-
Notifications
You must be signed in to change notification settings - Fork 25.6k
Closed as not planned
Labels
:Distributed Coordination/NetworkHttp and internode communication implementationsHttp and internode communication implementations:Security/TLSSSL/TLS, CertificatesSSL/TLS, CertificatesTeam:Distributed (Obsolete)Meta label for distributed team (obsolete). Replaced by Distributed Indexing/Coordination.Meta label for distributed team (obsolete). Replaced by Distributed Indexing/Coordination.Team:SecurityMeta label for security teamMeta label for security teamteam-discuss
Description
Describe the feature:
The transport connection should support SNI when configured to use TLS
Elasticsearch version (bin/elasticsearch --version):
Version: 7.6.1, Build: default/rpm/aa751e09be0a5072e8570670309b1f12348f023b/2020-02-29T00:15:25.529771Z, JVM: 13.0.2
Plugins installed: default rpm install
JVM version (java -version):
openjdk 13.0.2 2020-01-14
OpenJDK Runtime Environment AdoptOpenJDK (build 13.0.2+8)
OpenJDK 64-Bit Server VM AdoptOpenJDK (build 13.0.2+8, mixed mode, sharing)
OS version (uname -a if on a Unix-like system): CentOS 7
Description of the problem including expected versus actual behavior:
I expect the transport connection to use SNI when connecting to a peer. Currently it does not send any SNI headers
Steps to reproduce:
Can't come up with a simple repro case. I guess the easiest would be to setup a cluster and a haproxy that proxies to the nodes using SNI
Provide logs (if relevant):
n/a
LoadingZhang
Metadata
Metadata
Assignees
Labels
:Distributed Coordination/NetworkHttp and internode communication implementationsHttp and internode communication implementations:Security/TLSSSL/TLS, CertificatesSSL/TLS, CertificatesTeam:Distributed (Obsolete)Meta label for distributed team (obsolete). Replaced by Distributed Indexing/Coordination.Meta label for distributed team (obsolete). Replaced by Distributed Indexing/Coordination.Team:SecurityMeta label for security teamMeta label for security teamteam-discuss