You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/reference/auditbeat/configuring-ssl-logstash.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ To use SSL mutual authentication:
38
38
39
39
* `ssl`. When set to true, enables Logstash to use SSL/TLS.
40
40
* `ssl_certificate_authorities`. Configures Logstash to trust any certificates signed by the specified CA.
41
-
* `ssl_certificate` and `ssl_key`. Specify the certificate and key that Logstash uses to authenticate with the client.
41
+
* `ssl_certificate` and `ssl_key`. Specifies the certificate and key that Logstash uses to authenticate with the client.
42
42
* `ssl_client_authentication`. Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `required` or `optional` to make the server ask for the certificate and validate it. If you specify `required`, and Auditbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
Copy file name to clipboardExpand all lines: docs/reference/auditbeat/ssl-client-fails.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ The host running {{ls}} might be unreachable or the certificate may not be valid
23
23
::::
24
24
25
25
* Use OpenSSL to test connectivity to the {{ls}} server and diagnose problems. See the [OpenSSL documentation](https://www.openssl.org/docs/manmaster/man1/openssl-s_client.md) for more info.
26
-
* Make sure that you have enabled SSL (set `ssl => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
26
+
* Make sure that you have enabled SSL (set `ssl_enabled => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
27
27
28
28
## Common SSL-Related Errors and Resolutions [_common_ssl_related_errors_and_resolutions]
Copy file name to clipboardExpand all lines: docs/reference/filebeat/configuring-ssl-logstash.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,10 +17,10 @@ To use SSL mutual authentication:
17
17
If you are using {{security-features}}, you can use the [elasticsearch-certutil tool](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md) to generate certificates.
18
18
::::
19
19
20
-
2. Configure Filebeat to use SSL. In the `filebeat.yml` config file, specify the following settings under `ssl`:
20
+
2. Configure Filebeat to use SSL. In the `filebeat.yml` config file, specify these settings under `ssl`:
21
21
22
-
*`certificate_authorities`: Configures Filebeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23
-
*`certificate` and `key`: Specifies the certificate and key that Filebeat uses to authenticate with Logstash.
22
+
*`certificate_authorities`. Configures Filebeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23
+
*`certificate` and `key`. Specifies the certificate and key that Filebeat uses to authenticate with Logstash.
24
24
25
25
For example:
26
26
@@ -34,24 +34,24 @@ To use SSL mutual authentication:
34
34
35
35
For more information about these configuration options, see [SSL](/reference/filebeat/configuration-ssl.md).
36
36
37
-
3. Configure Logstash to use SSL. In the Logstash config file, specify the following settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
37
+
3. Configure Logstash to use SSL. In the Logstash config file, specify these settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
38
38
39
-
* `ssl`: When set to true, enables Logstash to use SSL/TLS.
40
-
* `ssl_certificate_authorities`: Configures Logstash to trust any certificates signed by the specified CA.
41
-
* `ssl_certificate` and `ssl_key`: Specify the certificate and key that Logstash uses to authenticate with the client.
42
-
* `ssl_verify_mode`: Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `peer` or `force_peer` to make the server ask for the certificate and validate it. If you specify `force_peer`, and Filebeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
39
+
* `ssl`. When set to true, enables Logstash to use SSL/TLS.
40
+
* `ssl_certificate_authorities`. Configures Logstash to trust any certificates signed by the specified CA.
41
+
* `ssl_certificate` and `ssl_key`. Specifies the certificate and key that Logstash uses to authenticate with the client.
42
+
* `ssl_client_authentication`. Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `required` or `optional` to make the server ask for the certificate and validate it. If you specify `required`, and Filebeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
43
43
44
44
For example:
45
45
46
46
```json
47
47
input {
48
48
beats {
49
49
port => 5044
50
-
ssl => true
50
+
ssl_enabled => true
51
51
ssl_certificate_authorities => ["/etc/ca.crt"]
52
52
ssl_certificate => "/etc/server.crt"
53
53
ssl_key => "/etc/server.key"
54
-
ssl_verify_mode => "force_peer"
54
+
ssl_client_authentication => "required"
55
55
}
56
56
}
57
57
```
@@ -74,7 +74,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
74
74
* Rebuilt URL to: https://logs.example.com:5044/
75
75
* Trying 192.168.99.100...
