Java连接ES的多种方式

Posted dkjhl

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了Java连接ES的多种方式相关的知识,希望对你有一定的参考价值。

前言

本篇文章主要介绍:使用Basic、Transport、Kerberos三种方式连接ES

Bisic方式

/**
 * Basic方式(带用户名和密码方式访问)
 * @param user 用户名
 * @param password 密码
 * @param index 索引名
 */
private static void basicConnect(String user, String password,String index) 
    try 
        System.out.println("Basic访问start........................");
        final CredentialsProvider credentialsProvider = new BasicCredentialsProvider();
        credentialsProvider.setCredentials(AuthScope.ANY,new UsernamePasswordCredentials(user, password));
        System.out.println("用户为:"+user+" ,密码为:"+password);
        client = new RestHighLevelClient(
                RestClient.builder(new HttpHost(PropertiesUtil.esHost, PropertiesUtil.esPort))
                        .setHttpClientConfigCallback(new RestClientBuilder.HttpClientConfigCallback() 
                            @Override
                            public HttpAsyncClientBuilder customizeHttpClient(HttpAsyncClientBuilder httpClientBuilder) 
                                //httpClientBuilder.disableAuthCaching();
                                return httpClientBuilder.setDefaultCredentialsProvider(credentialsProvider);
                            
                        ));
     catch (Exception e) 
        e.printStackTrace();
    
    //访问所有索引
    PropertiesUtil.getIndics(client);
    //访问指定索引
    PropertiesUtil.getIndex(client,index);
    System.out.println("Basic访问end........................");

Transport方式

/**
 * 
 * 使用transport方法访问ES
 * @param index 索引名
 */
public static void transportConnect(String index)
    try 
        System.out.println("transport访问start........................");
        TransportClient client=new PreBuiltTransportClient(getESSetting())
                .addTransportAddress(new TransportAddress(InetAddress.getByName(PropertiesUtil.esHost),9300));
        System.out.println("Basic "+Base64.getEncoder().encodeToString(
                ("admin" + ":" + Objects.requireNonNull("admin")).getBytes(StandardCharsets.UTF_8)));
        client.threadPool().getThreadContext().putHeader("Authorization", "Basic "+Base64.getEncoder().encodeToString(
                ("admin" + ":" + Objects.requireNonNull("admin")).getBytes(StandardCharsets.UTF_8)));

        System.out.println("获取client成功........................");
        System.out.println("尝试创建index:" + index);
        if (!PropertiesUtil.isExistIndex(client,index)) 
            CreateIndexResponse cir = client.admin().indices().create(new CreateIndexRequest(index)).actionGet();
            System.out.println(cir.isAcknowledged());
         else 
            System.out.println(index + "已存在");
        
        System.out.println("transport访问end........................");
     catch (Exception e) 
        e.printStackTrace();
    


/**
 * 设置setting
 * @return 返回setting
 */
public static Settings getESSetting() 
    return Settings.builder()
            .put("cluster.name",PropertiesUtil.clusterName)
            .build();

Kerberos方式

/**
 * 认证kerberos访问es
 * @param index 索引名
 */
public static void kerberosConnect(String index) 
    RestHighLevelClient restHighLevelClient = null;
    try 
        System.out.println("kerberos访问start........................");
        System.out.println("开始认证........................");
        SpnegoHttpClientConfigCallbackHandler callbackHandler = new SpnegoHttpClientConfigCallbackHandler(PropertiesUtil.principal,
                PropertiesUtil.ketTabPath, true);
        System.out.println("认证成功........................");

        //业务逻辑开始
        List<HttpHost> hosts = new ArrayList<>();
        HttpHost hostNew = new HttpHost(PropertiesUtil.esHost, PropertiesUtil.esPort, "http");
        hosts.add(hostNew);
        HttpHost[] httpHosts = hosts.toArray(new HttpHost[0]);

        RestClientBuilder restClientBuilder = RestClient.builder(httpHosts);
        restClientBuilder.setHttpClientConfigCallback(callbackHandler);
        restHighLevelClient = new RestHighLevelClient(restClientBuilder);
        //测试获取所有的索引
        System.out.println("获取所有的索引........................");
        PropertiesUtil.getIndics(restHighLevelClient);
        System.out.println("获取" + index + "索引数据........................");
        PropertiesUtil.getIndex(restHighLevelClient,index);

