Skip to content

Commit 0ff93d9

Browse files
Merge branch 'main' into tbs-config-discard-on-write
2 parents 201df71 + 25bae93 commit 0ff93d9

File tree

240 files changed

+4348
-2540
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

240 files changed

+4348
-2540
lines changed

.github/workflows/doc-preview-comment.yml

Lines changed: 0 additions & 77 deletions
This file was deleted.

.github/workflows/docs-build.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ jobs:
1616
deployments: write
1717
id-token: write
1818
contents: read
19-
pull-requests: read
19+
pull-requests: write

.github/workflows/label-community-issues.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,17 @@ jobs:
1212
contents: read
1313

1414
steps:
15+
# Adding this step for debug purposes
16+
# If this works as expected, we can simplify this workflow
17+
# and replace it with the `check-membership` step
18+
- name: Check organization membership (test)
19+
run: echo "${{ github.event.issue.author_association == 'MEMBER' }}"
1520
- name: Check organization membership
1621
id: check-membership
1722
uses: actions/github-script@v7
1823
with:
1924
github-token: ${{ secrets.ORG_MEMBER_READ_TOKEN }}
25+
result-encoding: string
2026
script: |
2127
const issueAuthor = '${{ github.event.issue.user.login }}';
2228
const orgName = 'elastic';
@@ -55,4 +61,4 @@ jobs:
5561
labels: ['community']
5662
});
5763
58-
console.log(`Added "community" label to issue by ${issueAuthor}`);
64+
console.log(`Added "community" label to issue by ${issueAuthor}`);

cloud-account/multifactor-authentication.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106,4 +106,12 @@ The only secure and recommended approach is to use one Elastic account for each
106106

107107
For now, you will need to answer an MFA challenge on every login, but we are working on adding a **Trust this device** option, which will "silence" the MFA challenge for one month per user session.
108108

109+
**Can I use multiple email addresses for MFA?**
110+
111+
No, only one email address can be used for MFA verification. In alignment with security best practices, Elastic Cloud is designed to use only one designated email address for MFA purposes. This email is used to send your one-time verification codes during login. If you need to update your MFA email address, review [Update your email address](update-your-email-address.md) for more information.
112+
113+
114+
115+
116+
109117

deploy-manage/api-keys/elasticsearch-api-keys.md

Lines changed: 27 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Several types of {{es}} API keys exist:
1515
* **Cross-cluster** API key: allows other clusters to connect to this cluster.
1616
* **Managed** API key: created and managed by {{kib}} to run background tasks.
1717

18-
To manage API keys in {{kib}}, go to the **API Keys** management page using the navigation menu or the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md).
18+
To manage API keys in {{kib}}, go to **Management > Stack Management > API Keys** from the navigation menu or use the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md).
1919

2020
![API Keys UI](/deploy-manage/images/kibana-api-keys.png "")
2121

@@ -33,23 +33,41 @@ To manage roles, go to the **Roles** management page using the navigation menu o
3333

3434
## Create an API key [create-api-key]
3535

36-
To create an API key, go to the **API Keys** management page using the navigation menu or the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md), and select **Create API key**.
36+
Two methods are available to create an API key:
3737

38-
![Create API Key UI](/deploy-manage/images/kibana-create-ccr-api-key.png "")
38+
* As a quick option to create a personal API key from anywhere in {{kib}}:
39+
1. From the **Help menu** (![help icon](/deploy-manage/images/help-icon.svg)), select **Connection details > API key**.
40+
1. Give the key a name.
41+
1. Select **Create API key**.
42+
43+
Your personal API key is created with a default expiration of 90 days from the time of creation. You can manage the key from the **API Keys** page.
3944

40-
Refer to the [Create API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-api-key) documentation to learn more about creating user API keys.
45+
* To create a personal or cross-cluster API key with configurable options, go to **Management > Stack Management > API Keys** from the navigation menu or use the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md), and select **Create API key**.
4146

42-
Refer to the [Create cross-cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) documentation to learn more about creating cross-cluster API keys.
47+
![Create API Key UI](/deploy-manage/images/kibana-create-user-api-key.png "")
4348

49+
1. Choose to create either a user or a cross-cluster API key.
50+
2. Optionally, set an expiry date. By default the API key will not expire, but it's a good security practice to give the key a limited lifespan.
51+
3. Configure access:
52+
* For a user API key, you can opt to configure access to specific {{es}} APIs and resources by assigning the key with predefined roles or custom privileges. Refer to [Defining roles](/deploy-manage/users-roles/cluster-or-deployment-auth/defining-roles.md) and the [Create API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-api-key) API documentation to learn more.
53+
* For a cross-cluster API key, you can control the indices that other clusters have access to. Refer to the [Create cross-cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) API documentation to learn more.
54+
4. Add any additional metadata about the API as one or more key-value pairs. Refer to the [Create API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-api-key) API documentation for examples.
4455

4556
## Update an API key [update-api-key]
4657

47-
To update an API key, go to the **API Keys** management page using the navigation menu or the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md), and then click on the name of the key. You cannot update the name or the type of API key.
58+
To update an API key, go to **Management > Stack Management > API Keys** from the navigation menu or use the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md), and then click on the name of the key. You cannot update the name or the type of an API key.
4859