76
76
* Connected to logs.example.com (192.168.99.100) port 5044 (#0)
77
-
* TLS 1.2 connection using TLS_DHE_RSA_WITH_AES_256_CBC_SHA
77
+
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
78
78
* Server certificate: logs.example.com
79
79
* Server certificate: example.com
80
80
> GET / HTTP/1.1
@@ -87,7 +87,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
87
87
curl: (52) Empty reply from server
88
88
```
89
89
90
-
The following example uses the IP address rather than the hostname to validate the certificate:
90
+
This example uses the IP address rather than the hostname to validate the certificate:
Copy file name to clipboardExpand all lines: docs/reference/filebeat/ssl-client-fails.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ The host running {{ls}} might be unreachable or the certificate may not be valid
23
23
::::
24
24
25
25
* Use OpenSSL to test connectivity to the {{ls}} server and diagnose problems. See the [OpenSSL documentation](https://www.openssl.org/docs/manmaster/man1/openssl-s_client.md) for more info.
26
-
* Make sure that you have enabled SSL (set `ssl => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
26
+
* Make sure that you have enabled SSL (set `ssl_enabled => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
27
27
28
28
## Common SSL-Related Errors and Resolutions [_common_ssl_related_errors_and_resolutions]
Copy file name to clipboardExpand all lines: docs/reference/heartbeat/configuring-ssl-logstash.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,10 +17,10 @@ To use SSL mutual authentication:
17
17
If you are using {{security-features}}, you can use the [elasticsearch-certutil tool](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md) to generate certificates.
18
18
::::
19
19
20
-
2. Configure Heartbeat to use SSL. In the `heartbeat.yml` config file, specify the following settings under `ssl`:
20
+
2. Configure Heartbeat to use SSL. In the `heartbeat.yml` config file, specify these settings under `ssl`:
21
21
22
-
*`certificate_authorities`: Configures Heartbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23
-
*`certificate` and `key`: Specifies the certificate and key that Heartbeat uses to authenticate with Logstash.
22
+
*`certificate_authorities`. Configures Heartbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23
+
*`certificate` and `key`. Specifies the certificate and key that Heartbeat uses to authenticate with Logstash.
24
24
25
25
For example:
26
26
@@ -34,24 +34,24 @@ To use SSL mutual authentication:
34
34
35
35
For more information about these configuration options, see [SSL](/reference/heartbeat/configuration-ssl.md).
36
36
37
-
3. Configure Logstash to use SSL. In the Logstash config file, specify the following settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
37
+
3. Configure Logstash to use SSL. In the Logstash config file, specify these settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
38
38
39
-
* `ssl`: When set to true, enables Logstash to use SSL/TLS.
40
-
* `ssl_certificate_authorities`: Configures Logstash to trust any certificates signed by the specified CA.
41
-
* `ssl_certificate` and `ssl_key`: Specify the certificate and key that Logstash uses to authenticate with the client.
42
-
* `ssl_verify_mode`: Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `peer` or `force_peer` to make the server ask for the certificate and validate it. If you specify `force_peer`, and Heartbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
39
+
* `ssl`. When set to true, enables Logstash to use SSL/TLS.
40
+
* `ssl_certificate_authorities`. Configures Logstash to trust any certificates signed by the specified CA.
41
+
* `ssl_certificate` and `ssl_key`. Specifies the certificate and key that Logstash uses to authenticate with the client.
42
+
* `ssl_client_authentication`. Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `required` or `optional` to make the server ask for the certificate and validate it. If you specify `required`, and Heartbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
43
43
44
44
For example:
45
45
46
46
```json
47
47
input {
48
48
beats {
49
49
port => 5044
50
-
ssl => true
50
+
ssl_enabled => true
51
51
ssl_certificate_authorities => ["/etc/ca.crt"]
52
52
ssl_certificate => "/etc/server.crt"
53
53
ssl_key => "/etc/server.key"
54
-
ssl_verify_mode => "force_peer"
54
+
ssl_client_authentication => "required"
55
55
}
56
56
}
57
57
```
@@ -74,7 +74,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
74
74
* Rebuilt URL to: https://logs.example.com:5044/
75
75
* Trying 192.168.99.100...
76
76
* Connected to logs.example.com (192.168.99.100) port 5044 (#0)
77
-
* TLS 1.2 connection using TLS_DHE_RSA_WITH_AES_256_CBC_SHA
77
+
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
78
78
* Server certificate: logs.example.com
79
79
* Server certificate: example.com
80
80
> GET / HTTP/1.1
@@ -87,7 +87,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
87
87
curl: (52) Empty reply from server
88
88
```
89
89
90
-
The following example uses the IP address rather than the hostname to validate the certificate:
90
+
This example uses the IP address rather than the hostname to validate the certificate:
Copy file name to clipboardExpand all lines: docs/reference/heartbeat/ssl-client-fails.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ The host running {{ls}} might be unreachable or the certificate may not be valid
23
23
::::
24
24
25
25
* Use OpenSSL to test connectivity to the {{ls}} server and diagnose problems. See the [OpenSSL documentation](https://www.openssl.org/docs/manmaster/man1/openssl-s_client.md) for more info.
