|
@@ -3,9 +3,9 @@
|
|
|
== Restricting connections with IP filtering
|
|
|
|
|
|
You can apply IP filtering to application clients, node clients, or transport
|
|
|
-clients, in addition to other nodes that are attempting to join the cluster.
|
|
|
+clients, remote cluster clients, in addition to other nodes that are attempting to join the cluster.
|
|
|
|
|
|
-If a node's IP address is on the blacklist, the {es} {security-features} allow
|
|
|
+If a node's IP address is on the denylist, the {es} {security-features} allow
|
|
|
the connection to {es} but it is be dropped immediately and no requests are
|
|
|
processed.
|
|
|
|
|
@@ -25,7 +25,8 @@ You configure IP filtering by specifying the `xpack.security.transport.filter.al
|
|
|
`xpack.security.transport.filter.deny` settings in `elasticsearch.yml`. Allow rules
|
|
|
take precedence over the deny rules.
|
|
|
|
|
|
-IMPORTANT: Unless explicitly specified, `xpack.security.http.filter.*` settings default to
|
|
|
+IMPORTANT: Unless explicitly specified, `xpack.security.http.filter.*` and
|
|
|
+`xpack.security.remote_cluster.filter.*` settings default to
|
|
|
the corresponding `xpack.security.transport.filter.*` setting's value.
|
|
|
|
|
|
[source,yaml]
|
|
@@ -110,9 +111,33 @@ xpack.security.http.filter.allow: 172.16.0.0/16
|
|
|
xpack.security.http.filter.deny: _all
|
|
|
--------------------------------------------------
|
|
|
|
|
|
+[discrete]
|
|
|
+=== Remote cluster (API key based model) filtering
|
|
|
+
|
|
|
+beta::[]
|
|
|
+
|
|
|
+If other clusters connect <<remote-clusters-api-key,using API key
|
|
|
+authentication>> for {ccs} or {ccr}, you may want to have different IP filtering
|
|
|
+for the remote cluster server interface.
|
|
|
+
|
|
|
+[source,yaml]
|
|
|
+--------------------------------------------------
|
|
|
+xpack.security.remote_cluster.filter.allow: 192.168.1.0/8
|
|
|
+xpack.security.remote_cluster.filter.deny: 192.168.0.0/16
|
|
|
+xpack.security.transport.filter.allow: localhost
|
|
|
+xpack.security.transport.filter.deny: '*.google.com'
|
|
|
+xpack.security.http.filter.allow: 172.16.0.0/16
|
|
|
+xpack.security.http.filter.deny: _all
|
|
|
+--------------------------------------------------
|
|
|
+
|
|
|
+NOTE: Whether IP filtering for remote cluster is enabled is controlled by
|
|
|
+`xpack.security.transport.filter.enabled` as well. This means filtering for
|
|
|
+the remote cluster and transport interfaces must be enabled or disabled together.
|
|
|
+But the exact allow and deny lists can be different between them.
|
|
|
+
|
|
|
[discrete]
|
|
|
[[dynamic-ip-filtering]]
|
|
|
-==== Dynamically updating IP filter settings
|
|
|
+=== Dynamically updating IP filter settings
|
|
|
|
|
|
In case of running in an environment with highly dynamic IP addresses like cloud
|
|
|
based hosting, it is very hard to know the IP addresses upfront when provisioning
|