Skip to content

Commit 78caa87

Browse files
authored
Doc: Use current Logstash SSL settings for beats (#46866)
1 parent 42b613a commit 78caa87

File tree

12 files changed

+67
-67
lines changed

12 files changed

+67
-67
lines changed

docs/reference/auditbeat/configuring-ssl-logstash.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To use SSL mutual authentication:
3838
3939
* `ssl`. When set to true, enables Logstash to use SSL/TLS.
4040
* `ssl_certificate_authorities`. Configures Logstash to trust any certificates signed by the specified CA.
41-
* `ssl_certificate` and `ssl_key`. Specify the certificate and key that Logstash uses to authenticate with the client.
41+
* `ssl_certificate` and `ssl_key`. Specifies the certificate and key that Logstash uses to authenticate with the client.
4242
* `ssl_client_authentication`. Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `required` or `optional` to make the server ask for the certificate and validate it. If you specify `required`, and Auditbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
4343

4444
For example:

docs/reference/auditbeat/ssl-client-fails.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The host running {{ls}} might be unreachable or the certificate may not be valid
2323
::::
2424

2525
* Use OpenSSL to test connectivity to the {{ls}} server and diagnose problems. See the [OpenSSL documentation](https://www.openssl.org/docs/manmaster/man1/openssl-s_client.md) for more info.
26-
* Make sure that you have enabled SSL (set `ssl => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
26+
* Make sure that you have enabled SSL (set `ssl_enabled => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
2727

2828
## Common SSL-Related Errors and Resolutions [_common_ssl_related_errors_and_resolutions]
2929

docs/reference/filebeat/configuring-ssl-logstash.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ To use SSL mutual authentication:
1717
If you are using {{security-features}}, you can use the [elasticsearch-certutil tool](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md) to generate certificates.
1818
::::
1919

20-
2. Configure Filebeat to use SSL. In the `filebeat.yml` config file, specify the following settings under `ssl`:
20+
2. Configure Filebeat to use SSL. In the `filebeat.yml` config file, specify these settings under `ssl`:
2121

22-
* `certificate_authorities`: Configures Filebeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23-
* `certificate` and `key`: Specifies the certificate and key that Filebeat uses to authenticate with Logstash.
22+
* `certificate_authorities`. Configures Filebeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23+
* `certificate` and `key`. Specifies the certificate and key that Filebeat uses to authenticate with Logstash.
2424

2525
For example:
2626

@@ -34,24 +34,24 @@ To use SSL mutual authentication:
3434
3535
For more information about these configuration options, see [SSL](/reference/filebeat/configuration-ssl.md).
3636
37-
3. Configure Logstash to use SSL. In the Logstash config file, specify the following settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
37+
3. Configure Logstash to use SSL. In the Logstash config file, specify these settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
3838
39-
* `ssl`: When set to true, enables Logstash to use SSL/TLS.
40-
* `ssl_certificate_authorities`: Configures Logstash to trust any certificates signed by the specified CA.
41-
* `ssl_certificate` and `ssl_key`: Specify the certificate and key that Logstash uses to authenticate with the client.
42-
* `ssl_verify_mode`: Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `peer` or `force_peer` to make the server ask for the certificate and validate it. If you specify `force_peer`, and Filebeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
39+
* `ssl`. When set to true, enables Logstash to use SSL/TLS.
40+
* `ssl_certificate_authorities`. Configures Logstash to trust any certificates signed by the specified CA.
41+
* `ssl_certificate` and `ssl_key`. Specifies the certificate and key that Logstash uses to authenticate with the client.
42+
* `ssl_client_authentication`. Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `required` or `optional` to make the server ask for the certificate and validate it. If you specify `required`, and Filebeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
4343

4444
For example:
4545

4646
```json
4747
input {
4848
beats {
4949
port => 5044
50-
ssl => true
50+
ssl_enabled => true
5151
ssl_certificate_authorities => ["/etc/ca.crt"]
5252
ssl_certificate => "/etc/server.crt"
5353
ssl_key => "/etc/server.key"
54-
ssl_verify_mode => "force_peer"
54+
ssl_client_authentication => "required"
5555
}
5656
}
5757
```
@@ -74,7 +74,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
7474
* Rebuilt URL to: https://logs.example.com:5044/
7575
* Trying 192.168.99.100...
7676
* Connected to logs.example.com (192.168.99.100) port 5044 (#0)
77-
* TLS 1.2 connection using TLS_DHE_RSA_WITH_AES_256_CBC_SHA
77+
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
7878
* Server certificate: logs.example.com
7979
* Server certificate: example.com
8080
> GET / HTTP/1.1
@@ -87,7 +87,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
8787
curl: (52) Empty reply from server
8888
```
8989

90-
The following example uses the IP address rather than the hostname to validate the certificate:
90+
This example uses the IP address rather than the hostname to validate the certificate:
9191

9292
```shell
9393
curl -v --cacert ca.crt https://192.168.99.100:5044

docs/reference/filebeat/ssl-client-fails.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The host running {{ls}} might be unreachable or the certificate may not be valid
2323
::::
2424

