Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ElasicSearchSink-TrustCertificates #1246

Closed
mthirion opened this issue Jan 20, 2023 · 6 comments
Closed

ElasicSearchSink-TrustCertificates #1246

mthirion opened this issue Jan 20, 2023 · 6 comments
Milestone

Comments

@mthirion
Copy link

When using the "elasticsearch-index-sink" kamelet wit SSL enabled, I receive : "PKIX path building failed: unable to find valid certification path to requested target".
Is there a way to add a truststore or to ignore hostname verification?

@oscerd
Copy link
Contributor

oscerd commented Jan 20, 2023

You need to specify certificatePath

@oscerd
Copy link
Contributor

oscerd commented Jan 20, 2023

If you are using the main branch, you should pass a certificate file like described here https://github.com/apache/camel-kamelets-examples/tree/main/jbang/timer-elasticsearch-index

@oscerd
Copy link
Contributor

oscerd commented Jan 20, 2023

This will work with 3.21.0 release. With 3.20 you still have the old kamelet and with that there is no way to specify a trust store, unless you create your own kamelet

@mthirion
Copy link
Author

Ah yeah, ok, that's my version indeed. I'll get to the next one.

@oscerd
Copy link
Contributor

oscerd commented Jan 20, 2023

This is mainly because the old version was based on the rest component, while the new one has been based on the java client 8.x..

@oscerd
Copy link
Contributor

oscerd commented Jul 11, 2023

3.21.0 has been released

@oscerd oscerd closed this as completed Jul 11, 2023
@oscerd oscerd added this to the 3.21.0 milestone Jul 11, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants