Skip to content

Commit d5a8901

Browse files
committed
some stuff
1 parent e5f0ded commit d5a8901

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+566
-529
lines changed
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
## Check that {{es}} is running [_check_that_elasticsearch_is_running_2]
2+
3+
You can test that your {{es}} node is running by sending an HTTPS request to port `9200` on `localhost`:
4+
5+
```sh
6+
curl --cacert %ES_HOME%\config\certs\http_ca.crt -u elastic:$ELASTIC_PASSWORD https://localhost:9200 <1>
7+
```
8+
9+
1. Ensure that you use `https` in your call, or the request will fail.`--cacert`
10+
: Path to the generated `http_ca.crt` certificate for the HTTP layer.
11+
12+
13+
14+
The call returns a response like this:
15+
16+
```js
17+
{
18+
"name" : "Cp8oag6",
19+
"cluster_name" : "elasticsearch",
20+
"cluster_uuid" : "AT69_T_DTp-1qgIJlatQqA",
21+
"version" : {
22+
"number" : "9.0.0-SNAPSHOT",
23+
"build_type" : "tar",
24+
"build_hash" : "f27399d",
25+
"build_flavor" : "default",
26+
"build_date" : "2016-03-30T09:51:41.449Z",
27+
"build_snapshot" : false,
28+
"lucene_version" : "10.0.0",
29+
"minimum_wire_compatibility_version" : "1.2.3",
30+
"minimum_index_compatibility_version" : "1.2.3"
31+
},
32+
"tagline" : "You Know, for Search"
33+
}
34+
```
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
## Connect clients to {{es}} [_connect_clients_to_es_2]
2+
3+
% This file is reused in each of the installation pages. Ensure that any changes
4+
% you make to this file are applicable across all installation environments.
5+
6+
When you start {{es}} for the first time, TLS is configured automatically for the HTTP layer. A CA certificate is generated and stored on disk at:
7+
8+
```sh
9+
{{es-conf}}{{slash}}certs{{slash}}http_ca.crt
10+
```
11+
12+
The hex-encoded SHA-256 fingerprint of this certificate is also output to the terminal. Any clients that connect to {{es}}, such as the [{{es}} Clients](https://www.elastic.co/guide/en/elasticsearch/client/index.html), {{beats}}, standalone {{agent}}s, and {{ls}} must validate that they trust the certificate that {{es}} uses for HTTPS. {{fleet-server}} and {{fleet}}-managed {{agent}}s are automatically configured to trust the CA certificate. Other clients can establish trust by using either the fingerprint of the CA certificate or the CA certificate itself.
13+
14+
If the auto-configuration process already completed, you can still obtain the fingerprint of the security certificate. You can also copy the CA certificate to your machine and configure your client to use it.
15+
16+
17+
### Use the CA fingerprint [_use_the_ca_fingerprint_2]
18+
19+
Copy the fingerprint value that’s output to your terminal when {{es}} starts, and configure your client to use this fingerprint to establish trust when it connects to {{es}}.
20+
21+
If the auto-configuration process already completed, you can still obtain the fingerprint of the security certificate by running the following command. The path is to the auto-generated CA certificate for the HTTP layer.
22+
23+
```sh
24+
openssl x509 -fingerprint -sha256 -in config/certs/http_ca.crt
25+
```
26+
27+
The command returns the security certificate, including the fingerprint. The `issuer` should be `Elasticsearch security auto-configuration HTTP CA`.
28+
29+
```sh
30+
issuer= /CN=Elasticsearch security auto-configuration HTTP CA
31+
SHA256 Fingerprint=<fingerprint>
32+
```
33+
34+
35+
### Use the CA certificate [_use_the_ca_certificate_2]
36+
37+
If your library doesn’t support a method of validating the fingerprint, the auto-generated CA certificate is created in the following directory on each {{es}} node:
38+
39+
```sh
40+
{{es-conf}}{{slash}}certs{{slash}}http_ca.crt
41+
```
42+
43+
Copy the `http_ca.crt` file to your machine and configure your client to use this certificate to establish trust when it connects to {{es}}.
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
Some features automatically create indices within {{es}}. By default, {{es}} is configured to allow automatic index creation, and no additional steps are required. However, if you have disabled automatic index creation in {{es}}, you must configure [`action.auto_create_index`](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-create) in `elasticsearch.yml` to allow features to create the following indices:
2+
3+
```yaml
4+
action.auto_create_index: .monitoring*,.watches,.triggered_watches,.watcher-history*,.ml*
5+
```
6+
7+
::::{important}
8+
If you are using [Logstash](https://www.elastic.co/products/logstash) or [Beats](https://www.elastic.co/products/beats) then you will most likely require additional index names in your `action.auto_create_index` setting, and the exact value will depend on your local configuration. If you are unsure of the correct value for your environment, you may consider setting the value to `*` which will allow automatic creation of all indices.
9+
::::
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
This package contains both free and subscription features. [Start a 30-day trial](asciidocalypse://docs/elasticsearch/docs/reference/elasticsearch/configuration-reference/license-settings.md) to try out all of the features.
