Skip to content

Instantly share code, notes, and snippets.

@xenoid
Created March 11, 2020 11:46
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save xenoid/c35d7d4a5f39f040abdaa1b5b4bd4282 to your computer and use it in GitHub Desktop.
Save xenoid/c35d7d4a5f39f040abdaa1b5b4bd4282 to your computer and use it in GitHub Desktop.
# ======================== Elasticsearch Configuration =========================
#Cluster
cluster.name: mycluster-new
#Node
node.name: ${HOSTNAME}
node.master: false
node.data: true
node.attr.tier: t1
#thread_pool.bulk.queue_size: 1000
#thread_pool.write.size: 65
thread_pool.write.queue_size: 1000
xpack.security.enabled: false
xpack.ml.enabled: false
node.attr.data: hot
#cluster.routing.allocation.disk.threshold_enabled: false
node.attr.zone: MY-DATA-CENTER
#Pfade
path.data: /mydata/
path.logs: /var/log/elasticsearch
#Network
network.host: 0.0.0.0
http.port: 9201
transport.port: 9301
#Connection to master
discovery.zen.ping.unicast.hosts: ["192.168.1.1:9301", "192.168.1.2:9301", "192.168.1.3:9301"]
discovery.zen.minimum_master_nodes: 2
#Memory-Lock
bootstrap.memory_lock: true
action.destructive_requires_name: true
node.max_local_storage_nodes: 8
#indices.fielddata.cache.size: 10GB
xpack.monitoring.enabled: true
#SearchGuard
searchguard.ssl.transport.pemcert_filepath: certs/my_node.company.co.crt
searchguard.ssl.transport.pemkey_filepath: certs/my_node.company.co.pk8
searchguard.ssl.transport.pemtrustedcas_filepath: certs/ca.company.co.crt searchguard.ssl.transport.enforce_hostname_verification: false
searchguard.ssl.http.enabled: true searchguard.ssl.http.pemcert_filepath: certs/esnode.lindner.lan.crt
searchguard.ssl.http.pemkey_filepath: certs/my_node.company.co.pk8 searchguard.ssl.http.pemtrustedcas_filepath: certs/ca.lindner.lan.crt
searchguard.authcz.admin_dn: - 'CN=syslogadmin.lindner.lan,OU=IT,O=Lindner Group,L=Arnstorf,ST=Bayern,C=DE'
searchguard.nodes_dn: - CN=esnode.lindner.lan,OU=IT,O=Lindner Group,L=Arnstorf,ST=Bayern,C=DE
searchguard.enterprise_modules_enabled: true searchguard.restapi.roles_enabled: ["Kibana_Auth_Admin", "sg_all_access"]
searchguard.ssl.http.clientauth_mode: OPTIONAL
#searchguard.restapi.endpoints_disabled.sg_all_access.ROLES: ["GET", "PUT", "POST", "DELETE"] #searchguard.restapi.endpoints_disabled.sg_all_access.ACTIONGROUPS: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.sg_all_access.ROLESMAPPING: ["GET", "PUT", "POST", "DELETE"] #searchguard.restapi.endpoints_disabled.sg_all_access.INTERNALUSERS: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.sg_all_access.SGCONFIG: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.sg_all_access.CACHE: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.sg_all_access.LICENSE: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.sg_all_access.SYSTEMINFO: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.Kibana_Auth_Admin.ROLES: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.Kibana_Auth_Admin.ACTIONGROUPS: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.Kibana_Auth_Admin.ROLESMAPPING: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.Kibana_Auth_Admin.INTERNALUSERS: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.Kibana_Auth_Admin.SGCONFIG: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.Kibana_Auth_Admin.CACHE: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.Kibana_Auth_Admin.LICENSE: ["GET", "PUT", "POST", "DELETE"]
#searchguard.restapi.endpoints_disabled.Kibana_Auth_Admin.SYSTEMINFO: ["GET", "PUT", "POST", "DELETE"]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment