ElasticSearch | 集群与外部间的安全通信

2020-06-01  本文已影响0人  乌鲁木齐001号程序员

配置 ElasticSearch for HTTPS

在配置文件中配置
xpack.security.http.ssl.enabled: true
xpack.security.http.ssl.keystore.path: certs/elastic-certificates.p12
xpack.security.http.ssl.truststore.path: certs/elastic-certificates.p12
或在命令行中把参数加进去

bin/elasticsearch -E node.name=node0 -E cluster.name=geektime -E path.data=node0_data -E http.port=9200 -E xpack.security.enabled=true -E xpack.security.transport.ssl.enabled=true -E xpack.security.transport.ssl.verification_mode=certificate -E xpack.security.transport.ssl.keystore.path=certs/elastic-certificates.p12 -E xpack.security.http.ssl.enabled=true -E xpack.security.http.ssl.keystore.path=certs/elastic-certificates.p12 -E xpack.security.http.ssl.truststore.path=certs/elastic-certificates.p12


配置 Kibana 通过 HTTPS 访问 ElasticSearch

通过 openssl 将 .p12 转为 .pem

openssl pkcs12 -in elastic-certificates.p12 -cacerts -nokeys -out elastic-ca.pem

生成后,将 elastic-ca.pem 拷贝到 Kibana/config/certs 下;

修改 kibana.yml
elasticsearch.hosts: ["https://localhost:9200"]
elasticsearch.ssl.certificateAuthorities: [ "/Users/yiruan/geektime/kibana-7.1.0/config/certs/elastic-ca.pem" ]
elasticsearch.ssl.verificationMode: certificate

配置使用 HTTPS 访问 Kibana

生成 pem 的证书

bin/elasticsearch-certutil ca --pem

修改 kibana.yml
server.ssl.enabled: true
server.ssl.certificate: config/certs/instance.crt
server.ssl.key: config/certs/instance.key
上一篇 下一篇

猜你喜欢

热点阅读