You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jun 24, 2022. It is now read-only.
Copy file name to clipboardexpand all lines: README.md
+1-72
Original file line number
Diff line number
Diff line change
@@ -370,79 +370,8 @@ These can either be set to a user declared in the file based realm, with admin p
370
370
371
371
#### X-Pack Security SSL/TLS
372
372
373
-
The role allows configuring HTTP and transport layer SSL/TLS for the cluster. You will need to generate and provide your own PKCS12 or PEM encoded certificates as described in [Encrypting communications in Elasticsearch](https://www.elastic.co/guide/en/elasticsearch/reference/7.4/configuring-tls.html#configuring-tls).
373
+
* To configure your cluster with SSL/TLS for HTTP and/or transport communications follow the [SSL/TLS setup procedure](./docs/ssl-tls-setup.md)
374
374
375
-
The following should be configured to ensure a security-enabled cluster successfully forms:
376
-
377
-
* `es_enable_http_ssl` Default `false`. Setting this to `true` will enable HTTP client SSL/TLS
378
-
* `es_enable_transport_ssl` - Default `false`. Setting this to `true` will enable transport layer SSL/TLS
379
-
380
-
When using a [PKCS12](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-settings.html#security-http-pkcs12-files) keystore and truststore:
381
-
382
-
* `es_ssl_keystore` path to your PKCS12 keystore (can be the same as `es_ssl_truststore`)
383
-
* `es_ssl_keystore_password` set this if your keystore is protected with a password
384
-
* `es_ssl_truststore` path to your PKCS12 keystore (can be the same as `es_ssl_keystore`)
385
-
* `es_ssl_truststore_password` set this if your truststore is protected with a password
386
-
387
-
When using [PEM encoded](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-settings.html#_pem_encoded_files_3) certificates:
388
-
389
-
* `es_ssl_key` path to your SSL key
390
-
* `es_ssl_key_password` set this if your SSL key is protected with a password
391
-
* `es_ssl_certificate` the path to your SSL certificate
392
-
393
-
##### Generating an SSL keystore
394
-
395
-
With a password:
396
-
397
-
```shell
398
-
$ bin/elasticsearch-certutil ca --out ./my-ca.p12 --pass "ca_password"
* `es_ssl_certificate_path` Default `{{ es_conf_dir }}/certs`. The location where certificates should be stored on the ES node.
412
-
* `es_ssl_verification_mode` Default `certificate`. See [SSL verification_mode](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-settings.html#ssl-tls-settings) for options.
413
-
* `es_ssl_certificate_authority` PEM encoded certificate file that should be trusted.
414
-
* `es_validate_certs` Default `yes`. Determines if ansible should validate SSL certificates when performing actions over HTTPS. e.g. installing templates and managing native users.
The role allows configuring HTTP and transport layer SSL/TLS for the cluster. You will need to generate and provide your own PKCS12 or PEM encoded certificates as described in [Encrypting communications in Elasticsearch](https://www.elastic.co/guide/en/elasticsearch/reference/7.4/configuring-tls.html#configuring-tls).
4
+
5
+
The following should be configured to ensure a security-enabled cluster successfully forms:
6
+
7
+
*`es_enable_http_ssl` Default `false`. Setting this to `true` will enable HTTP client SSL/TLS
8
+
*`es_enable_transport_ssl` - Default `false`. Setting this to `true` will enable transport layer SSL/TLS
9
+
10
+
When using a [PKCS12](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-settings.html#security-http-pkcs12-files) keystore and truststore:
11
+
12
+
*`es_ssl_keystore` path to your PKCS12 keystore (can be the same as `es_ssl_truststore`)
13
+
*`es_ssl_keystore_password` set this if your keystore is protected with a password
14
+
*`es_ssl_truststore` path to your PKCS12 keystore (can be the same as `es_ssl_keystore`)
15
+
*`es_ssl_truststore_password` set this if your truststore is protected with a password
16
+
17
+
When using [PEM encoded](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-settings.html#_pem_encoded_files_3) certificates:
18
+
19
+
*`es_ssl_key` path to your SSL key
20
+
*`es_ssl_key_password` set this if your SSL key is protected with a password
21
+
*`es_ssl_certificate` the path to your SSL certificate
22
+
23
+
## Generating an SSL keystore
24
+
25
+
With a password:
26
+
27
+
```shell
28
+
$ bin/elasticsearch-certutil ca --out ./my-ca.p12 --pass "ca_password"
*`es_ssl_certificate_path` Default `{{ es_conf_dir }}/certs`. The location where certificates should be stored on the ES node.
42
+
*`es_ssl_verification_mode` Default `certificate`. See [SSL verification_mode](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-settings.html#ssl-tls-settings) for options.
43
+
*`es_ssl_certificate_authority` PEM encoded certificate file that should be trusted.
44
+
*`es_validate_certs` Default `yes`. Determines if ansible should validate SSL certificates when performing actions over HTTPS. e.g. installing templates and managing native users.
0 commit comments