All Products
Search
Document Center

:Connect to a cluster by using Kibana

Last Updated:Nov 28, 2025

Kibana is a core component of Alibaba Cloud Elasticsearch (ES) that provides a visual interface to explore, analyze, and display data. Kibana is built into the ES console. A successful logon to Kibana confirms a successful connection to the cluster, which lets you explore your data.

Log on to Kibana over the internet (for V3 deployment architecture)

To log on to Kibana over the internet, you need to configure or obtain the following information:

  • Public endpoint: The Kibana public endpoint is enabled by default. You can obtain it from the Kibana configuration page in the ES console.

  • Public access whitelist: By default, the public access whitelist denies access from all IP addresses to Kibana over the internet. You must add the IP address of your device to the whitelist.

  • Authentication method: The default method is two-factor authentication with an Alibaba Cloud account and the ES instance access password. This means you first log on to your Alibaba Cloud account, and then use your ES instance credentials (username: elastic, and the corresponding password) to authenticate.

  • Port number: The port is fixed at 443.

  1. Log on to the Alibaba Cloud Elasticsearch console, and navigate to the Basic Information page of the target instance.

  2. In the navigation pane on the left, click Data Visualization. In the Kibana area, click Modify Configuration.

    image

  3. In the Network Access Configuration section, you can modify the Public IP Address Whitelist and Authentication Method for Public Network Access.

    image

    Obtain the IP address of the access device

    You can obtain the IP address of your device based on the following scenarios.

    Scenario

    IP address to obtain

    Method

    Access Kibana from an on-premises device over the internet.

    The public IP address of the on-premises device.

    Note

    If your on-premises device is on a home network or a corporate local area network (LAN), you need to add the public egress IP address of the LAN.

    Run the curl ipinfo.io/ip command to query the public IP address of the on-premises device.

    Access Kibana from an ECS instance over the internet.

    If the ECS instance and the ES cluster are in different virtual private clouds (VPCs), you can access Kibana using the public IP address of the ECS instance. In this case, you must obtain the public IP address of the ECS instance and add it to the ES public access whitelist.

    Log on to the ECS console and view the public IP address of the instance in the instance list.

    Add the IP address to the public whitelist

    1. Find Public IP Address Whitelist and click Edit.

      image

    2. Click Configure to the right of the default group, and in the dialog box that appears, add an IP whitelist., in the dialog box that appears, add an IP whitelist.

      • You can also click Add a new IP whitelist group to customize the group name.

      • Groups are for IP address management only and do not affect access permissions.

        image

      Configuration type

      Format and example values

      Important notes

      IPv4 address format

      • Single IP address: 192.168.0.1

      • CIDR block: 192.168.0.0/24. We recommend that you merge scattered IP addresses into CIDR blocks.

      A single cluster can have up to 300 IP addresses or CIDR blocks. Separate multiple entries with a comma (,). Do not add spaces before or after the comma.

      • Default public address: 127.0.0.1. This denies access from all IPv4 addresses.

      • 0.0.0.0/0: Allows access from all IPv4 addresses.

        Important
        • We strongly recommend that you do not configure 0.0.0.0/0. It poses a high security threat.

        • Some clusters and regions do not support 0.0.0.0/0. The availability is subject to the information on the UI or the error messages.

    3. After completing the configuration, click OK.

    Configure the public logon authentication method

    The default method is two-factor authentication with an Alibaba Cloud account and the ES instance access password. This means you first log on to your Alibaba Cloud account, and then use your ES instance credentials (username: elastic, and the corresponding password) to authenticate.

    Important

    You can change the method to use only the ES instance access password (username: elastic, and the corresponding password). This method reduces cluster security and is not recommended.

    image

  4. Click Access over Internet and enter your username and password on the Kibana logon page to access the Kibana console and explore your ES data.

    image

    • Username: The username is fixed as elastic.

      You can use the Elasticsearch X-Pack plugin in Kibana to create roles for fine-grained permission management.

    • Password: The password that you set when you created the ES cluster. If you forget the password, you can reset the password.