2525
* Use OpenSSL to test connectivity to the {{ls}} server and diagnose problems. See the [OpenSSL documentation](https://www.openssl.org/docs/manmaster/man1/openssl-s_client.md) for more info.
26-
* Make sure that you have enabled SSL (set `ssl => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
26+
* Make sure that you have enabled SSL (set `ssl_enabled => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
2727

2828
## Common SSL-Related Errors and Resolutions [_common_ssl_related_errors_and_resolutions]
2929

docs/reference/heartbeat/configuring-ssl-logstash.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ To use SSL mutual authentication:
1717
If you are using {{security-features}}, you can use the [elasticsearch-certutil tool](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md) to generate certificates.
1818
::::
1919

20-
2. Configure Heartbeat to use SSL. In the `heartbeat.yml` config file, specify the following settings under `ssl`:
20+
2. Configure Heartbeat to use SSL. In the `heartbeat.yml` config file, specify these settings under `ssl`:
2121

22-
* `certificate_authorities`: Configures Heartbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23-
* `certificate` and `key`: Specifies the certificate and key that Heartbeat uses to authenticate with Logstash.
22+
* `certificate_authorities`. Configures Heartbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23+
* `certificate` and `key`. Specifies the certificate and key that Heartbeat uses to authenticate with Logstash.
2424

2525
For example:
2626

@@ -34,24 +34,24 @@ To use SSL mutual authentication:
3434
3535
For more information about these configuration options, see [SSL](/reference/heartbeat/configuration-ssl.md).
3636
37-
3. Configure Logstash to use SSL. In the Logstash config file, specify the following settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
37+
3. Configure Logstash to use SSL. In the Logstash config file, specify these settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
3838
39-
* `ssl`: When set to true, enables Logstash to use SSL/TLS.
40-
* `ssl_certificate_authorities`: Configures Logstash to trust any certificates signed by the specified CA.
41-
* `ssl_certificate` and `ssl_key`: Specify the certificate and key that Logstash uses to authenticate with the client.
42-
* `ssl_verify_mode`: Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `peer` or `force_peer` to make the server ask for the certificate and validate it. If you specify `force_peer`, and Heartbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
39+
* `ssl`. When set to true, enables Logstash to use SSL/TLS.
40+
* `ssl_certificate_authorities`. Configures Logstash to trust any certificates signed by the specified CA.
41+
* `ssl_certificate` and `ssl_key`. Specifies the certificate and key that Logstash uses to authenticate with the client.
42+
* `ssl_client_authentication`. Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `required` or `optional` to make the server ask for the certificate and validate it. If you specify `required`, and Heartbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
4343

4444
For example:
4545

4646
```json
4747
input {
4848
beats {
4949
port => 5044
50-
ssl => true
50+
ssl_enabled => true
5151
ssl_certificate_authorities => ["/etc/ca.crt"]
5252
ssl_certificate => "/etc/server.crt"
5353
ssl_key => "/etc/server.key"
54-
ssl_verify_mode => "force_peer"
54+
ssl_client_authentication => "required"
5555
}
5656
}
5757
```
@@ -74,7 +74,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
7474
* Rebuilt URL to: https://logs.example.com:5044/
7575
* Trying 192.168.99.100...
7676
* Connected to logs.example.com (192.168.99.100) port 5044 (#0)
77-
* TLS 1.2 connection using TLS_DHE_RSA_WITH_AES_256_CBC_SHA
77+
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
7878
* Server certificate: logs.example.com
7979
* Server certificate: example.com
8080
> GET / HTTP/1.1
@@ -87,7 +87,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
8787
curl: (52) Empty reply from server
8888
```
8989

90-
The following example uses the IP address rather than the hostname to validate the certificate:
90+
This example uses the IP address rather than the hostname to validate the certificate:
9191

9292
```shell
9393
curl -v --cacert ca.crt https://192.168.99.100:5044

docs/reference/heartbeat/ssl-client-fails.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The host running {{ls}} might be unreachable or the certificate may not be valid
2323
::::
2424

