All Products
Search
Document Center

Elasticsearch:Access control methods for Elasticsearch clusters

Last Updated:Feb 27, 2026

Alibaba Cloud Elasticsearch clusters are deployed in logically isolated virtual private clouds (VPCs). Multiple security layers protect your clusters: network-level access control, authentication, authorization, encryption, and advanced security features provided by X-Pack.

Security layers

Access control operates in three layers:

  1. Network layer -- IP address whitelists control which hosts can reach the cluster or Kibana endpoint.

  2. Authentication layer -- The elastic user password verifies identity when connecting through a client or Kibana.

  3. Authorization layer -- Role-based access control (RBAC) through X-Pack grants granular permissions on objects such as clusters, indexes, and fields.

The following table summarizes default states and required actions for each method.

MethodScopeDefault stateAction required
Cluster access passwordCluster and Kibana authenticationSet during cluster creationSpecify a password for the elastic user
Public IP address whitelist (cluster)Cluster network accessPublic Network Access is disabledEnable Public Network Access and add IP addresses
Private IP address whitelist (cluster)Cluster network accessInternal network access is allowedAdd IP addresses to the private whitelist
Public IP address whitelist (Kibana)Kibana network accessPublic Network Access is enabled; default whitelist is 127.0.0.1,::1 (blocks all traffic)Add your IP address to the Kibana public whitelist
Private IP address whitelist (Kibana)Kibana network accessPrivate Network Access is disabledEnable Private Network Access and add IP addresses
X-Pack RBACAuthorization (clusters, indexes, fields)Available after cluster creationCreate custom roles and assign them to users in the Kibana console

Network access control

Cluster IP address whitelists

Public IP address whitelist

Public Network Access is disabled for Elasticsearch clusters by default. To access your cluster over the Internet, enable Public Network Access and add the IP address of your host to a public IP address whitelist.

For more information, see Configure a public or private IP address whitelist for an Elasticsearch cluster.

设置ES访问白名单

Private IP address whitelist

By default, Elasticsearch allows access to your cluster over an internal network. To restrict access to specific hosts, add their IP addresses to a private IP address whitelist.

For more information, see Configure a public or private IP address whitelist for an Elasticsearch cluster.

Kibana IP address whitelists

Public IP address whitelist

Public Network Access is enabled for Kibana by default. However, the default public IP address whitelist contains 127.0.0.1,::1, which denies requests from all IPv4 and IPv6 addresses. The first time you log on to the Kibana console, the system prompts you to configure a public IP address whitelist. Add the IP address of your host before you log on.

For more information, see Configure a public or private IP address whitelist for Kibana.

设置Kibana访问白名单

Private IP address whitelist

Private Network Access is disabled for Kibana by default. To log on to the Kibana console from a host over an internal network, enable Private Network Access and add the IP address of the host to a private IP address whitelist.

For more information, see Configure a public or private IP address whitelist for Kibana.

Authentication

Cluster access password

When you create an Elasticsearch cluster, specify a password for the elastic default user. This password authenticates your identity when you access the cluster through a client or log on to the Kibana console.

For more information, see Parameters on the buy page.

设置elastic密码

To change the password, reset it on the cluster details page.

For more information, see Reset the access password for an Elasticsearch cluster.

ES重置密码

Authorization

X-Pack RBAC

To grant granular permissions on objects such as Elasticsearch clusters, indexes, and fields, use the RBAC mechanism provided by the X-Pack plug-in. Create custom roles with specific permissions, then assign the roles to users in the Kibana console.

For more information, see Use the RBAC mechanism provided by Elasticsearch X-Pack to implement access control.

ES X-Pack角色管控