Hi All,
I am trying to integrate EFK to LDAP.
My configurations in ES is. "elaticsearch.yml"
//root@uklvadapp417[DEV][elasticsearch] //# cat elasticsearch.yml
//# ======================== Elasticsearch Configuration =========================
//#
//# NOTE: Elasticsearch comes with reasonable defaults for most settings.
//# Before you set out to tweak and tune the configuration, make sure you
//# understand what are you trying to accomplish and the consequences.
//#
//# The primary way of configuring a node is via this file. This template lists
//# the most important settings you may want to configure for a production cluster.
//#
//# Please consult the documentation for further information on configuration options:
//# https://www.elastic.co/guide/en/elasticsearch/reference/index.html
//#
//# ---------------------------------- Cluster -----------------------------------
//#
//# Use a descriptive name for your cluster:
//#
cluster.name: coltefk
//#
//# ------------------------------------ Node ------------------------------------
//#
//# Use a descriptive name for the node:
//#
node.name: node-3
//#
//# Add custom attributes to the node:
//#
path.repo: /apps/es_backups/
//#
//# ----------------------------------- Paths ------------------------------------
//#
//# Path to directory where to store the data (separate multiple locations by comma):
//#
path.data: /apps/elasticsearch/data
//#
//# Path to log files:
//#
path.logs: /apps/elasticsearch/logs
//#
//# ----------------------------------- Memory -----------------------------------
//#
//# Lock the memory on startup:
//#
//#bootstrap.memory_lock: true
//#
//# Make sure that the heap size is set to about half the memory available
//# on the system and that the owner of the process is allowed to use this
//# limit.
//#
//# Elasticsearch performs poorly when the system is swapping the memory.
//#
//# ---------------------------------- Network -----------------------------------
//#
//# Set the bind address to a specific IP (IPv4 or IPv6):
//#
network.host: 10.198.39.5
//#
//# Set a custom port for HTTP:
//#
//#http.port: 9200
//#
//# For more information, consult the network module documentation.
//#
//# --------------------------------- Discovery ----------------------------------
//#
//# Pass an initial list of hosts to perform discovery when new node is started:
//# The default list of hosts is ["127.0.0.1", "[::1]"]
//#
//discovery.zen.ping.unicast.hosts: ["10.198.39.3","10.198.39.4","10.198.39.5"]
//#
//# Prevent the "split brain" by configuring the majority of nodes (total number of master-eligible nodes / 2 + 1):
//#
//discovery.zen.minimum_master_nodes: 2
//#
//# For more information, consult the zen discovery module documentation.
//#
//# ---------------------------------- Gateway -----------------------------------
//#
//# Block initial recovery after a full cluster restart until N nodes are started:
//#
//#gateway.recover_after_nodes: 3
//#
//# For more information, consult the gateway module documentation.
//#
//# ---------------------------------- Various -----------------------------------
//#
//# Require explicit names when deleting indices:
//#
//#action.destructive_requires_name: true
//# BEGIN ANSIBLE MANAGED BLOCK
//action.auto_create_index: true
//xpack:
// security:
// authc:
// realms:
// ldap1:
// type: ldap
// order: 0
// url: "ldap://10.20.235.156:389"
// bind_dn: "cn=mycompany.com,ou=WB,ou=apps,o=mycompany.com"
// bind_password: abc123
// user_search:
// base_dn: "ou=users,o=mycompany.com"
// attribute: cn
// group_search:
// base_dn: "ou=users,o=mycompany.com"
// files:
// role_mapping: "/etc/elasticsearch/x-pack/role_mapping.yml"
// unmapped_groups_as_roles: false
//# END ANSIBLE MANAGED BLOCK
My roles_mapping.yml is
//root@uklvadapp417[DEV][x-pack] # cat role_mapping.yml
//# Role mapping configuration file which has elasticsearch roles as keys
//# that map to one or more user or group distinguished names
//#roleA: this is an elasticsearch role
//# - groupA-DN this is a group distinguished name
//# - groupB-DN
//# - user1-DN this is the full user distinguished name
//power_user:
//cn=mycompany.com,ou=GBIL,ou=apps,o=mycompany.com
//#user:
//# - "cn=users,dc=example,dc=com"
//cn=mycompany.com,ou=GBIL,ou=apps,o=mycompany.com
//# - "cn=John Doe,cn=other users,dc=example,dc=com"
//root@uklvadapp417[DEV][x-pack] #
I dont see if I am connected and I cant autheticate with an ldap user.
I have check also:
//coltapps@uklvadapp092[DEV][gb-efk-plays] $ curl -u elastic -XGET -u admin 'http://10.198.39.5:9200/_xpack/usage?pretty'
//Enter host password for user 'elastic':
//Enter host password for user 'admin':
//{
// "security" : {
// "available" : true,
// "enabled" : true,
// "realms" : {
// "file" : {
// "name" : [
// "default_file"
// ],
// "available" : true,
// "size" : [
// 1
// ],
// "enabled" : true,
// "order" : [
// 2147483647
// ]
// },
// "ldap" : {
// "available" : true,
// "enabled" : false
// },
// "native" : {
// "name" : [
// "default_native"
// ],
// "available" : true,
// "size" : [
// 0
// ],
// "enabled" : true,
// "order" : [
// 2147483647
// ]
// },
// "active_directory" : {
// "available" : true,
// "enabled" : false
// },
// "pki" : {
// "available" : true,
// "enabled" : false
// }
// },
// "roles" : {
// "native" : {
// "size" : 0,
// "fls" : false,
// "dls" : false
// },
// "file" : {
// "size" : 0,
// "fls" : false,
// "dls" : false
// }
// },
// "ssl" : {
// "http" : {
// "enabled" : false
// },
// "transport" : {
// "enabled" : false
// }
// },
// "audit" : {
// "outputs" : [
// "logfile"
// ],
// "enabled" : false
// },
// "ipfilter" : {
// "http" : false,
// "transport" : false
// },
// "system_key" : {
// "enabled" : false
// },
// "anonymous" : {
// "enabled" : false
// }
// },
// "watcher" : {
// "available" : true,
// "enabled" : true,
// "count" : {
// "active" : 0,
// "total" : 0
// },
// "execution" : {
// "actions" : {
// "_all" : {
// "total" : 0,
// "total_time_in_ms" : 0
// }
// }
// }
// },
// "monitoring" : {
// "available" : true,
// "enabled" : true,
// "enabled_exporters" : {
// "local" : 1
// }
// },
// "graph" : {
// "available" : true,
// "enabled" : true
// }
}
Please advise.