mirror of
https://github.com/elastic/logstash.git
synced 2025-04-24 22:57:16 -04:00
221 lines
9 KiB
Ruby
221 lines
9 KiB
Ruby
# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
|
|
# or more contributor license agreements. Licensed under the Elastic License;
|
|
# you may not use this file except in compliance with the Elastic License.
|
|
|
|
module LogStash module Helpers
|
|
module ElasticsearchOptions
|
|
extend self
|
|
|
|
ES_SETTINGS = %w(
|
|
ssl.certificate_authority
|
|
ssl.truststore.path
|
|
ssl.keystore.path
|
|
hosts
|
|
username
|
|
password
|
|
cloud_id
|
|
cloud_auth
|
|
api_key
|
|
proxy
|
|
)
|
|
|
|
# xpack setting to ES output setting
|
|
SETTINGS_MAPPINGS = {
|
|
"cloud_id" => "cloud_id",
|
|
"cloud_auth" => "cloud_auth",
|
|
"username" => "user",
|
|
"password" => "password",
|
|
"api_key" => "api_key",
|
|
"proxy" => "proxy",
|
|
"sniffing" => "sniffing",
|
|
"ssl.certificate_authority" => "cacert",
|
|
"ssl.truststore.path" => "truststore",
|
|
"ssl.truststore.password" => "truststore_password",
|
|
"ssl.keystore.path" => "keystore",
|
|
"ssl.keystore.password" => "keystore_password",
|
|
}
|
|
|
|
# Retrieve elasticsearch options from either specific settings, or modules if the setting is not there and the
|
|
# feature supports falling back to modules if the feature is not specified in logstash.yml
|
|
def es_options_from_settings_or_modules(feature, settings)
|
|
only_modules_configured?(feature, settings) ? es_options_from_modules(settings) : es_options_from_settings(feature, settings)
|
|
end
|
|
|
|
# Populate the Elasticsearch options from LogStashSettings file, based on the feature that is being used.
|
|
# @return Hash
|
|
def es_options_from_settings(feature, settings)
|
|
prefix = (feature == "monitoring" && LogStash::MonitoringExtension.use_direct_shipping?(settings)) ? "" : "xpack."
|
|
opts = {}
|
|
|
|
validate_authentication!(feature, settings, prefix)
|
|
|
|
# transpose all directly mappable settings
|
|
SETTINGS_MAPPINGS.each do |xpack_setting, es_setting|
|
|
v = settings.get("#{prefix}#{feature}.elasticsearch.#{xpack_setting}")
|
|
opts[es_setting] = v unless v.nil?
|
|
end
|
|
|
|
# process remaining settings
|
|
|
|
unless settings.get("#{prefix}#{feature}.elasticsearch.cloud_id")
|
|
opts['hosts'] = settings.get("#{prefix}#{feature}.elasticsearch.hosts")
|
|
end
|
|
opts['ssl_certificate_verification'] = settings.get("#{prefix}#{feature}.elasticsearch.ssl.verification_mode") == 'certificate'
|
|
|
|
# if all hosts are using https or any of the ssl related settings are set
|
|
if ssl?(feature, settings, prefix)
|
|
opts['ssl'] = true
|
|
end
|
|
|
|
# the username setting has a default value and should not be included when using another authentication
|
|
# it is safe to silently remove here since all authentication verifications have been validated at this point.
|
|
if settings.set?("#{prefix}#{feature}.elasticsearch.cloud_auth") || settings.set?("#{prefix}#{feature}.elasticsearch.api_key")
|
|
opts.delete('user')
|
|
end
|
|
|
|
opts
|
|
end
|
|
|
|
def ssl?(feature, settings, prefix)
|
|
return true if verify_https_scheme(feature, settings, prefix)
|
|
return true if settings.set?("#{prefix}#{feature}.elasticsearch.cloud_id") # cloud_id always resolves to https hosts
|
|
return true if settings.set?("#{prefix}#{feature}.elasticsearch.ssl.certificate_authority")
|
|
return true if settings.set?("#{prefix}#{feature}.elasticsearch.ssl.truststore.path") && settings.set?("#{prefix}#{feature}.elasticsearch.ssl.truststore.password")
|
|
return true if settings.set?("#{prefix}#{feature}.elasticsearch.ssl.keystore.path") && settings.set?("#{prefix}#{feature}.elasticsearch.ssl.keystore.password")
|
|
|
|
return false
|
|
end
|
|
|
|
HTTPS_SCHEME = /^https:\/\/.+/
|
|
def verify_https_scheme(feature, settings, prefix)
|
|
hosts = Array(settings.get("#{prefix}#{feature}.elasticsearch.hosts"))
|
|
hosts.all? {|host| host.match?(HTTPS_SCHEME)}
|
|
end
|
|
|
|
# Elasticsearch settings can be extracted from the modules settings inside the configuration.
|
|
# Few options will be supported, however - the modules security configuration is
|
|
# different to
|
|
def es_options_from_modules(settings)
|
|
module_settings = extract_module_settings(settings)
|
|
|
|
if module_settings.empty?
|
|
return nil
|
|
end
|
|
|
|
opts = {}
|
|
|
|
setting = LogStash::Setting::SplittableStringArray.new("var.elasticsearch.hosts", String, ["localhost:9200"])
|
|
raw_value = module_settings[setting.name]
|
|
setting.set(raw_value) unless raw_value.nil?
