Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The following table shows the DNS configuration and the role each machine plays in the cluster.

FQDNIPRole
wifimon-node1.example.org10.0.0.1master-eligible / data node
wifimon-node2.example.org10.0.0.2master-eligible / data node
wifimon-node3.example.org10.0.0.3master-eligible / data node
wifimon-kibana.example.org10.0.0.4coordinating node
wifimon-logstash.example.org10.0.0.5pipeline node

Cluster node is considered to be the one that joins the cluster. In this setup, cluster nodes are the master-eligible/data nodes and the coordinating node. The pipeline node is not, it doesn’t join the cluster.

...

Port 9200/tcp is used to query the cluster using the Elasticsearch REST API. Port 9300/tcp is used for internal communication between cluster nodes. Port 5044/tcp is where Logstash listens for beats of log events sent from Filebeat. Port 5601/tcp is used to access Kibana platform from the browser.

This setup uses firewalld for the configuration of firewall. On each component a "wifimon" custom zone is created to hold the specific configuration.

On wifimon-kibana.example.org:

Code Block
firewall-cmd --zone=public --list-ports 
5601/tcp
firewall-cmd --zone=wifimon --list-ports 
9300/tcp
firewall-cmd --zone=wifimon --list-sources
10.0.0.1/32 10.0.0.2/32 10.0.0.3/32

On wifimon-node1.example.org:

Code Block
firewall-cmd --zone=wifimon --list-ports 
9300/tcp
firewall-cmd --zone=wifimon --list-sources
10.0.0.2/32 10.0.0.3/32 10.0.0.4/32

On wifimon-node2.example.org:

Code Block
firewall-cmd --zone=wifimon --list-ports 
9300/tcp
firewall-cmd --zone=wifimon --list-sources
10.0.0.1/32 10.0.0.3/32 10.0.0.4/32

On wifimon-node3.example.org:

Code Block
firewall-cmd --zone=wifimon --list-ports 
9300/tcp
firewall-cmd --zone=wifimon --list-sources
10.0.0.1/32 10.0.0.2/32 10.0.0.4/32

On wifimon-logstash.example.org:

Code Block
firewall-cmd --zone=wifimon --list-ports 
5044/tcp
firewall-cmd --zone=wifimon --list-sources
10.10.10.111/32 10.10.10.15/32


Note
titleNOTE

The 10.10.10.111 and 10.10.10.15 above are the IPs of the servers where Filebeat agents are installed.

SSL/TLS Certificates

The cluster communication is secured by configuring SSL/TLS encryption. The elasticsearch-certutil was used to generate a CA certificate, utilized for signing the certificates of the cluster components. This utility comes with the elasticsearch installation, and in this case was used the one installed in the wifimon-kibana.example.org node.

...