Logstash configuration:
input {
file {
path => "/tmp/hello_world"
type => "hello_world"
start_position => "beginning"
sincedb_path => "/dev/null"
}
}
output {
if [type] == "hello_world" {
elasticsearch {
host => "xxx.xxx.xxx.xxx"
port => 9200
protocol => "http"
index => "hello_world"
document_type => "hello"
manage_template => false
ssl => true
keystore => "/path/to/keystore"
keystore_password => "changeme"
cacert => "/path/to/cert"
}
}
}
keytool -list -v -keytore /path/to/keystore:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 1 entry
Alias name: logstash
Creation date: Oct 18, 2015
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=My-AD-group, OU=MyDepartment, O=AcmeInc, C=US
Issuer: CN=OurCA, OU=MyDepartment, O=AcmeInc, C=US
Serial number: SomeHexaCode
Valid from: Wed Jul 08 17:08:35 AKDT 2015 until: Sat Aug 24 17:08:35 AKDT 2017
Certificate fingerprints:
MD5: 55:20:B2:68:FD:0F:4E:BF:D5:E5:D5:04:47:6C:E3:10
SHA1: 25:17:A0:CA:86:CC:3E:6C:2D:C0:4E:8D:E8:33:05:F7:4B:50:FE:E5
SHA256: 25:17:A0:CA:86:CC:3E:6C:2D:C0:4E:8D:E8:33:05:F7:4B:50:FE:E5:CA:86:CC:3E:6C:2D:C0:4E:8D:E8:33:05:F7
Signature algorithm name: SHA1withRSA
Version: 3
Extensions:
#1: ObjectId: 9.8.9.6.4.3.564.34.12 Criticality=false
0000: 29 8B 7F 4A 53 C3 D6 67 29 8B 7F 4A 53 C3 D6 67 some_map
0010: 29 8B 7F 4A 53 C3 D6 67 29 8B 7F 4A some_map
#2: ObjectId: 9.8.9.6.4.3.564.34.12 Criticality=false
0000: 29 8B 7F 4A 53 C3 D6 67 29 8B 7F 4A 53 C3 D6 67 some_map
0010: 29 8B 7F 4A 53 C3 D6 67 29 8B 7F 4A 53 C3 D6 67 some_map
0020: 29 8B 7F 4A 53 C3 D6 67 29 8B 7F 4A 53 C3 D6 67 some_map
0030: 29 some_map
#3: ObjectId: 9.8.9.6.4.3.564.34.12 Criticality=false
0000: 29 8B 7F 4A 53 C3 D6 67 29 8B 7F 4A 53 C3 D6 67 Acme Service Auth
0010: 29 8B 7F 4A 53 C3 D6 67 29 8B entication
#4: ObjectId: 9.8.9.6.4.3.564.34.12 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
accessLocation: URIName: http://address.of.ca.cert/INFO.crt
,
accessMethod: caIssuers
accessLocation: URIName: http://another.address.of.ca.cert/INFO.crt
]
]
#5: objectid: 9.8.34.12 criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 29 8b 7f 4a 53 c3 d6 67 29 8b 7f 4a 53 c3 d6 67 acme service auth
0010: 29 8b 7f 4a 53 c3 d6 67 29 8b entication
]
]
#6: ObjectId: 9.8.34.12 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://path.ca.crl/INFO.crl, URIName: http://path.to.second.ca.crl/INFO.crl]
]]
#7: ObjectId: 9.8.34.12 Criticality=false
ExtendedKeyUsages [
clientAuth
8.2.3.4.5.6.124.45.64.3.2
]
#8: ObjectId: 9.8.34.12 Criticality=false
KeyUsage [
digitalSignature
Key_Encipherment
]
#9: ObjectId: 9.8.34.12 Criticality=false
SubjectAlternativeName [
Other-Name: Urecognized ObjectIdentifier: 4.2.3.4.5.6.255.63.5.6
]
#10: objectid: 9.8.34.12 criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 29 8b 7f 4a 53 c3 d6 67 29 8b 7f 4a 53 c3 d6 67 some_map
0010: 29 8b 7f 4a 53 c3 d6 67 29 8b some_map
]
]
*******************************************
*******************************************
I currently can't provide my full shield configuration for company security reasons. I'll probably provide parts of it later on.