| 123456789101112131415161718192021222324252627282930313233343536 | [[ssl-tls]]=== Setting up TLS on a clusterThe {stack} {security-features} enable you to encrypt traffic to, from, andwithin your {es} cluster. Connections are secured using Transport Layer Security(TLS), which is commonly referred to as "SSL".WARNING: Clusters that do not have encryption enabled send all data in plain textincluding passwords. If the {es} {security-features} are enabled, unless you have a trial license, you must configure SSL/TLS for internode-communication.The following steps describe how to enable encryption across the variouscomponents of the {stack}. You must perform each of the steps that areapplicable to your cluster.. Generate a private key and X.509 certificate for each of your {es} nodes. See{ref}/configuring-tls.html#node-certificates[Generating Node Certificates].. Configure each node in the cluster to identify itself using its signedcertificate and enable TLS on the transport layer. You can also optionallyenable TLS on the HTTP layer. See{ref}/configuring-tls.html#tls-transport[Encrypting Communications Between Nodes in a Cluster] and{ref}/configuring-tls.html#tls-http[Encrypting HTTP Client Communications]. . Configure the {monitor-features} to use encrypted connections. See <<secure-monitoring>>.. Configure {kib} to encrypt communications between the browser andthe {kib} server and to connect to {es} via HTTPS. See{kibana-ref}/using-kibana-with-security.html[Configuring security in {kib}].. Configure Logstash to use TLS encryption. See{logstash-ref}/ls-security.html[Configuring security in {ls}].. Configure Beats to use encrypted connections. See <<beats>>.. Configure {es} for Apache Hadoop to use secured transport. See{hadoop-ref}/security.html[{es} for Apache Hadoop Security].
 |