26
-
* Make sure that you have enabled SSL (set `ssl => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
26
+
* Make sure that you have enabled SSL (set `ssl_enabled => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
27
27
28
28
## Common SSL-Related Errors and Resolutions [_common_ssl_related_errors_and_resolutions]
Copy file name to clipboardExpand all lines: docs/reference/metricbeat/configuring-ssl-logstash.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,10 +17,10 @@ To use SSL mutual authentication:
17
17
If you are using {{security-features}}, you can use the [elasticsearch-certutil tool](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md) to generate certificates.
18
18
::::
19
19
20
-
2. Configure Metricbeat to use SSL. In the `metricbeat.yml` config file, specify the following settings under `ssl`:
20
+
2. Configure Metricbeat to use SSL. In the `metricbeat.yml` config file, specify these settings under `ssl`:
21
21
22
-
*`certificate_authorities`: Configures Metricbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23
-
*`certificate` and `key`: Specifies the certificate and key that Metricbeat uses to authenticate with Logstash.
22
+
*`certificate_authorities`. Configures Metricbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23
+
*`certificate` and `key`. Specifies the certificate and key that Metricbeat uses to authenticate with Logstash.
24
24
25
25
For example:
26
26
@@ -34,24 +34,24 @@ To use SSL mutual authentication:
34
34
35
35
For more information about these configuration options, see [SSL](/reference/metricbeat/configuration-ssl.md).
36
36
37
-
3. Configure Logstash to use SSL. In the Logstash config file, specify the following settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
37
+
3. Configure Logstash to use SSL. In the Logstash config file, specify these settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
38
38
39
-
* `ssl`: When set to true, enables Logstash to use SSL/TLS.
40
-
* `ssl_certificate_authorities`: Configures Logstash to trust any certificates signed by the specified CA.
41
-
* `ssl_certificate` and `ssl_key`: Specify the certificate and key that Logstash uses to authenticate with the client.
42
-
* `ssl_verify_mode`: Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `peer` or `force_peer` to make the server ask for the certificate and validate it. If you specify `force_peer`, and Metricbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
39
+
* `ssl`. When set to true, enables Logstash to use SSL/TLS.
40
+
* `ssl_certificate_authorities`. Configures Logstash to trust any certificates signed by the specified CA.
41
+
* `ssl_certificate` and `ssl_key`. Specifies the certificate and key that Logstash uses to authenticate with the client.
42
+
* `ssl_client_authentication`. Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `required` or `optional` to make the server ask for the certificate and validate it. If you specify `required`, and Metricbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
43
43
44
44
For example:
45
45
46
46
```json
47
47
input {
48
48
beats {
49
49
port => 5044
50
-
ssl => true
50
+
ssl_enabled => true
51
51
ssl_certificate_authorities => ["/etc/ca.crt"]
52
52
ssl_certificate => "/etc/server.crt"
53
53
ssl_key => "/etc/server.key"
54
-
ssl_verify_mode => "force_peer"
54
+
ssl_client_authentication => "required"
55
55
}
56
56
}
57
57
```
@@ -74,7 +74,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
74
74
* Rebuilt URL to: https://logs.example.com:5044/
75
75
* Trying 192.168.99.100...
76
76
* Connected to logs.example.com (192.168.99.100) port 5044 (#0)
77
-
* TLS 1.2 connection using TLS_DHE_RSA_WITH_AES_256_CBC_SHA
77
+
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
78
78
* Server certificate: logs.example.com
79
79
* Server certificate: example.com
80
80
> GET / HTTP/1.1
@@ -87,7 +87,7 @@ If the test is successful, you’ll receive an empty response error. Here's an e
87
87
curl: (52) Empty reply from server
88
88
```
89
89
90
-
The following example uses the IP address rather than the hostname to validate the certificate:
90
+
This example uses the IP address rather than the hostname to validate the certificate:
Copy file name to clipboardExpand all lines: docs/reference/metricbeat/ssl-client-fails.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ The host running {{ls}} might be unreachable or the certificate may not be valid
23
23
::::
24
24
25
25
* Use OpenSSL to test connectivity to the {{ls}} server and diagnose problems. See the [OpenSSL documentation](https://www.openssl.org/docs/manmaster/man1/openssl-s_client.md) for more info.
26
-
* Make sure that you have enabled SSL (set `ssl => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
26
+
* Make sure that you have enabled SSL (set `ssl_enabled => true`) when configuring the [Beats input plugin for {{ls}}](logstash-docs-md://lsr/plugins-inputs-beats.md).
27
27
28
28
## Common SSL-Related Errors and Resolutions [_common_ssl_related_errors_and_resolutions]
0 commit comments