2017-01-30 17:56:45 -05:00
|
|
|
[[secure-settings]]
|
2018-07-01 04:11:47 -04:00
|
|
|
=== Secure settings
|
2017-01-30 17:56:45 -05:00
|
|
|
|
|
|
|
Some settings are sensitive, and relying on filesystem permissions to protect
|
2017-11-29 03:44:25 -05:00
|
|
|
their values is not sufficient. For this use case, Elasticsearch provides a
|
2018-01-09 18:01:37 -05:00
|
|
|
keystore and the `elasticsearch-keystore` tool to manage the settings in the keystore.
|
2017-01-30 17:56:45 -05:00
|
|
|
|
2017-11-29 03:44:25 -05:00
|
|
|
NOTE: All commands here should be run as the user which will run Elasticsearch.
|
2017-01-30 17:56:45 -05:00
|
|
|
|
2019-06-20 17:27:07 -04:00
|
|
|
IMPORTANT: Only some settings are designed to be read from the keystore. However,
|
|
|
|
the keystore has no validation to block unsupported settings.
|
|
|
|
Adding unsupported settings to the keystore will cause {es}
|
|
|
|
Additional unsupported settings being added to the keystore will cause Elasticsearch
|
|
|
|
to fail to start. See documentation for each setting to see if it is supported
|
|
|
|
as part of the keystore.
|
2017-06-14 00:04:16 -04:00
|
|
|
|
2017-11-30 17:19:58 -05:00
|
|
|
NOTE: All the modifications to the keystore take affect only after restarting
|
|
|
|
Elasticsearch.
|
|
|
|
|
2018-01-09 18:01:37 -05:00
|
|
|
NOTE: The elasticsearch keystore currently only provides obfuscation. In the future,
|
|
|
|
password protection will be added.
|
|
|
|
|
2018-07-01 04:11:47 -04:00
|
|
|
These settings, just like the regular ones in the `elasticsearch.yml` config file,
|
|
|
|
need to be specified on each node in the cluster. Currently, all secure settings
|
|
|
|
are node-specific settings that must have the same value on every node.
|
|
|
|
|
2017-01-30 17:56:45 -05:00
|
|
|
[float]
|
|
|
|
[[creating-keystore]]
|
|
|
|
=== Creating the keystore
|
|
|
|
|
|
|
|
To create the `elasticsearch.keystore`, use the `create` command:
|
|
|
|
|
|
|
|
[source,sh]
|
|
|
|
----------------------------------------------------------------
|
|
|
|
bin/elasticsearch-keystore create
|
|
|
|
----------------------------------------------------------------
|
|
|
|
|
|
|
|
The file `elasticsearch.keystore` will be created alongside `elasticsearch.yml`.
|
|
|
|
|
|
|
|
[float]
|
|
|
|
[[list-settings]]
|
|
|
|
=== Listing settings in the keystore
|
|
|
|
|
|
|
|
A list of the settings in the keystore is available with the `list` command:
|
|
|
|
|
|
|
|
[source,sh]
|
|
|
|
----------------------------------------------------------------
|
2017-07-21 05:24:27 -04:00
|
|
|
bin/elasticsearch-keystore list
|
2017-01-30 17:56:45 -05:00
|
|
|
----------------------------------------------------------------
|
|
|
|
|
|
|
|
[float]
|
|
|
|
[[add-string-to-keystore]]
|
|
|
|
=== Adding string settings
|
|
|
|
|
|
|
|
Sensitive string settings, like authentication credentials for cloud
|
2017-04-05 05:15:08 -04:00
|
|
|
plugins, can be added using the `add` command:
|
2017-01-30 17:56:45 -05:00
|
|
|
|
|
|
|
[source,sh]
|
|
|
|
----------------------------------------------------------------
|
|
|
|
bin/elasticsearch-keystore add the.setting.name.to.set
|
|
|
|
----------------------------------------------------------------
|
|
|
|
|
|
|
|
The tool will prompt for the value of the setting. To pass the value
|
|
|
|
through stdin, use the `--stdin` flag:
|
|
|
|
|
|
|
|
[source,sh]
|
|
|
|
----------------------------------------------------------------
|
|
|
|
cat /file/containing/setting/value | bin/elasticsearch-keystore add --stdin the.setting.name.to.set
|
|
|
|
----------------------------------------------------------------
|
|
|
|
|
2019-04-11 08:48:42 -04:00
|
|
|
[float]
|
|
|
|
[[add-file-to-keystore]]
|
|
|
|
=== Adding file settings
|
|
|
|
You can add sensitive files, like authentication key files for cloud plugins,
|
|
|
|
using the `add-file` command. Be sure to include your file path as an argument
|
|
|
|
after the setting name.
