You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/security/set-up-basic-security.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,28 +47,28 @@ When you manually set up transport TLS, you can choose from the following CA opt
47
47
48
48
You can use the `elasticsearch-certutil` tool to generate a CA for your cluster. Using `elasticsearch-certutil` guarantees that your certificates meet {{es}} certificate requirements and security best practices.
49
49
50
-
1. Before starting {{es}}, use the `elasticsearch-certutil` tool on any single node to generate a CA for your cluster.
50
+
1. Before starting {{es}}, generate the CA:
51
+
1. Use the `elasticsearch-certutil` tool on any single node to generate a CA for your cluster.
51
52
52
53
```shell
53
54
./bin/elasticsearch-certutil ca
54
55
```
55
56
56
-
1. When prompted, accept the default file name, which is `elastic-stack-ca.p12`. This file contains the public certificate for your CA and the private key used to sign certificates for each node.
57
-
2. Enter a password for your CA. You can choose to leave the password blank if you’re not deploying to a production environment.
57
+
2. When prompted, accept the default file name, which is `elastic-stack-ca.p12`. This file contains the public certificate for your CA and the private key used to sign certificates for each node.
58
+
3. Enter a password for your CA. You can choose to leave the password blank if you’re not deploying to a production environment.
58
59
59
-
2. On any single node, generate a certificate and private key forthe nodesin your cluster. You include the `elastic-stack-ca.p12` output file that you generated in the previous step.
60
+
2. Generate the certificate:
61
+
1. On any single node, generate a certificate and private key forthe nodesin your cluster. Include the `elastic-stack-ca.p12` output file that you generated in the previous step.
1. The `--ca` flag must contain the name of the CA file used to sign your certificates. The default file name from the `elasticsearch-certutil` tool is `elastic-stack-ca.p12`.
67
67
68
-
1. Enter the password foryour CA, or press **Enter** if you did not configure onein the previous step.
69
-
2. Create a password for the certificate and accept the default file name.
68
+
2. Enter the password foryour CA, or press **Enter** if you did not configure onein the previous step.
69
+
3. Create a password for the certificate and accept the default file name.
70
70
71
-
The output file is a keystore named `elastic-certificates.p12`. This file contains a node certificate, node key, and CA certificate.
71
+
The output file is a keystore named `elastic-certificates.p12`. This file contains a node certificate, node key, and CA certificate.
72
72
73
73
74
74
### Provide certificates from an external CA [external-ca]
@@ -86,7 +86,7 @@ The transport networking layer is used for internal communication between nodes
86
86
87
87
Now that you’ve obtained your certificates, you’ll update your cluster to use these files.
88
88
89
-
These steps assume that you [generated a CA and certificates](#generate-certificates) using `elasticsearch-certutil`. The `xpack.security.transport.ssl` settings that you need to set differ if you're using a certificate generated with an external CA. Refer to [Transport TLS/SSL settings](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#transport-tls-ssl-settings) full list of available settings.
89
+
These steps assume that you [generated a CA and certificates](#generate-certificates) using `elasticsearch-certutil`. The `xpack.security.transport.ssl` settings that you need to set differ if you're using a certificate generated with an external CA. Refer to [Transport TLS/SSL settings](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#transport-tls-ssl-settings) for a full list of available settings.
90
90
91
91
::::{note}
92
92
{{es}} monitors all files such as certificates, keys, keystores, or truststores that are configured as values of TLS-related node settings. If you update any of these files, such as when your hostnames change or your certificates are due to expire, {{es}} reloads them. The files are polled for changes at a frequency determined by the global {{es}} `resource.reload.interval.high` setting, which defaults to 5 seconds.
0 commit comments