Encrypt Communication b/w kibana and elasticsearch

I regenerate the certificate for hot_node_3 but kibana and metricbeat cannot connect to this node or metricbeat cannot access events
kibana.log


{"type":"log","@timestamp":"2021-03-01T17:13:09+05:30","tags":["error","elasticsearch","monitoring"],"pid":11225,"message":"Request error, retrying\nGET https://1hot_node3_ip:9200/_xpack?accept_enterprise=true => connect EHOSTUNREACH hot_node3_ip:9200"}
{"type":"log","@timestamp":"2021-03-01T17:13:10+05:30","tags":["warning","elasticsearch","monitoring"],"pid":11225,"message":"Unable to revive connection: https://hot_node3_ip:9200/"}
{"type":"log","@timestamp":"2021-03-01T17:13:10+05:30","tags":["warning","elasticsearch","monitoring"],"pid":11225,"message":"No living connections"}
{"type":"log","@timestamp":"2021-03-01T17:13:10+05:30","tags":["warning","plugins","licensing"],"pid":11225,"message":"License information could not be obtained from Elasticsearch due to Error: No Living connections error"}

but i can curl

[root@eh3 elasticsearch]# curl -XGET --cacert /etc/elasticsearch/certs/ca/ca.crt -u aniket "https://hot_node3_ip:9200"
Enter host password for user 'aniket':
{
  "name" : "eh3",
  "cluster_name" : "hot-warm",
  "cluster_uuid" : "sUe_7CNMSvmyhjg0FRWnJA",
  "version" : {
    "number" : "7.11.1",
    "build_flavor" : "default",
    "build_type" : "rpm",
    "build_hash" : "ff17057114c2199c9c1bbecc727003a907c0db7a",
    "build_date" : "2021-02-15T13:44:09.394032Z",
    "build_snapshot" : false,
    "lucene_version" : "8.7.0",
    "minimum_wire_compatibility_version" : "6.8.0",
    "minimum_index_compatibility_version" : "6.0.0-beta1"
  },
  "tagline" : "You Know, for Search"
}

elasticsearch.yml file (hot_node)


xpack.security.enabled: true
#xpack.security.audit.enabled: true
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: full
xpack.security.transport.ssl.key: certs/eh3/eh3.key
xpack.security.transport.ssl.certificate: certs/eh3/eh3.crt
xpack.security.transport.ssl.certificate_authorities: certs/ca/ca.crt
xpack.security.transport.ssl.client_authentication: required
xpack.security.http.ssl.enabled: true
xpack.security.http.ssl.key:  certs/eh3/eh3.key
xpack.security.http.ssl.certificate: certs/eh3/eh3.crt
xpack.security.http.ssl.certificate_authorities: certs/ca/ca.crt