Secured Graylog and Beats input¶
The goal of this guide is to have a secured Graylog interface, API and secure communication for Beats that are authenticated by certificate. This way only trusted sources are able to deliver messages into Graylog.
This is a structured document that contains only information already given at various location in this documentation. It should give the missing connection between the different parts of the documentation.
Create a CA with our shadowCA or use your already given CA. That is needed to create all certificates. The examples will take the given names from our shadowCA and reference to that only, please adjust this to your local needs. If in doubt check the shadowCA scripts what kind of certificate is created and used.
The CA certificate needs to be imported on all machines that are part of the setup using the documented steps. Depending on your Browser you might need to import the
.der to your Browser to trust the CA. In addition the CA
.der file is imported to a JVM Keystore that is used by Graylog.
adding of .der to JVM Keystore¶
Graylog needs to know the CA that is used to verify the certificates. The prime advantage is that it only needs the CA certificate and not all known self-signed certificates in the setup.:
# test the .der file keytool -v -printcert -file shadowCA.der # copy cacert into Graylog Folder (ubuntu / debian and CENTOS openJDK ) [ -f /usr/lib/jvm/jre/lib/security/cacerts ] && cp /usr/lib/jvm/jre/lib/security/cacerts /etc/graylog/server/cacerts.jks [ -f /usr/lib/jvm/java-8-openjdk-amd64/jre/lib/security/cacerts ] && cp /usr/lib/jvm/java-8-openjdk-amd64/jre/lib/security/cacerts /etc/graylog/server/cacerts.jks # import CA .der into keystore # will only work if the default password & user is not changed. keytool -importcert -alias shadowCA -keystore /etc/graylog/server/cacerts.jks -storepass changeit -file shadowCA.der
Create certificates for each server, all hostnames and IPs that might be used later to connect from and to this server should be included in the certificates. See README of shadowCA for the possible options. The most common error is that the certificate name does not match the hostname that is used for the connection.
The shadowCA uses the same settings that can be found in the SSL documentation, but easy up the process.
Deploy and configure¶
.crt file on your Graylog server in the configuration dir (/etc/graylog/server/) and add them to the Graylog server.conf. In addition change the
web_listen_uri to https. You might need to cover other settings in a multinode cluster or special setups - just read the comments of the settings inside of the server.conf.
When using the collector-sidecar, use the https URI in the
After restart of Graylog the web interface and the API is served via https only. No automatic redirect from http to https is made.
TLS Beats Input¶
To enable TLS on the input, a certificate (and private key file) is needed. It can be the same or a different certificate as the one of your REST/web interface, as long as it matches all hostnames of your input. Just reference the files TLS cert file and TLS private key file in the Beats Input configuration and restart the input.
The ingesting client will verify the presented certificate against his know CA certificates, if that is successful communication will be establised using TLS.
Add client authentication to beats input¶
Create one directory (
/etc/graylog/server/trusted_clients) that will hold all client certificates you allow to connect to the beats input. This directory must be available on all Graylog server that have the input enabled. Write that path in the beats input configuration TLS Client Auth Trusted Certs and select required for the option TLS client authentication.
After this setting is saved only clients that provide a certificate that is trusted by the CA and is placed inside the configured directory (
/etc/graylog/server/trusted_clients) can deliver messages to Graylog.
output.logstash: hosts: ["graylog.example.org:5044"] ssl.certificate_authorities: ["/etc/ca.pem"] ssl.certificate: "/etc/client.crt" ssl.key: "/etc/client.key"
Place your previously created certificates on the server where you installed beats and adjust the configuration to your needs.
The certificate (
.crt) file of the beats needs to be placed at the Graylog server in the configured directory for trusted clients only if you have enabled that feature at the beats input in Graylog and want client authentication.
Place the certificate and key on the server where the collector-sidecar is running (e.g. place it in
/etc/graylog/collector-sidecar/ssl). Then reference those files in the beats output configuration at the Graylog web interface. The description how to secure sidecar only refers to self signed certificates not how to use your own CA.
You need to place the
shadowCA.pem and the
.key in the directory at the collector-sidecar server.