logstash 192.168.1.26

filebeat 192.168.1.10

在logstash 端 生成证书

[root@redhat~]vi /etc/pki/tls/openssl.con 
#在[ v3_ca ]下面填写
subjectAltName = IP:192.168.1.26
[ v3_ca ] 
subjectKeyIdentifier=hash 
subjectAltName = IP:192.168.1.26   #若是elk端处于内网,建议ip写成公网出口ip 
[root@redhat~]cd /etc/pki/tls/ 
openssl req -subj '/CN=192.168.1.26/' -x509 -days 3650 -batch -nodes -newkey rsa:2048 -keyout private/logstash.key -out certs/logstash.crt

 log端生成证书

[root@redhat~]vi /etc/pki/tls/openssl.conf 
#在[ v3_ca ]下面填写subjectAltName = IP:192.168.1.40 

[ v3_ca ] 
subjectKeyIdentifier=hash
subjectAltName = IP:192.168.1.40 
#若是log端处于内网,建议ip写成公网出口ip
[root@redhat
~]cd /etc/pki/tls/ openssl req -subj '/CN=192.168.1.40/' -x509 -days 3650 -batch -nodes -newkey rsa:2048 -keyout private/filebeat.key -out certs/filebeat.crt

复制各自证书到对应主机的响应目录下,修改配置,并重启生效#elk端 

 

#重启filebeat
systemctl restart filebeat

 

相关文章:

  • 2021-12-17
  • 2021-08-20
  • 2021-09-09
  • 2021-06-11
  • 2022-01-21
  • 2022-01-10
  • 2022-02-27
  • 2022-12-23
猜你喜欢
  • 2021-12-08
  • 2021-07-21
  • 2022-01-09
  • 2022-03-14
  • 2022-02-20
  • 2022-01-01
相关资源
相似解决方案