Skip to content

Conversation

@lcawl
Copy link
Contributor

@lcawl lcawl commented Jul 24, 2018

Related to #68

The Stack Overview contains a tutorial for installing Elasticsearch, Kibana, Logstash, and Metricbeat.

This PR creates a new tutorial that describes how to encrypt communications using TLS. When #68 is approved, it might be used as a prerequisite for this TLS tutorial.

@lcawl
Copy link
Contributor Author

lcawl commented Jul 24, 2018

@lcawl lcawl force-pushed the lcawley-gs-tls branch 3 times, most recently from 01f5a8b to e02527b Compare July 27, 2018 19:30
@lcawl lcawl added v6.4.1 and removed v6.4.0 labels Aug 23, 2018
when nodes are added to your cluster they just need to use a certificate signed
by the same CA and the node is automatically allowed to join the cluster.

. Pick a verification mode for the certificates. By default, {es} verifies that
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd honestly be in favor of dropping this. Advising users on how to disable hostname verification before they even attempt TLS sets the wrong precedent

certificates.

The `elasticsearch-certutil` command also prompts you for a password to protect
the file and key. If you plan to add more nodes to your cluster in the future,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

users should always retain this file and store it securely. It holds the key to their cluster

See {ref}/starting-elasticsearch.html[Starting {es}].
--

When TLS is enabled on an {es} cluster, {kib}, {ls}, and Beats must communicate
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is out of place since we haven't yet turned on HTTPS. Enabling Transport TLS does not require the other products to use TLS

{ref}/configuring-tls.html#tls-http[Encrypting HTTP client communications].

NOTE: Enabling TLS on the HTTP layer is strongly recommended but is not required.
If you enable TLS on the HTTP layer in {es}, you might need to make
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/might/will

create the `certs` folder on each node and copy the appropriate node certificate
to each node.

. Create a certificate for use by {kib}.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe this should be Reformat CA certificate for use by {kib}

. Create a certificate for use by {kib}.
+
--
{kib} doesn't currently support PKCS#12 keystores, so we must create a PEM
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PEM formatted CA certificate


["source","sh",subs="attributes,callouts"]
----------------------------------------------------------------------
openssl pkcs12 -in elastic-certificates.p12 -cacerts -nokeys -out elastic-ca.pem
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/elastic-certificates.p12/elastic-stack-ca.p12

openssl pkcs12 -in elastic-certificates.p12 -cacerts -nokeys -out elastic-ca.pem
----------------------------------------------------------------------

In this example, `elastic-certificates.p12` is the PKCS#12 keystore that you
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In this example, elastic-stack-ca.p12 is the PKCS#12 keystore containing the Elasticsearch cluster's CA.

@lcawl
Copy link
Contributor Author

lcawl commented Mar 28, 2019

Replaced by #164

@lcawl lcawl closed this Mar 28, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants