secure-settings.asciidoc 2.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
  1. [[secure-settings]]
  2. === Secure settings
  3. Some settings are sensitive, and relying on filesystem permissions to protect
  4. their values is not sufficient. For this use case, {es} provides a
  5. keystore and the <<elasticsearch-keystore,`elasticsearch-keystore` tool>> to
  6. manage the settings in the keystore.
  7. IMPORTANT: Only some settings are designed to be read from the keystore. However,
  8. the keystore has no validation to block unsupported settings. Adding unsupported
  9. settings to the keystore causes {es} to fail to start. To see whether a setting
  10. is supported in the keystore, look for a "Secure" qualifier the setting
  11. reference.
  12. All the modifications to the keystore take affect only after restarting {es}.
  13. NOTE: The {es} keystore currently only provides obfuscation. In the future,
  14. password protection will be added.
  15. These settings, just like the regular ones in the `elasticsearch.yml` config file,
  16. need to be specified on each node in the cluster. Currently, all secure settings
  17. are node-specific settings that must have the same value on every node.
  18. [discrete]
  19. [[reloadable-secure-settings]]
  20. === Reloadable secure settings
  21. Just like the settings values in `elasticsearch.yml`, changes to the keystore
  22. contents are not automatically applied to the running {es} node. Re-reading
  23. settings requires a node restart. However, certain secure settings are marked as
  24. *reloadable*. Such settings can be re-read and applied on a running node.
  25. The values of all secure settings, *reloadable* or not, must be identical
  26. across all cluster nodes. After making the desired secure settings changes,
  27. using the `bin/elasticsearch-keystore add` command, call:
  28. [source,console]
  29. ----
  30. POST _nodes/reload_secure_settings
  31. ----
  32. This API decrypts and re-reads the entire keystore, on every cluster node,
  33. but only the *reloadable* secure settings are applied. Changes to other
  34. settings do not go into effect until the next restart. Once the call returns,
  35. the reload has been completed, meaning that all internal data structures
  36. dependent on these settings have been changed. Everything should look as if the
  37. settings had the new value from the start.
  38. When changing multiple *reloadable* secure settings, modify all of them on each
  39. cluster node, then issue a `reload_secure_settings` call instead of reloading
  40. after each modification.
  41. There are reloadable secure settings for:
  42. * {plugins}/repository-azure-client-settings.html[The Azure repository plugin]
  43. * {plugins}/discovery-ec2-usage.html#_configuring_ec2_discovery[The EC2 discovery plugin]
  44. * {plugins}/repository-gcs-client.html[The GCS repository plugin]
  45. * {plugins}/repository-s3-client.html[The S3 repository plugin]