49-
Refer to the [Update API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-update-api-key) documentation to learn more about updating user API keys.
50-
51-
Refer to the [Update cross-cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-update-cross-cluster-api-key) documentation to learn more about updating cross-cluster API keys.
60+
* For a user API key, you can update:
61+
* The API key's access to {{es}} APIs and resources.
62+
* The metadata associated with the key.
63+
64+
Refer to the [Update API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-update-api-key) API documentation to learn more.
5265

66+
* For a cross-cluster API key, you can update:
67+
* The indices that other clusters have access to.
68+
* The metadata associated with the key.
69+
70+
Refer to the [Update cross-cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-update-cross-cluster-api-key) API documentation to learn more.
5371

5472
## View and delete API keys [view-api-keys]
5573

deploy-manage/api-keys/serverless-project-api-keys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,9 +46,9 @@ API keys are intended for programmatic access. Don’t use API keys to authentic
4646

4747

4848

49-
### Restrict privileges [api-keys-restrict-privileges]
49+
### Control security privileges [api-keys-restrict-privileges]
5050

51-
When you create or update an API key, use **Restrict privileges** to limit the permissions. Define the permissions using a JSON `role_descriptors` object, where you specify one or more roles and the associated privileges.
51+
When you create or update an API key, use **Control security privileges** to configure access to specific {{es}} APIs and resources. Define the permissions using a JSON `role_descriptors` object, where you specify one or more roles and the associated privileges.
5252

5353
For example, the following `role_descriptors` object defines a `books-read-only` role that limits the API key to `read` privileges on the `books` index.
5454

deploy-manage/autoscaling/autoscaling-in-ece-and-ech.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Currently, autoscaling behavior is as follows:
4343
* **Data tiers**
4444

4545
* Each {{es}} [data tier](../../manage-data/lifecycle/data-tiers.md) scales upward based on the amount of available storage. When we detect more storage is needed, autoscaling will scale up each data tier independently to ensure you can continue and ingest more data to your hot and content tier, or move data to the warm, cold, or frozen data tiers.
46-
* In addition to scaling up existing data tiers, a new data tier will be automatically added when necessary, based on your [index lifecycle management policies](https://www.elastic.co/guide/en/cloud-enterprise/current/ece-configure-index-management.html).
46+
* In addition to scaling up existing data tiers, a new data tier will be automatically added when necessary, based on your [index lifecycle management policies](/manage-data/lifecycle/index-lifecycle-management.md).
4747
* To control the maximum size of each data tier and ensure it will not scale above a certain size, you can use the maximum size per zone field.
4848
* Autoscaling based on memory or CPU, as well as autoscaling downward, is not currently supported. In case you want to adjust the size of your data tier to add more memory or CPU, or in case you deleted data and want to scale it down, you can set the current size per zone of each data tier manually.
4949

deploy-manage/cloud-organization/billing/billing-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ $$$faq-included$$$What is included in my paid {{ech}} deployment?
9999

100100
* Free 1GB RAM {{kib}} instance
101101
* Free 1GB RAM Machine Learning node
102-
* Free 1GB RAM APM server
102+
* Free 1GB RAM APM / Integrations Server instance
103103
* A free allowance for [data transfer and snapshot storage costs](#faq-dts)
104104

105105
Note that if you go above the free tier of Kibana/ML/APM (for example, a 2GB {{kib}} instance), you will be charged in full for the size of that instance.

deploy-manage/cloud-organization/billing/security-billing-dimensions.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,7 @@ Logs, events, alerts, and configuration data ingested into your security project
7070

7171
For more details about {{elastic-sec}} serverless project rates and billable assets, refer to Cloud Protection in the [{{ecloud}} pricing table](https://cloud.elastic.co/cloud-pricing-table?productType=serverless&project=security).
7272

73-
% Note: Commenting out this section until this is ready to be published.
7473

75-
% ## Elastic-managed LLM
74+
## Elastic Managed LLM
7675

77-
% The default LLM enables you to leverage AI-powered search as a service without deploying a model in your serverless project. It's configured by default to use with the Security AI Assistant, Attack Discovery, and other applicable AI features as a part of your "Complete" tier subscription. Using the default LLM will use tokens and incur related token-based add-on billing for your serverless project.
76+
The default [Elastic Managed LLM](kibana://reference/connectors-kibana/elastic-managed-llm.md) enables you to leverage AI-powered search as a service without deploying a model in your serverless project. It's configured by default to use with the Security AI Assistant, Attack Discovery, and other applicable AI features as a part of your "Complete" tier subscription. Using the default LLM will use tokens and incur related token-based add-on billing for your serverless project.

deploy-manage/deploy/cloud-enterprise/add-custom-bundles-plugins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ In this example, we assume the Identity Provider does not publish its SAML metad
184184
185185
## Example: Custom JVM trust store bundle [ece-add-custom-bundle-example-cacerts]
186186
187-
If you are using SSL certificates signed by non-public certificate authorities, {{es}} is not able to communicate with the services using those certificates unless you import a custom JVM trust store containing the certificates of your signing authority into your {{ece}} installation. You’ll need the trust store to access snapshot repositories like Minio, for your {{ece}} proxy, or to reindex from remote.
187+
If you are using SSL certificates signed by non-public certificate authorities, {{es}} is not able to communicate with the services using those certificates unless you import a custom JVM trust store containing the certificates of your signing authority into your {{ece}} installation. You’ll need the trust store to access snapshot repositories like MinIO, for your {{ece}} proxy, or to reindex from remote.
188188
189189
To import a JVM trust store:
190190

0 commit comments

Comments
 (0)