add a variable to define elasticsearch.ssl.verificationMode in kibana

This commit is contained in:
Pablo Escobar 2020-05-28 11:18:21 +02:00 committed by Manuel Gutierrez
parent 5603faa1f2
commit 81c2df4fff
No known key found for this signature in database
GPG Key ID: CEB8789DAED15AAD
2 changed files with 2 additions and 1 deletions

View File

@ -26,6 +26,7 @@ wazuh_api_credentials:
# Xpack Security # Xpack Security
kibana_xpack_security: false kibana_xpack_security: false
kibana_ssl_verification_mode: "full"
elasticsearch_xpack_security_user: elastic elasticsearch_xpack_security_user: elastic
elasticsearch_xpack_security_password: elastic_pass elasticsearch_xpack_security_password: elastic_pass

View File

@ -110,7 +110,7 @@ elasticsearch.password: "{{ elasticsearch_xpack_security_password }}"
server.ssl.enabled: true server.ssl.enabled: true
server.ssl.key: "{{node_certs_destination}}/{{ kibana_node_name }}.key" server.ssl.key: "{{node_certs_destination}}/{{ kibana_node_name }}.key"
server.ssl.certificate: "{{node_certs_destination}}/{{ kibana_node_name }}.crt" server.ssl.certificate: "{{node_certs_destination}}/{{ kibana_node_name }}.crt"
elasticsearch.ssl.verificationMode: certificate elasticsearch.ssl.verificationMode: "{{ kibana_ssl_verification_mode }}"
{% if generate_CA == true %} {% if generate_CA == true %}
elasticsearch.ssl.certificateAuthorities: ["{{ node_certs_destination }}/ca.crt"] elasticsearch.ssl.certificateAuthorities: ["{{ node_certs_destination }}/ca.crt"]
{% elif generate_CA == false %} {% elif generate_CA == false %}