|
Command |
Purpose |
|---|---|
|
|
Generates a new Certificate Authority (CA) for securing Elasticsearch HTTP/transport communication. |
|
|
Extracts the CA certificate from the PKCS#12 file to a |
|
|
Generates a new node certificate signed by the existing CA. |
|
|
Creates node certificates (PEM format) based on |
|
|
Resets the password for the built-in |
|
|
Creates a new Elasticsearch user and assigns the |
|
|
Allows inbound Syslog traffic on UDP port 514 for Filebeat log ingestion. |
|
|
Allows inbound Syslog traffic on TCP port 514 for Filebeat log ingestion. |
|
|
Navigates to the Filebeat installation directory. |
|
|
Loads Filebeat index templates, ILM policies, workflows, and Kibana dashboards into Elasticsearch. |
|
|
Runs Filebeat in the foreground with console logging for debugging. |
|
|
Allows execution of Filebeat installation scripts in the current PowerShell session. |
|
|
Installs Filebeat as a Windows service. |
|
|
Starts the Filebeat Windows service. |
|
|
Displays the current status of the Filebeat service. |
|
|
Restarts the Filebeat service to apply configuration changes. |
|
|
Tails Filebeat logs in real time for troubleshooting. |
|
|
To verify whether Syslog port 514 (UDP/TCP) is open and listening, and to identify which process is using that port. |
|
|
Validates the Filebeat configuration file for syntax or YAML errors. |
Elasticsearch CLI commands