Skip to content
This repository has been archived by the owner on Apr 12, 2022. It is now read-only.

Beats SSL Support #58

Closed
rheak opened this issue Nov 26, 2019 · 20 comments
Closed

Beats SSL Support #58

rheak opened this issue Nov 26, 2019 · 20 comments

Comments

@rheak
Copy link

rheak commented Nov 26, 2019

Can SSL Support be added to this role similar to what was recently added to the ansible-elasticsearch role?

@jmlrt
Copy link
Member

jmlrt commented Dec 11, 2019

Hi @rheak

What do you mean by SSL support for this role?
Configuration to connect to a TLS elasticsearch output like in this example can already be added in output_conf variable.

Is there something missing?

@rheak
Copy link
Author

rheak commented Dec 11, 2019

Hi @jmlrt - I currently have a few conditional tasks to create ssl dir and copy up certificates, similar to what was done in the elasticsearch role. I am using the output_conf as you suggested for the config.

- name: ensure certificate directory exists
   .........

- name: Upload SSL/TLS key and certificate
   .........

- name: Upload SSL Certificate Authority

@jmlrt
Copy link
Member

jmlrt commented Dec 11, 2019

OK, we may add the tasks to upload the certificates into this role if you want to create a PR for that.
For the output_conf, that will stay the recommanded way to manage TLS elasticsearch output.

@jmlrt jmlrt added the feature label Dec 27, 2019
@jmlrt jmlrt self-assigned this Mar 5, 2020
@hulta82
Copy link

hulta82 commented Mar 28, 2020

Its no problem to configure secure connection for both inputs and outputs. But the main feature that is missing (elastic.elasticsearch project has this) is support for beats keystore. At the moment you have to put passwords as plain text inside your yml or manually create the keys in a pre_tasks.

@botelastic
Copy link

botelastic bot commented Jun 26, 2020

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@jmlrt
Copy link
Member

jmlrt commented Jun 26, 2020

still valid

@botelastic botelastic bot removed the triage/stale label Jun 26, 2020
@jmlrt jmlrt removed their assignment Jun 26, 2020
@botelastic
Copy link

botelastic bot commented Sep 24, 2020

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@jmlrt
Copy link
Member

jmlrt commented Oct 2, 2020

still valid

@botelastic botelastic bot removed the triage/stale label Oct 2, 2020
@ph
Copy link

ph commented Oct 2, 2020

@jmlrt I wonder if this Allow embedding of certificate solve some of the problem of this request.

@botelastic
Copy link

botelastic bot commented Dec 31, 2020

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@jmlrt
Copy link
Member

jmlrt commented Jan 4, 2021

still valid

@botelastic botelastic bot removed the triage/stale label Jan 4, 2021
@cutler-scott-newrelic
Copy link

Chiming in to add a +1 for this feature request. I am implementing an Ansible playbook right now that uses both the ES role and beats role. For ES I can specify es_ssl_keystore: "certs/node.p12" and the playbook will upload that cert from the ansible server to the target machine. For beats there is no equivalent option so instead I have to upload the cert and restart the service manually...

tasks:
    - name: Copy Elastic certs to Metricbeats directory
      copy:
        src: /etc/elasticsearch/certs
        dest: /etc/metricbeat/certs
        owner: root
        group: root
        remote_src: yes
      become: yes
    - name: Wait before restarting Metricbeats
      pause:
        minutes: 3
    - name: Restart metricbeat service after Copy
      systemd:
        state: restarted
        name: metricbeat.service
        enabled: yes
      become: yes

@metabsd
Copy link
Contributor

metabsd commented Feb 25, 2021

Has anyone managed to use the role to push an embeded certificate authorities? I'm having trouble and I think my problem is with the jinja2 template and the to_nice_yaml filter. Thank you!

@botelastic
Copy link

botelastic bot commented May 26, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@jmlrt
Copy link
Member

jmlrt commented May 26, 2021

still valid

@botelastic botelastic bot removed the triage/stale label May 26, 2021
@mirkenstein
Copy link

See my pull request: Feature keystore #149

@botelastic
Copy link

botelastic bot commented Aug 30, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@jmlrt
Copy link
Member

jmlrt commented Sep 21, 2021

still valid

@botelastic botelastic bot removed the triage/stale label Sep 21, 2021
@botelastic
Copy link

botelastic bot commented Dec 20, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@botelastic
Copy link

botelastic bot commented Jan 19, 2022

This issue has been automatically closed because it has not had recent activity since being marked as stale.

@botelastic botelastic bot closed this as completed Jan 19, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

7 participants