-
created directory : /home/es/config/certs
-
copied certificates.p12 : cp /etc/elasticsearch/elastic-certificates.p12 /home/es/config/certs
-
copied HTTP certs to the same directory : cp /etc/elasticsearch/http.p12 /home/es/config/certs
And to http
-
For each additional Elastic product that you want to configure, copy the certificates to the relevant configuration directory. - ???
Does it include beats products? If it does where are "relevant" configuration directories? under /etc/..?
-
cp elasticsearch-ssl-http.zip /home/es/config/certs
-
unzip elasticsearch-ssl-http.zip
-
copy http.p12 to /etc/elasticsearch/
-
elasticsearch.yml :
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: certificate
xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
xpack.security.http.ssl.enabled: true
xpack.security.http.ssl.verification_mode: certificate
xpack.security.http.ssl.keystore.path: http.p12
xpack.security.http.ssl.truststore.path: http.p12
-
Update all clients, tools, and applications that connect to Elasticsearch
to use the https protocol in their configuration URL.
For example, Kibana, Beats, Logstash, language clients, and custom applications.
- for me that is:
/etc/kibana/kibana.yml
/etc/filebeat/filebeat.yml #protocol: "https" - for elasticsearch output
/etc/auditbeat/auditbeat.yml #protocol: "https"
/etc/metricbeat/metricbeat.yml #protocol: "https"
/etc/metricbeat/modules.d/lasticsearch-xpack.yml #https
/etc/packetbeat/packetbeat.yml #protocol: "https"
- Encrypting traffic between the browser and Kibana.
Encrypt communications in Kibana | Kibana Guide [7.11] | Elastic
bin/elasticsearch-certutil cert -name sk1f_kibana -dns localhost, 0.0.0.0
Certificates written to /usr/share/elasticsearch/sk1f_kibana.p12
Certificates written to /usr/share/elasticsearch/certificate-bundle.zip
/usr/share/elasticsearch/bin/elasticsearch-certutil cert -name sk1f_kibana -dns localhost,0.0.0.0 -pem #here tried to use pem to see if there will be .key output.
cp /usr/share/elasticsearch/certificate-bundle.zip /home/es/config/certs/
- cp /usr/share/elasticsearch/sk1f_kibana.p12 /home/es/config/certs/
sudo cp certificate-bundle.zip /home/es/config/certs/kibana-server/ # -tried to use pem format in case if p12 not going to work
in kibana.yml : server.ssl.keystore.path: "/path/to/kibana-server.p12"
server.ssl.keystore.path: /etc/kibana/sk1f_kibana.p12
server.ssl.keystore.password: ""
server.ssl.enabled: true
elasticsearch.ssl.certificateAuthorities: ["/etc/kibana/elasticsearch-ca.pem"]
when try to launch kibana :
["error","plugins","securitySolution"],"pid":13097,"message":"The following index patterns did not match any indices: [\"logs-endpoint.alerts-*\"] name: \"Endpoint Security\" id: \"f98df1a8-82db-11eb-906e-3fd6825689af\" rule id: \"9a1a2dae-0b5f-4c3d-8305-a268d404c306\" signals index: \".siem-signals-default\""}
["error","elasticsearch","data"],"pid":13097,"message":"Request error, retrying\nPOST https://localhost:9200/_bulk => socket hang up"}
Any advice on where is the error/how to fix it/ any help/ any reply?