Securing the Elasticsearch database
Tip
If you do not want the hassle of maintaining the DataMiner storage databases yourself, we recommend using DataMiner Storage as a Service instead.
Client-server TLS encryption
By default all client-server communication with Elasticsearch is unencrypted.
To configure TLS encryption for client-server communication:
Request or generate a TLS certificate (the certificates should be in the PKCS#12 format). Make sure the IP address of the node is included in the Subject Alternative Names of the certificate.
Elasticsearch comes with the
elasticsearch-certutil
tool installed, which can be used to generate certificates. However, we recommend that you use our scripts for generating TLS certificates, available on GitHub. There is a version of the script for Linux and Windows machines. The script requires two tools: openssl and the Java keytool. Both of these can run on Linux and Windows.Add the following lines to the elasticsearch.yml file:
xpack.security.http.ssl.enabled: true xpack.security.http.ssl.keystore.path: path/to/your/<NODE CERT STORE> xpack.security.http.ssl.truststore.path: path/to/your/<NODE CERT STORE>
If you are using a
.PEM
certificate generated usingopenssl
utility, add the following lines to the elasticsearch.yml file instead:xpack.security.http.ssl.enabled: true xpack.security.http.ssl.verification_mode: full xpack.security.http.ssl.key: path/to/your/PrivateKey/used/to/generatet/the/certificate xpack.security.http.ssl.certificate: path/to/your/certificate xpack.security.http.ssl.certificate_authorities: path/to/certificate/authority #In case of a self-signed certificates replace `path/to/certificate/authority` with path to certificate of each node in cluster.
For cert stores generated with the script or password-protected certificates, execute the following commands as Administrator and enter the password when prompted:
bin\elasticsearch-keystore add xpack.security.http.ssl.keystore.secure_password bin\elasticsearch-keystore add xpack.security.http.ssl.truststore.secure_password
For example, if you use Ubuntu, you can do so as follows:
Navigate to the bin folder using the following command:
cd /usr/share/elasticsearch/bin
Set the password for the keystore using the following command:
sudo ./elasticsearch-keystore add xpack.security.http.ssl.keystore.secure_password
Set the password for the truststore using the following command:
sudo ./elasticsearch-keystore add xpack.security.http.ssl.truststore.secure_password
Note
- Depending on the flavor of operating system (Windows, Ubuntu, or another OS), the procedure can be different. Note that we generally recommend Ubuntu.
- If the password needs to be updated, after you have run generate-tls-certificates again and acquired a new password for the keystore and truststore, you need to execute the commands above to set the keystore and truststore passwords in
/usr/share/elasticsearch/bin
again. These will overwrite the previous password.
Start the elasticsearch-service-x64 service and verify that you can connect with a browser to https://FQDN:9200.
Stop the DataMiner Agent.
Add the full https:// URL (including the port) in the <DBServer> element in the DB.xml file. For example:
<DBServer>https://elastic.dataminer:9200</DBServer>
Import the certificate in the Trusted Root Certification Authorities store of the Windows Certificate Store.
Save the changes and start the DataMiner Agent.
Tip
To troubleshoot problems after enabling TLS encryption, consult the SLSearch.txt log file.
Troubleshooting
Syntax error when executing the generate-certificates.sh script
Situation: You have cloned the "Generate-TLS-Certificates" GitHub repository on a Windows machine, and have transferred the generate-certificates.sh file to a Linux machine using SCP. You have executed the following command:
sudo generate-certificates.sh
Symptom: Bash indicates that there are syntax errors in the script.
Resolution: Convert the .sh file to Unix format.
Begin by installing dos2unix with the following command:
sudo apt install dos2unix
Next, run the following command:
dos2unix generate-certificates.sh
Once the conversion is complete, you can execute the script again.
Inter-node TLS encryption
By default inter-node communication in Elasticsearch is unencrypted.
To configure TLS encryption for inter-node communication:
Request or generate a TLS certificate (the certificates should be in the PKCS#12 format). Make sure the IP address of the node is included in the Subject Alternative Names of the certificate.
