12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879 |
- [role="xpack"]
- [[bootstrap-checks-xpack]]
- == Bootstrap Checks for {xpack}
- In addition to the <<bootstrap-checks,{es} bootstrap checks>>, there are
- checks that are specific to {xpack} features.
- [float]
- === Encrypt sensitive data check
- //See EncryptSensitiveDAtaBootstrapCheck.java
- If you use {watcher} and have chosen to encrypt sensitive data (by setting
- `xpack.watcher.encrypt_sensitive_data` to `true`), you must also place a key in
- the secure settings store.
- To pass this bootstrap check, you must set the `xpack.watcher.encryption_key`
- on each node in the cluster. For more information, see <<encrypting-data>>.
- [float]
- === PKI realm check
- //See PkiRealmBootstrapCheckTests.java
- If you use {es} {security-features} and a Public Key Infrastructure (PKI) realm,
- you must configure Transport Layer Security (TLS) on your cluster and enable
- client authentication on the network layers (either transport or http). For more
- information, see <<pki-realm>> and <<ssl-tls>>.
- To pass this bootstrap check, if a PKI realm is enabled, you must configure TLS
- and enable client authentication on at least one network communication layer.
- [float]
- === Role mappings check
- If you authenticate users with realms other than `native` or `file` realms, you
- must create role mappings. These role mappings define which roles are assigned
- to each user.
- If you use files to manage the role mappings, you must configure a YAML file
- and copy it to each node in the cluster. By default, role mappings are stored in
- `ES_PATH_CONF/role_mapping.yml`. Alternatively, you can specify a
- different role mapping file for each type of realm and specify its location in
- the `elasticsearch.yml` file. For more information, see
- <<mapping-roles-file>>.
- To pass this bootstrap check, the role mapping files must exist and must be
- valid. The Distinguished Names (DNs) that are listed in the role mappings files
- must also be valid.
- [float]
- [[bootstrap-checks-tls]]
- === SSL/TLS check
- //See TLSLicenseBootstrapCheck.java
- If you enable {es} {security-features}, unless you have a trial license, you
- must configure SSL/TLS for internode-communication.
- NOTE: Single-node clusters that use a loopback interface do not have this
- requirement. For more information, see
- <<encrypting-communications>>.
- To pass this bootstrap check, you must
- <<ssl-tls,set up SSL/TLS in your cluster>>.
- [float]
- === Token SSL check
- //See TokenSSLBootstrapCheckTests.java
- If you use {es} {security-features} and the built-in token service is enabled,
- you must configure your cluster to use SSL/TLS for the HTTP interface. HTTPS is
- required in order to use the token service.
- In particular, if `xpack.security.authc.token.enabled` is
- set to `true` in the `elasticsearch.yml` file, you must also set
- `xpack.security.http.ssl.enabled` to `true`. For more information about these
- settings, see <<security-settings>> and <<modules-http>>.
- To pass this bootstrap check, you must enable HTTPS or disable the built-in
- token service.
|