nano /etc/filebeat/filebeat.yml
output.elasticsearch:
hosts: ['http://<elasticsearch_ip_node1>:9200','http://<elasticsearch_ip_node2>:9200','http://<elasticsearch_ip_node3>:9200']
loadbalance: true
nano /etc/filebeat/filebeat.ymloutput.elasticsearch.username: elasticoutput.elasticsearch.password: passwordinstances:
- name: "wazuh-master-ELK"
ip:
- "10.0.0.1"
- name: "worker1"
ip:
- "10.0.0.2"
- name: "worker1"
ip:
- "10.0.0.3"instances: - name: "wazuh-master-ELK" ip: - "10.0.0.1" - name: "worker1" ip: - "10.0.0.2" - name: "worker1" ip: - "10.0.0.3" - name: "worker3" ip: - "10.0.0.3"instances: - name: "wazuh-manager" ip: - "10.0.0.1" - name: "wazuh-worker-1" ip: - "10.0.0.2" - name: "wazuh-worker-1" ip: - "10.0.0.3" - name: "wazuh-worker-3" ip: - "10.0.0.4" - name: "es-node-1" ip: - "10.0.0.5" - name: "es-node-2" ip: - "10.0.0.6" - name: "es-node-3" ip: - "10.0.0.7" - name: "kibana" ip: - "10.0.0.8"/usr/share/elasticsearch/bin/elasticsearch-certutil cert ca --pem --in instances.yml --out certs.zip
mkdir /etc/elasticsearch/certs/ca -p
cp ca/ca.crt /etc/elasticsearch/certs/ca
cp <es-node-x>/<es-node-x>.* /etc/elasticsearch/certs # Change the <es-node-x>
chown -R elasticsearch: /etc/elasticsearch/certs
chmod -R 770 /etc/elasticsearch/certs
# Transport layerxpack.security.transport.ssl.enabled: truexpack.security.transport.ssl.verification_mode: certificatexpack.security.transport.ssl.key: /etc/elasticsearch/certs/<es-node-x>.keyxpack.security.transport.ssl.certificate: /etc/elasticsearch/certs/<es-node-x>.crtxpack.security.transport.ssl.certificate_authorities: [ "/etc/elasticsearch/certs/ca/ca.crt" ]
# HTTP layerxpack.security.http.ssl.enabled: truexpack.security.http.ssl.verification_mode: certificatexpack.security.http.ssl.key: /etc/elasticsearch/certs/<es-node-x>.keyxpack.security.http.ssl.certificate: /etc/elasticsearch/certs/<es-node-x>.crtxpack.security.http.ssl.certificate_authorities: [ "/etc/elasticsearch/certs/ca/ca.crt" ]systemctl restart kibanamkdir /etc/filebeat/certs/ca -pcp ca/ca.crt /etc/filebeat/certs/cacp wazuh-manager/wazuh-manager.crt /etc/filebeat/certscp wazuh-manager/wazuh-manager.key /etc/filebeat/certschmod 770 -R /etc/filebeat/certsoutput.elasticsearch.hosts: ['<es-node-ip:9200>', '<es-node-ip:9200>', '<es-node-ip:9200>']output.elasticsearch.protocol: https
output.elasticsearch.loadbalance: true
output.elasticsearch.ssl.certificate: "/etc/filebeat/certs/wazuh-manager.crt"output.elasticsearch.ssl.key: "/etc/filebeat/certs/wazuh-manager.key"output.elasticsearch.ssl.certificate_authorities: ["/etc/filebeat/certs/ca/ca.crt"]In the previous answers, you showed your Filebeat configuration, change it to look like in our example, use multilevel for output.elasticsearch throws an error
nano /etc/filebeat/filebeat.yml
output.elasticsearch:
hosts: ['http://<elasticsearch_ip_node1>:9200','http://<elasticsearch_ip_node2>:9200','http://<elasticsearch_ip_node3>:9200']
loadbalance: true
systemctl restart filebeatxpack.security.enabled: true
systemctl restart elasticsearch/usr/share/elasticsearch/bin/elasticsearch-setup-passwords interactive
output.elasticsearch.username: "elastic"output.elasticsearch.password: "<your_password>"systemctl restart filebeat
instances: - name: "wazuh-master-ELK" ip: - "10.0.0.1" - name: "worker1" ip: - "10.0.0.2" - name: "worker1" ip: - "10.0.0.3" - name: "worker3" ip: - "10.0.0.4"instances: - name: "wazuh-master-ELK" ip: - "10.0.0.1" - name: "worker1 & ELK" ip: - "10.0.0.2" - name: "worker1 & ELK" ip: - "10.0.0.3" - name: "worker3 & ELK" ip: - "10.0.0.4"transport.host: localhosttransport.tcp.port: 9300http.port: 8200
cluster.name: new-clusternode.name: node01network.host: 192.168.0.24discovery.seed_hosts: - 192.168.0.24 - 192.168.0.25
cluster.initial_master_nodes: - node01 - node02transport.host: localhosttransport.tcp.port: 9300http.port: 8200
cluster.name: new-clusternode.name: node02network.host: 192.168.0.25discovery.seed_hosts: - 192.168.0.24 - 192.168.0.25
cluster.initial_master_nodes: - node01 - node02output.elasticsearch: hosts: ['http://192.168.0.24:9200','http://192.168.0.25:9200'] loadbalance: true