| 123456789101112131415161718192021222324252627282930313233343536373839 | [[ssl-tls]]=== Setting Up TLS on a Cluster{security} enables you to encrypt traffic to, from, and within your {es}cluster. Connections are secured using Transport Layer Security (TLS), which iscommonly referred to as "SSL".WARNING: Clusters that do not have encryption enabled send all data in plain textincluding passwords and will not be able to install a license that enables {security}.The following steps describe how to enable encryption across the variouscomponents of the Elastic Stack. You must perform each of the steps that areapplicable to your cluster.. Generate a private key and X.509 certificate for each of your {es} nodes. See{ref}/configuring-tls.html#node-certificates[Generating Node Certificates].. Configure each node in the cluster to identify itself using its signedcertificate and enable TLS on the transport layer. You can also optionallyenable TLS on the HTTP layer. See{ref}/configuring-tls.html#tls-transport[Encrypting Communications Between Nodes in a Cluster] and{ref}/configuring-tls.html#tls-http[Encrypting HTTP Client Communications]. . Configure {monitoring} to use encrypted connections. See <<secure-monitoring>>.. Configure {kib} to encrypt communications between the browser andthe {kib} server and to connect to {es} via HTTPS. See{kibana-ref}/using-kibana-with-security.html[Configuring Security in {kib}].. Configure Logstash to use TLS encryption. See{logstash-ref}/ls-security.html[Configuring Security in Logstash].. Configure Beats to use encrypted connections. See <<beats>>.. Configure the Java transport client to use encrypted communications.See <<java-clients>>.. Configure {es} for Apache Hadoop to use secured transport. See{hadoop-ref}/security.html[{es} for Apache Hadoop Security].
 |