CentOS下Filebeat安全设置指南
一 基础加固
二 传输加密与认证
三 网络与防火墙
四 系统与服务安全
五 快速配置示例
安装与导入GPG(略,见上文)。
生成或获取证书(示例为自签名CA与节点证书):
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048
-keyout /etc/pki/tls/private/filebeat.key -out /etc/pki/tls/certs/filebeat.crt
-subj “/CN=filebeat/O=example.com”
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048
-keyout /etc/pki/tls/private/es.key -out /etc/pki/tls/certs/es.crt
-subj “/CN=elasticsearch/O=example.com”
配置**/etc/filebeat/filebeat.yml**(精简示例):
filebeat.inputs:
output.elasticsearch: hosts: [“https://elasticsearch.example.com:9200”] ssl.enabled: true ssl.verification_mode: certificate ssl.certificate_authorities: [“/etc/pki/tls/certs/ca-bundle.crt”] ssl.certificate: “/etc/pki/tls/certs/filebeat.crt” ssl.key: “/etc/pki/tls/private/filebeat.key” username: “filebeat_writer” password: “StrongPassword!”
setup.template.enabled: false xpack.monitoring.collection.enabled: true
防火墙仅开放必要端口:
sudo firewall-cmd --permanent --zone=public --add-port=9200/tcp
sudo firewall-cmd --reload
启动与开机自启:
sudo systemctl start filebeat
sudo systemctl enable filebeat
验证:
sudo systemctl status filebeat
tail -f /var/log/filebeat/filebeat.log
说明:证书路径、主机名与凭据请按实际环境替换;Elasticsearch侧需启用xpack.security与相应TLS配置。