Skip to content

Commit

Permalink
[DOCS] Clarifying TLS steps (#65326) (#66613)
Browse files Browse the repository at this point in the history
* [DOCS] Clarifying TLS steps

* Fix file name

* Clarifying note based on reviewer feedback
  • Loading branch information
Adam Locke authored Dec 18, 2020
1 parent 04d7f7e commit 2704706
Showing 1 changed file with 30 additions and 8 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ Use the <<certutil-ca,`elasticsearch-certutil ca`>> command:

[source,shell]
----
bin/elasticsearch-certutil ca
./bin/elasticsearch-certutil ca
----

You can configure the cluster to trust all nodes that have a certificate that
Expand All @@ -55,7 +55,7 @@ Use the <<certutil-cert,`elasticsearch-certutil cert`>> command:

[source,shell]
----
bin/elasticsearch-certutil cert --ca elastic-stack-ca.p12
./bin/elasticsearch-certutil cert --ca elastic-stack-ca.p12
----
You are prompted for a password. You can enter a password for your
certificate and key, or you can leave the password blank.
Expand Down Expand Up @@ -88,12 +88,34 @@ Use the <<certutil-http,`elasticsearch-certutil http`>> command:

[source,shell]
----
bin/elasticsearch-certutil http
./bin/elasticsearch-certutil http
----

This command guides you through the process of generating the appropriate
certificates for use in {es} and {kib}. If you created a CA for your cluster,
you can re-use it by supplying its location when prompted.

NOTE: The first question that the `elasticsearch-certutil` tool prompts you
with is whether you want to generate a Certificate Signing Request (CSR).
Answer `y` if a trusted authority, such as in internal security team or a
commercial certificate authority, will sign your certificates. Answer `n` if
you have access to a trusted CA and will sign your own certificates.

The output is a `.zip` file containing one directory each for both Elasticsearch
and Kibana:

[source,shell]
----
/elasticsearch
|_ README.txt
|_ http.p12
|_ sample-elasticsearch.yml
/kibana
|_ README.txt
|_ elasticsearch-ca.pem
|_ sample-kibana.yml
----
--

. Copy the node certificate to the appropriate locations.
Expand All @@ -105,12 +127,12 @@ your security certificates. For example, create a `certs` folder in the
NOTE: The <<config-files-location,{es} configuration directory>> varies
depending on your {es} installation.

.. Copy the node certificates into the `certs` directory that you created in the
previous step.
.. On each node, copy the certificate that you created into the `/certs`
directory. This certificate is typically a single `.p12` (PKCS#12) file, such
as `elastic-certificates.p12`.

.. Copy the `.p12` keystore file into the {es} configuration directory. {es}
will fail to start if the keystore file is located anywhere except this
directory.
.. If you generated HTTP certificates, copy the `http.p12` file into the
`certs` directory as well.

.. For each additional Elastic product that you want to configure, copy the
certificates to the relevant configuration directory.

0 comments on commit 2704706

Please sign in to comment.