Hello guys, I’m setting up an elastic cluster and getting these errors in the logs, tell me what I’m doing wrong
[2023-10-11T01:00:19,733][WARN ][o.e.c.s.DiagnosticTrustManager] [ELK-01] failed to establish trust with server at []; the server provided a certificate with subject name [CN=ELK-02], fingerprint [d41f13a7131475eab12dc25fcbcd53eff2], no keyUsage and no extendedKeyUsage; the certificate is valid between [2023-05-31T06:20:31Z] and [2122-05-07T06:20:31Z] (current time is [2023-10-18T11:00:19.732233376Z], certificate dates are valid); the session uses cipher suite [TLS_AES_256_GCM_SHA384] and protocol [TLSv1.3]; the certificate does not have any subject alternative names; the certificate is issued by [CN=Elasticsearch security auto-configuration HTTP CA]; the certificate is signed by (subject [CN=Elasticsearch security auto-configuration HTTP CA] fingerprint [3dea099e74a763fed9470c0d374c0b95]) which is self-issued; the [CN=Elasticsearch security auto-configuration HTTP CA] certificate is not trusted in this ssl context ([xpack.security.transport.ssl (with trust configuration: StoreTrustConfig{path=certs/transport.p12, password=, type=PKCS12, algorithm=PKIX})]); this ssl context does trust a certificate with subject [CN=Elasticsearch security auto-configuration HTTP CA] but the trusted certificate has fingerprint [c68f2db3cef39c6949e7e2affa14a5561a]
sun.security.validator.ValidatorException: PKIX path validation failed: java.security.cert.CertPathValidatorException: Path does not chain with any of the trust anchors