Replacing Old Certificates
Copying New Certificates for OpenSearch
Overview
Certificate replacement in OpenSearch is a critical step for establishing secure node-to-node communication. This process involves deploying new certificates and private keys to appropriate nodes to ensure data encryption and service authentication.
Notations:
$PATH_NEW_NODE_CERT_KEY
— path to new certificates and private keys
Disable shard allocation or restart nodes sequentially, waiting for cluster recovery before proceeding.
- Deploy certificates to SA Data Master
cp $PATH_NEW_NODE_CERT_KEY/{node-cert.pem,node-key.pem} ${OS_HOME}/config/
- Restart SA Data Master node
systemctl stop opensearch
systemctl start opensearch
- Verify node reconnection to cluster
GET _cat/nodes?v
- Restart data nodes
Restarting SA Data Storage should be performed in stages: first, it is necessary to perform a sequential reboot of nodes with the routing_mode parameter cold
, then - warm
, after - `hot'.
Deploying Generated Certificates for SA Engine RE and Inventory
Perform these steps only if these components use different certificates than SA Data Master and SA Data Storage nodes.
- Deploy certificates to SA Engine RE
cp $PATH_NEW_NODE_CERT_KEY/{node-cert.pem,node-key.pem} ${OS_HOME}/utils/sme-re
- Restart SA Engine RE nodes
systemctl stop sme-re
systemctl start sme-re
- Check logs for errors
tail -f /app/logs/opensearch/sme-re/main.log
- Deploy certificates to Inventory
cp $PATH_NEW_NODE_CERT_KEY/{ca-cert.pem} ${OS_HOME}/utils/inventory
Deploying Generated Certificates for Other Search Anywhere Framework Components
- Deploy certificates to OpenSearch Dashboards (OSD)
cp $PATH_NEW_NODE_CERT_KEY/{node-cert.pem,node-key.pem} ${OSD_HOME}/config
- Restart OSD nodes
systemctl stop opensearch-dashboards
systemctl start opensearch-dashboards
-
Verify OSD connection to OpenSearch
-
Deploy certificates to Logstash
cp $PATH_NEW_NODE_CERT_KEY/{node-cert.pem,node-key.pem} ${LOGSTASH_HOME}/config/
- Restart Logstash nodes
systemctl stop logstash
systemctl start logstash
- Check Logstash logs for errors
tail -f /app/logs/logstash/logstash-plain.log
- Deploy certificates to SAF Beat Manager
cp $PATH_NEW_NODE_CERT_KEY/{cert.pem,key.pem} ${SBM_HOME}/etc/ssl
- Restart SAF Beat Manager
systemctl stop SAFBeatManager
systemctl start SAFBeatManager