        System.out.println("kerberos访问end.........................................");
     catch (Exception e) 
        e.printStackTrace();
    finally 
        if(restHighLevelClient !=null)
            try 
                restHighLevelClient.close();
             catch (IOException e) 
                e.printStackTrace();
            
        
    

正常访问

/**
 * 正常访问ES(不带认证信息)
 * @param index 索引名
 */
private static void rnormalConnect(String index)
    try 
        System.out.println("正常访问start.........................................");
        List<HttpHost> hosts = new ArrayList<>();
        HttpHost hostNew = new HttpHost(PropertiesUtil.esHost, PropertiesUtil.esPort, "http");
        hosts.add(hostNew);
        HttpHost[] httpHosts = hosts.toArray(new HttpHost[0]);
        RestClientBuilder restClientBuilder = RestClient.builder(httpHosts);
        Header[] defaultHeaders = new Header[]
                new BasicHeader("Accept", "application/json"),
                new BasicHeader("Content-type", "application/json");
        restClientBuilder.setDefaultHeaders(defaultHeaders);


        client = new RestHighLevelClient(restClientBuilder);

        PropertiesUtil.getIndics(client);
        PropertiesUtil.getIndex(client,index);
        System.out.println("正常访问end.........................................");
     catch (Exception e) 
        e.printStackTrace();
    finally 
        closeRes();
    

综合测试

  • EsConnectDemo

public class EsConnectDemo 

    private static RestHighLevelClient client;

    public static void main(String[] args) 

        try 
            //测试kerberos是否可以认证
            kerberos();

            if (args.length != 1) 
                System.out.println("请输入要测试的索引名称");
            
            String index = args[0];

            //ES 功能验证
            busisses(index);
         catch (Exception e) 
            e.printStackTrace();
        

    

    /**
     * 验证当前kerberos是否可以认证
     */
    public static void kerberos() 
        try 
            System.setProperty("http.auth.preference","Kerberos");
            System.setProperty("java.security.krb5.conf",PropertiesUtil.krb5ConfPath);
            System.setProperty("sun.security.krb5.debug", "false");
            System.setProperty("sun.security.spnego.debug", "false");
            String acceptorPrincipal = PropertiesUtil.principal;
            Path acceptorKeyTabPath = Paths.get(PropertiesUtil.ketTabPath);

            Set<String> set = new HashSet<>();
            set.add(acceptorPrincipal);
            final Subject subject = JaasKrbUtil.loginUsingKeytab(set, acceptorKeyTabPath, true);
            Set<Object> privateCredentials = subject.getPrivateCredentials();
            System.out.println("getPrivateCredentials:----------------------");
            privateCredentials.forEach(System.out::println);
         catch (Exception e) 
            e.printStackTrace();
        
    

    /**
     * 测试ES权限
     * 每次测试时,会读取es的全部索引,和指定索引数据
     * @param index 读取的索引名称
     */
    private static void busisses(String index) 
        try 

            /* --- transPort 方式访问 --- */
            transportConnect(index);
            
            /* --- rest 方式访问 --- */
            //正常访问
            normalConnect(index);
            //Basic 管理员访问
            basicConnect("admin","admin",index);
            //Basic 超级用户访问
            basicConnect("super","super",index);
            //Basic 普通用户访问
            basicConnect("normal","normal",index);
            //kerberos访问
            kerberosConnect(index);
         catch (Exception e) 
            e.printStackTrace();
        finally 
            closeRes();
        
    

    /**
     * 关闭连接
     */
    public static void closeRes()
        if(client != null)
            try 
                client.close();
             catch (IOException e) 
                e.printStackTrace();
            
        
    

配置文件

  • kerberos.properties
principal=example@HADOOP.COM
keytabPath=/etc/keytabs/es.service.keytab
krb5ConfPath=/etc/krb5.conf
esHost=hostname
esPort=9200
clusterName=dkjhl

文中提到的工具类

  • PropertiesUtil
import org.elasticsearch.action.admin.indices.alias.get.GetAliasesRequest;
import org.elasticsearch.action.admin.indices.exists.indices.IndicesExistsRequest;
import org.elasticsearch.action.search.SearchRequest;
import org.elasticsearch.action.search.SearchResponse;
import org.elasticsearch.client.GetAliasesResponse;
import org.elasticsearch.client.RequestOptions;
import org.elasticsearch.client.RestHighLevelClient;
import org.elasticsearch.client.transport.TransportClient;
import org.elasticsearch.cluster.metadata.AliasMetaData;
import org.elasticsearch.search.SearchHit;
import org.elasticsearch.search.builder.SearchSourceBuilder;

import java.io.FileInputStream;
import java.io.InputStream;
import java.util.Map;
import java.util.Properties;
import java.util.Set;

public class PropertiesUtil 
    public static Properties prop = new Properties();
    static 
        try (InputStream is = new FileInputStream("kerberos.properties"))
            prop.load(is);
         catch (Exception e) 
            e.printStackTrace();
            System.out.println("找不到kerberos.properties文件!");
        
    

    public static String ketTabPath = prop.getProperty("keytabPath");
    public static String krb5ConfPath = prop.getProperty("krb5ConfPath");
    public static String principal = prop.getProperty("principal");
    public static String esHost = prop.getProperty("esHost");
    public static int esPort = Integer.parseInt(prop.getProperty("esPort"));
    public static String clusterName = prop.getProperty("clusterName");


    /**
     * 判断index是否存在
     * @param client 客户端
     * @param indexName 索引名字
     * @return
     */
    public static boolean isExistIndex(TransportClient client, String indexName) 
        boolean isExistIndex = false;
        try 
            isExistIndex = client.admin().indices()
                    .exists(new IndicesExistsRequest().indices(indexName))
                    .actionGet().isExists();
         catch (Exception e) 
            e.printStackTrace();
        
        return isExistIndex;
    

    /**
     * 获取所有索引
     * @param client 客户端
     */
    public static void getIndics(RestHighLevelClient client)
        try 
            GetAliasesRequest request = new GetAliasesRequest();
            GetAliasesResponse getAliasesResponse =  client.indices().getAlias(request, RequestOptions.DEFAULT);
            Map<String, Set<AliasMetaData>> map = getAliasesResponse.getAliases();
            Set<String> indices = map.keySet();
            for (String key : indices) 
                System.out.println(key);
            
         catch (Exception e) 
            e.printStackTrace();
        
    

    /**
     * 获取节点列表
     * @param client 客户端
     */
    public static void getIndex(RestHighLevelClient client, String index)
        try 
            SearchRequest searchRequest = new SearchRequest(index);
            SearchSourceBuilder builder = new SearchSourceBuilder();
            searchRequest.source(builder);
            SearchResponse searchResponse = client.search(searchRequest, RequestOptions.DEFAULT);
            for (SearchHit hit : searchResponse.getHits().getHits()) 
                System.out.println(hit);
            
         catch (Exception e) 
            e.printStackTrace();
        
    

  • JaasKrbUtil
//Source: Apache Kerby project
//https://directory.apache.org/kerby/

import javax.security.auth.Subject;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.PasswordCallback;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.auth.kerberos.KerberosPrincipal;
import javax.security.auth.login.AppConfigurationEntry;
import javax.security.auth.login.Configuration;
import javax.security.auth.login.LoginContext;
import javax.security.auth.login.LoginException;
import java.io.IOException;
import java.nio.file.Path;
import java.security.Principal;
import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;
import java.util.Set;

/**
* JAAS utilities for Kerberos login.
*/
public final class JaasKrbUtil 

 private static boolean debug = false;

 private JaasKrbUtil() 
 

 public static void setDebug(final boolean debuger) 

     debug = debuger;
 

 public static Subject loginUsingPassword(final String principal, final String password) throws LoginException 
     final Set<Principal> principals = new HashSet<Principal>();
     principals.add(new KerberosPrincipal(principal));

     final Subject subject = new Subject(false, principals, new HashSet<Object>(), new HashSet<Object>());

     final Configuration conf = usePassword(principal);
     final String confName = "PasswordConf";
     final CallbackHandler callback = new KrbCallbackHandler(principal, password);
     final LoginContext loginContext = new LoginContext(confName, subject, callback, conf);
     loginContext.login();
     return loginContext.getSubject();
 

 public static Subject loginUsingTicketCache(final String principal, final Path cachePath) throws LoginException 
     final Set<Principal> principals = new HashSet<Principal>();
     principals.add(new KerberosPrincipal(principal));

     final Subject subject = new Subject(false, principals, new HashSet<Object>(), new HashSet<Object>());

     final Configuration conf = useTicketCache(principal, cachePath);
     final String confName = "TicketCacheConf";
     final LoginContext loginContext = new LoginContext(confName, subject, null, conf);
     loginContext.login();
     return loginContext.getSubject();
 

 public static Subject loginUsingKeytab(final Set<String> principalAsStrings, final Path keytabPath, final boolean initiator) throws LoginException 
     final Set<Principal> principals = new HashSet<Principal>();

