Skip to content

Commit 5b3f185

Browse files
authored
[Ingest] Use current Logstash security settings (#4241)
1 parent 21ce88e commit 5b3f185

File tree

5 files changed

+6
-13
lines changed

5 files changed

+6
-13
lines changed

manage-data/ingest/ingesting-data-from-applications/ingest-data-from-beats-to-elasticsearch-service-with-logstash-as-proxy.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -388,7 +388,6 @@ In this section, you configure {{ls}} to send the Metricbeat and Filebeat data t
388388
ilm_enabled => true
389389
cloud_id => "<DeploymentName>:<ID>" <1>
390390
cloud_auth => "elastic:<Password>" <2>
391-
ssl => true
392391
# api_key => "<myAPIid:myAPIkey>"
393392
}
394393
}
@@ -455,7 +454,6 @@ In this section, you configure {{ls}} to send the Metricbeat and Filebeat data t
455454
elasticsearch {
456455
index => "%{[@metadata][beat]}-%{[@metadata][version]}"
457456
cloud_id => "<myDeployment>"
458-
ssl => true
459457
ilm_enabled => true
460458
api_key => "2GBe63fBcxgJAetmgZeh:aB1cdeF-GJI23jble4NOH4"
461459
# user => "<Username>"

manage-data/ingest/ingesting-data-from-applications/ingest-data-from-relational-database-into-elasticsearch-service.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,6 @@ In this section, we configure Logstash to send the MySQL data to Elasticsearch.
294294
ilm_enabled => false
295295
cloud_id => "<DeploymentName>:<ID>" <1>
296296
cloud_auth => "elastic:<Password>" <2>
297-
ssl => true
298297
# api_key => "<myAPIid:myAPIkey>"
299298
}
300299
}
@@ -355,7 +354,6 @@ In this section, we configure Logstash to send the MySQL data to Elasticsearch.
355354
elasticsearch {
356355
index => "rdbms_idx"
357356
cloud_id => "<myDeployment>"
358-
ssl => true
359357
ilm_enabled => false
360358
api_key => "2TBR42gBabmINotmvZjv:tV1dnfF-GHI59ykgv4N0U3"
361359
# user => "<Username>"

reference/fleet/ls-output-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ input {
3131
ssl_certificate_authorities => ["<ca_path>"]
3232
ssl_certificate => "<server_cert_path>"
3333
ssl_key => "<server_cert_key_in_pkcs8>"
34-
ssl_verify_mode => "force_peer"
34+
ssl_client_authentication => "required"
3535
}
3636
}
3737
output {
@@ -41,7 +41,7 @@ output {
4141
api_key => "<api_key>" <3>
4242
data_stream => true
4343
ssl_enabled => true
44-
# cacert => "<elasticsearch_ca_path>"
44+
ssl_certificate_authorities => "<elasticsearch_ca_path>"
4545
}
4646
}
4747
```

reference/fleet/secure-logstash-connections.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -118,14 +118,12 @@ output {
118118
cloud_id => "xxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxx=" <1>
119119
api_key => "xxxx:xxxx" <2>
120120
data_stream => true
121-
ssl => true <3>
122121
}
123122
}
124123
```
125124

126125
1. Use the `cloud_id` shown on your deployment page in {{ecloud}}.
127126
2. In {{fleet}}, you can generate this API key when you add a {{ls}} output.
128-
3. {{ech}} uses standard publicly trusted certificates, so there’s no need specify other SSL settings here.
129127

130128

131129
Self-managed {{es}} cluster example:
@@ -147,8 +145,7 @@ output {
147145
hosts => "https://xxxx:9200"
148146
api_key => "xxxx:xxxx"
149147
data_stream => true
150-
ssl => true
151-
cacert => "/path/to/http_ca.crt" <1>
148+
ssl_certificate_authorities => "/path/to/http_ca.crt" <1>
152149
}
153150
}
154151
```

solutions/observability/apm/apm-server/configure-logstash-output.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -301,19 +301,19 @@ To use SSL mutual authentication:
301301
* `ssl`: When set to true, enables {{ls}} to use SSL/TLS.
302302
* `ssl_certificate_authorities`: Configures {{ls}} to trust any certificates signed by the specified CA.
303303
* `ssl_certificate` and `ssl_key`: Specify the certificate and key that {{ls}} uses to authenticate with the client.
304-
* `ssl_verify_mode`: Specifies whether the {{ls}} server verifies the client certificate against the CA. You need to specify either `peer` or `force_peer` to make the server ask for the certificate and validate it. If you specify `force_peer`, and APM Server doesn’t provide a certificate, the {{ls}} connection will be closed. If you choose not to use [`certutil`](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
304+
* `ssl_client_authentication`: Specifies whether the {{ls}} server verifies the client certificate against the CA. If you specify `required` and APM Server doesn’t provide a certificate, the {{ls}} connection will be closed. If you choose not to use [`certutil`](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
305305

306306
For example:
307307

308308
```json
309309
input {
310310
beats {
311311
port => 5044
312-
ssl => true
312+
ssl_enabled => true
313313
ssl_certificate_authorities => ["/etc/ca.crt"]
314314
ssl_certificate => "/etc/server.crt"
315315
ssl_key => "/etc/server.key"
316-
ssl_verify_mode => "force_peer"
316+
ssl_client_authentication => "required"
317317
}
318318
}
319319
```

0 commit comments

Comments
 (0)