|
|
opts['hosts'] = setting.value
|
|
opts['user'] = module_settings['var.elasticsearch.username']
|
|
password = module_settings['var.elasticsearch.password']
|
|
opts['password'] = password.value unless password.nil?
|
|
|
|
# Sniffing is not supported for modules.
|
|
opts['sniffing'] = false
|
|
if cacert = module_settings["var.elasticsearch.ssl.certificate_authority"]
|
|
opts['cacert'] = cacert
|
|
opts['ssl'] = true
|
|
end
|
|
opts
|
|
end
|
|
|
|
|
|
# Determine whether only modules have been configured, and not monitoring
|
|
# @param String feature to be checked
|
|
# @param Logstash::Settings Logstash settings
|
|
def only_modules_configured?(feature, settings)
|
|
modules_configured?(settings) && !feature_configured?(feature, settings)
|
|
end
|
|
|
|
# If no settings are configured, then assume that the feature has not been configured.
|
|
def feature_configured?(feature, settings)
|
|
ES_SETTINGS.each do |option|
|
|
return true if settings.set?("xpack.#{feature}.elasticsearch.#{option}")
|
|
end
|
|
false
|
|
end
|
|
|
|
def modules_configured?(settings)
|
|
!extract_module_settings(settings).nil?
|
|
end
|
|
|
|
# Read module settings from yaml file. This should be refactored in Logstash proper to allow for DRY-ing up
|
|
# these settings
|
|
def extract_module_settings(settings)
|
|
cli_settings = settings.get("modules.cli")
|
|
yml_settings = settings.get("modules")
|
|
modules_array = if !(cli_settings.empty? && yml_settings.empty?)
|
|
LogStash::Modules::SettingsMerger.merge(cli_settings, yml_settings)
|
|
elsif cli_settings.empty?
|
|
yml_settings
|
|
else
|
|
cli_settings
|
|
end
|
|
LogStash::Modules::SettingsMerger.merge_cloud_settings(modules_array.first, settings) unless modules_array.empty?
|
|
# As only one module is supported in the initial rollout, use the first one found
|
|
modules_array.first
|
|
end
|
|
|
|
private
|
|
|
|
def validate_authentication!(feature, settings, prefix)
|
|
provided_cloud_id = settings.set?("#{prefix}#{feature}.elasticsearch.cloud_id")
|
|
provided_hosts = settings.set?("#{prefix}#{feature}.elasticsearch.hosts")
|
|
provided_cloud_auth = settings.set?("#{prefix}#{feature}.elasticsearch.cloud_auth")
|
|
provided_api_key = settings.set?("#{prefix}#{feature}.elasticsearch.api_key")
|
|
provided_username = settings.set?("#{prefix}#{feature}.elasticsearch.username")
|
|
provided_password = settings.set?("#{prefix}#{feature}.elasticsearch.password")
|
|
|
|
# note that the username setting has a default value and in the verifications below
|
|
# we can test on the password option being set as a proxy to using basic auth because
|
|
# if the username is not explicitly set it will use its default value.
|
|
|
|
if provided_cloud_auth && (provided_username || provided_password)
|
|
raise ArgumentError.new(
|
|
"Both #{prefix}#{feature}.elasticsearch.cloud_auth and " +
|
|
"#{prefix}#{feature}.elasticsearch.username/password " +
|
|
"specified, please only use one of those"
|
|
)
|
|
end
|
|
|
|
if provided_username && !provided_password
|
|
raise(ArgumentError,
|
|
"When using #{prefix}#{feature}.elasticsearch.username, " +
|
|
"#{prefix}#{feature}.elasticsearch.password must also be set"
|
|
)
|
|
end
|
|
|
|
if provided_cloud_id
|
|
if provided_hosts
|
|
raise(ArgumentError,
|
|
"Both #{prefix}#{feature}.elasticsearch.cloud_id and " +
|
|
"#{prefix}#{feature}.elasticsearch.hosts specified, please only use one of those"
|
|
)
|
|
end
|
|
end
|
|
|
|
authentication_count = 0
|
|
authentication_count += 1 if provided_cloud_auth
|
|
authentication_count += 1 if provided_password
|
|
authentication_count += 1 if provided_api_key
|
|
|
|
if authentication_count == 0
|
|
# when no explicit authentication is set it is relying on default username
|
|
# but without and explicit password set
|
|
raise(ArgumentError,
|
|
"With the default #{prefix}#{feature}.elasticsearch.username, " +
|
|
"#{prefix}#{feature}.elasticsearch.password must be set"
|
|
)
|
|
end
|
|
|
|
if authentication_count > 1
|
|
raise(ArgumentError, "Multiple authentication options are specified, please only use one of #{prefix}#{feature}.elasticsearch.username/password, #{prefix}#{feature}.elasticsearch.cloud_auth or #{prefix}#{feature}.elasticsearch.api_key")
|
|
end
|
|
|
|
if provided_api_key && !ssl?(feature, settings, prefix)
|
|
raise(ArgumentError, "Using api_key authentication requires SSL/TLS secured communication")
|
|
end
|
|
end
|
|
end end end
|