...
Node | Open Port |
---|---|
wifimon-node{1,2,3}.example.org | 9300/tcp |
wifimon-kibana.example.org | 9200/tcp, 9300/tcp, 5601/tcp |
wifimon-logstash.example.org | 5044/tcp |
Port 9300/tcp is used for internal communication between cluster nodes. Port 5044/tcp is where Logstash listens for beats of log events sent from Filebeat. Port 5601/tcp is used to access Kibana platform from the browser. Port 9200/tcp is used to query the cluster.
Note | ||
---|---|---|
| ||
To query the cluster, the The node wifimon-kibana.example.org is also used for monitoring purposes, and this is the reason port 9200/tcp is used. This port is not opened open in the firewall. There's no need to open port 9200/tcp for querying , the cluster, this can only be queried happen locally by applying Elasticsearch Elasticsearch REST API commands at the cluster node you are currently logged in. For more information on querying the cluster see Cluster Exploration. |
This setup uses firewalld for the configuration of firewall. On wifimon-kibana.example.org two rich rules allow access for cluster nodes and components. On each other node a "wifimon" custom zone is created to hold the specific configuration.
...
Code Block |
---|
firewall-cmd --zone=public --list-ports 5601/tcp firewall-cmd --zone=wifimonpublic --list-rich-ports 9300/tcp firewall-cmd --zone=wifimon --list-sources 10.0.0.1/32 10.0.0.2/32 10.0.0.3/32rules rule family="ipv4" source ipset="wifimon-nodes" port port="9300" protocol="tcp" accept rule family="ipv4" source ipset="wifimon-components" port port="9200" protocol="tcp" accept firewall-cmd --zone=public --ipset=wifimon-nodes --get-entries 10.0.0.1 10.0.0.2 10.0.0.3 firewall-cmd --zone=public --ipset=wifimon-components --get-entries 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.5 10.10.10.111 192.168.1.15 |
Note | ||
---|---|---|
| ||
In the wifimon-components ipset, |
On wifimon-node1.example.org:
Code Block |
---|
firewall-cmd --zone=wifimon --list-ports
9300/tcp
firewall-cmd --zone=wifimon --list-sources
10.0.0.2/32 10.0.0.3/32 10.0.0.4/32 |
...
Code Block |
---|
firewall-cmd --zone=wifimon --list-ports
9300/tcp
firewall-cmd --zone=wifimon --list-sources
10.0.0.1/32 10.0.0.3/32 10.0.0.4/32 |
...
Code Block |
---|
firewall-cmd --zone=wifimon --list-ports
9300/tcp
firewall-cmd --zone=wifimon --list-sources
10.0.0.1/32 10.0.0.2/32 10.0.0.4/32 |
...
Code Block | ||
---|---|---|
firewall-cmd --zone=wifimon --list-ports
5044/tcp
firewall-cmd --zone=wifimon --list-sources
10.10.10.111/32 192.168.1.15/32 | ||
Note | ||
| ||
In the configuration of Logstash firewall, 10.10.10.111 and 192.168.1.15 are the IPs of the servers where Filebeat agents are installed. For the other components, their IPs are described at 04 Streaming Logs Into ELK Cluster section. |
SSL/TLS Certificates
The cluster communication is secured by configuring SSL/TLS encryption. The elasticsearch-certutil was used to generate a CA certificate, utilized for signing the certificates of the cluster components. This utility comes with the elasticsearch installation, and in this case was used the one installed in the wifimon-kibana.example.org node.
...