Challenge - 5 Problems
Encryption Mastery in Elasticsearch
Get all challenges correct to earn this badge!
Test your skills under time pressure!
❓ Predict Output
intermediate2:00remaining
What is the output of the Elasticsearch TLS configuration snippet?
Given the following Elasticsearch configuration snippet for enabling TLS encryption in transit, what will be the effect when Elasticsearch nodes start?
Elasticsearch
xpack.security.transport.ssl.enabled: true xpack.security.transport.ssl.verification_mode: certificate xpack.security.transport.ssl.keystore.path: certs/elastic-certificates.p12 xpack.security.transport.ssl.truststore.path: certs/elastic-certificates.p12
Attempts:
2 left
💡 Hint
Look at the 'xpack.security.transport.ssl.enabled' and 'verification_mode' settings.
✗ Incorrect
Setting 'xpack.security.transport.ssl.enabled' to true enables TLS encryption for transport layer. The 'verification_mode: certificate' means nodes verify certificates but do not require hostname verification, so communication is encrypted and verified.
❓ Predict Output
intermediate2:00remaining
What happens if you enable encryption at rest without setting a keystore password?
Consider this Elasticsearch configuration snippet for encryption at rest:
xpack.security.enabled: true
xpack.security.encryptionKey: "myencryptionkey123"
xpack.security.audit.enabled: true
What will happen when Elasticsearch tries to encrypt data at rest?
Attempts:
2 left
💡 Hint
Check if 'xpack.security.encryptionKey' is sufficient for encryption at rest.
✗ Incorrect
The 'xpack.security.encryptionKey' setting provides the key for encrypting sensitive data at rest. No keystore password is required here, so encryption proceeds successfully.
🔧 Debug
advanced2:00remaining
Identify the error in this Elasticsearch TLS transport configuration
This snippet is intended to enable TLS encryption for Elasticsearch transport layer. What error will occur when Elasticsearch starts?
Elasticsearch
xpack.security.transport.ssl.enabled: true xpack.security.transport.ssl.keystore.path: certs/elastic-certificates.p12 xpack.security.transport.ssl.truststore.path: certs/elastic-certificates.p12 xpack.security.transport.ssl.verification_mode: none
Attempts:
2 left
💡 Hint
Check the allowed values for 'verification_mode'.
✗ Incorrect
'none' is a valid value for 'verification_mode' which disables certificate verification but still encrypts transport. This is insecure but does not cause startup failure.
📝 Syntax
advanced2:00remaining
Which option correctly enables HTTPS for Elasticsearch HTTP layer?
Select the correct configuration snippet to enable HTTPS encryption for the HTTP layer in Elasticsearch.
Attempts:
2 left
💡 Hint
Focus on the correct prefix for HTTP SSL settings.
✗ Incorrect
To enable HTTPS on the HTTP layer, 'xpack.security.http.ssl.enabled' must be true and keystore path and password must be set under the HTTP SSL namespace.
🚀 Application
expert3:00remaining
How many nodes will successfully join the cluster with this transport encryption config?
You have a 3-node Elasticsearch cluster. Each node has the following transport encryption settings:
Node 1:
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: certificate
xpack.security.transport.ssl.keystore.path: certs/node1.p12
xpack.security.transport.ssl.truststore.path: certs/ca.p12
Node 2:
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: full
xpack.security.transport.ssl.keystore.path: certs/node2.p12
xpack.security.transport.ssl.truststore.path: certs/ca.p12
Node 3:
xpack.security.transport.ssl.enabled: false
How many nodes will successfully join the cluster?
Attempts:
2 left
💡 Hint
Consider how transport encryption and verification_mode affect node communication.
✗ Incorrect
Nodes 1 and 2 have transport encryption enabled and trust the CA, so they can communicate. Node 3 has transport encryption disabled, so it cannot join the encrypted cluster.