Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Elasticsearch throws a warning because Transport SSL isn't enabled #668

Open
antoineco opened this issue Feb 11, 2022 · 1 comment
Open
Labels
elasticsearch Issues pertaining to the Elasticsearch component

Comments

@antoineco
Copy link
Collaborator

Elasticsearch is printing the following warning because we are enabling X-Pack security (ON by default since v8.0.0) but don't have Transport SSL enabled (not on the main branch, at least):

{
  "@timestamp": "2022-02-11T19:15:57.791Z",
  "log.level": "WARN",
  "message": "Transport SSL must be enabled if security is enabled. Please set [xpack.security.transport.ssl.enabled] to [true] or disable security by setting [xpack.security.enabled] to [false]",
  "ecs.version": "1.2.0",
  "service.name": "ES_ECS",
  "event.dataset": "elasticsearch.server",
  "process.thread.name": "main",
  "log.logger": "org.elasticsearch.bootstrap.BootstrapChecks",
  "elasticsearch.node.name": "06c05d6947c9",
  "elasticsearch.cluster.name": "docker-cluster"
}

Right now, this is not preventing Elasticsearch from starting, but I'm worried that it may in a future release, especially due to the usage of the term "must" in the log message. We should keep our eyes open.


As a reminder, the tls branch has Transport SSL enabled by default. However, there were concerns about making this the default, mostly due to the fact that private keys are public until the user manually rotates them.

## Communications between nodes in a cluster
## see https://www.elastic.co/guide/en/elasticsearch/reference/current/configuring-tls.html#tls-transport
#
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: certificate
xpack.security.transport.ssl.keystore.path: elasticsearch.p12
xpack.security.transport.ssl.truststore.path: elasticsearch.p12

@antoineco antoineco added the elasticsearch Issues pertaining to the Elasticsearch component label Feb 11, 2022
@antoineco
Copy link
Collaborator Author

Update: the aforementioned concern was addressed in #790. Users are now required to generate their own X.509 certificates and private keys by running docker-compose up tls prior to starting the stack for the first time.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
elasticsearch Issues pertaining to the Elasticsearch component
Projects
None yet
Development

No branches or pull requests

1 participant