-
Notifications
You must be signed in to change notification settings - Fork 254
[DOCS] Adds tutorial for getting started with TLS #87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
You can preview this content in https://doc-review-63bf6.firebaseapp.com/x2/security-getting-started.html |
01f5a8b to
e02527b
Compare
9fe59ba to
f629398
Compare
| when nodes are added to your cluster they just need to use a certificate signed | ||
| by the same CA and the node is automatically allowed to join the cluster. | ||
|
|
||
| . Pick a verification mode for the certificates. By default, {es} verifies that |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd honestly be in favor of dropping this. Advising users on how to disable hostname verification before they even attempt TLS sets the wrong precedent
| certificates. | ||
|
|
||
| The `elasticsearch-certutil` command also prompts you for a password to protect | ||
| the file and key. If you plan to add more nodes to your cluster in the future, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
users should always retain this file and store it securely. It holds the key to their cluster
| See {ref}/starting-elasticsearch.html[Starting {es}]. | ||
| -- | ||
|
|
||
| When TLS is enabled on an {es} cluster, {kib}, {ls}, and Beats must communicate |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is out of place since we haven't yet turned on HTTPS. Enabling Transport TLS does not require the other products to use TLS
| {ref}/configuring-tls.html#tls-http[Encrypting HTTP client communications]. | ||
|
|
||
| NOTE: Enabling TLS on the HTTP layer is strongly recommended but is not required. | ||
| If you enable TLS on the HTTP layer in {es}, you might need to make |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/might/will
| create the `certs` folder on each node and copy the appropriate node certificate | ||
| to each node. | ||
|
|
||
| . Create a certificate for use by {kib}. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe this should be Reformat CA certificate for use by {kib}
| . Create a certificate for use by {kib}. | ||
| + | ||
| -- | ||
| {kib} doesn't currently support PKCS#12 keystores, so we must create a PEM |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
PEM formatted CA certificate
|
|
||
| ["source","sh",subs="attributes,callouts"] | ||
| ---------------------------------------------------------------------- | ||
| openssl pkcs12 -in elastic-certificates.p12 -cacerts -nokeys -out elastic-ca.pem |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/elastic-certificates.p12/elastic-stack-ca.p12
| openssl pkcs12 -in elastic-certificates.p12 -cacerts -nokeys -out elastic-ca.pem | ||
| ---------------------------------------------------------------------- | ||
|
|
||
| In this example, `elastic-certificates.p12` is the PKCS#12 keystore that you |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In this example, elastic-stack-ca.p12 is the PKCS#12 keystore containing the Elasticsearch cluster's CA.
f629398 to
202cea0
Compare
|
Replaced by #164 |
Related to #68
The Stack Overview contains a tutorial for installing Elasticsearch, Kibana, Logstash, and Metricbeat.
This PR creates a new tutorial that describes how to encrypt communications using TLS. When #68 is approved, it might be used as a prerequisite for this TLS tutorial.