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
## Run {{es}} from the command line [windows-running]
2+
3+
Run the following command to start {{es}} from the command line:
4+
5+
```sh
6+
.\bin\elasticsearch.bat
7+
```
8+
9+
When starting {{es}} for the first time, security features are enabled and configured by default. The following security configuration occurs automatically:
10+
11+
* Authentication and authorization are enabled, and a password is generated for the `elastic` built-in superuser.
12+
* Certificates and keys for TLS are generated for the transport and HTTP layer, and TLS is enabled and configured with these keys and certificates.
13+
* An enrollment token is generated for {{kib}}, which is valid for 30 minutes.
14+
15+
The password for the `elastic` user and the enrollment token for {{kib}} are output to your terminal.
16+
17+
We recommend storing the `elastic` password as an environment variable in your shell. Example:
18+
19+
```sh
20+
$ELASTIC_PASSWORD = "your_password"
21+
```
22+
23+
If you have password-protected the {{es}} keystore, you will be prompted to enter the keystore’s password. See [Secure settings](../../security/secure-settings.md) for more details.
24+
25+
By default {{es}} prints its logs to the console (`STDOUT`) and to the `<cluster name>.log` file within the [logs directory](important-settings-configuration.md#path-settings). {{es}} logs some information while it is starting, but after it has finished initializing it will continue to run in the foreground and won’t log anything further until something happens that is worth recording. While {{es}} is running you can interact with it through its HTTP interface which is on port `9200` by default.
26+
27+
To stop {{es}}, press `Ctrl-C`.
28+
29+
30+
### Enroll nodes in an existing cluster [_enroll_nodes_in_an_existing_cluster_2]
31+
32+
When {{es}} starts for the first time, the security auto-configuration process binds the HTTP layer to `0.0.0.0`, but only binds the transport layer to localhost. This intended behavior ensures that you can start a single-node cluster with security enabled by default without any additional configuration.
33+
34+
Before enrolling a new node, additional actions such as binding to an address other than `localhost` or satisfying bootstrap checks are typically necessary in production clusters. During that time, an auto-generated enrollment token could expire, which is why enrollment tokens aren’t generated automatically.
35+
36+
Additionally, only nodes on the same host can join the cluster without additional configuration. If you want nodes from another host to join your cluster, you need to set `transport.host` to a [supported value](asciidocalypse://docs/elasticsearch/docs/reference/elasticsearch/configuration-reference/networking-settings.md#network-interface-values) (such as uncommenting the suggested value of `0.0.0.0`), or an IP address that’s bound to an interface where other hosts can reach it. Refer to [transport settings](asciidocalypse://docs/elasticsearch/docs/reference/elasticsearch/configuration-reference/networking-settings.md#transport-settings) for more information.
37+
38+
To enroll new nodes in your cluster, create an enrollment token with the `elasticsearch-create-enrollment-token` tool on any existing node in your cluster. You can then start a new node with the `--enrollment-token` parameter so that it joins an existing cluster.
39+
40+
1. In a separate terminal from where {{es}} is running, navigate to the directory where you installed {{es}} and run the [`elasticsearch-create-enrollment-token`](asciidocalypse://docs/elasticsearch/docs/reference/elasticsearch/command-line-tools/create-enrollment-token.md) tool to generate an enrollment token for your new nodes.
41+
42+
```sh
43+
bin\elasticsearch-create-enrollment-token -s node
44+
```
45+
46+
Copy the enrollment token, which you’ll use to enroll new nodes with your {{es}} cluster.
47+
48+
2. From the installation directory of your new node, start {{es}} and pass the enrollment token with the `--enrollment-token` parameter.
49+
50+
```sh
51+
bin\elasticsearch --enrollment-token <enrollment-token>
52+
```
53+
54+
{{es}} automatically generates certificates and keys in the following directory:
55+
56+
```sh
57+
config\certs
58+
```
59+
60+
3. Repeat the previous step for any new nodes that you want to enroll.

deploy-manage/deploy/self-managed/bootstrap-checks-all-permission.md

Lines changed: 0 additions & 9 deletions
This file was deleted.

deploy-manage/deploy/self-managed/bootstrap-checks-client-jvm.md

Lines changed: 0 additions & 9 deletions
This file was deleted.

deploy-manage/deploy/self-managed/bootstrap-checks-discovery-configuration.md

Lines changed: 0 additions & 17 deletions
This file was deleted.

deploy-manage/deploy/self-managed/bootstrap-checks-early-access.md

Lines changed: 0 additions & 9 deletions
This file was deleted.

deploy-manage/deploy/self-managed/bootstrap-checks-file-descriptor.md

Lines changed: 0 additions & 9 deletions
This file was deleted.

0 commit comments

Comments
 (0)