Hi:
My es version is 5.5.1,search guard version is v5.Es and search guard have been running normally about two years,but suddenly one day when I execute the following command in my running es cluster to update es access rights:“/opt/elasticsearch-5.5.1/plugins/search-guard-5/tools/sgadmin.sh -cd /opt/elasticsearch-5.5.1/plugins/search-guard-5/sgconfig -cn faceid-es -ks /opt/elasticsearch-5.5.1/config/kirk.jks -ts /opt/elasticsearch-5.5.1/config/truststore.jks -nhnv”,I get the error log,the log as fllow:
[10.104.42.108] run: tools/sgadmin_demo.sh
[10.104.42.108] out: Search Guard Admin v5
[10.104.42.108] out: Will connect to localhost:9300 … done
[10.104.42.108] out:
[10.104.42.108] out: ### LICENSE NOTICE Search Guard ###
[10.104.42.108] out:
[10.104.42.108] out: If you use one or more of the following features in production
[10.104.42.108] out: make sure you have a valid Search Guard license
[10.104.42.108] out: (See Licensing | Search Guard Community, Enterprise and Compliance Edition)
[10.104.42.108] out:
[10.104.42.108] out: * Kibana Multitenancy
[10.104.42.108] out: * LDAP authentication/authorization
[10.104.42.108] out: * Active Directory authentication/authorization
[10.104.42.108] out: * REST Management API
[10.104.42.108] out: * JSON Web Token (JWT) authentication/authorization
[10.104.42.108] out: * Kerberos authentication/authorization
[10.104.42.108] out: * Document- and Fieldlevel Security (DLS/FLS)
[10.104.42.108] out: * Auditlogging
[10.104.42.108] out:
[10.104.42.108] out: In case of any doubt mail to sales@floragunn.com
[10.104.42.108] out: ###################################
[10.104.42.108] out: Contacting elasticsearch cluster ‘facepp-es’ and wait for YELLOW clusterstate …
[10.104.42.108] out: Cannot retrieve cluster state due to: None of the configured nodes are available: [{#transport#-1}{roaP-g5qRri23cL9i81YvQ}{localhost}{10.104.42.108:9300}]. This is not an error, will keep on trying …
[10.104.42.108] out: * Try running sgadmin.sh with -icl (but no -cl) and -nhnv (If thats works you need to check your clustername as well as hostnames in your SSL certificates)
[10.104.42.108] out: * Make also sure that your keystore or cert is a client certificate (not a node certificate) and configured properly in elasticsearch.yml
[10.104.42.108] out: * If this is not working, try running sgadmin.sh with --diagnose and see diagnose trace log file)
[10.104.42.108] out: * Add --accept-red-cluster to allow sgadmin to operate on a red cluster.
[10.104.42.108] out: 12:34:32.302 [elasticsearch[client][transport_client_boss][T#1]] ERROR com.floragunn.searchguard.ssl.transport.SearchGuardSSLNettyTransport - SSL Problem General SSLEngine problem
[10.104.42.108] out: javax.net.ssl.SSLHandshakeException: General SSLEngine problem
[10.104.42.108] out: at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1478) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:535) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:813) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:781) ~[?:1.8.0_144]
[10.104.42.108] out: at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624) ~[?:1.8.0_144]
[10.104.42.108] out: at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:254) ~[netty-handler-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1156) ~[netty-handler-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1078) ~[netty-handler-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:489) ~[netty-codec-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:428) ~[netty-codec-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:265) ~[netty-codec-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1334) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:926) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:134) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:644) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:579) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:496) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:458) [netty-transport-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:858) [netty-common-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at java.lang.Thread.run(Thread.java:748) [?:1.8.0_144]
[10.104.42.108] out: Caused by: javax.net.ssl.SSLHandshakeException: General SSLEngine problem
[10.104.42.108] out: at sun.security.ssl.Alerts.getSSLException(Alerts.java:192) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1728) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:304) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:296) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1514) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1026) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$1.run(Handshaker.java:966) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$1.run(Handshaker.java:963) ~[?:1.8.0_144]
[10.104.42.108] out: at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1416) ~[?:1.8.0_144]
[10.104.42.108] out: at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1295) ~[netty-handler-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1208) ~[netty-handler-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: … 18 more
[10.104.42.108] out: Caused by: sun.security.validator.ValidatorException: PKIX path validation failed: java.security.cert.CertPathValidatorException: timestamp check failed
[10.104.42.108] out: at sun.security.validator.PKIXValidator.doValidate(PKIXValidator.java:362) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:270) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.validator.Validator.validate(Validator.java:260) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:281) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:136) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1501) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1026) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$1.run(Handshaker.java:966) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$1.run(Handshaker.java:963) ~[?:1.8.0_144]
[10.104.42.108] out: at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1416) ~[?:1.8.0_144]
[10.104.42.108] out: at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1295) ~[netty-handler-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1208) ~[netty-handler-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: … 18 more
[10.104.42.108] out: Caused by: java.security.cert.CertPathValidatorException: timestamp check failed
[10.104.42.108] out: at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate(PKIXMasterCertPathValidator.java:135) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:223) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:140) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.provider.certpath.PKIXCertPathValidator.engineValidate(PKIXCertPathValidator.java:79) ~[?:1.8.0_144]
[10.104.42.108] out: at java.security.cert.CertPathValidator.validate(CertPathValidator.java:292) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.validator.PKIXValidator.doValidate(PKIXValidator.java:357) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:270) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.validator.Validator.validate(Validator.java:260) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:281) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:136) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1501) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1026) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$1.run(Handshaker.java:966) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$1.run(Handshaker.java:963) ~[?:1.8.0_144]
[10.104.42.108] out: at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1416) ~[?:1.8.0_144]
[10.104.42.108] out: at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1295) ~[netty-handler-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1208) ~[netty-handler-4.1.11.Final.jar:4.1.11.Final]
[10.104.42.108] out: … 18 more
[10.104.42.108] out: Caused by: java.security.cert.CertificateExpiredException: NotAfter: Wed Sep 02 02:38:10 CST 2020
[10.104.42.108] out: at sun.security.x509.CertificateValidity.valid(CertificateValidity.java:274) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.x509.X509CertImpl.checkValidity(X509CertImpl.java:629) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.provider.certpath.BasicChecker.verifyTimestamp(BasicChecker.java:190) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.provider.certpath.BasicChecker.check(BasicChecker.java:144) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate(PKIXMasterCertPathValidator.java:125) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:223) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:140) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.provider.certpath.PKIXCertPathValidator.engineValidate(PKIXCertPathValidator.java:79) ~[?:1.8.0_144]
[10.104.42.108] out: at java.security.cert.CertPathValidator.validate(CertPathValidator.java:292) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.validator.PKIXValidator.doValidate(PKIXValidator.java:357) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:270) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.validator.Validator.validate(Validator.java:260) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:281) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:136) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1501) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1026) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$1.run(Handshaker.java:966) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$1.run(Handshaker.java:963) ~[?:1.8.0_144]
[10.104.42.108] out: at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_144]
[10.104.42.108] out: at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1416) ~[?:1.8.0_144]
It seems certificate expired,how can I solve this problem?
Thanks!