You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This commit made the plugin SSL settings consistent with the naming convention defined in the meta issue: elastic/logstash#14905.
It added the following SSL settings:
ssl_enabled: Enable/disable the SSL settings. Infer the value from the hosts' scheme if neither the deprecated `:ssl` nor the new `:ssl_enabled` configs were set
ssl_certificate: OpenSSL-style X.509 certificate file to authenticate the client
ssl_key: OpenSSL-style RSA private key that corresponds to the ssl_certificate
ssl_truststore_path: The JKS truststore to validate the server's certificate
ssl_truststore_type: The format of the truststore file
ssl_truststore_password: The truststore password
ssl_keystore_path: The keystore used to present a certificate to the server
ssl_keystore_type: The format of the keystore file
ssl_keystore_password: The keystore password
ssl_cipher_suites: The list of cipher suites to use
ssl_supported_protocols: Supported protocols with versions
And deprecated:
ssl in favor of ssl_enabled:
ca_file in favor of ssl_certificate_authorities
ssl_certificate_verification in favor of ssl_verification_mode
-`ssl_enabled`: Enable/disable the SSL settings. If not provided, the value is inferred from the hosts scheme
4
+
-`ssl_certificate`: OpenSSL-style X.509 certificate file to authenticate the client
5
+
-`ssl_key`: OpenSSL-style RSA private key that corresponds to the `ssl_certificate`
6
+
-`ssl_truststore_path`: The JKS truststore to validate the server's certificate
7
+
-`ssl_truststore_type`: The format of the truststore file
8
+
-`ssl_truststore_password`: The truststore password
9
+
-`ssl_keystore_path`: The keystore used to present a certificate to the server
10
+
-`ssl_keystore_type`: The format of the keystore file
11
+
-`ssl_keystore_password`: The keystore password
12
+
-`ssl_cipher_suites`: The list of cipher suites to use
13
+
-`ssl_supported_protocols`: Supported protocols with versions
14
+
- Reviewed and deprecated SSL settings to comply with Logstash's naming convention
15
+
- Deprecated `ssl` in favor of `ssl_enabled`
16
+
- Deprecated `ca_file` in favor of `ssl_certificate_authorities`
17
+
- Deprecated `ssl_certificate_verification` in favor of `ssl_verification_mode`
18
+
1
19
## 4.16.0
2
20
- Added `ssl_certificate_verification` option to control SSL certificate verification [#180](https://github.com/logstash-plugins/logstash-input-elasticsearch/pull/180)
@@ -96,13 +96,12 @@ TIP: Set the `target` option to avoid potential schema conflicts.
96
96
[id="plugins-{type}s-{plugin}-options"]
97
97
==== Elasticsearch Input configuration options
98
98
99
-
This plugin supports the following configuration options plus the <<plugins-{type}s-{plugin}-common-options>> described later.
99
+
This plugin supports the following configuration options plus the <<plugins-{type}s-{plugin}-common-options>> and the <<plugins-{type}s-{plugin}-deprecated-options>> described later.
The `.cer` or `.pem` files to validate the server's certificate.
427
+
428
+
NOTE: You cannot use this setting and <<plugins-{type}s-{plugin}-ssl_truststore_path>> at the same time.
429
+
430
+
[id="plugins-{type}s-{plugin}-ssl_cipher_suites"]
431
+
===== `ssl_cipher_suites`
432
+
* Value type is a list of <<string,string>>
433
+
* There is no default value for this setting
434
+
435
+
The list of cipher suites to use, listed by priorities.
436
+
Supported cipher suites vary depending on the Java and protocol versions.
437
+
438
+
[id="plugins-{type}s-{plugin}-ssl_enabled"]
439
+
===== `ssl_enabled`
411
440
412
441
* Value type is <<boolean,boolean>>
413
-
* Default value is `false`
442
+
* There is no default value for this setting.
414
443
415
-
If enabled, SSL will be used when communicating with the Elasticsearch
416
-
server (i.e. HTTPS will be used instead of plain HTTP).
444
+
Enable SSL/TLS secured communication to Elasticsearch cluster.
445
+
Leaving this unspecified will use whatever scheme is specified in the URLs listed in <<plugins-{type}s-{plugin}-hosts>> or extracted from the <<plugins-{type}s-{plugin}-cloud_id>>.
446
+
If no explicit protocol is specified plain HTTP will be used.
Defines how to verify the certificates presented by another party in the TLS connection:
535
+
536
+
`full` validates that the server certificate has an issue date that’s within
537
+
the not_before and not_after dates; chains to a trusted Certificate Authority (CA), and
538
+
has a hostname or IP address that matches the names within the certificate.
539
+
540
+
`none` performs no certificate validation.
541
+
542
+
WARNING: Setting certificate verification to `none` disables many security benefits of SSL/TLS, which is very dangerous. For more information on disabling certificate verification please read https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
0 commit comments