Elasticsearch transport client settings (com.akana.es.client.security)
Elasticsearch client security settings
Enable SSL with Shield security on ES Cluster. Applicable only for TransportClient
Keystore path. Applicable to PKCS12 and JKS.
Password for the keystore. Applicable to PKCS12 and JKS.
Password for the private key in the keystore. defaults to keystorePassword. Applicable to PKCS12 and JKS.
Alias for the keystore
Elastic client user name. required if x-pack security is enabled.
The password for the client user. required if x-pack security is enabled.
Truststore path. Applicable to PKCS12 and JKS.
Password to the truststore. Applicable to PKCS12 and JKS.
Keystore type. Possible types are PKCS12, JKS or PEM
Path to the PEM encoded file containing the private key.
Path to a PEM encoded file containing the certificate (or certificate chain) that will be presented to clients when they connect.
List of paths to the PEM encoded certificate files that should be trusted. If you are using a public CA that is already trusted by the Java runtime, you do not need to set this property.
The passphrase that is used to decrypt the private key. This value is not required if the key is not be encrypted.
The ssl verification mode. Valid values are none, certificate or full. See the documentation for details.
The ssl host name verifier mode. Valid values are allow_all or default. The default enforces the host name verification.