You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jun 24, 2022. It is now read-only.
Copy file name to clipboardexpand all lines: docs/ssl-tls-setup.md
+3
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,8 @@
2
2
3
3
The role allows configuring HTTP and transport layer SSL/TLS for the cluster. You will need to generate and provide your own PKCS12 or PEM encoded certificates as described in [Encrypting communications in Elasticsearch](https://www.elastic.co/guide/en/elasticsearch/reference/7.4/configuring-tls.html#configuring-tls).
4
4
5
+
If you don't want this role to add autogenerated SSL configuration to elasticsearch.yml set `es_enable_auto_ssl_configuration` to `false` (default: `true`).
6
+
5
7
The following should be configured to ensure a security-enabled cluster successfully forms:
6
8
7
9
*`es_enable_http_ssl` Default `false`. Setting this to `true` will enable HTTP client SSL/TLS
*`es_enable_auto_ssl_configuration` Default `true`. Whether this role should add automatically generated SSL config to elasticsearch.yml.
41
44
*`es_ssl_certificate_path` Default `{{ es_conf_dir }}/certs`. The location where certificates should be stored on the ES node.
42
45
*`es_ssl_verification_mode` Default `certificate`. See [SSL verification_mode](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-settings.html#ssl-tls-settings) for options.
43
46
*`es_ssl_certificate_authority` PEM encoded certificate file that should be trusted.
0 commit comments