| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182 | [role="xpack"][[bootstrap-checks-xpack]]== Bootstrap Checks for {xpack}In addition to the <<bootstrap-checks,{es} bootstrap checks>>, there arechecks that are specific to {xpack} features.[float]=== Encrypt sensitive data check//See EncryptSensitiveDAtaBootstrapCheck.javaIf you use {watcher} and have chosen to encrypt sensitive data (by setting`xpack.watcher.encrypt_sensitive_data` to `true`), you must also place a key inthe secure settings store.To pass this bootstrap check, you must set the `xpack.watcher.encryption_key`on each node in the cluster. For more information, see{xpack-ref}/encrypting-data.html[Encrypting Sensitive Data in {watcher}].[float]=== PKI realm check//See PkiRealmBootstrapCheckTests.javaIf you use {es} {security-features} and a Public Key Infrastructure (PKI) realm,you must configure Transport Layer Security (TLS) on your cluster and enableclient authentication on the network layers (either transport or http). For moreinformation, see {stack-ov}/pki-realm.html[PKI user authentication] and{stack-ov}/ssl-tls.html[Setting up TLS on a cluster].To pass this bootstrap check, if a PKI realm is enabled, you must configure TLSand enable client authentication on at least one network communication layer.[float]=== Role mappings checkIf you authenticate users with realms other than `native` or `file` realms, youmust create role mappings. These role mappings define which roles are assignedto each user.If you use files to manage the role mappings, you must configure a YAML fileand copy it to each node in the cluster. By default, role mappings are stored in`ES_PATH_CONF/role_mapping.yml`. Alternatively, you can specify adifferent role mapping file for each type of realm and specify its location inthe `elasticsearch.yml` file. For more information, see{stack-ov}/mapping-roles.html#mapping-roles-file[Using role mapping files].To pass this bootstrap check, the role mapping files must exist and must bevalid. The Distinguished Names (DNs) that are listed in the role mappings filesmust also be valid.[float][[bootstrap-checks-tls]]=== SSL/TLS check//See TLSLicenseBootstrapCheck.javaIn 6.0 and later releases, if you have a gold, platinum, or enterprise licenseand {es} {security-features} are enabled, you must configure SSL/TLS forinternode-communication.NOTE: Single-node clusters that use a loopback interface do not have thisrequirement.  For more information, see{stack-ov}/encrypting-communications.html[Encrypting communications].To pass this bootstrap check, you must{stack-ov}/ssl-tls.html[set up SSL/TLS in your cluster].[float]=== Token SSL check//See TokenSSLBootstrapCheckTests.javaIf you use {es} {security-features} and the built-in token service is enabled,you must configure your cluster to use SSL/TLS for the HTTP interface. HTTPS isrequired in order to use the token service.In particular, if `xpack.security.authc.token.enabled` isset to `true` in the `elasticsearch.yml` file, you must also set`xpack.security.http.ssl.enabled` to `true`. For more information about thesesettings, see <<security-settings>> and <<modules-http>>.To pass this bootstrap check, you must enable HTTPS or disable the built-intoken service.
 |