New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
logstash-keystore create does not have an option to force keystore creation without password #9608
Comments
|
turns out a workaround would be
|
|
@jakelandis would be curious as to your thoughts on adding this as a feature. |
+1 to better allow scripting with usage against the keystore. However, given the interactive nature as-is, I am not sure a Perhaps this scope should be expanded to use a kev/value temp file. Perhaps:
Where the password would be one of the key/value pairs. It would require temporary storage of secrets in plain text, this could be done on an admin's laptop, or part of a secure config management that handles the security of the tmp file. |
|
+1 on the When trying to none-interactively overwriting an existing value, the workaround from #9608 (comment) doesn't work. The only way I got this working was by removing the old entry first: this is where the |
|
+1 on the Very frustrating how Elastic has implemented the approach to keystores so differently from one component to the next. Would like to see more consistency. |
|
ES, Kibana, Logstash keystores work really differently - will be nice to standardise them. Our DEV team has generic scripts for adding to the keystore and we need to keep 3 copies of them as they all have slight variations... |
|
+1 on the standarize keystore usage and configuration across the Elastic Stack. It's akward that the Elastic products don't have similar keystore configurations. The elasticsearch keystore has the -f "force" option. https://www.elastic.co/guide/en/elasticsearch/reference/current/elasticsearch-keystore.html |
|
+1 on wanting a force option. |
bin/logstash-keystore createwill prompt the user to accept not using a password.I would like to be able to script creation of the keystore, and I don't want passwords in the ENV.
Even by turning off history setting the env and then turning on the history, the password is still in plaintext when anyone with access to the system types
env. Also, the keystore password could be leaked via any other service running on the machine that might be reporting ENV Vars.I'm not suggesting to remove this feature. But instead add a flag that allows a user to proceed without being prompted.
something like:
The text was updated successfully, but these errors were encountered: