@@ -159,8 +159,8 @@ This plugin supports the following configuration options plus the <<plugins-{typ
159159[cols="<,<,<",options="header",]
160160|=======================================================================
161161|Setting |Input type|Required
162- | <<plugins-{type}s-{plugin}-add_hostname>> |<<boolean,boolean>>|No
163- | <<plugins-{type}s-{plugin}-cipher_suites>> |<<array,array>>|No
162+ | <<plugins-{type}s-{plugin}-add_hostname>> |<<boolean,boolean>>|__Deprecated__
163+ | <<plugins-{type}s-{plugin}-cipher_suites>> |<<array,array>>|__Deprecated__
164164| <<plugins-{type}s-{plugin}-client_inactivity_timeout>> |<<number,number>>|No
165165| <<plugins-{type}s-{plugin}-ecs_compatibility>> | <<string,string>>|No
166166| <<plugins-{type}s-{plugin}-executor_threads>> |<<number,number>>|No
@@ -173,10 +173,11 @@ This plugin supports the following configuration options plus the <<plugins-{typ
173173| <<plugins-{type}s-{plugin}-ssl_handshake_timeout>> |<<number,number>>|No
174174| <<plugins-{type}s-{plugin}-ssl_key>> |a valid filesystem path|No
175175| <<plugins-{type}s-{plugin}-ssl_key_passphrase>> |<<password,password>>|No
176- | <<plugins-{type}s-{plugin}-ssl_verify_mode>> |<<string,string>>, one of `["none", "peer", "force_peer"]`|No
177176| <<plugins-{type}s-{plugin}-ssl_peer_metadata>> |<<boolean,boolean>>|No
178- | <<plugins-{type}s-{plugin}-tls_max_version>> |<<number,number>>|No
179- | <<plugins-{type}s-{plugin}-tls_min_version>> |<<number,number>>|No
177+ | <<plugins-{type}s-{plugin}-ssl_supported_protocols>> |<<array,array>>|No
178+ | <<plugins-{type}s-{plugin}-ssl_verify_mode>> |<<string,string>>, one of `["none", "peer", "force_peer"]`|No
179+ | <<plugins-{type}s-{plugin}-tls_max_version>> |<<number,number>>|__Deprecated__
180+ | <<plugins-{type}s-{plugin}-tls_min_version>> |<<number,number>>|__Deprecated__
180181|=======================================================================
181182
182183Also see <<plugins-{type}s-{plugin}-common-options>> for a list of options supported by all
@@ -194,17 +195,13 @@ input plugins.
194195
195196Flag to determine whether to add `host` field to event using the value supplied by the {plugin-singular} in the `hostname` field.
196197
197-
198198[id="plugins-{type}s-{plugin}-cipher_suites"]
199199===== `cipher_suites`
200+ deprecated[6.4.0, Replaced by <<plugins-{type}s-{plugin}-ssl_cipher_suites>>]
200201
201202 * Value type is <<array,array>>
202- * Default value is `java.lang.String[TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256]@459cfcca`
203203
204- The list of ciphers suite to use, listed by priorities.
205- This default list applies for OpenJDK 11.0.14 and higher.
206- For older JDK versions, the default list includes only suites supported by that version.
207- For example, the ChaCha20 family of ciphers is not supported in older versions.
204+ The list of cipher suites to use, listed by priorities.
208205
209206[id="plugins-{type}s-{plugin}-client_inactivity_timeout"]
210207===== `client_inactivity_timeout`
@@ -217,14 +214,14 @@ Close Idle clients after X seconds of inactivity.
217214[id="plugins-{type}s-{plugin}-ecs_compatibility"]
218215===== `ecs_compatibility`
219216
220- * Value type is <<string,string>>
221- * Supported values are:
222- ** `disabled`: unstructured connection metadata added at root level
223- ** `v1`: structured connection metadata added under ECS v1 compliant namespaces
224- ** `v8`: structured connection metadata added under ECS v8 compliant namespaces
225- * Default value depends on which version of Logstash is running:
226- ** When Logstash provides a `pipeline.ecs_compatibility` setting, its value is used as the default
227- ** Otherwise, the default value is `disabled`.
217+ * Value type is <<string,string>>
218+ * Supported values are:
219+ ** `disabled`: unstructured connection metadata added at root level
220+ ** `v1`: structured connection metadata added under ECS v1 compliant namespaces
221+ ** `v8`: structured connection metadata added under ECS v8 compliant namespaces
222+ * Default value depends on which version of Logstash is running:
223+ ** When Logstash provides a `pipeline.ecs_compatibility` setting, its value is used as the default
224+ ** Otherwise, the default value is `disabled`.
228225
229226Refer to <<plugins-{type}s-{plugin}-ecs_metadata,ECS mapping>> for detailed information.
230227
@@ -300,6 +297,16 @@ You can define multiple files or paths. All the certificates will
300297be read and added to the trust store. You need to configure the `ssl_verify_mode`
301298to `peer` or `force_peer` to enable the verification.
302299
300+ [id="plugins-{type}s-{plugin}-ssl_cipher_suites"]
301+ ===== `ssl_cipher_suites`
302+
303+ * Value type is <<array,array>>
304+ * Default value is `['TLS_AES_256_GCM_SHA384', 'TLS_AES_128_GCM_SHA256', 'TLS_CHACHA20_POLY1305_SHA256', 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384', 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384', 'TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256', 'TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256', 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256', 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256', 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384', 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384', 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256', 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256']`
305+
306+ The list of cipher suites to use, listed by priorities.
307+ This default list applies for OpenJDK 11.0.14 and higher.
308+ For older JDK versions, the default list includes only suites supported by that version.
309+ For example, the ChaCha20 family of ciphers is not supported in older versions.
303310
304311[id="plugins-{type}s-{plugin}-ssl_handshake_timeout"]
305312===== `ssl_handshake_timeout`
@@ -333,6 +340,33 @@ openssl pkcs8 -inform PEM -in path/to/logstash.key -topk8 -nocrypt -outform PEM
333340
334341SSL key passphrase to use.
335342
343+ [id="plugins-{type}s-{plugin}-ssl_peer_metadata"]
344+ ===== `ssl_peer_metadata`
345+
346+ * Value type is <<boolean,boolean>>
347+ * Default value is `false`
348+
349+ Enables storing client certificate information in event's metadata.
350+
351+ This option is only valid when `ssl_verify_mode` is set to `peer` or `force_peer`.
352+
353+ [id="plugins-{type}s-{plugin}-ssl_supported_protocols"]
354+ ===== `ssl_supported_protocols`
355+
356+ * Value type is <<array,array>>
357+ * Allowed values are: `'TLSv1.1'`, `'TLSv1.2'`, `'TLSv1.3'`
358+ * Default depends on the JDK being used. With up-to-date Logstash, the default is `['TLSv1.2', 'TLSv1.3']`.
359+ `'TLSv1.1'` is not considered secure and is only provided for legacy applications.
360+
361+ List of allowed SSL/TLS versions to use when establishing a connection to the HTTP endpoint.
362+
363+ For Java 8 `'TLSv1.3'` is supported only since **8u262** (AdoptOpenJDK), but requires that you set the
364+ `LS_JAVA_OPTS="-Djdk.tls.client.protocols=TLSv1.3"` system property in Logstash.
365+
366+ NOTE: If you configure the plugin to use `'TLSv1.1'` on any recent JVM, such as the one packaged with Logstash,
367+ the protocol is disabled by default and needs to be enabled manually by changing `jdk.tls.disabledAlgorithms` in
368+ the *$JDK_HOME/conf/security/java.security* configuration file. That is, `TLSv1.1` needs to be removed from the list.
369+
336370[id="plugins-{type}s-{plugin}-ssl_verify_mode"]
337371===== `ssl_verify_mode`
338372
@@ -349,33 +383,23 @@ If the client doesn't provide a certificate, the connection will be closed.
349383
350384This option needs to be used with `ssl_certificate_authorities` and a defined list of CAs.
351385
352- [id="plugins-{type}s-{plugin}-ssl_peer_metadata"]
353- ===== `ssl_peer_metadata`
354-
355- * Value type is <<boolean,boolean>>
356- * Default value is `false`
357-
358- Enables storing client certificate information in event's metadata.
359-
360- This option is only valid when `ssl_verify_mode` is set to `peer` or `force_peer`.
361-
362386[id="plugins-{type}s-{plugin}-tls_max_version"]
363387===== `tls_max_version`
388+ deprecated[6.4.0, Replaced by <<plugins-{type}s-{plugin}-ssl_supported_protocols>>]
364389
365390 * Value type is <<number,number>>
366- * Default value is `1.3`
367391
368- The maximum TLS version allowed for the encrypted connections. The value must be the one of the following:
369- 1.0 for TLS 1.0, 1.1 for TLS 1.1, 1.2 for TLS 1.2, 1.3 for TLS 1 .3
392+ The maximum TLS version allowed for the encrypted connections.
393+ The value must be the one of the following: 1.1 for TLS 1.1, 1.2 for TLS 1.2, 1.3 for TLSv1 .3
370394
371395[id="plugins-{type}s-{plugin}-tls_min_version"]
372396===== `tls_min_version`
397+ deprecated[6.4.0, Replaced by <<plugins-{type}s-{plugin}-ssl_supported_protocols>>]
373398
374399 * Value type is <<number,number>>
375- * Default value is `1`
376400
377- The minimum TLS version allowed for the encrypted connections. The value must be one of the following:
378- 1.0 for TLS 1.0, 1.1 for TLS 1.1, 1.2 for TLS 1.2, 1.3 for TLS 1.3
401+ The minimum TLS version allowed for the encrypted connections.
402+ The value must be one of the following: 1.1 for TLS 1.1, 1.2 for TLS 1.2, 1.3 for TLS 1.3
379403
380404
381405
0 commit comments