You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[DOCS] Document when security auto configuration is skipped (#86575) (#86839)
* [DOCS] Document when security auto configuration is skipped
* Add xpack autoconfiguration parameter and links
* Fix typo and add related link 🔗
* Incorporate review feedback
* Remove keystore section and instead integrate into previous section
(cherry picked from commit acc22de)
Additionally, when you use the enrollment token to connect {kib} to a secured {es} cluster, the HTTP layer CA certificate is retrieved from {es} and stored in the
113
127
{kib} `/data` directory. This file establishes trust between {kib} and the {es}
114
128
Certificate Authority (CA) for the HTTP layer.
129
+
130
+
[discrete]
131
+
[[stack-skip-auto-configuration]]
132
+
=== Cases when security auto configuration is skipped
133
+
When you start {es} for the first time, the node startup process tries to
134
+
automatically configure security for you. The process runs some checks to
135
+
determine:
136
+
137
+
* If this is the first time that the node is starting
138
+
* Whether security is already configured
139
+
* If the startup process can modify the node configuration
140
+
141
+
If any of those checks fail, there's a good indication that you
142
+
<<manually-configure-security,manually configured security>>, or don't want
143
+
security to be configured automatically. In these cases, the node starts
144
+
normally using the existing configuration.
145
+
146
+
[discrete]
147
+
[[stack-existing-environment-detected]]
148
+
==== Existing environment detected
149
+
If certain directories already exist, there's a strong indication that the node
150
+
was started previously. Similarly, if certain files _don't_ exist, or we can't
151
+
read or write to specific files or directories, then we're likely not running as
152
+
the user who installed {es} or an administrator imposed restrictions. If any of
153
+
the following environment checks are true, security isn't configured
154
+
automatically.
155
+
156
+
The {es} `/data` directory exists and isn't empty::
157
+
The existence of this directory is a strong indicator that the node was started
158
+
previously, and might already be part of a cluster.
159
+
160
+
The `elasticsearch.yml` file doesn't exist (or isn't readable), or the `elasticsearch.keystore` isn't readable::
161
+
If either of these files aren't readable, we can't determine whether {es} security
162
+
features are already enabled. This state can also indicate that the node startup
163
+
process isn't running as a user with sufficient privileges to modify the
164
+
node configuration.
165
+
166
+
The {es} configuration directory isn't writable::
167
+
This state likely indicates that an administrator made this directory read-only,
168
+
or that the user who is starting {es} is not the user that installed {es}.
169
+
170
+
[discrete]
171
+
[[stack-existing-settings-detected]]
172
+
==== Existing settings detected
173
+
The following settings are incompatible with security auto configuration. If any
174
+
of these settings exist, the node startup process skips configuring security
175
+
automatically and the node starts normally.
176
+
177
+
* {ref}/modules-node.html#node-roles[`node.roles`] is set to a value where the
178
+
node can't be elected as `master`, or if the node can't hold data
179
+
* {ref}/security-settings.html#general-security-settings[`xpack.security.autoconfiguration.enabled`] is set to `false`
180
+
* {ref}/security-settings.html#general-security-settings[`xpack.security.enabled`] has a value set
181
+
* Any of the
182
+
{ref}/security-settings.html#transport-tls-ssl-settings[`xpack.security.transport.ssl.*`] or
0 commit comments