| 12345678910111213141516171819202122232425262728293031323334353637383940 | [[ssl-tls]]=== Setting Up TLS on a clusterThe {stack} {security-features} enables you to encrypt traffic to, from, andwithin your {es} cluster. Connections are secured using Transport Layer Security(TLS), which is commonly referred to as "SSL".WARNING: Clusters that do not have encryption enabled send all data in plain textincluding passwords and will not be able to install a license that enables{security-features}.The following steps describe how to enable encryption across the variouscomponents of the Elastic Stack. You must perform each of the steps that areapplicable to your cluster.. Generate a private key and X.509 certificate for each of your {es} nodes. See{ref}/configuring-tls.html#node-certificates[Generating Node Certificates].. Configure each node in the cluster to identify itself using its signedcertificate and enable TLS on the transport layer. You can also optionallyenable TLS on the HTTP layer. See{ref}/configuring-tls.html#tls-transport[Encrypting Communications Between Nodes in a Cluster] and{ref}/configuring-tls.html#tls-http[Encrypting HTTP Client Communications]. . Configure {monitoring} to use encrypted connections. See <<secure-monitoring>>.. Configure {kib} to encrypt communications between the browser andthe {kib} server and to connect to {es} via HTTPS. See{kibana-ref}/using-kibana-with-security.html[Configuring Security in {kib}].. Configure Logstash to use TLS encryption. See{logstash-ref}/ls-security.html[Configuring Security in Logstash].. Configure Beats to use encrypted connections. See <<beats>>.. Configure the Java transport client to use encrypted communications.See <<java-clients>>.. Configure {es} for Apache Hadoop to use secured transport. See{hadoop-ref}/security.html[{es} for Apache Hadoop Security].
 |