| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105 | [[secure-settings]]=== Secure settingsSome settings are sensitive, and relying on filesystem permissions to protecttheir values is not sufficient. For this use case, Elasticsearch provides akeystore and the `elasticsearch-keystore` tool to manage the settings in the keystore.NOTE: All commands here should be run as the user which will run Elasticsearch.NOTE: Only some settings are designed to be read from the keystore. Seedocumentation for each setting to see if it is supported as part of the keystore.NOTE: All the modifications to the keystore take affect only after restartingElasticsearch.NOTE: The elasticsearch keystore currently only provides obfuscation. In the future,password protection will be added.These settings, just like the regular ones in the `elasticsearch.yml` config file,need to be specified on each node in the cluster. Currently, all secure settingsare node-specific settings that must have the same value on every node.[float][[creating-keystore]]=== Creating the keystoreTo create the `elasticsearch.keystore`, use the `create` command:[source,sh]----------------------------------------------------------------bin/elasticsearch-keystore create----------------------------------------------------------------The file `elasticsearch.keystore` will be created alongside `elasticsearch.yml`.[float][[list-settings]]=== Listing settings in the keystoreA list of the settings in the keystore is available with the `list` command:[source,sh]----------------------------------------------------------------bin/elasticsearch-keystore list----------------------------------------------------------------[float][[add-string-to-keystore]]=== Adding string settingsSensitive string settings, like authentication credentials for cloudplugins, can be added using the `add` command:[source,sh]----------------------------------------------------------------bin/elasticsearch-keystore add the.setting.name.to.set----------------------------------------------------------------The tool will prompt for the value of the setting. To pass the valuethrough stdin, use the `--stdin` flag:[source,sh]----------------------------------------------------------------cat /file/containing/setting/value | bin/elasticsearch-keystore add --stdin the.setting.name.to.set----------------------------------------------------------------[float][[remove-settings]]=== Removing settingsTo remove a setting from the keystore, use the `remove` command:[source,sh]----------------------------------------------------------------bin/elasticsearch-keystore remove the.setting.name.to.remove----------------------------------------------------------------[float][[reloadable-secure-settings]]=== Reloadable secure settingsJust like the settings values in `elasticsearch.yml`, changes to thekeystore contents are not automatically applied to the runningelasticsearch node. Re-reading settings requires a node restart.However, certain secure settings are marked as *reloadable*. Such settingscan be re-read and applied on a running node.The values of all secure settings, *reloadable* or not, must be identicalacross all cluster nodes. After making the desired secure settings changes,using the `bin/elasticsearch-keystore add` command, call:[source,js]----POST _nodes/reload_secure_settings----// CONSOLEThis API will decrypt and re-read the entire keystore, on every cluster node,but only the *reloadable* secure settings will be applied. Changes to othersettings will not go into effect until the next restart. Once the call returns,the reload has been completed, meaning that all internal datastructures dependenton these settings have been changed. Everything should look as if the settingshad the new value from the start.When changing multiple *reloadable* secure settings, modify all of them, oneach cluster node, and then issue a `reload_secure_settings` call, insteadof reloading after each modification.
 |