path.data: /data/elasticsearch/indices
path.logs: /data/elasticsearch/logs
discovery.zen.ping.unicast.hosts: ["XX", "XX", "XX"]
discovery.zen.minimum_master_nodes: 2
network.host: 0.0.0.0
http.cors.enabled: true
http.cors.allow-origin: "*"
# Needed to true because of kibana
rest.action.multi.allow_explicit_index: true
node.master: true
node.data: true
node.ingest: true
searchguard.enterprise_modules_enabled: false
searchguard.allow_unsafe_democertificates: false
searchguard.allow_default_init_sgindex: false
######## Start Search Guard Demo Configuration ########
searchguard.ssl.transport.pemkey_filepath: host.key
searchguard.ssl.transport.pemcert_filepath: host.cert
searchguard.ssl.transport.pemtrustedcas_filepath: alldsca.crt
searchguard.ssl.transport.enforce_hostname_verification: true
searchguard.ssl.transport.resolve_hostname: true
searchguard.ssl.transport.enabled: true
searchguard.ssl.http.enabled: false
searchguard.authcz.admin_dn:
- 'XXX,CN=sgadmin'
searchguard.nodes_dn:
- CN=XX
- CN=XX
- CN=XX
node.max_local_storage_nodes: 3
xpack.security.enabled: false
searchguard.restapi.roles_enabled: ["sg_all_access"]
# For CAS
http.max_header_size: 64kb
######## End Search Guard Demo Configuration ########
{
"_nodes": {
"total": 3,
"successful": 3,
"failed": 0
},
"cluster_name": "Sysop-Logstash",
"sg_license": {
"msgs": [
"No license required because enterprise modules not enabled."
],
"license_required": false
},
"modules": {
"HTTP_CLIENTCERT_AUTHENTICATOR": {
"default_implementation": "com.floragunn.searchguard.http.HTTPClientCertAuthenticator",
"gitsha1": "a73761a7204d9da260d43044ee682518b7d9b179",
"buildTime": "2018-02-21T22:43:07Z",
"is_enterprise": "false",
"actual_implementation": "com.floragunn.searchguard.http.HTTPClientCertAuthenticator",
"description": "HTTP Client Certificate Authenticator",
"type": "HTTP_CLIENTCERT_AUTHENTICATOR",
"version": "6.2.2-21.0"
},
"INTERNAL_USERS_AUTHENTICATION_BACKEND": {
"default_implementation": "com.floragunn.searchguard.auth.internal.InternalAuthenticationBackend",
"gitsha1": "a73761a7204d9da260d43044ee682518b7d9b179",
"buildTime": "2018-02-21T22:43:07Z",
"is_enterprise": "false",
"actual_implementation": "com.floragunn.searchguard.auth.internal.InternalAuthenticationBackend",
"description": "Internal users authorization backend",
"type": "INTERNAL_USERS_AUTHENTICATION_BACKEND",
"version": "6.2.2-21.0"
},
"NOOP_AUTHENTICATION_BACKEND": {
"default_implementation": "com.floragunn.searchguard.auth.internal.NoOpAuthenticationBackend",
"gitsha1": "a73761a7204d9da260d43044ee682518b7d9b179",
"buildTime": "2018-02-21T22:43:07Z",
"is_enterprise": "false",
"actual_implementation": "com.floragunn.searchguard.auth.internal.NoOpAuthenticationBackend",
"description": "Noop authentication backend",
"type": "NOOP_AUTHENTICATION_BACKEND",
"version": "6.2.2-21.0"
},
"HTTP_PROXY_AUTHENTICATOR": {
"default_implementation": "com.floragunn.searchguard.http.HTTPProxyAuthenticator",
"gitsha1": "a73761a7204d9da260d43044ee682518b7d9b179",
"buildTime": "2018-02-21T22:43:07Z",
"is_enterprise": "false",
"actual_implementation": "com.floragunn.searchguard.http.HTTPProxyAuthenticator",
"description": "HTTP Proxy Authenticator",
"type": "HTTP_PROXY_AUTHENTICATOR",
"version": "6.2.2-21.0"
},
"HTTP_BASIC_AUTHENTICATOR": {
"default_implementation": "com.floragunn.searchguard.http.HTTPBasicAuthenticator",
"gitsha1": "a73761a7204d9da260d43044ee682518b7d9b179",
"buildTime": "2018-02-21T22:43:07Z",
"is_enterprise": "false",
"actual_implementation": "com.floragunn.searchguard.http.HTTPBasicAuthenticator",
"description": "HTTP Basic Authenticator",
"type": "HTTP_BASIC_AUTHENTICATOR",
"version": "6.2.2-21.0"
}
},
"compatibility": {
"modules_mismatch": false
}
}