Loading README.md +24 −5 Original line number Diff line number Diff line Loading @@ -50,9 +50,9 @@ clients: Then, use it with the script `tools/sgtlstool.sh` and generate the certificates: ``` ./sgtlstool.sh -c ../config/example.yml -v -ca ./sgtlstool.sh -c ../config/example.yml -v -csr ./sgtlstool.sh -c ../config/example.yml -v -crt -f -o $ ./sgtlstool.sh -c ../config/example.yml -v -ca $ ./sgtlstool.sh -c ../config/example.yml -v -csr $ ./sgtlstool.sh -c ../config/example.yml -v -crt -f -o ``` Your certificates will be generated inside `tools/out` directory. Loading Loading @@ -82,11 +82,30 @@ When using Search Guard at first time, is required to run a script as certified While running, get into container and run the following commands: ``` cd /usr/share/elasticsearch/plugins/search-guard-6/tools $ cd /usr/share/elasticsearch/plugins/search-guard-6/tools bash sgadmin.sh -cd /usr/share/elasticsearch/plugins/search-guard-6/sgconfig -icl \ $ bash sgadmin.sh -cd /usr/share/elasticsearch/plugins/search-guard-6/sgconfig -icl \ -key /usr/share/elasticsearch/config/certs/admin.key \ -cert /usr/share/elasticsearch/config/certs/admin.pem \ -cacert /usr/share/elasticsearch/config/certs/root-ca.pem \ -nhnv -h localhost ``` ## Snapshots In order to create backups, you must configure a snapshot repository first. Run these command once inside running container: ``` $ echo "YOUR ACCESS KEY" | elasticsearch-keystore add --stdin s3.client.default.access_key $ echo "YOUR SECRET KEY" | elasticsearch-keystore add --stdin s3.client.default.secret_key $ curl -XPOST -u user:pass 'http://localhost:9200/_nodes/reload_secure_settings' $ curl -XPUT -u user:pass 'http://localhost:9200/_snapshot/s3-backup' -d '{ "type": "s3", "settings": { "bucket": "redmic.elasticsearch.backup", "region": "eu-west-1" } }' ``` Loading
README.md +24 −5 Original line number Diff line number Diff line Loading @@ -50,9 +50,9 @@ clients: Then, use it with the script `tools/sgtlstool.sh` and generate the certificates: ``` ./sgtlstool.sh -c ../config/example.yml -v -ca ./sgtlstool.sh -c ../config/example.yml -v -csr ./sgtlstool.sh -c ../config/example.yml -v -crt -f -o $ ./sgtlstool.sh -c ../config/example.yml -v -ca $ ./sgtlstool.sh -c ../config/example.yml -v -csr $ ./sgtlstool.sh -c ../config/example.yml -v -crt -f -o ``` Your certificates will be generated inside `tools/out` directory. Loading Loading @@ -82,11 +82,30 @@ When using Search Guard at first time, is required to run a script as certified While running, get into container and run the following commands: ``` cd /usr/share/elasticsearch/plugins/search-guard-6/tools $ cd /usr/share/elasticsearch/plugins/search-guard-6/tools bash sgadmin.sh -cd /usr/share/elasticsearch/plugins/search-guard-6/sgconfig -icl \ $ bash sgadmin.sh -cd /usr/share/elasticsearch/plugins/search-guard-6/sgconfig -icl \ -key /usr/share/elasticsearch/config/certs/admin.key \ -cert /usr/share/elasticsearch/config/certs/admin.pem \ -cacert /usr/share/elasticsearch/config/certs/root-ca.pem \ -nhnv -h localhost ``` ## Snapshots In order to create backups, you must configure a snapshot repository first. Run these command once inside running container: ``` $ echo "YOUR ACCESS KEY" | elasticsearch-keystore add --stdin s3.client.default.access_key $ echo "YOUR SECRET KEY" | elasticsearch-keystore add --stdin s3.client.default.secret_key $ curl -XPOST -u user:pass 'http://localhost:9200/_nodes/reload_secure_settings' $ curl -XPUT -u user:pass 'http://localhost:9200/_snapshot/s3-backup' -d '{ "type": "s3", "settings": { "bucket": "redmic.elasticsearch.backup", "region": "eu-west-1" } }' ```