Log on to Kibana over a private network (for V3 deployment architecture)

To log on to Kibana over a private network, you need to configure or obtain the following information:

  • Private endpoint: This is disabled by default. You need to use Alibaba Cloud PrivateLink to access Kibana over a private network from within a VPC. You must associate an independent endpoint with Kibana. Alibaba Cloud ES covers the costs incurred by the PrivateLink endpoint.

    Important

    You can enable the private endpoint when the Kibana node specifications are 2-core 4 GB or higher.

  • Private access authentication method: The default method is two-factor authentication with an Alibaba Cloud account and the ES instance access password. This means you first log on to your Alibaba Cloud account, and then use your ES instance credentials (username: elastic, and the corresponding password) to authenticate.

  • Port number: The port is fixed at 5601.

Configure the private logon endpoint

  1. On the Network Access Configuration page, turn on the Private Network Access switch.

    image

  2. Configure the endpoint information as prompted on the page.

    image

    Parameter

    Description

    Endpoint Name

    The endpoint name is automatically generated but can be modified.

    VPC

    The VPC is the same as that of the ES instance. You can view the VPC of the instance on the Basic Information page.

    Zone

    You can view the Zone on the Basic Information page of the instance.

    vSwitch

    The vSwitch must be the same as that of the ES instance. You can view the vSwitch ID of the instance on its Basic Information page.

    Security Group

    Use security group rules to control network access to Kibana over the private network. You can select an existing security group or quickly create a new one. You need to go to the ECS console to modify security group rules:

    • The destination port range must include the Kibana private port 5601.

    • The source must include the IP address of the device used for access.

    • When you modify the security group for private access to Kibana, you must select a security group of the same type as the one you initially chose:

      • If you initially selected a basic security group, you can only change it to another basic security group.

      • If you initially selected an enterprise security group, you can only change it to another enterprise security group.

    • Quickly create a security group:

      1. Click Create below the Security Group text box.

      2. Enter a security group name.

        The security group name is automatically generated but can be modified.

      3. Enter the authorized IP address.

        This is the private IP address of the device to be authorized. For example, if you access the Kibana service from an ECS instance over a private network, you need to enter the private IP address of the ECS instance. Log on to the ECS console and view the private IP address of the instance in the instance list.

    Authentication Method for Private Network Access

    The default method is two-factor authentication with an Alibaba Cloud account and the ES instance access password. This means you first log on to your Alibaba Cloud account, and then use your ES instance credentials (username: elastic; and the corresponding password) to authenticate.

    Important

    You can change the method to use only the ES instance access password (username: elastic; and the corresponding password). This method reduces cluster security and is not recommended.

    After you click OK, the configuration of the Kibana internal-facing access address begins. The process is complete when the endpoint connection status is Connected.

    image

    • After the endpoint is created, you can modify only its name. To query and manage security groups, go to the ECS console to make changes.

    • If you turn off Private Network Access, the associated endpoint resources are automatically released. If you turn this feature on again, you must create new endpoint resources. However, the Kibana access address remains unchanged.

Connection examples

  • The following example shows how to use a VNC connection to an ECS instance (running Windows) and then connect to Kibana using the private endpoint.

    image

    Enter your username and password, and then click Log On.

    • Username: The username is fixed as elastic.

      You can use the Elasticsearch X-Pack plugin in Kibana to create roles for fine-grained permission management.

    • Password: The password that you set when you created the ES cluster. If you forget the password, you can reset the password.

      image

  • The following example shows how to use Workbench to remotely connect to an ECS instance and then run the following command to connect to Kibana using the private endpoint:

    curl.exe -u elastic:passdord! -k -I "https://es-cn-xxxxxxxxxxxxxxxxx-kibana.internal.elasticsearch.aliyuncs.com:5601/"

    A successful connection returns the following information:

    image

Log on to Kibana over the internet (for V2 deployment architecture)

To log on to Kibana over the internet, you need to configure or obtain the following information:

  • Public endpoint: The Kibana public endpoint is enabled by default. You can obtain it from the Kibana configuration page in the ES console.

  • Public access whitelist: By default, the public access whitelist denies access from all IP addresses to Kibana over the internet. You must add the IP address of your device to the whitelist.

