You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/reference/auditbeat/configuring-ssl-logstash.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,41 +17,41 @@ To use SSL mutual authentication:
17
17
If you are using {{security-features}}, you can use the [elasticsearch-certutil tool](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md) to generate certificates.
18
18
::::
19
19
20
-
2. Configure Auditbeat to use SSL. In the `auditbeat.yml` config file, specify the following settings under `ssl`:
20
+
2. Configure Auditbeat to use SSL. In the `auditbeat.yml` config file, specify these settings under `ssl`:
21
21
22
-
*`certificate_authorities`: Configures Auditbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23
-
*`certificate` and `key`: Specifies the certificate and key that Auditbeat uses to authenticate with Logstash.
22
+
*`certificate_authorities`. Configures Auditbeat to trust any certificates signed by the specified CA. If `certificate_authorities` is empty or not set, the trusted certificate authorities of the host system are used.
23
+
*`certificate` and `key`. Specifies the certificate and key that Auditbeat uses to authenticate with Logstash.
24
24
25
25
For example:
26
26
27
27
```yaml
28
28
output.logstash:
29
-
hosts: ["logs.mycompany.com:5044"]
29
+
hosts: ["logs.example.com:5044"]
30
30
ssl.certificate_authorities: ["/etc/ca.crt"]
31
31
ssl.certificate: "/etc/client.crt"
32
32
ssl.key: "/etc/client.key"
33
33
```
34
34
35
35
For more information about these configuration options, see [SSL](/reference/auditbeat/configuration-ssl.md).
36
36
37
-
3. Configure Logstash to use SSL. In the Logstash config file, specify the following settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
37
+
3. Configure Logstash to use SSL. In the Logstash config file, specify these settings for the [Beats input plugin for Logstash](logstash-docs-md://lsr/plugins-inputs-beats.md):
38
38
39
-
* `ssl`: When set to true, enables Logstash to use SSL/TLS.
40
-
* `ssl_certificate_authorities`: Configures Logstash to trust any certificates signed by the specified CA.
41
-
* `ssl_certificate` and `ssl_key`: Specify the certificate and key that Logstash uses to authenticate with the client.
42
-
* `ssl_verify_mode`: Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `peer` or `force_peer` to make the server ask for the certificate and validate it. If you specify `force_peer`, and Auditbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
39
+
* `ssl`. When set to true, enables Logstash to use SSL/TLS.
40
+
* `ssl_certificate_authorities`. Configures Logstash to trust any certificates signed by the specified CA.
41
+
* `ssl_certificate` and `ssl_key`. Specify the certificate and key that Logstash uses to authenticate with the client.
42
+
* `ssl_client_authentication`. Specifies whether the Logstash server verifies the client certificate against the CA. You need to specify either `required` or `optional` to make the server ask for the certificate and validate it. If you specify `required`, and Auditbeat doesn’t provide a certificate, the Logstash connection will be closed. If you choose not to use [certutil](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
43
43
44
44
For example:
45
45
46
46
```json
47
47
input {
48
48
beats {
49
49
port => 5044
50
-
ssl => true
50
+
ssl_enabled => true
51
51
ssl_certificate_authorities => ["/etc/ca.crt"]
52
52
ssl_certificate => "/etc/server.crt"
53
53
ssl_key => "/etc/server.key"
54
-
ssl_verify_mode => "force_peer"
54
+
ssl_client_authentication => "required"
55
55
}
56
56
}
57
57
```
@@ -65,35 +65,35 @@ To use SSL mutual authentication:
65
65
Before running Auditbeat, you should validate the Logstash server’s certificate. You can use `curl` to validate the certificate even though the protocol used to communicate with Logstash is not based on HTTP. For example:
Validation for this test fails because the certificate is not valid for the specified IP address. It’s only valid for the `logs.mycompany.com`, the hostname that appears in the Subject field of the certificate.
96
+
Validation for this test fails because the certificate is not valid for the specified IP address. It’s only valid for the `logs.example.com`, the hostname that appears in the Subject field of the certificate.
0 commit comments