Updating certificate location instructions. (#63334) (#63340)

This commit is contained in:
Adam Locke 2020-10-06 12:51:22 -04:00 committed by GitHub
parent 87076c32e2
commit 4f314eeb9c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 50 additions and 43 deletions

View File

@ -8,31 +8,38 @@ recommended approach for validating certificate authenticity in an {es} cluster
is to trust the certificate authority (CA) that signed the certificate. By doing
this, as nodes are added to your cluster they just need to use a certificate
signed by the same CA and the node is automatically allowed to join the cluster.
Additionally, it is recommended that the certificates contain subject alternative
names (SAN) that correspond to the node's IP address and DNS name so that
hostname verification can be performed.
Additionally, it is recommended that the certificates contain subject
alternative names (SAN) that correspond to the node's IP address and DNS name
so that hostname verification can be performed.
The {ref}/certutil.html[`elasticsearch-certutil`] command simplifies the process
of generating certificates for the {stack}. It takes care of generating a CA and
signing certificates with the CA. It can be used interactively or in a silent
mode through the use of an input file. It also supports generation of
certificate signing requests (CSR), so that a commercial- or
organization-specific CA can be used to sign the certificates. For example:
organization-specific CA can be used to sign the certificates.
. Optional: Create a certificate authority for your {es} cluster.
NOTE: If you choose not to use `elasticsearch-certutil`, the certificates that
you obtain must allow for both `clientAuth` and `serverAuth` if the extended key
usage extension is present. The certificates need to be in PEM or PKCS#12
format. Although not required, it is highly recommended that the certificate
contain the DNS names and/or IP addresses of the node so that hostname
verification can be used.
. *Optional*: Create a certificate authority for your {es} cluster.
+
--
For example, use the `elasticsearch-certutil ca` command:
Use the <<certutil-ca,`elasticsearch-certutil ca`>> command:
[source,shell]
----------------------------------------------------------
----
bin/elasticsearch-certutil ca
----------------------------------------------------------
----
You can configure the cluster to trust all nodes that have a certificate that
has been signed by this CA.
The command outputs a single file, with a default name of `elastic-stack-ca.p12`.
The command outputs a single file with a default name of `elastic-stack-ca.p12`.
This file is a PKCS#12 keystore that contains the public certificate for your CA
and the private key that is used to sign the certificates for each node.
@ -44,66 +51,66 @@ retain a copy of the file and remember its password.
. Generate a certificate and private key for each node in your cluster.
+
--
For example, use the `elasticsearch-certutil cert` command:
Use the <<certutil-cert,`elasticsearch-certutil cert`>> command:
[source,shell]
----------------------------------------------------------
----
bin/elasticsearch-certutil cert --ca elastic-stack-ca.p12
----------------------------------------------------------
----
You are prompted for a password. You can enter a password for your
certificate and key, or you can leave the password blank.
The output is a single PKCS#12 keystore that includes the node certificate, node
key, and CA certificate.
You are also prompted for a password. You can enter a password for your
certificate and key, or you can leave the password blank by pressing Enter.
IMPORTANT: Secure all output files, which contain the private keys
for your instance.
By default `elasticsearch-certutil` generates certificates that have no hostname
information in them (that is, they do not have any Subject Alternative Name
fields). This means that you can use the certificate for every node in your
cluster, but you must turn off hostname verification as shown in the
configuration below.
The `elasticsearch-certutil` command generates certificates that have no
hostname information in them such as SAN fields. This
means that you can use the certificate for every node in your cluster, but you
must turn off hostname verification.
If you want to use hostname verification within your cluster, run the
`elasticsearch-certutil cert` command once for each of your nodes and provide
the `--name`, `--dns` and `--ip` options.
NOTE: You should secure the output files, since they contain the private keys
for your instance.
Alternatively, if you want to use a commercial or organization-specific CA,
you can use the `elasticsearch-certutil csr` command to generate certificate
signing requests (CSR) for the nodes in your cluster. For more information, see
<<certutil>>.
you can use the <<certutil-csr,`elasticsearch-certutil csr`>> command to
generate certificate signing requests (CSR) for the nodes in your cluster.
--
. Optional: Generate additional certificates specifically for encrypting HTTP
client communications.
. *Optional*: Generate additional certificates specifically for encrypting HTTP
client communications.
+
--
For example, use the `elasticsearch-certutil http` command:
Use the <<certutil-http,`elasticsearch-certutil http`>> command:
[source,shell]
----------------------------------------------------------
----
bin/elasticsearch-certutil http
----------------------------------------------------------
----
This command guides you through the process of generating the appropriate
certificates for use in {es} and {kib}. If you created a CA for your cluster,
you can re-use it by supplying its location when prompted.
--
. Copy the node certificates to the appropriate locations.
. Copy the node certificate to the appropriate locations.
.. Create a folder in the configuration directory on each {es} node to contain
your security certificates. For example, create a `certs` folder in the
`/home/es/config/certs` directory.
+
--
Copy the applicable files into the {es} configuration directory on each
node.
NOTE: The <<config-files-location,{es} configuration directory>> varies
depending on your {es} installation.
For each additional Elastic product that you want to configure, copy the
certificates to the relevant configuration directory.
--
.. Copy the node certificates into the `certs` directory that you created in the
previous step.
NOTE: If you choose not to use `elasticsearch-certutil`, the certificates that
you obtain must allow for both `clientAuth` and `serverAuth` if the extended key
usage extension is present. The certificates need to be in PEM or PKCS#12
format. Although not required, it is highly recommended that the certificate
contain the DNS names and/or IP addresses of the node so that hostname
verification can be used.
.. Copy the `.p12` keystore file into the {es} configuration directory. {es}
will fail to start if the keystore file is located anywhere except this
directory.
.. For each additional Elastic product that you want to configure, copy the
certificates to the relevant configuration directory.