2525
* Use OpenSSL to test connectivity to the {{ls}} server and diagnose problems. See the [OpenSSL documentation](https://www.openssl.org/docs/manmaster/man1/openssl-s_client.md) for more info.
26-
* Make sure that you have enabled SSL (set `ssl => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
26+
* Make sure that you have enabled SSL (set `ssl_enabled => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
2727

2828
## Common SSL-Related Errors and Resolutions [_common_ssl_related_errors_and_resolutions]
2929

docs/reference/metricbeat/configuring-ssl-logstash.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ To use SSL mutual authentication:
1717
If you are using {{security-features}}, you can use the [elasticsearch-certutil tool](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md) to generate certificates.
1818
::::
1919

20-
2. Configure Metricbeat to use SSL. In the `metricbeat.yml` config file, specify the following settings under `ssl`:
20+
2. Configure Metricbeat to use SSL. In the `metricbeat.yml` config file, specify these settings under `ssl`:
2121

22-
* `certificate_authorities`: Configures Metricbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23-
* `certificate` and `key`: Specifies the certificate and key that Metricbeat uses to authenticate with Logstash.
22+
* `certificate_authorities`. Configures Metricbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23+
* `certificate` and `key`. Specifies the certificate and key that Metricbeat uses to authenticate with Logstash.
2424

2525
For example:
2626

@@ -34,24 +34,24 @@ To use SSL mutual authentication:
3434
3535
For more information about these configuration options, see [SSL](/reference/metricbeat/configuration-ssl.md).
3636
37-
3. Configure Logstash to use SSL. In the Logstash config file, specify the following settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
37+
3. Configure Logstash to use SSL. In the Logstash config file, specify these settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
3838
39-
* `ssl`: When set to true, enables Logstash to use SSL/TLS.
40-
* `ssl_certificate_authorities`: Configures Logstash to trust any certificates signed by the specified CA.
41-
* `ssl_certificate` and `ssl_key`: Specify the certificate and key that Logstash uses to authenticate with the client.
42-
* `ssl_verify_mode`: Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `peer` or `force_peer` to make the server ask for the certificate and validate it. If you specify `force_peer`, and Metricbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
39+
* `ssl`. When set to true, enables Logstash to use SSL/TLS.
40+
* `ssl_certificate_authorities`. Configures Logstash to trust any certificates signed by the specified CA.
41+
* `ssl_certificate` and `ssl_key`. Specifies the certificate and key that Logstash uses to authenticate with the client.
42+
* `ssl_client_authentication`. Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `required` or `optional` to make the server ask for the certificate and validate it. If you specify `required`, and Metricbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
4343

4444
For example:
4545

4646
```json
4747
input {
4848
beats {
4949
port => 5044
50-
ssl => true
50+
ssl_enabled => true
5151
ssl_certificate_authorities => ["/etc/ca.crt"]
5252
ssl_certificate => "/etc/server.crt"
5353
ssl_key => "/etc/server.key"
54-
ssl_verify_mode => "force_peer"
54+
ssl_client_authentication => "required"
5555
}
5656
}
5757
```
@@ -74,7 +74,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
7474
* Rebuilt URL to: https://logs.example.com:5044/
7575
* Trying 192.168.99.100...
7676
* Connected to logs.example.com (192.168.99.100) port 5044 (#0)
77-
* TLS 1.2 connection using TLS_DHE_RSA_WITH_AES_256_CBC_SHA
77+
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
7878
* Server certificate: logs.example.com
7979
* Server certificate: example.com
8080
> GET / HTTP/1.1
@@ -87,7 +87,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
8787
curl: (52) Empty reply from server
8888
```
8989

90-
The following example uses the IP address rather than the hostname to validate the certificate:
90+
This example uses the IP address rather than the hostname to validate the certificate:
9191

9292
```shell
9393
curl -v --cacert ca.crt https://192.168.99.100:5044

docs/reference/metricbeat/ssl-client-fails.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The host running {{ls}} might be unreachable or the certificate may not be valid
2323
::::
2424

2525
* Use OpenSSL to test connectivity to the {{ls}} server and diagnose problems. See the [OpenSSL documentation](https://www.openssl.org/docs/manmaster/man1/openssl-s_client.md) for more info.
26-
* Make sure that you have enabled SSL (set `ssl => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
26+
* Make sure that you have enabled SSL (set `ssl_enabled => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
2727

2828
## Common SSL-Related Errors and Resolutions [_common_ssl_related_errors_and_resolutions]
2929

0 commit comments

Comments
 (0)