You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cloud-account/multifactor-authentication.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,4 +106,12 @@ The only secure and recommended approach is to use one Elastic account for each
106
106
107
107
For now, you will need to answer an MFA challenge on every login, but we are working on adding a **Trust this device** option, which will "silence" the MFA challenge for one month per user session.
108
108
109
+
**Can I use multiple email addresses for MFA?**
110
+
111
+
No, only one email address can be used for MFA verification. In alignment with security best practices, Elastic Cloud is designed to use only one designated email address for MFA purposes. This email is used to send your one-time verification codes during login. If you need to update your MFA email address, review [Update your email address](update-your-email-address.md) for more information.
Copy file name to clipboardExpand all lines: deploy-manage/api-keys/elastic-cloud-api-keys.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,8 +27,8 @@ These keys provides access to the API that enables you to manage your deployment
27
27
28
28
1. Log in to the [{{ecloud}} Console](https://cloud.elastic.co?page=docs&placement=docs-body).
29
29
2. Go to your avatar in the upper right corner and choose **Organization**.
30
-
3. On the API keys tab of the **Organization** page, click **Create API Key**.
31
-
4.From the **Create API Key**page, you can configure your new key by adding a name, set expiration, or assign [roles](../users-roles/cloud-organization/user-roles.md).
30
+
3. On the **API keys** tab of the **Organization** page, click **Create API key**.
31
+
4.On the **Create API key**flyout, you can configure your new key by adding a name, set expiration, or assign [roles](../users-roles/cloud-organization/user-roles.md).
32
32
33
33
By default, API keys expire after three months. You can set the expiration to a different preset value or to a specific date, up to one year. If you need the key to work indefinitely, you can also set its expiration to Never. In this case, the key won’t expire.
Copy file name to clipboardExpand all lines: deploy-manage/api-keys/elasticsearch-api-keys.md
+27-9Lines changed: 27 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ Several types of {{es}} API keys exist:
15
15
***Cross-cluster** API key: allows other clusters to connect to this cluster.
16
16
***Managed** API key: created and managed by {{kib}} to run background tasks.
17
17
18
-
To manage API keys in {{kib}}, go to the **API Keys**management page using the navigation menu or the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md).
18
+
To manage API keys in {{kib}}, go to **Management > Stack Management > API Keys**from the navigation menu or use the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md).
@@ -33,23 +33,41 @@ To manage roles, go to the **Roles** management page using the navigation menu o
33
33
34
34
## Create an API key [create-api-key]
35
35
36
-
To create an API key, go to the **API Keys** management page using the navigation menu or the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md), and select **Create API key**.
36
+
Two methods are available to create an API key:
37
37
38
-

38
+
* As a quick option to create a personal API key from anywhere in {{kib}}:
39
+
1. From the **Help menu** (), select **Connection details > API key**.
40
+
1. Give the key a name.
41
+
1. Select **Create API key**.
42
+
43
+
Your personal API key is created with a default expiration of 90 days from the time of creation. You can manage the key from the **API Keys** page.
39
44
40
-
Refer to the [Create API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-api-key) documentation to learn more about creating user API keys.
45
+
* To create a personal or cross-cluster API key with configurable options, go to **Management > Stack Management > API Keys** from the navigation menu or use the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md), and select **Create API key**.
41
46
42
-
Refer to the [Create cross-cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) documentation to learn more about creating cross-cluster API keys.
47
+

43
48
49
+
1. Choose to create either a user or a cross-cluster API key.
50
+
2. Optionally, set an expiry date. By default the API key will not expire, but it's a good security practice to give the key a limited lifespan.
51
+
3. Configure access:
52
+
* For a user API key, you can opt to configure access to specific {{es}} APIs and resources by assigning the key with predefined roles or custom privileges. Refer to [Defining roles](/deploy-manage/users-roles/cluster-or-deployment-auth/defining-roles.md) and the [Create API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-api-key) API documentation to learn more.
53
+
* For a cross-cluster API key, you can control the indices that other clusters have access to. Refer to the [Create cross-cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) API documentation to learn more.
