IDEA2023.1.3破解,IDEA破解,IDEA 2023.1破解,最新IDEA激活码

Elasticsearch、kibana、logstash7.6.2添加登录认证

IDEA2023.1.3破解,IDEA破解,IDEA 2023.1破解,最新IDEA激活码

elasticsearch 7.6.2使用x-pack添加登录认证

第一步:切换到elasticsearch的bin目录下,使用下列命令生成证书
./elasticsearch-certutil cert -out config/elastic-certificates.p12 -pass “”

第二步:打开config/elasticsearch.yml,在尾部添加下面一行代码:
xpack.security.enabled: true
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: certificate
xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
xpack.security.transport.ssl.truststore.path: elastic-certificates.p12

然后启动elasticsearch

第三步:新打开一个终端,使用cd命令切换到elasticsearch的bin目录,然后使用 ./elasticsearch-setup-passwords auto 命令自动生成好几个默认用户和密码。
如果想手动生成密码,则使用 bin/elasticsearch-setup-passwords interactive 命令。一般默认会生成好几个管理员账户,其中一个叫elastic的用户是超级管理员。

Changed password for user apm_system
PASSWORD apm_system = password1

Changed password for user kibana
PASSWORD kibana = password2

Changed password for user logstash_system
PASSWORD logstash_system = password3

Changed password for user beats_system
PASSWORD beats_system = password4

Changed password for user remote_monitoring_user
PASSWORD remote_monitoring_user = password5

Changed password for user elastic
PASSWORD elastic = password6

第四步:验证一下。打开浏览器,输入我们的elasticsearch的网址,比如本地的http://localhost:9200/ ,然后会弹出一个输入框,输入账号和密码,输入后则可以看到一些介绍。

第五步:打开config/kibana.yml,添加下面一行代码:
elasticsearch.username: “elastic”
elasticsearch.password: “密码”

然后启动kibana

第六步:打开config/logstash.yml,添加下面一行代码:

xpack.monitoring.enabled: true
xpack.monitoring.elasticsearch.username: elastic
xpack.monitoring.elasticsearch.password: password
xpack.monitoring.elasticsearch.hosts: ["https://127.0.0.1:9200"]

打开syncdata.conf,添加下面一行代码:

output {

if [type]=="user" {
elasticsearch {
hosts => "127.0.0.1:9200"
user => elastic
password => password
# index名
index => "user"
# type名
document_type => "_doc"
# 需要关联的数据库中有有一个id字段,对应索引的id号
document_id => "%{id}"
}
stdout {
codec => json_lines
}

}
}

启动logstash,就可以进行抽取数据了

多节点集群X-Pack安全如何配置?
最简单的方法,
假定是初始部署集群阶段。

步骤1:清空data文件; 已经配置好的集群要添加登录认证的话,先删除data文件,不然启动报错
步骤2:将配置好的带证书的文件copy到另一台机器;
步骤3:根据集群配置ip、角色等信息即可。

文章永久链接:https://tech.souyunku.com/?p=48393


Warning: A non-numeric value encountered in /data/wangzhan/tech.souyunku.com.wp/wp-content/themes/dux/functions-theme.php on line 1154
赞(77) 打赏



未经允许不得转载:搜云库技术团队 » Elasticsearch、kibana、logstash7.6.2添加登录认证

IDEA2023.1.3破解,IDEA破解,IDEA 2023.1破解,最新IDEA激活码
IDEA2023.1.3破解,IDEA破解,IDEA 2023.1破解,最新IDEA激活码

评论 抢沙发

大前端WP主题 更专业 更方便

联系我们联系我们

觉得文章有用就打赏一下文章作者

微信扫一扫打赏

微信扫一扫打赏


Fatal error: Uncaught Exception: Cache directory not writable. Comet Cache needs this directory please: `/data/wangzhan/tech.souyunku.com.wp/wp-content/cache/comet-cache/cache/https/tech-souyunku-com/index.q`. Set permissions to `755` or higher; `777` might be needed in some cases. in /data/wangzhan/tech.souyunku.com.wp/wp-content/plugins/comet-cache/src/includes/traits/Ac/ObUtils.php:367 Stack trace: #0 [internal function]: WebSharks\CometCache\Classes\AdvancedCache->outputBufferCallbackHandler() #1 /data/wangzhan/tech.souyunku.com.wp/wp-includes/functions.php(5109): ob_end_flush() #2 /data/wangzhan/tech.souyunku.com.wp/wp-includes/class-wp-hook.php(303): wp_ob_end_flush_all() #3 /data/wangzhan/tech.souyunku.com.wp/wp-includes/class-wp-hook.php(327): WP_Hook->apply_filters() #4 /data/wangzhan/tech.souyunku.com.wp/wp-includes/plugin.php(470): WP_Hook->do_action() #5 /data/wangzhan/tech.souyunku.com.wp/wp-includes/load.php(1097): do_action() #6 [internal function]: shutdown_action_hook() #7 {main} thrown in /data/wangzhan/tech.souyunku.com.wp/wp-content/plugins/comet-cache/src/includes/traits/Ac/ObUtils.php on line 367