|
|
|
|
|
|
|
|
[source,sh]
|
|
|
|
----------------------------------------------------------------
|
|
|
|
bin/elasticsearch-keystore add-file the.setting.name.to.set /path/example-file.json
|
|
|
|
----------------------------------------------------------------
|
|
|
|
|
2017-01-30 17:56:45 -05:00
|
|
|
[float]
|
|
|
|
[[remove-settings]]
|
|
|
|
=== Removing settings
|
|
|
|
|
|
|
|
To remove a setting from the keystore, use the `remove` command:
|
|
|
|
|
|
|
|
[source,sh]
|
|
|
|
----------------------------------------------------------------
|
|
|
|
bin/elasticsearch-keystore remove the.setting.name.to.remove
|
|
|
|
----------------------------------------------------------------
|
|
|
|
|
2018-08-01 05:07:23 -04:00
|
|
|
[float]
|
|
|
|
[[reloadable-secure-settings]]
|
|
|
|
=== Reloadable secure settings
|
|
|
|
|
|
|
|
Just like the settings values in `elasticsearch.yml`, changes to the
|
|
|
|
keystore contents are not automatically applied to the running
|
|
|
|
elasticsearch node. Re-reading settings requires a node restart.
|
|
|
|
However, certain secure settings are marked as *reloadable*. Such settings
|
|
|
|
can be re-read and applied on a running node.
|
|
|
|
|
|
|
|
The values of all secure settings, *reloadable* or not, must be identical
|
|
|
|
across all cluster nodes. After making the desired secure settings changes,
|
|
|
|
using the `bin/elasticsearch-keystore add` command, call:
|
2019-09-05 10:11:25 -04:00
|
|
|
|
|
|
|
[source,console]
|
2018-08-01 05:07:23 -04:00
|
|
|
----
|
|
|
|
POST _nodes/reload_secure_settings
|
|
|
|
----
|
2019-09-05 10:11:25 -04:00
|
|
|
|
2018-08-01 05:07:23 -04:00
|
|
|
This API will decrypt and re-read the entire keystore, on every cluster node,
|
|
|
|
but only the *reloadable* secure settings will be applied. Changes to other
|
|
|
|
settings will not go into effect until the next restart. Once the call returns,
|
|
|
|
the reload has been completed, meaning that all internal datastructures dependent
|
|
|
|
on these settings have been changed. Everything should look as if the settings
|
|
|
|
had the new value from the start.
|
|
|
|
|
|
|
|
When changing multiple *reloadable* secure settings, modify all of them, on
|
|
|
|
each cluster node, and then issue a `reload_secure_settings` call, instead
|
|
|
|
of reloading after each modification.
|
2019-09-04 13:12:03 -04:00
|
|
|
|
|
|
|
There are reloadable secure settings for:
|
|
|
|
|
2019-09-05 13:44:21 -04:00
|
|
|
* {plugins}/repository-azure-client-settings.html[The Azure repository plugin]
|
2019-09-04 17:43:58 -04:00
|
|
|
* {plugins}/discovery-ec2-usage.html#_configuring_ec2_discovery[The EC2 discovery plugin]
|
2019-09-04 19:24:55 -04:00
|
|
|
* {plugins}/repository-gcs-client.html[The GCS repository plugin]
|
2019-09-04 17:43:58 -04:00
|
|
|
* {plugins}/repository-s3-client.html[The S3 repository plugin]
|