     String a = "";
     for(String p: principalAsStrings) 
         a = p;
         principals.add(new KerberosPrincipal(p));
     
     final Subject subject = new Subject(false, principals, new HashSet<Object>(), new HashSet<Object>());

     final Configuration conf = useKeytab(a, keytabPath, initiator);
     final String confName = "KeytabConf";
     final LoginContext loginContext = new LoginContext(confName, subject, null, conf);
     loginContext.login();
     return loginContext.getSubject();
 

 public static Configuration usePassword(final String principal) 
     return new PasswordJaasConf(principal);
 

 public static Configuration useTicketCache(final String principal, final Path credentialPath) 
     return new TicketCacheJaasConf(principal, credentialPath);
 

 public static Configuration useKeytab(final String principal, final Path keytabPath, final boolean initiator) 
     return new KeytabJaasConf(principal, keytabPath, initiator);
 

 private static String getKrb5LoginModuleName() 
     return System.getProperty("java.vendor").contains("IBM") ? "com.ibm.security.auth.module.Krb5LoginModule"
             : "com.sun.security.auth.module.Krb5LoginModule";
 

 static class KeytabJaasConf extends Configuration 
     private final String principal;
     private final Path keytabPath;
     private final boolean initiator;

     public KeytabJaasConf(final String principal, final Path keytab, final boolean initiator) 
         this.principal = principal;
         this.keytabPath = keytab;
         this.initiator = initiator;
     

     @Override
     public AppConfigurationEntry[] getAppConfigurationEntry(final String name) 
         final Map<String, String> options = new HashMap<String, String>();
         options.put("keyTab", keytabPath.toAbsolutePath().toString());
         options.put("principal", principal);
         options.put("useKeyTab", "true");
         options.put("storeKey", "true");
         options.put("doNotPrompt", "true");
         options.put("renewTGT", "false");
         options.put("refreshKrb5Config", "true");
         options.put("isInitiator", String.valueOf(initiator));
         options.put("debug", String.valueOf(debug));

         return new AppConfigurationEntry[]  new AppConfigurationEntry(getKrb5LoginModuleName(),
                 AppConfigurationEntry.LoginModuleControlFlag.REQUIRED, options) ;
     
 

 static class TicketCacheJaasConf extends Configuration 
     private final String principal;
     private final Path clientCredentialPath;

     public TicketCacheJaasConf(final String principal, final Path clientCredentialPath) 
         this.principal = principal;
         this.clientCredentialPath = clientCredentialPath;
     

     @Override
     public AppConfigurationEntry[] getAppConfigurationEntry(final String name) 
         final Map<String, String> options = new HashMap<String, String>();
         options.put("principal", principal);
         options.put("storeKey", "false");
         options.put("doNotPrompt", "false");
         options.put("useTicketCache", "true");
         options.put("renewTGT", "true");
         options.put("refreshKrb5Config", "true");
         options.put("isInitiator", "true");
         options.put("ticketCache", clientCredentialPath.toAbsolutePath().toString());
         options.put("debug", String.valueOf(debug));

         return new AppConfigurationEntry[]  new AppConfigurationEntry(getKrb5LoginModuleName(),
                 AppConfigurationEntry.LoginModuleControlFlag.REQUIRED, options) ;
     
 

 static class PasswordJaasConf extends Configuration 
     private final String principal;

     public PasswordJaasConf(final String principal) 
         this.principal = principal;
     

     @Override
     public AppConfigurationEntry[] getAppConfigurationEntry(final String name) 
         final Map<String, String> options = new HashMap<>();
         options.put("principal", principal);
         options.put("storeKey", "true");
         options.put("useTicketCache", "true");
         options.put("useKeyTab", "false");
         options.put("renewTGT", "true");
         options.put("refreshKrb5Config", "true");
         options.put("isInitiator", "true");
         options.put("debug", String.valueOf(debug));

         return new AppConfigurationEntry[]  new AppConfigurationEntry(getKrb5LoginModuleName(),
                 AppConfigurationEntry.LoginModuleControlFlag.REQUIRED, options) ;
     
 

 public static class KrbCallbackHandler implements CallbackHandler 
     private final String principal;
     private final String password;

     public KrbCallbackHandler(final String principal, final String password) 
         this.principal = principal;
         this.password = password;
     

     @Override
     public void handle(final Callback[] callbacks) throws IOException, UnsupportedCallbackException 
         for (int i = 0; i < callbacks.length; i++) 
             if (callbacks[i] instanceof PasswordCallback) 
                 final PasswordCallback pc = (PasswordCallback) callbacks[i];
                 if (pc.getPrompt().contains(principal)) 
                     pc.setPassword(password.toCharArray());
                     break;
                 
             
         
     
 


  • SpnegoHttpClientConfigCallbackHandler
import org.apache.http.auth.AuthSchemeProvider;
import org.apache.http.auth.AuthScope;
import org.apache.http.auth.Credentials;
import org.apache.http.auth.KerberosCredentials;
import org.apache.http.client.CredentialsProvider;
import org.apache.http.client.config.AuthSchemes;
import org.apache.http.config.Lookup;
import org.apache.http.config.RegistryBuilder;
import org.apache.http.impl.auth.SPNegoSchemeFactory;
import org.apache.http.impl.nio.client.HttpAsyncClientBuilder;
import org.elasticsearch.ExceptionsHelper;
import org.elasticsearch.client.RestClientBuilder.HttpClientConfigCallback;
import org.elasticsearch.common.settings.SecureString;
import org.ietf.jgss.*;

import javax.security.auth.Subject;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.PasswordCallback;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.auth.kerberos.KerberosPrincipal;
import javax.security.auth.login.AppConfigurationEntry;
import javax.security.auth.login.Configuration;
import javax.security.auth.login.LoginContext;
import java.io.IOException;
import java.security.AccessControlContext;
import java.security.AccessController;
import java.security.PrivilegedActionException;
import java.security.PrivilegedExceptionAction;
import java.util.Collections;
import java.util.HashMap;
import java.util.Map;


public class SpnegoHttpClientConfigCallbackHandler implements HttpClientConfigCallback 
    private static final String SUN_KRB5_LOGIN_MODULE = "com.sun.security.auth.module.Krb5LoginModule";
    private static final String CRED_CONF_NAME = "ESClientLoginConf";
    private static final Oid SPNEGO_OID = getSpnegoOid();

    private static Oid getSpnegoOid() 
        Oid oid = null;
        try 
            oid = new Oid("1.3.6.1.5.5.2");
         catch (GSSException gsse) 
            throw ExceptionsHelper.convertToRuntime(gsse);
        
        return oid;
    

    private final String userPrincipalName;
    private final SecureString password;
    private final String keytabPath;
    private final boolean enableDebugLogs;
    private LoginContext loginContext;

    /**
     * principalName and password.
     *
     * @param userPrincipalName user principal name
     * @param password password for user
     * @param enableDebugLogs if @code true enables kerberos debug logs
     */
    public SpnegoHttpClientConfigCallbackHandler(final String userPrincipalName, final SecureString password,
            final boolean enableDebugLogs) 
        this.userPrincipalName = userPrincipalName;
        this.password = password;
        this.keytabPath = null;
        this.enableDebugLogs = enableDebugLogs;
    

    /**
     * principalName and keytab.
     *
     * @param userPrincipalName User principal name
     * @param keytabPath path to keytab file for user
     * @param enableDebugLogs if @code true enables kerberos debug logs
     */
    public SpnegoHttpClientConfigCallbackHandler(final String userPrincipalName, final String keytabPath, final boolean enableDebugLogs) 
        this.userPrincipalName = userPrincipalName;
        this.keytabPath = keytabPath;
        this.password = null;
        this.enableDebugLogs = enableDebugLogs;
    

    @Override
    public HttpAsyncClientBuilder customizeHttpClient(HttpAsyncClientBuilder httpClientBuilder) 
        setupSpnegoAuthSchemeSupport(httpClientBuilder);
        return httpClientBuilder;
    

    private void setupSpnegoAuthSchemeSupport(HttpAsyncClientBuilder httpClientBuilder) 
        final Lookup<AuthSchemeProvider> authSchemeRegistry = RegistryBuilder.<AuthSchemeProvider>create()
                .register(AuthSchemes.SPNEGO, new SPNegoSchemeFactory()).build();