Add the following to the elasticsearch.yml file on each node:
xpack.security.transport.ssl.enabled: true xpack.security.transport.ssl.verification_mode: full xpack.security.transport.ssl.keystore.path: elastic-certificates.p12 xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
If you are using a
.PEM
certificate generated usingopenssl
utility, add the following lines to elasticsearch.yml file instead.xpack.security.transport.ssl.enabled: true xpack.security.transport.ssl.verification_mode: full xpack.security.transport.ssl.key: path/to/your/PrivateKey/used/to/generatet/the/certificate xpack.security.transport.ssl.certificate: path/to/your/certificate xpack.security.transport.ssl.certificate_authorities: path/to/certificate/authority #In case of a self-signed certificates replace `path/to/certificate/authority` with path to certificate of each node in cluster.
For cert stores generated with the script or if you secured the node's certificate with a password, add the password to your Elasticsearch keystore by executing the following commands:
bin/elasticsearch-keystore add xpack.security.transport.ssl.keystore.secure_password bin/elasticsearch-keystore add xpack.security.transport.ssl.truststore.secure_password
Restart the Elasticsearch cluster (all nodes).
Note
DataMiner does not require a restart when enabling inter-node TLS encryption.
Authentication
By default, Elasticsearch does not require authentication, which means anyone can access or alter the data. We therefore highly recommend that you enable authentication on your Elasticsearch cluster.
Note
For the authentication to work, TLS must be configured first, as detailed above.
To enable authentication in Elasticsearch 6.8.X:
Stop your DataMiner Agent.
Stop the elasticsearch-service-x64 service.
Add the following lines to the elasticsearch.yml file (typically located in C:\Program Files\Elasticsearch\config):
xpack.security.enabled: true
discovery.type: single-node
Note
For a multi-node cluster, "discovery.type" is not required.
Start the elasticsearch-service-x64 service.
Execute the elasticsearch-setup-passwords.bat script (as superuser) with the interactive argument.
On a Windows server, this is located in
C:\Program Files\Elasticsearch\bin\elasticsearch-setup-passwords.bat interactive
On a Linux server, this is located in
/usr/share/elasticsearch/bin/elasticsearch-setup-passwords interactive
When the script prompts you to do so, enter the new credentials for several users. Ideally these are random-generated, strong passwords.
When the script is finished, add the credentials for the elastic user to the db.xml file. This file is located on every DataMiner Agent in C:\Skyline DataMiner\db.xml.
<DataBase active="true" search="true" type="Elasticsearch"> <DBServer>[ELASTIC URL]</DBServer> <UID>[YOUR ELASTIC USER]</UID> <PWD>[YOUR STRONG PASSWORD]</PWD> </DataBase>
Start your DataMiner Agent.
Note
To keep using Kibana, also set the credentials in the elasticsearch.username and elasticsearch.password fields of the kibana.yml (typically located in C:\Program Files\Elasticsearch\Kibana\config).
Updating passwords
The elasticsearch-setup-passwords.bat script can only create the passwords.
To update an existing password:
Send the following request to your Elasticsearch database, where <USERNAME> is the name of the user you want to update:
POST /_security/user/<USERNAME>/_password { "password" : "new-strong-password" }
Update the password in the DB.xml file on every DataMiner Agent and restart the DataMiner System.
Updating Elasticsearch
By default, DataMiner installs Elasticsearch 6.8.23. For more information about how you can upgrade your Elasticsearch version, refer to Upgrading Elasticsearch from one minor version to another.
Updating Java
By default, DataMiner installs Elasticsearch with its own Java installation. This is typically located in the folder C:\Program Files\Elasticsearch\Java\bin. DataMiner deploys Elasticsearch with Java 1.8.0_121.
To update the Java version:
Download the latest Java binaries from the official website.
Stop your DataMiner Agent.
Stop the elasticsearch-service-x64 service.
Update the binaries in C:\Program Files\Elasticsearch\Java.
Start the elasticsearch-service-x64 service.
Start your DataMiner Agent.