| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354 | [role="xpack"][testenv="gold+"][[syskeygen]]== elasticsearch-syskeygenThe `elasticsearch-syskeygen` command creates a system key file in theelasticsearch config directory.[discrete]=== Synopsis[source,shell]--------------------------------------------------bin/elasticsearch-syskeygen[-E <KeyValuePair>] [-h, --help]([-s, --silent] | [-v, --verbose])--------------------------------------------------[discrete]=== DescriptionThe command generates a `system_key` file, which you can use to symmetricallyencrypt sensitive data. For example, you can use this key to prevent {watcher}from returning and storing information that contains clear text credentials. See<<encrypting-data>>. IMPORTANT: The system key is a symmetric key, so the same key must be used onevery node in the cluster.[discrete][[syskeygen-parameters]]=== Parameters`-E <KeyValuePair>`:: Configures a setting. For example, if you have a custominstallation of {es}, you can use this parameter to specify the `ES_PATH_CONF`environment variable.`-h, --help`:: Returns all of the command parameters.`-s, --silent`:: Shows minimal output.`-v, --verbose`:: Shows verbose output.[discrete]=== ExamplesThe following command generates a `system_key` file in thedefault `$ES_HOME/config` directory:[source, sh]--------------------------------------------------bin/elasticsearch-syskeygen--------------------------------------------------
 |