Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump winlogbeat to v7.10.2 to make implementing secure TLS encryption efficient #46

Open
william-stearns opened this issue Feb 11, 2021 · 0 comments

Comments

@william-stearns
Copy link
Contributor

The used winlogbeat version v7.5.2 is quite old and becomes Security Support EoL this June. The current stable version is 7.10.2 and should be downloaded via the install script.

The new version also allows “ssl.validation_mode: certificate”. This enables to check the BeaKer/Espy-side server certificate against a CA without requiring an actual matching FQDN in the certificate. It makes securing the communication between the winlogbeat and elasticsearch (in case of BeaKer) or redis (Espy) pretty straight forward, as the server side CA cert can just be included in the winlogbeat config and the server certificate is still considered valid when accessing it directly via IP address or any hostname/FQDN. In short: this makes secure TLS encryption possible without requiring customers to set up DNS entries, internal PKI configuration and manual setup of certificates on both ends.

So far I tested v7.10.2 with BeaKer and Espy configurations on a Windows-VM and have not observed any issues, yet. This also includes testing the TLS approach stated before with BeaKer using the automatically generated kibana CA. Checking this with Espy/Redis is still ongoing as your helper script (generate_tls_certs.sh) only generate a self-signed cert without a CA.

Cheers

Clemens

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant