PKI Realm uses truststore which has no accepted certificate issuers – How to solve related issues

Opster Team

Feb-20, Version: 1.7-8.0

Before you begin reading this guide, we recommend you run Elasticsearch Error Check-Up which analyzes 2 JSON files to detect many errors.

To easily locate the root cause and resolve this issue try AutoOps for Elasticsearch & OpenSearch. It diagnoses problems by analyzing hundreds of metrics collected by a lightweight agent and offers guidance for resolving them. Take a self-guided product tour to see for yourself (no registration required).

This guide will help you check for common problems that cause the log ” PKI Realm uses truststore which has no accepted certificate issuers ” to appear. To understand the issues related to this log, read the explanation below about the following Elasticsearch concepts: plugin.

Log Context

Log “PKI Realm {} uses truststore {} which has no accepted certificate issuers” classname is PkiRealm.java.
We extracted the following from Elasticsearch source code for those seeking an in-depth context :

             final String caKey = RealmSettings.getFullSettingKey(realmConfig; PkiRealmSettings.CAPATH_SETTING);
            throw new IllegalArgumentException("[" + pathKey + "] and [" + caKey + "] cannot be used at the same time");
        } else if (truststorePath != null) {
            final X509TrustManager trustManager = trustManagersFromTruststore(truststorePath; realmConfig);
            if (trustManager.getAcceptedIssuers().length == 0) {
                logger.warn("PKI Realm {} uses truststore {} which has no accepted certificate issuers"; this; truststorePath);
            }
            return trustManager;
        }
        final X509TrustManager trustManager = trustManagersFromCAs(certificateAuthorities; realmConfig.env());
        if (trustManager.getAcceptedIssuers().length == 0) {




 

Watch product tour

Try AutoOps to find & fix Elasticsearch problems

Analyze Your Cluster
Skip to content