  • Authentication method: Authenticate using the ES username and password (username: elastic, and the corresponding password).

  • Port number: The port is fixed at 5601.

  1. You can log on to the Alibaba Cloud Elasticsearch console and navigate to the Basic Information page of the target instance.

  2. In the navigation pane on the left, click Data Visualization. In the Kibana area, click Modify Configuration.

    image

  3. In the Network Access Configuration section, you can modify the Kibana public access whitelist.

    Obtain the IP address of the access device

    You can obtain the IP address of your device based on the following scenarios.

    Scenario

    IP address to obtain

    Method

    Access Kibana from an on-premises device over the internet.

    The public IP address of the on-premises device.

    Note

    If your on-premises device is on a home network or a corporate LAN, you need to add the public egress IP address of the LAN.

    Run the curl ipinfo.io/ip command to query the public IP address of the on-premises device.

    Access Kibana from an ECS instance over the internet.

    If the ECS instance and the ES cluster are in different VPCs, you can access Kibana using the public IP address of the ECS instance. In this case, you must obtain the public IP address of the ECS instance and add it to the ES public access whitelist.

    Log on to the ECS console and view the public IP address of the instance in the instance list.

    Add the IP address to the public whitelist

    1. In the Private IP Address Whitelist section, click Modify.

      image

    2. Click Configure to the right of the default group to add an IP whitelist in the dialog box that appears.

      • You can also click Add a new IP whitelist group to create a group with a custom name.

      • Groups are for IP address management only and do not affect access permissions.

      Configuration type

      Format and example values

      Important notes

      IPv4 address format

      • Single IP address: 192.168.0.1

      • CIDR block: 192.168.0.0/24. We recommend that you merge scattered IP addresses into CIDR blocks.

      A single cluster can have up to 300 IP addresses or CIDR blocks. Separate multiple entries with a comma (,). Do not add spaces before or after the comma.

      • Default public address: 127.0.0.1. This denies access from all IPv4 addresses.

      • 0.0.0.0/0: Allows access from all IPv4 addresses.

        Important
        • We strongly recommend that you do not configure 0.0.0.0/0. It poses a high security threat.

        • Some clusters and regions do not support 0.0.0.0/0. Availability is subject to the information in the UI or the error messages.

      IPv6 address format

      (Supported only in the Hangzhou region)

      • Single IP address: 2401:XXXX:1000:24::5

      • CIDR block: 2401:XXXX:1000::/48

      A single cluster can have up to 300 IP addresses or CIDR blocks. Separate multiple entries with a comma (,). Do not add spaces before or after the comma.

      • ::1: Denies access from all IPv6 addresses.

      • ::/0: Allows access from all IPv6 addresses.

        Important
        • We strongly recommend that you do not configure ::/0. It poses a high security threat.

        • Some cluster versions do not support ::/0. Availability is subject to the information in the console UI or the error messages.

    3. After completing the configuration, click OK.

  4. Click Access over Internet, enter your username and password on the Kibana logon page, and log on to the Kibana console, where you can explore data in ES.

    image

    • Username: The username is fixed as elastic.

      You can use the Elasticsearch X-Pack plugin in Kibana to create roles for fine-grained permission management.

    • Password: The password that you set when you created the ES cluster. If you forget the password, you can reset the password.

Log on to Kibana over a private network (for V2 deployment architecture)

To log on to Kibana over a private network, you need to configure or obtain the following information:

  • Private endpoint: This is disabled by default. You can enable it from the console.

    Important

    You can enable the private endpoint when the Kibana node specifications are 2-core 4 GB or higher.

  • Private access whitelist: By default, the private access whitelist denies access from all IP addresses to Kibana over a private network. You must add the IP address of your device to the whitelist.

  • Private access authentication method: Log on using the ES username and password (username: elastic, and the corresponding password).

  • Port number: The port is fixed at 5601.

  1. In the navigation pane on the left, click Data Visualization. In the Kibana area, click Modify Configuration.

  2. In the Network Access Configuration section, enable the Private Network Access switch and configure the access whitelist.

