setting-up-ssl.asciidoc 1.7 KB

123456789101112131415161718192021222324252627282930313233343536
  1. [[ssl-tls]]
  2. === Setting up TLS on a cluster
  3. The {stack} {security-features} enable you to encrypt traffic to, from, and
  4. within your {es} cluster. Connections are secured using Transport Layer Security
  5. (TLS), which is commonly referred to as "SSL".
  6. WARNING: Clusters that do not have encryption enabled send all data in plain text
  7. including passwords. If the {es} {security-features} are enabled, unless you have a trial license, you must configure SSL/TLS for internode-communication.
  8. The following steps describe how to enable encryption across the various
  9. components of the {stack}. You must perform each of the steps that are
  10. applicable to your cluster.
  11. . Generate a private key and X.509 certificate for each of your {es} nodes. See
  12. {ref}/configuring-tls.html#node-certificates[Generating Node Certificates].
  13. . Configure each node in the cluster to identify itself using its signed
  14. certificate and enable TLS on the transport layer. You can also optionally
  15. enable TLS on the HTTP layer. See
  16. {ref}/configuring-tls.html#tls-transport[Encrypting Communications Between Nodes in a Cluster] and
  17. {ref}/configuring-tls.html#tls-http[Encrypting HTTP Client Communications].
  18. . Configure the {monitor-features} to use encrypted connections. See <<secure-monitoring>>.
  19. . Configure {kib} to encrypt communications between the browser and
  20. the {kib} server and to connect to {es} via HTTPS. See
  21. {kibana-ref}/using-kibana-with-security.html[Configuring security in {kib}].
  22. . Configure Logstash to use TLS encryption. See
  23. {logstash-ref}/ls-security.html[Configuring security in {ls}].
  24. . Configure Beats to use encrypted connections. See <<beats>>.
  25. . Configure {es} for Apache Hadoop to use secured transport. See
  26. {hadoop-ref}/security.html[{es} for Apache Hadoop Security].