syskeygen.asciidoc 1.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
  1. [role="xpack"]
  2. [testenv="gold+"]
  3. [[syskeygen]]
  4. == elasticsearch-syskeygen
  5. The `elasticsearch-syskeygen` command creates a system key file in the
  6. elasticsearch config directory.
  7. [discrete]
  8. === Synopsis
  9. [source,shell]
  10. --------------------------------------------------
  11. bin/elasticsearch-syskeygen
  12. [-E <KeyValuePair>] [-h, --help]
  13. ([-s, --silent] | [-v, --verbose])
  14. --------------------------------------------------
  15. [discrete]
  16. === Description
  17. The command generates a `system_key` file, which you can use to symmetrically
  18. encrypt sensitive data. For example, you can use this key to prevent {watcher}
  19. from returning and storing information that contains clear text credentials. See
  20. <<encrypting-data>>.
  21. IMPORTANT: The system key is a symmetric key, so the same key must be used on
  22. every node in the cluster.
  23. [discrete]
  24. [[syskeygen-parameters]]
  25. === Parameters
  26. `-E <KeyValuePair>`:: Configures a setting. For example, if you have a custom
  27. installation of {es}, you can use this parameter to specify the `ES_PATH_CONF`
  28. environment variable.
  29. `-h, --help`:: Returns all of the command parameters.
  30. `-s, --silent`:: Shows minimal output.
  31. `-v, --verbose`:: Shows verbose output.
  32. [discrete]
  33. === Examples
  34. The following command generates a `system_key` file in the
  35. default `$ES_HOME/config` directory:
  36. [source, sh]
  37. --------------------------------------------------
  38. bin/elasticsearch-syskeygen
  39. --------------------------------------------------