I built a cluster with two master nodes; two days later, the attempt to add another master node (all on different hosts) failed with error:
./elasticsearch-create-enrollment-token -s node
Unable to create enrollment token for scope [node]
ERROR: Unable to create an enrollment token. Elasticsearch node HTTP layer SSL configuration is not configured with a keystore, with exit code 73.
In elasticsearch.yml on both nodes for HTTP SSL I generated node's crt and key with CLI ./bin/elasticsearch-certgen --cert ca/ca.crt --key ca/ca.key --out .zip.
Content of elasticserach.keystore is:
./elasticsearch-keystore list /etc/elasticsearch/certs/elasticsearch.keystore
keystore.seed
xpack.security.http.ssl.keystore.secure_password
xpack.security.transport.ssl.keystore.secure_password
xpack.security.transport.ssl.truststore.secure_password
elasticsearch.yml
# ======================== Elasticsearch Configuration =========================
#
# NOTE: Elasticsearch comes with reasonable defaults for most settings.
# Before you set out to tweak and tune the configuration, make sure you
# understand what are you trying to accomplish and the consequences.
#
# The primary way of configuring a node is via this file. This template lists
# the most important settings you may want to configure for a production cluster.
#
# Please consult the documentation for further information on configuration options:
# https://www.elastic.co/guide/en/elasticsearch/reference/index.html
#
# ---------------------------------- Cluster -----------------------------------
#
# Use a descriptive name for your cluster:
#
cluster.name: CLUSTERNAME
#
# ------------------------------------ Node ------------------------------------
#
# Use a descriptive name for the node:
#
node.name: NODE1MASTERNAME
#
# Add custom attributes to the node:
#
#node.attr.rack: r1
# ----------------------------------- Paths ------------------------------------
#
# Path to directory where to store the data (separate multiple locations by comma):
#
path.data: /var/lib/elasticsearch
#
# Path to log files:
#
path.logs: /var/log/elasticsearch
#
# ----------------------------------- Memory -----------------------------------
#
# Lock the memory on startup:
#
#bootstrap.memory_lock: true
#
# Make sure that the heap size is set to about half the memory available
# on the system and that the owner of the process is allowed to use this
# limit.
#
# Elasticsearch performs poorly when the system is swapping the memory.
#
# ---------------------------------- Network -----------------------------------
#
# By default Elasticsearch is only accessible on localhost. Set a different
# address here to expose this node on the network:
#
network.host: NODE1MASTER_IP
#
# By default Elasticsearch listens for HTTP traffic on the first free port it
# finds starting at 9200. Set a specific HTTP port here:
#
http.port: 9200
#
# For more information, consult the network module documentation.
#
# --------------------------------- Discovery ----------------------------------
#
# Pass an initial list of hosts to perform discovery when this node is started:
# The default list of hosts is ["127.0.0.1", "[::1]"]
#
discovery.seed_hosts: ["NODE2MASTER_IP:9300"]
#
# Bootstrap the cluster using an initial set of master-eligible nodes:
#
#cluster.initial_master_nodes: ["node-1", "node-2"]
cluster.initial_master_nodes: ["NODE1MASTERNAME","NODE2MASTERNAME"]
#
# For more information, consult the discovery and cluster formation module documentation.
#
# ---------------------------------- Various -----------------------------------
#
# Allow wildcard deletion of indices:
#
#action.destructive_requires_name: false
#lock memory on bootstrap
#bootstrap.memory_lock: true
#----------------------- BEGIN SECURITY AUTO CONFIGURATION -----------------------
#
# The following settings, TLS certificates, and keys have been automatically
# generated to configure Elasticsearch security features on 05-02-2025 21:58:05
#
# --------------------------------------------------------------------------------
# Enable security features
xpack.security.enabled: true
xpack.security.enrollment.enabled: true
#xpack.security.autoconfiguration.enabled: false
# Enable encryption for HTTP API client connections, such as Kibana, Logstash, and Agents
xpack.security.http.ssl:
enabled: true
# keystore.path: /etc/elasticsearch/certs/http.p12
#verification_mode: certificate
key: /etc/elasticsearch/certs/NODE1MASTERNAME/NODE1MASTERNAME.key
certificate: /etc/elasticsearch/certs/NODE1NAME/NODE1MASTERNAME.crt
certificate_authorities: ["/etc/elasticsearch/certs/ca/ca.crt"]
# Enable encryption and mutual authentication between cluster nodes
xpack.security.transport.ssl:
enabled: true
# verification_mode: none
# key: /etc/elasticsearch/certs/NODE1MASTERNAME/NODE1MASTERNAME.key
# certificate: /etc/elasticsearch/certs/NODE1MASTERNAME/NODE1MASTERNAME.crt
# certificate_authorities: /etc/elasticsearch/certs/ca/ca.crt
verification_mode: none
keystore.path: /etc/elasticsearch/certs/transport.p12
truststore.path: /etc/elasticsearch/certs/transport.p12
# Create a new cluster with the current node only
# Additional nodes can still join the cluster later
#
# Allow HTTP API connections from anywhere
# Connections are encrypted and require user authentication
http.host: 0.0.0.0
# Allow other nodes to join the cluster from anywhere
# Connections are encrypted and mutually authenticated
transport.host: 0.0.0.0
#----------------------- END SECURITY AUTO CONFIGURATION -------------------------
#script.painless.regex.enabled: true