        final GSSManager gssManager = GSSManager.getInstance();
        try 
            final GSSName gssUserPrincipalName = gssManager.createName(userPrincipalName, GSSName.NT_USER_NAME);
            login();
            final AccessControlContext acc = AccessController.getContext();
            final GSSCredential credential = doAsPrivilegedWrapper(loginContext.getSubject(),
                    (PrivilegedExceptionAction<GSSCredential>) () -> gssManager.createCredential(gssUserPrincipalName,
                            GSSCredential.DEFAULT_LIFETIME, SPNEGO_OID, GSSCredential.INITIATE_ONLY),
                    acc);

            final KerberosCredentialsProvider credentialsProvider = new KerberosCredentialsProvider();
            credentialsProvider.setCredentials(
                    new AuthScope(AuthScope.ANY_HOST, AuthScope.ANY_PORT, AuthScope.ANY_REALM, AuthSchemes.SPNEGO),
                    new KerberosCredentials(credential));
            httpClientBuilder.setDefaultCredentialsProvider(credentialsProvider);
         catch (GSSException e) 
            throw new RuntimeException(e);
         catch (PrivilegedActionException e) 
            throw new RuntimeException(e.getCause());
        
        /** 2022-08-16 update options : java.io.IOException:listener timeout after waiting for [xxxxx] ms start **/
        // httpClientBuilder.setKeepAliveStrategy((httpResponse,httpContext) -> Duration.ofMinutes(5).toMillis());
        // 时间的不同设置
        // httpClientBuilder.setKeepAliveStrategy((httpResponse,httpContext) -> TimeUnit.MINUTES.toMillis(3));
        // httpClientBuilder.setDefaultIOReactorConfig(IOReactorConfig.custom().setSoKeepAlive(true).build());
        /** 2022-08-16 update options : java.io.IOException:listener timeout after waiting for [xxxxx] ms end **/

        httpClientBuilder.setDefaultAuthSchemeRegistry(authSchemeRegistry);
    

    /**
     * If logged in @link LoginContext is not available, it attempts login and
     * returns @link LoginContext
     *
     * @return @link LoginContext
     * @throws PrivilegedActionException
     */
    public synchronized LoginContext login() throws PrivilegedActionException 
        if (this.loginContext == null) 
            AccessController.doPrivileged((PrivilegedExceptionAction<Void>) () -> 
                final Subject subject = new Subject(false, Collections.singleton(new KerberosPrincipal(userPrincipalName)),
                        Collections.emptySet(), Collections.emptySet());
                Configuration conf = null;
                final CallbackHandler callback;
                if (password != null) 
                    conf = new PasswordJaasConf(userPrincipalName, enableDebugLogs);
                    callback = new KrbCallbackHandler(userPrincipalName, password);
                 else 
                    conf = new KeytabJaasConf(userPrincipalName, keytabPath, enableDebugLogs);
                    callback = null;
                
                loginContext = new LoginContext(CRED_CONF_NAME, subject, callback, conf);
                loginContext.login();
                return null;
            );
        
        return loginContext;
    

    /**
     * Privileged Wrapper that invokes action with Subject.doAs to perform work as
     * given subject.
     *
     * @param subject @link Subject to be used for this work
     * @param action @link PrivilegedExceptionAction action for performing inside
     *            Subject.doAs
     * @param acc the @link AccessControlContext to be tied to the specified
     *            subject and action see
     *            @link Subject#doAsPrivileged(Subject, PrivilegedExceptionAction, AccessControlContext)
     * @return the value returned by the PrivilegedExceptionAction's run method
     * @throws PrivilegedActionException
     */
    static <T> T doAsPrivilegedWrapper(final Subject subject, final PrivilegedExceptionAction<T> action, final AccessControlContext acc)
            throws PrivilegedActionException 
        try 
            return AccessController.doPrivileged((PrivilegedExceptionAction<T>) () -> Subject.doAsPrivileged(subject, action, acc));
         catch (PrivilegedActionException pae) 
            if (pae.getCause() instanceof PrivilegedActionException) 
                throw (PrivilegedActionException) pae.getCause();
            
            throw pae;
        
    

    /**
     * This class matches @link AuthScope and based on that returns
     * @link Credentials. Only supports @link AuthSchemes#SPNEGO in
     * @link AuthScope#getScheme()
     */
    private static class KerberosCredentialsProvider implements CredentialsProvider 
        private AuthScope authScope;
        private Credentials credentials;

