# Courtesy of https://github.com/sgzijl # config.js includes elasticsearch: "https://"+window.location.hostname+":443", ServerName your.domain.tld RewriteEngine On RewriteCond %{HTTPS} off RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI} ServerName your.domain.tld SSLEngine on SSLCertificateFile /path/to/public.crt SSLCertificateKeyFile /path/to/private.key DocumentRoot /path/to/kibana3 Allow from all Options -Multiviews LogLevel debug ErrorLog /path/to/logs/error_log CustomLog /path/to/logs/access_log combined # Set global proxy timeouts ProxySet connectiontimeout=5 timeout=90 # Proxy for _aliases and .*/_search ProxyPassMatch http://127.0.0.1:9200 ProxyPassReverse http://127.0.0.1:9200 # Proxy for kibana-int/{dashboard,temp} stuff (if you don't want auth on /, then you will want these to be protected) ProxyPassMatch http://127.0.0.1:9200 ProxyPassReverse http://127.0.0.1:9200 # Optional disable auth for a src IP (eg: your monitoring host or subnet) Allow from 5.6.7.8 Deny from all Satisfy any AuthLDAPBindDN "CN=_ldapbinduser,OU=Users,DC=example,DC=com" AuthLDAPBindPassword "ldapbindpass" AuthLDAPURL "ldaps://ldap01.example.com ldap02.example.com/OU=Users,DC=example,DC=com?sAMAccountName?sub?(objectClass=*)" AuthType Basic AuthBasicProvider ldap AuthName "Please authenticate for Example dot com" AuthLDAPGroupAttributeIsDN on require valid-user