or public) with the corresponding port.
server {
listen 80;
# Replace server_name with the actual domain name of your server
server_name _;
# Security headers
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
add_header X-Frame-Options DENY;
add_header X-Content-Type-Options nosniff;
location / {
# Proxy requests to the backend Kibana service
proxy_pass https://es-xx-xxxxxxxxxxxxxxxxx-kibana.internal.elasticsearch.aliyuncs.com:5601;
# Certificate verification (use a valid certificate in production)
proxy_ssl_verify off;
proxy_ssl_server_name on;
# Header settings
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
# WebSocket support
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_cache_bypass $http_upgrade;
# Timeout settings
proxy_connect_timeout 60s;
proxy_send_timeout 60s;
proxy_read_timeout 60s;
}
}
Switch the Kibana language
Kibana supports Chinese and English (English is the default). Language switching is available for ES versions 6.7.0 and later.
-
Log on to the Alibaba Cloud Elasticsearch console and go to the Basic Information page of the target instance.
-
In the left navigation pane, click Data Visualization. In the Kibana area, click Modify Configuration.

-
Click Modify Configuration to change the Kibana language.

FAQ
How do I tell whether my cluster uses V2 or V3 architecture?
Clusters have two control deployment modes: cloud-native control (V3) and basic control (V2). Check the deployment mode on the cluster overview page in the console.
Does enabling public or private Kibana access affect the ES cluster?
No. Enabling public or private Kibana access affects only the Server Load Balancer (SLB) that connects to Kibana — not the ES cluster itself.
Enabling private Kibana access for the first time triggers a restart of the Kibana node. The ES cluster is not affected.
I added my IP address to the whitelist but still cannot access Kibana. What should I do?
Check the following:
-
The ES instance must be in a healthy state.
-
Verify the IP address is correct: visit www.cip.cc in a browser to confirm your current public IP matches what is in the whitelist.
-
If you have a whitelist configured for the ES instance itself, also configure a Kibana-specific public or private access whitelist. Modify this in Configuration and Management > Data Visualization.
-
Clear your browser cache and retry.
-
Restart the Kibana node and retry.
Why can't I modify security group rules in the ES console?
Security group rules affect all scenarios using them for access control. Modify security group rules in the ECS Security Group console instead.
More Kibana FAQ topics:
References
-
API operations:
-
Enable or disable Kibana public or private access: TriggerNetwork
-
Update the Kibana public or private access whitelist: ModifyWhiteIps
-
-
For Kibana logon and usage issues, see Kibana FAQ.