bootstrap-checks-xes.asciidoc 3.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182
  1. [role="xpack"]
  2. [[bootstrap-checks-xpack]]
  3. == Bootstrap Checks for {xpack}
  4. In addition to the <<bootstrap-checks,{es} bootstrap checks>>, there are
  5. checks that are specific to {xpack} features.
  6. [float]
  7. === Encrypt sensitive data check
  8. //See EncryptSensitiveDAtaBootstrapCheck.java
  9. If you use {watcher} and have chosen to encrypt sensitive data (by setting
  10. `xpack.watcher.encrypt_sensitive_data` to `true`), you must also place a key in
  11. the secure settings store.
  12. To pass this bootstrap check, you must set the `xpack.watcher.encryption_key`
  13. on each node in the cluster. For more information, see
  14. {xpack-ref}/encrypting-data.html[Encrypting Sensitive Data in {watcher}].
  15. [float]
  16. === PKI realm check
  17. //See PkiRealmBootstrapCheckTests.java
  18. If you use {security} and a Public Key Infrastructure (PKI) realm, you must
  19. configure Transport Layer Security (TLS) on your cluster and enable client
  20. authentication on the network layers (either transport or http). For more
  21. information, see {xpack-ref}/pki-realm.html[PKI User Authentication] and
  22. {xpack-ref}/ssl-tls.html[Setting Up TLS on a Cluster].
  23. To pass this bootstrap check, if a PKI realm is enabled, you must configure TLS
  24. and enable client authentication on at least one network communication layer.
  25. [float]
  26. === Role mappings check
  27. If you authenticate users with realms other than `native` or `file` realms, you
  28. must create role mappings. These role mappings define which roles are assigned
  29. to each user.
  30. If you use files to manage the role mappings, you must configure a YAML file
  31. and copy it to each node in the cluster. By default, role mappings are stored in
  32. `ES_PATH_CONF/role_mapping.yml`. Alternatively, you can specify a
  33. different role mapping file for each type of realm and specify its location in
  34. the `elasticsearch.yml` file. For more information, see
  35. {xpack-ref}/mapping-roles.html#mapping-roles-file[Using Role Mapping Files].
  36. To pass this bootstrap check, the role mapping files must exist and must be
  37. valid. The Distinguished Names (DNs) that are listed in the role mappings files
  38. must also be valid.
  39. [float]
  40. [[bootstrap-checks-tls]]
  41. === SSL/TLS check
  42. //See TLSLicenseBootstrapCheck.java
  43. In 6.0 and later releases, if you have a gold, platinum, or enterprise license
  44. and {security} is enabled, you must configure SSL/TLS for
  45. internode-communication.
  46. NOTE: Single-node clusters that use a loopback interface do not have this
  47. requirement. For more information, see
  48. {xpack-ref}/encrypting-communications.html[Encrypting Communications].
  49. To pass this bootstrap check, you must
  50. {xpack-ref}/ssl-tls.html[set up SSL/TLS in your cluster].
  51. [float]
  52. === Token SSL check
  53. //See TokenSSLBootstrapCheckTests.java
  54. If you use {security} and the built-in token service is enabled, you must
  55. configure your cluster to use SSL/TLS for the HTTP interface. HTTPS is required
  56. in order to use the token service.
  57. In particular, if `xpack.security.authc.token.enabled` is
  58. set to `true` in the `elasticsearch.yml` file, you must also set
  59. `xpack.security.http.ssl.enabled` to `true`. For more information about these
  60. settings, see <<security-settings>> and <<modules-http>>.
  61. To pass this bootstrap check, you must enable HTTPS or disable the built-in
  62. token service by using the {security} settings.