Changing the Security Mode

After a cluster is created, its security mode can be changed using the following methods:

Context

You can create clusters in multiple security modes. For details about the differences between security modes, see Table 1.

Table 1 Cluster security modes

Security Mode

Scenario

Advantage

Disadvantage

Non-Security Mode

Intranet services and test scenarios

Simple. Easy to access.

Poor security. Anyone can access such clusters.

Security Mode + HTTP Protocol

User permissions can be isolated, which is applicable to scenarios sensitive to cluster performance.

Security authentication is required for accessing such clusters, which improves cluster security. Accessing a cluster through HTTP protocol can retain the high performance of the cluster.

Cannot be accessed from the public network.

Security Mode + HTTPS Protocol

Scenarios that require high security and public network access.

Security authentication is required for accessing such clusters, which improves cluster security. HTTPS protocol allows public network to access such clusters.

The performance of clusters using HTTPS is 20% lower than that of using HTTP.

Prerequisites

  • You are advised to back up data before changing the cluster security mode.

  • The target cluster is available and has no tasks in progress.

Constraints

  • Only clusters (whose version is 6.5.4 or later) created after November 2022 support security mode switching.

  • A cluster automatically restarts when its security mode is being changed. Services are interrupted during the restart. The authentication mode for invoking the cluster will change after the restart, and client configurations need to be adjusted accordingly.

  • If a cluster has already opened the Kibana session box, a session error message will be displayed after you change the cluster security mode. In this case, clear the cache and open Kibana again.

Switching from the Non-Security Mode to Security Mode

You can change a non-security cluster to a security cluster that uses HTTP or HTTPS. After a cluster's security mode is enabled, security authentication is required for accessing the cluster.

  1. Log in to the CSS management console.

  2. In the navigation pane, choose a cluster type. The cluster management page is displayed.

  3. Choose More > Modify Configuration in the Operation column of the target cluster. The Modify Configuration page is displayed.

  4. Choose the Configure Security Mode tab.

  5. Enable the security mode. Enter and confirm the administrator password of the cluster.

    **Figure 1** Enabling the security mode

    Figure 1 Enabling the security mode

  6. Enable or disable HTTPS Access.

    • If you enable HTTPS Access: The HTTPS protocol is used to encrypt cluster communication and you can configure public networks to access the cluster.

    • If you disable HTTPS Access: The HTTP protocol is used and you cannot configure public networks to access the cluster.

  7. Click Submit. Confirm the information and the cluster list page is displayed.

    The Task Status of the cluster is The security mode is changing. When the cluster status changes to Available, the security mode has been successfully changed.

Switching from the Security to Non-Security Mode

You can change a security cluster that uses HTTP or HTTPS to a non-security cluster. After a cluster's security mode is disabled, security authentication is no longer required for accessing the cluster.

Important

  • Clusters in non-security mode can be accessed without security authentication, and HTTP protocol is used to transmit data. Ensure the security of the cluster access environment and do not expose the access interface to the public network.

  • During the switchover from the security mode to the non-security mode, the indexes of the original security cluster will be deleted. Back up data before disabling the security mode.

  • If a security cluster has been bound to a public IP address, unbind it before changing the security mode.

  • If a security cluster has enabled Kibana public network access, disable it before changing the security mode.

  1. Log in to the CSS management console.

  2. In the navigation pane on the left, choose Clusters. On the displayed Clusters page, locate the target cluster and choose More > Modify Configuration in the Operation column.

  3. Choose the Configure Security Mode tab.

  4. Disable the security mode.

    **Figure 2** Disabling the security mode

    Figure 2 Disabling the security mode

  5. Click Submit. Confirm the information and the cluster list page is displayed.

    The Task Status of the cluster is The security mode is changing. When the cluster status changes to Available, the security mode has been successfully changed.

Switching the Protocol of Security Clusters

You can change the protocol of a security cluster.

Important

If a security cluster has been bound to a public IP address, you need to unbind it before changing HTTPS protocol to HTTP.

  1. Log in to the CSS management console.

  2. In the navigation pane on the left, choose Clusters. On the displayed Clusters page, locate the target cluster and choose More > Modify Configuration in the Operation column.

  3. Choose the Configure Security Mode tab.

  4. Enable or disable HTTPS Access.

    **Figure 3** Configuring the protocol

    Figure 3 Configuring the protocol

    • If you enable HTTPS Access:

      HTTPS protocol is used to encrypt cluster communication and you can configure public network access.

    • If you disable HTTPS Access: An alarm message is displayed. Click OK to disable the function.

      Cluster communication is no longer encrypted and the public network access function cannot be enabled.

  5. Click Submit. Confirm the information and the cluster list page is displayed.

    The Task Status of the cluster is The security mode is changing. When the cluster status changes to Available, the security mode has been successfully changed.