    Obtain the IP address of the access device

    You can obtain the IP address of your device based on the following scenarios.

    Scenario

    IP address to obtain

    Method

    Access Kibana from an ECS instance over a private network.

    If the ECS instance and the ES cluster are in the same VPC, you need to obtain the private IP address of the ECS instance to connect to the ES cluster.

    Log on to the ECS console and view the public IP address of the instance in the instance list.

    Add the IP address to the private whitelist

    1. For Private IP Address Whitelist, click Modify.

    2. Click Configure to the right of the default group and add an IP whitelist in the dialog box.

      • If needed, you can also click Add a new IP whitelist group to create a group with a custom name.

      • Groups are for IP address management only and do not affect access permissions.

      Configuration type

      Format and example values

      Important notes

      IPv4 address format

      • Single IP address: 192.168.0.1

      • CIDR block: 192.168.0.0/24. We recommend that you merge scattered IP addresses into CIDR blocks.

      A single cluster can have up to 300 IP addresses or CIDR blocks. Separate multiple entries with a comma (,). Do not add spaces before or after the comma.

      • Default public address: 127.0.0.1. This denies access from all IPv4 addresses.

      • 0.0.0.0/0: Allows access from all IPv4 addresses.

        Important
        • We strongly recommend that you do not configure 0.0.0.0/0. It poses a high security threat.

        • Some clusters and regions do not support 0.0.0.0/0. The availability is subject to the information on the UI or the error messages.

    3. After completing the configuration, click OK.

    Connection example

    The following example shows how to use Workbench to remotely connect to an ECS instance and then run the following command to connect to Kibana using the private endpoint:

    curl.exe -u elastic:password! -k -I "https://es-xx-xxxxxxxxxxxxxxxxx-kibana.internal.elasticsearch.aliyuncs.com:5601/"

    A successful connection returns the following information:

    image

Access Kibana through an Nginx proxy (V3 deployment architecture example)

When you access Kibana through an Nginx proxy, you need to configure or obtain the following information:

  • Kibana endpoint:

  • Port number: 443 for public access and 5601 for private access.

  • Security group configuration: If you access Kibana from a local browser through an Nginx proxy (for example, on an ECS server), you need to add the IP address of your on-premises device and port 80 to the security group of the ECS instance.

  • Modify the Nginx configuration. The key parameters are described as follows:

    • server_name: The domain name of the server. You can replace it with the actual domain name of your server.

    • proxy_pass: Proxies requests to the backend Kibana service. You must replace the value with the Kibana private or public connection information (endpoint and port number).

      server
       {
          listen 80;
           # You can replace server_name with the actual domain name of your server
          server_name _ ;
          # Security settings
          add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; add_header X-Frame-Options DENY; add_header X-Content-Type-Options nosniff;
      
          location / {
              # Proxy requests to the backend Kibana service
              proxy_pass https://es-xx-xxxxxxxxxxxxxxxxx-kibana.internal.elasticsearch.aliyuncs.com:5601;
      
              # Certificate verification (use a valid certificate in a production environment)
              proxy_ssl_verify off; proxy_ssl_server_name on;
      
              # Header settings
              proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header
              X-Forwarded-Proto $scheme;
      
              # WebSocket support
              proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; proxy_cache_bypass $http_upgrade;
      
              # Timeout settings
              proxy_connect_timeout 60s; proxy_send_timeout 60s; proxy_read_timeout 60s;
          }
      }

Switch the Kibana language

Kibana supports Chinese and English (default). You can switch the Kibana language for ES versions 6.7.0 and later.

  1. Log on to the Alibaba Cloud Elasticsearch console and navigate to the Basic Information page of the target instance.

  2. In the navigation pane on the left, click Data Visualization. Then, in the Kibana area, click Modify Configuration.

    image

  3. Click Modify Configuration to change the Kibana language.

    image

FAQ

References

  • API documentation:

    • To enable or disable public or private access to Kibana, see the TriggerNetwork API operation.

    • To update the public or private access whitelist for Kibana, see the ModifyWhiteIps API operation.

  • If you encounter problems when you log on to or use Kibana, see Kibana FAQ.