Загрузка страницы

Elastic Stack Cluster - Configure and Secure Tutorial

The video describes how you can create your own Elastic Stack(ELK) cluster on your local machine, using 3 virtual Nodes and Oracle VM VirtualBox free and open-source hosted hypervisor.

LINKS TO DOWNLOAD THE FILES WHICH I AM USING IN THE VIDEO:
Node 1 Virtual Machine - https://drive.google.com/open?id=1yKWrn8fiZV3HXW8XF2y1wnlvR5Lhk97X
Node 2 Virtual Machine - https://drive.google.com/open?id=1QvV58usPwexAG12h-Fl6PQI8U3BT9TO9
Node 3 Virtual Machine - https://drive.google.com/open?id=1uB1HwDUTh304GIJApS9TPYbHORKVLNHT
Putty Client - https://drive.google.com/open?id=1NpHdSZ1Ge9RlGBd9Cpn_xuZhWBw2nAK0
Instructions text file - https://drive.google.com/open?id=1E3qecXpeP3U4brKHT7FV6ooZjnlKyrOw

INSTRUCTIONS:

!!!FIRST CHECK THAT ELASTICSEARCH IS RUNNING!!!

systemctl status elasticsearch
if not execute the following commands with root user:
On node 1
systemctl start elasticsearch
On node 2
systemctl start elasticsearch
On node 3
systemctl start elasticsearch

!!!AFTER THIS FOLLOW THE STEPS IN THE VIDEO!!!

curl -X GET "localhost:9200/_cluster/health?pretty"

.::On Node 1::.
cd /usr/share/elasticsearch
bin/elasticsearch-certutil ca
Enter
Enter
bin/elasticsearch-certutil cert --ca elastic-stack-ca.p12
Enter
Enter
Enter

cp elastic-certificates.p12 /etc/elasticsearch/

cd /etc/elasticsearch/
ls -l
nano /etc/elasticsearch/elasticsearch.yml
- Copy and paste following 5 lines in elasticsearch.yml file
xpack.security.enabled: true
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: certificate
xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
xpack.security.transport.ssl.truststore.path: elastic-certificates.p12

chown root:elasticsearch /etc/elasticsearch/elastic-certificates.p12
chmod 660 /etc/elasticsearch/elastic-certificates.p12

scp /usr/share/elasticsearch/elastic-certificates.p12 elk@192.168.56.102:/home/elk/
scp /usr/share/elasticsearch/elastic-certificates.p12 elk@192.168.56.103:/home/elk/

systemctl restart elasticsearch

.::On Node 2::.
cp /home/elk/elastic-certificates.p12 /etc/elasticsearch/

nano /etc/elasticsearch/elasticsearch.yml
- Copy and paste following 5 lines in elasticsearch.yml file
xpack.security.enabled: true
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: certificate
xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
xpack.security.transport.ssl.truststore.path: elastic-certificates.p12

chown root:elasticsearch /etc/elasticsearch/elastic-certificates.p12
chmod 660 /etc/elasticsearch/elastic-certificates.p12

systemctl restart elasticsearch

.::On Node 3::.
cp /home/elk/elastic-certificates.p12 /etc/elasticsearch/

nano /etc/elasticsearch/elasticsearch.yml
- Copy and paste following 5 lines in elasticsearch.yml file
xpack.security.enabled: true
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: certificate
xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
xpack.security.transport.ssl.truststore.path: elastic-certificates.p12

chown root:elasticsearch /etc/elasticsearch/elastic-certificates.p12
chmod 660 /etc/elasticsearch/elastic-certificates.p12

systemctl restart elasticsearch

- Set passwords for default users
cd /usr/share/elasticsearch
bin/elasticsearch-setup-passwords interactive
demo passwords:
elastic:elastic
apm_system:apmsystem
kibana:kibana
logstash_system:logstashsytem
beats_system:beatssystem
remote_monitoring_user:remotemonitoringuser
- you can generate random passwords automatic using following command
bin/elasticsearch-setup-passwords auto
- be sure that you will remember them

Test cluster health:
curl -u elastic:elastic -X GET "localhost:9200/_cluster/health?pretty"

Configure Kibana on Node 1

/bin/systemctl daemon-reload
/bin/systemctl enable kibana.service
nano /etc/kibana/kibana.yml
Change followinglines:
server.port: 8801
server.host: "192.168.56.101"
elasticsearch.username: "kibana"
elasticsearch.password: "kibana"

sudo systemctl start kibana
create test user

If you want more videos like this please subscribe.
Follow me on my social network accounts:
Instagram - https://instagram.com/nbglink
facebook - https://facebook.com/techlinkbg
twitter - https://twitter.com/nbglink
patreon - https://www.patreon.com/nbglink

Thank you and enjoy it! ;)
#ElasticStack #Elasticsearch #ELK

00:00 For what is all about.
01:35 Nodes importation and run the machines.
03:38 Make ssh connection to the nodes.
06:03 Start with 1st node configuration.
12:06 2nd and 3rd node configuration.
16:15 Kibana configuration.
18:49 Check that Kibana is running and is secured.
21:10 Create users and make some permissions tests.

Видео Elastic Stack Cluster - Configure and Secure Tutorial канала HRISTO NESTOROV
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
15 января 2020 г. 1:24:34
00:24:53
Яндекс.Метрика