Microgateway 10.7 | webMethods Microgateway Help | SSL Configuration in Microgateway | How Do I Secure Microgateway Communication with Elasticsearch?
 
How Do I Secure Microgateway Communication with Elasticsearch?
This use case explains how to secure Microgateway communication with Elasticsearch using the HTTPS protocol.
The use case starts when you have a Microgateway instance to be secured using HTTPS and you have the required certificates to secure the communication channel between Microgateway and Elasticsearch. It ends when the secure channel is configured for communication between Microgateway and Elasticsearch.
*To secure Microgateway communication with Elasticsearch
1. Configure truststore.
Microgateway may use any of the following:
*Default truststore: The default truststore is located in the cacerts of the Microgateway JRE.
*Custom truststore: Custom truststore that may have a truststore configuration imported from API Gateway.
For details on importing truststore configuration from API Gateway, see Importing Truststore Configuration Configured in API Gateway
2. Ensure that Microgateway communicates over the HTTPS port configured on Elasticsearch.
Configure the port of communication with Elasticsearch, in the system-settings.yml file, as follows:
es_destination:
protocol: "https"
hostName: "localhost"
port: "8880"
userName: ""
password: ""
3. Ensure that the required Elasticsearch certificates are placed in the Microgateway truststore located at Install_dir/Microgateway/config/.
You can use self-signed certificates or custom CA. For details on configuring keystore for self-signed certificates, see Configuring Keystore in Microgateway