        @Override
        public void setCredentials(AuthScope authscope, Credentials credentials) 
            if (authscope.getScheme().regionMatches(true, 0, AuthSchemes.SPNEGO, 0, AuthSchemes.SPNEGO.length()) == false) 
                throw new IllegalArgumentException("Only " + AuthSchemes.SPNEGO + " auth scheme is supported in AuthScope");
            
            this.authScope = authscope;
            this.credentials = credentials;
        

        @Override
        public Credentials getCredentials(AuthScope authscope) 
            assert this.authScope != null && authscope != null;
            return authscope.match(this.authScope) > -1 ? this.credentials : null;
        

        @Override
        public void clear() 
            this.authScope = null;
            this.credentials = null;
        
    

    /**
     * Jaas call back handler to provide credentials.
     */
    private static class KrbCallbackHandler implements CallbackHandler 
        private final String principal;
        private final SecureString password;

        KrbCallbackHandler(final String principal, final SecureString password) 
            this.principal = principal;
            this.password = password;
        

        public void handle(final Callback[] callbacks) throws IOException, UnsupportedCallbackException 
            for (Callback callback : callbacks) 
                if (callback instanceof PasswordCallback) 
                    PasswordCallback pc = (PasswordCallback) callback;
                    if (pc.getPrompt().contains(principal)) 
                        pc.setPassword(password.getChars());
                        break;
                    
                
            
        
    

    /**
     * Usually we would have a JAAS configuration file for login configuration.
     * Instead of an additional file setting as we do not want the options to be
     * customizable we are constructing it in memory.
     * <p>
     * As we are using this instead of jaas.conf, this requires refresh of
     * @link Configuration and reqires appropriate security permissions to do so.
     */
    private static class PasswordJaasConf extends AbstractJaasConf 

        PasswordJaasConf(final String userPrincipalName, final boolean enableDebugLogs) 
            super(userPrincipalName, enableDebugLogs);
        

        public void addOptions(final Map<String, String> options) 
            options.put("useTicketCache", Boolean.FALSE.toString());
            options.put("useKeyTab", Boolean.FALSE.toString());
        
    

    /**
     * Usually we would have a JAAS configuration file for login configuration. As
     * we have static configuration except debug flag, we are constructing in
     * memory. This avoids additional configuration required from the user.
     * <p>
     * As we are using this instead of jaas.conf, this requires refresh of
     * @link Configuration and requires appropriate security permissions to do so.
     */
    private static class KeytabJaasConf extends AbstractJaasConf 
        private final String keytabFilePath;

        KeytabJaasConf(final String userPrincipalName, final String keytabFilePath, final boolean enableDebugLogs) 
            super(userPrincipalName, enableDebugLogs);
            this.keytabFilePath = keytabFilePath;
        

        public void addOptions(final Map<String, String> options) 
            options.put("useKeyTab", Boolean.TRUE.toString());
            options.put("keyTab", keytabFilePath);
            options.put("doNotPrompt", Boolean.TRUE.toString());
        

    

    private abstract static class AbstractJaasConf extends Configuration 
        private final String userPrincipalName;
        private final boolean enableDebugLogs;

        AbstractJaasConf(final String userPrincipalName, final boolean enableDebugLogs) 
            this.userPrincipalName = userPrincipalName;
            this.enableDebugLogs = enableDebugLogs;
        

        @Override
        public AppConfigurationEntry[] getAppConfigurationEntry(final String name) 
            final Map<String, String> options = new HashMap<>();
            options.put("principal", userPrincipalName);
            options.put("isInitiator", Boolean.TRUE.toString());
            options.put("storeKey", Boolean.TRUE.toString());
            options.put("debug", Boolean.toString(enableDebugLogs));
            addOptions(options);
            return new AppConfigurationEntry[]  new AppConfigurationEntry(SUN_KRB5_LOGIN_MODULE,
                    AppConfigurationEntry.LoginModuleControlFlag.REQUIRED, Collections.unmodifiableMap(options)) ;
        

        abstract void addOptions(Map<String, String> options);
    

以上是关于Java连接ES的多种方式的主要内容,如果未能解决你的问题,请参考以下文章

elasticsearch系列七:ES Java客户端-Elasticsearch Java client(ES Client 简介Java REST ClientJava ClientSpri(代码

K8S 日志收集:ES 集群安装

es工作原理及如何构建集群

Test

ES实现模糊搜索

java读取ES配置生成ES管理类,获取ES连接