Skip to content

Conversation

rhr323
Copy link
Contributor

@rhr323 rhr323 commented Oct 13, 2025

...draft...

@prodsecmachine
Copy link
Collaborator

prodsecmachine commented Oct 13, 2025

Snyk checks have passed. No issues have been found so far.

Status Scanner Critical High Medium Low Total (0)
Licenses 0 0 0 0 0 issues
Open Source Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@rhr323 rhr323 added >docs Documentation exclude-from-release-notes Exclude this PR from appearing in the release notes v3.2.0 labels Oct 13, 2025
Copy link

github-actions bot commented Oct 13, 2025


#### User Password Generation (Enterprise feature)

ECK will now generate longer passwords by default for the administrative user of each Elasticsearch Cluster. The password is 24 characters in length by default (can be configured to a maximum of 72 characters), incorporating alphabetic and numeric characters, to make password complexity stronger.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
ECK will now generate longer passwords by default for the administrative user of each Elasticsearch Cluster. The password is 24 characters in length by default (can be configured to a maximum of 72 characters), incorporating alphabetic and numeric characters, to make password complexity stronger.
ECK will now generate longer passwords by default for the administrative user of each Elasticsearch cluster. The password is 24 characters in length by default (can be configured to a maximum of 72 characters), incorporating alphabetic and numeric characters, to make password complexity stronger.


#### Automatic pod disruption budget (Enterprise feature)

ECK now offers better out-of-the-box pod disruption budgets that automatically keep your cluster available as pods move across nodes. The new policy calculates the number of pods per tier that can sustain replacement and automatically generates a pod-disruption budget for each tier, enabling the Elasticsearch cluster to vacate Kubernetes nodes more quickly, while considering cluster health, without interruption.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
ECK now offers better out-of-the-box pod disruption budgets that automatically keep your cluster available as pods move across nodes. The new policy calculates the number of pods per tier that can sustain replacement and automatically generates a pod-disruption budget for each tier, enabling the Elasticsearch cluster to vacate Kubernetes nodes more quickly, while considering cluster health, without interruption.
ECK now offers better out-of-the-box PodDisruptionBudgets that automatically keep your cluster available as Pods move across nodes. The new policy calculates the number of Pods per tier that can sustain replacement and automatically generates a PodDisruptionBudget for each tier, enabling the Elasticsearch cluster to vacate Kubernetes nodes more quickly, while considering cluster health, without interruption.

We tend to capitalize Kubernetes API object names in the docs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

>docs Documentation exclude-from-release-notes Exclude this PR from appearing in the release notes v3.2.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants