mirror of
https://github.com/honeymoose/OpenSearch.git
synced 2025-02-25 14:26:27 +00:00
Added docs for making cross cluster search work with security
relates elastic/x-pack-elasticsearch#868 Original commit: elastic/x-pack-elasticsearch@0292fbb5d3
This commit is contained in:
parent
29c64d83e1
commit
d4d505fb97
@ -83,7 +83,7 @@ issues.
|
|||||||
provides more information about how Security supports user authentication,
|
provides more information about how Security supports user authentication,
|
||||||
authorization, and encryption.
|
authorization, and encryption.
|
||||||
|
|
||||||
* <<tribe-clients-integrations>>
|
* <<ccs-tribe-clients-integrations>>
|
||||||
shows you how to interact with an Elasticsearch cluster protected by
|
shows you how to interact with an Elasticsearch cluster protected by
|
||||||
X-Pack Security.
|
X-Pack Security.
|
||||||
|
|
||||||
|
@ -1,10 +1,12 @@
|
|||||||
[[tribe-clients-integrations]]
|
[[ccs-tribe-clients-integrations]]
|
||||||
== Tribe, Clients and Integrations
|
== Cross Cluster Search, Tribe, Clients and Integrations
|
||||||
|
|
||||||
When using a {ref}/modules-tribe.html[Tribe Nodes] you need to take extra steps to secure its communication
|
When using {ref}/modules-cross-cluster-search.html[Cross Cluster Search] or
|
||||||
with the connected clusters
|
{ref}/modules-tribe.html[Tribe Nodes] you need to take extra steps to secure
|
||||||
|
communications with the connected clusters.
|
||||||
|
|
||||||
* <<tribe-node-configuring, Tribe Node Security>>
|
* <<cross-cluster-configuring, Cross Cluster Search and Security>>
|
||||||
|
* <<tribe-node-configuring, Tribe Nodes and Security>>
|
||||||
|
|
||||||
You will need to update the configuration for several clients to work with a
|
You will need to update the configuration for several clients to work with a
|
||||||
secured cluster:
|
secured cluster:
|
||||||
@ -23,6 +25,8 @@ be secured as well, or at least communicate with the cluster in a secured way:
|
|||||||
* <<kibana, Kibana>>
|
* <<kibana, Kibana>>
|
||||||
* <<secure-monitoring, Monitoring>>
|
* <<secure-monitoring, Monitoring>>
|
||||||
|
|
||||||
|
include::tribe-clients-integrations/cross-cluster.asciidoc[]
|
||||||
|
|
||||||
include::tribe-clients-integrations/tribe.asciidoc[]
|
include::tribe-clients-integrations/tribe.asciidoc[]
|
||||||
|
|
||||||
include::tribe-clients-integrations/java.asciidoc[]
|
include::tribe-clients-integrations/java.asciidoc[]
|
||||||
|
@ -0,0 +1,61 @@
|
|||||||
|
[[cross-cluster-configuring]]
|
||||||
|
=== Cross Cluster Search and Security
|
||||||
|
|
||||||
|
{ref}/modules-cross-cluster-search.html[Cross Cluster Search] enables
|
||||||
|
federated search across multiple clusters. When using cross cluster search
|
||||||
|
with secured clusters, all clusters must have {security} enabled.
|
||||||
|
|
||||||
|
The local cluster (the cluster used to initiate cross cluster search) must be
|
||||||
|
allowed to connect to the remote clusters, which means that the CA used to
|
||||||
|
sign the SSL/TLS key of the local cluster must be trusted by the remote
|
||||||
|
clusters.
|
||||||
|
|
||||||
|
User authentication is performed on the local cluster and the user and user's
|
||||||
|
roles are passed to the remote clusters. A remote cluster checks the user's
|
||||||
|
roles against its local role definitions to determine which indices the user
|
||||||
|
is allowed to access.
|
||||||
|
|
||||||
|
To use cross cluster search with secured clusters:
|
||||||
|
|
||||||
|
* Install {xpack} on every node in each connected cluster.
|
||||||
|
|
||||||
|
* Enable encryption globally. To encrypt communications, you must enable
|
||||||
|
<<ssl-tls,enable SSL/TLS>> on every node.
|
||||||
|
|
||||||
|
* Enable a trust relationship between the cluster used for performing cross
|
||||||
|
cluster search (the local cluster) and all remote clusters. This can be done
|
||||||
|
either by:
|
||||||
|
+
|
||||||
|
** Using the same certificate authority to generate certificates for all
|
||||||
|
connected clusters, or
|
||||||
|
** Adding the CA certificate from the local cluster as a trusted CA in
|
||||||
|
each remote cluster (see <<transport-tls-ssl-settings>>).
|
||||||
|
|
||||||
|
* Configure the local cluster to connect to remote clusters as described
|
||||||
|
in {ref}/modules-cross-cluster-search.html#_configuring_cross_cluster_search[Configuring Cross Cluster Search].
|
||||||
|
For example, the following configuration adds two remote clusters
|
||||||
|
to the local cluster:
|
||||||
|
+
|
||||||
|
[source,js]
|
||||||
|
-----------------------------------------------------------
|
||||||
|
PUT _cluster/settings
|
||||||
|
{
|
||||||
|
"persistent": {
|
||||||
|
"search": {
|
||||||
|
"remote": {
|
||||||
|
"cluster_one": {
|
||||||
|
"seeds": [ "10.0.1.1:9300" ]
|
||||||
|
},
|
||||||
|
"cluster_two": {
|
||||||
|
"seeds": [ "10.0.2.1:9300" ]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
-----------------------------------------------------------
|
||||||
|
|
||||||
|
* On the local cluster, ensure that users are assigned to (at least) one role
|
||||||
|
that exists on the remote clusters. On the remote clusters, use that role
|
||||||
|
to define which indices the user may access. (See <<authorization>>).
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user