syskeygen.asciidoc 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152
  1. [role="xpack"]
  2. [testenv="gold+"]
  3. [[syskeygen]]
  4. == elasticsearch-syskeygen
  5. The `elasticsearch-syskeygen` command creates a system key file in the
  6. elasticsearch config directory.
  7. [float]
  8. === Synopsis
  9. [source,shell]
  10. --------------------------------------------------
  11. bin/elasticsearch-syskeygen
  12. [-E <KeyValuePair>] [-h, --help]
  13. ([-s, --silent] | [-v, --verbose])
  14. --------------------------------------------------
  15. [float]
  16. === Description
  17. The command generates a `system_key` file, which you can use to symmetrically
  18. encrypt sensitive data. For example, you can use this key to prevent {watcher}
  19. from returning and storing information that contains clear text credentials. See {xpack-ref}/encrypting-data.html[Encrypting sensitive data in {watcher}].
  20. IMPORTANT: The system key is a symmetric key, so the same key must be used on
  21. every node in the cluster.
  22. [float]
  23. === Parameters
  24. `-E <KeyValuePair>`:: Configures a setting. For example, if you have a custom
  25. installation of {es}, you can use this parameter to specify the `ES_PATH_CONF`
  26. environment variable.
  27. `-h, --help`:: Returns all of the command parameters.
  28. `-s, --silent`:: Shows minimal output.
  29. `-v, --verbose`:: Shows verbose output.
  30. [float]
  31. === Examples
  32. The following command generates a `system_key` file in the
  33. default `$ES_HOME/config` directory:
  34. [source, sh]
  35. --------------------------------------------------
  36. bin/elasticsearch-syskeygen
  37. --------------------------------------------------