Elasticsearch Disabling Security in Elasticsearch: A Quick Guide

By Opster Team

Updated: Nov 5, 2023

| 2 min read

Before you dig into the details of this technical guide, have you tried asking OpsGPT?

You'll receive concise answers that will help streamline your Elasticsearch/OpenSearch operations.

Try OpsGPT now for step-by-step guidance and tailored insights into your Elasticsearch/ OpenSearch operation.

To manage all aspects of your Elasticsearch operation, you can use Opster’s Management Console (OMC). The OMC makes it easy to orchestrate and manage Elasticsearch in any K8 environment. Using the OMC you can deploy multiple clusters, configure node roles, scale cluster resources, manage certificates and more – all from a single interface, for free. Check it out here.

You can also try AutoOps for Elasticsearch. It will detect issues and improve your Elasticsearch performance by analyzing your shard sizes, threadpools, memory, snapshots, disk watermarks and more. Try it for free.

Quick links


Elasticsearch comes with a robust security feature that helps to protect your data. However, there might be situations where you need to disable this security feature, such as during testing or development phases. This article will guide you through the process of disabling security in Elasticsearch.

Understanding Elasticsearch Security

Elasticsearch security features are primarily designed to safeguard your clusters by providing a range of preventative measures. These include authentication, authorization, network encryption, audit logging, and more. While these features are essential for production environments, they might not be necessary during the development or testing phases. In such cases, disabling security can simplify the process.

Steps to Disable Security in Elasticsearch

Before proceeding, it’s important to note that disabling security should only be done in a controlled environment and never in a production environment. Here are the steps to disable security in Elasticsearch:

Step 1: Access the Elasticsearch Configuration File

The first step is to access the Elasticsearch configuration file, `elasticsearch.yml`, which is typically located in the `/etc/elasticsearch` directory. You can use any text editor to open this file.

Step 2: Disable Security Features

In the `elasticsearch.yml` file, you will find several settings related to security. To disable security, you need to set the `xpack.security.enabled` setting to `false`. Here’s how you can do it:

xpack.security.enabled: false

Save the changes and close the file.

Step 3: Restart Elasticsearch

After making the changes, you need to restart Elasticsearch for the changes to take effect. If you’re using a system with systemd, you can use the following command to restart Elasticsearch:

sudo systemctl restart elasticsearch

If you’re using a system with SysV Init, you can use the following command instead:

sudo service elasticsearch restart

After restarting, Elasticsearch will operate without the security features.

Verifying the Changes

To verify that the security features have been disabled, you can try to access the Elasticsearch API without any credentials. If the security is disabled, you should be able to access the API without any authentication.

curl -X GET "localhost:9200/_cluster/health?pretty"

If the security is disabled, the above command should return the cluster health status without asking for any credentials.

Re-enabling Security in Elasticsearch

If you need to re-enable security in Elasticsearch, you can do so by setting the `xpack.security.enabled` setting back to `true` in the `elasticsearch.yml` file and then restarting Elasticsearch.

xpack.security.enabled: true

Remember to restart Elasticsearch after making the changes.

Final Thoughts

Disabling security in Elasticsearch can be useful in certain scenarios, such as testing or development. However, it’s crucial to remember that this should never be done in a production environment as it can expose your data to potential threats. Always ensure that security is enabled in production environments to protect your data and maintain the integrity of your Elasticsearch clusters.

How helpful was this guide?

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Get expert answers on Elasticsearch/OpenSearch