syskeygen.asciidoc 1.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. [role="xpack"]
  2. [testenv="gold+"]
  3. [[syskeygen]]
  4. == elasticsearch-syskeygen
  5. The `elasticsearch-syskeygen` command creates a system key file in the
  6. elasticsearch config directory.
  7. [float]
  8. === Synopsis
  9. [source,shell]
  10. --------------------------------------------------
  11. bin/elasticsearch-syskeygen
  12. [-E <KeyValuePair>] [-h, --help]
  13. ([-s, --silent] | [-v, --verbose])
  14. --------------------------------------------------
  15. [float]
  16. === Description
  17. The command generates a `system_key` file, which you can use to symmetrically
  18. encrypt sensitive data. For example, you can use this key to prevent {watcher}
  19. from returning and storing information that contains clear text credentials. See
  20. <<encrypting-data>>.
  21. IMPORTANT: The system key is a symmetric key, so the same key must be used on
  22. every node in the cluster.
  23. [float]
  24. === Parameters
  25. `-E <KeyValuePair>`:: Configures a setting. For example, if you have a custom
  26. installation of {es}, you can use this parameter to specify the `ES_PATH_CONF`
  27. environment variable.
  28. `-h, --help`:: Returns all of the command parameters.
  29. `-s, --silent`:: Shows minimal output.
  30. `-v, --verbose`:: Shows verbose output.
  31. [float]
  32. === Examples
  33. The following command generates a `system_key` file in the
  34. default `$ES_HOME/config` directory:
  35. [source, sh]
  36. --------------------------------------------------
  37. bin/elasticsearch-syskeygen
  38. --------------------------------------------------