-
Notifications
You must be signed in to change notification settings - Fork 24.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Teach reindex to honor xpack.ssl.certificate_authorities
#29755
Comments
Original comment by @jaymode:
I wonder if we should have the notion of a default keystore/truststore in core for things that need SSL. For core, this would point to the jdk defaults that are configured using system properties. Plugins would need to be allowed to provide a default and then xpack would set it.
I am also on the fence about the effort and usefulness vs asking the user to configure the default JDK one (or if reindex has other settings). A simpler and possibly cleaner idea is to have xpack set the default SSLContext based on what has been configured using |
Original comment by @nik9000:
It is certainly worth testing that assumption, but if it proves true I think it is fine. |
Original comment by @joshbressers: This just showed up on my radar. I assume that with the coming TLS everywhere, we will want this working properly. |
Original comment by @tvernum: I'll do some of tests on this and see whether setting the default SSL context does what we want. |
Original comment by @tvernum: This doesn't work out of the box. It's possible to make it work, but it would require changes to the |
Original comment by @jaymode: I opened a core issue for the rest client aspect previously LINK REDACTED I'll go ahead and take a look at that since no one else has gotten around to it yet. |
Original comment by @jaymode: The core issue allowed for us to use the system default context, but I think the item left to do here is to consider making the SSLContext defined by the settings |
Original comment by @ppf2: +1 on making it work with |
Original comment by @PhaedrusTheGreek: Related: #27267 |
Note, this issue is specifically about how to make X-Pack based SSL config available in I propose that we do something based around the following
Putting those together, would mean that
There's some open questions there like:
but all those questions are relatively minor and could be resolved as part of the implementation. |
ping: @elastic/es-security , @joshbressers , @eskibars |
@eskibars Do you know if there's an ETA on this? If so, approximately when? |
Adds reindex.ssl.* settings for reindex from remote. This uses the ssl-config/ internal library to parse and load SSL configuration and files. This is applied when using the low level rest client to connect to a remote ES node Backport of: elastic#37527 Relates: elastic#37287 Resolves: elastic#29755
Original comment by @nik9000:
Right now reindex is fine with ssl but doesn't read
xpack.ssl.certificate_authorities
. It probably should, but I'm not really sure how to make that work because reindex and x-pack don't know about each other. I'm sure we could get it to work by making some common thing inside core that x-pack implements and reindex uses, but I'm not sure it is worth the effort. Maybe? Thus, discuss label.The text was updated successfully, but these errors were encountered: