How Do I Secure Microgateway Communication with Elasticsearch?
This use case explains how to secure Microgateway communication with Elasticsearch using the HTTPS protocol.
The use case starts when you have a Microgateway instance to be secured using HTTPS and you have the required certificates to secure the communication channel between Microgateway and Elasticsearch. It ends when the secure channel is configured for communication between Microgateway and Elasticsearch.
To secure
Microgateway communication with Elasticsearch
1. Configure truststore.
Microgateway may use any of the following:
Default truststore: The default truststore is located in the cacerts of the Microgateway JRE.
Custom truststore: Custom truststore that may have a truststore configuration imported from
API Gateway.
2. Ensure that Microgateway communicates over the HTTPS port configured on Elasticsearch.
Configure the port of communication with Elasticsearch, in the system-settings.yml file, as follows:
es_destination:
protocol: "https"
hostName: "localhost"
port: "8880"
userName: ""
password: ""
3. Ensure that the required Elasticsearch certificates are placed in the Microgateway truststore located at Install_dir/Microgateway/config/.