The error message means that a client in a TLS handshake couldn't agree on a mutually supported cipher suite. This can be misleading , as it can also happen in the context of Java when one of the two is configured with no available keys for TLS.
Can you share with us:
The exact command that you used to create the PKCS#12 files
The output of openssl -in /opt/elasticsearch/config/elastic-certificates.p12 -info
The logs ( The exception stacktraces ) from a couple of your nodes.
I cannot explain why you are getting a cipher suites error, but the problem here is that you ran that command on each node.
You skipped step 1 which creates a single CA for your cluster. Because you didn't do that step the /opt/elasticsearch/bin/elasticsearch-certutil cert command generated a new CA each time you ran it, which will not work.
If you are going to use /opt/elasticsearch/bin/elasticsearch-certutil cert without first generating a CA, then you need to run it once and then copy that certificate keystore to each node.
Thanks for replying. I have included the step to generate one CA, transfer the CA to all three nodes and ran the following command: /opt/elasticsearch/bin/elasticsearch-certutil cert --ca /etc/elasticsearch/elastic-stack-ca.p12 --ca-pass "" --out /opt/elasticsearch/config/elastic-certificates.p12 --pass ""
Sadly, after restarting all 3 nodes, they were still complain: "SSLHandshakeException: no cipher suites in common"
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.