hello everyone,
I have installed the elastic agent (enrolled in fleet) in all the nodes in my elasticsearch cluster they all have these settings
# Enable security features
xpack.security.enabled: true
xpack.security.enrollment.enabled: true
# Enable encryption for HTTP API client connections, such as Kibana, Logstash, and Agents
xpack.security.http.ssl:
enabled: true
keystore.path: certs/http.p12
# Enable encryption and mutual authentication between cluster nodes
xpack.security.transport.ssl:
enabled: true
verification_mode: certificate
client_authentication: required
keystore.path: certs/elastic-certificates.p12
truststore.path: certs/elastic-certificates.p12
all the agents installed in all the nodes of my cluster are enrolled in fleet under the same policy named "elasticsearch_clusterz_nodes" in this policy I added elasticsearch integration to monitor and view logs and metrics of every node
but the problem is that I get this error in all nodes (under stack monitoring)
i suspected these settings the username and password are correct but i don't know wich cert or api key i should use
for the certs that i already have are:
the certificate used for communication with the cluster elasticsearch-ca.pem
ssl certificate of each node http.p12
i converted my CA (elastic-stack-ca.p12) using these command two commands
openssl pkcs12 -in elastic-stack-ca.p12 -out cert.crt -clcerts -nokeys
openssl pkcs12 -in elastic-stack-ca.p12 -out private.key -nocerts -nodes
to get cert.crt
and private.key
of the certification used to communicate with the cluster but it didn't work sadly
same thing with my http.p12
SSL of each node I converted it using these commands to get http.crt
and http.key
but sadly it didn't work either
openssl pkcs12 -in http.p12 -clcerts -nokeys -out http.crt
openssl pkcs12 -in http.p12 -nocerts -out http.key -nodes
please help
@stephenb