54
+
4. Add any additional metadata about the API as one or more key-value pairs. Refer to the [Create API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-api-key) API documentation for examples.
44
55
45
56
## Update an API key [update-api-key]
46
57
47
-
To update an API key, go to the **API Keys**management page using the navigation menu or the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md), and then click on the name of the key. You cannot update the name or the type of API key.
58
+
To update an API key, go to **Management > Stack Management > API Keys**from the navigation menu or use the [global search field](../../explore-analyze/find-and-organize/find-apps-and-objects.md), and then click on the name of the key. You cannot update the name or the type of an API key.
48
59
49
-
Refer to the [Update API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-update-api-key) documentation to learn more about updating user API keys.
50
-
51
-
Refer to the [Update cross-cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-update-cross-cluster-api-key) documentation to learn more about updating cross-cluster API keys.
60
+
* For a user API key, you can update:
61
+
* The API key's access to {{es}} APIs and resources.
62
+
* The metadata associated with the key.
63
+
64
+
Refer to the [Update API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-update-api-key) API documentation to learn more.
52
65
66
+
* For a cross-cluster API key, you can update:
67
+
* The indices that other clusters have access to.
68
+
* The metadata associated with the key.
69
+
70
+
Refer to the [Update cross-cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-update-cross-cluster-api-key) API documentation to learn more.
### Control security privileges [api-keys-restrict-privileges]
50
50
51
-
When you create or update an API key, use **Restrict privileges** to limit the permissions. Define the permissions using a JSON `role_descriptors` object, where you specify one or more roles and the associated privileges.
51
+
When you create or update an API key, use **Control security privileges** to configure access to specific {{es}} APIs and resources. Define the permissions using a JSON `role_descriptors` object, where you specify one or more roles and the associated privileges.
52
52
53
53
For example, the following `role_descriptors` object defines a `books-read-only` role that limits the API key to `read` privileges on the `books` index.
Copy file name to clipboardExpand all lines: deploy-manage/autoscaling/autoscaling-in-ece-and-ech.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Currently, autoscaling behavior is as follows:
43
43
***Data tiers**
44
44
45
45
* Each {{es}} [data tier](../../manage-data/lifecycle/data-tiers.md) scales upward based on the amount of available storage. When we detect more storage is needed, autoscaling will scale up each data tier independently to ensure you can continue and ingest more data to your hot and content tier, or move data to the warm, cold, or frozen data tiers.
46
-
* In addition to scaling up existing data tiers, a new data tier will be automatically added when necessary, based on your [index lifecycle management policies](https://www.elastic.co/guide/en/cloud-enterprise/current/ece-configure-index-management.html).
46
+
* In addition to scaling up existing data tiers, a new data tier will be automatically added when necessary, based on your [index lifecycle management policies](/manage-data/lifecycle/index-lifecycle-management.md).
47
47
* To control the maximum size of each data tier and ensure it will not scale above a certain size, you can use the maximum size per zone field.
48
48
* Autoscaling based on memory or CPU, as well as autoscaling downward, is not currently supported. In case you want to adjust the size of your data tier to add more memory or CPU, or in case you deleted data and want to scale it down, you can set the current size per zone of each data tier manually.
Copy file name to clipboardExpand all lines: deploy-manage/cloud-organization/billing/billing-faq.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,7 @@ $$$faq-included$$$What is included in my paid {{ech}} deployment?
99
99
100
100
* Free 1GB RAM {{kib}} instance
101
101
* Free 1GB RAM Machine Learning node
102
-
* Free 1GB RAM APM server
102
+
* Free 1GB RAM APM / Integrations Server instance
103
103
* A free allowance for [data transfer and snapshot storage costs](#faq-dts)
104
104
105
105
Note that if you go above the free tier of Kibana/ML/APM (for example, a 2GB {{kib}} instance), you will be charged in full for the size of that instance.
Copy file name to clipboardExpand all lines: deploy-manage/cloud-organization/billing/manage-subscription.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,10 +33,11 @@ If, at any time during your monthly subscription with {{ecloud}}, you decide you
33
33
To change your subscription level:
34
34
35
35
1. Log in to the [{{ecloud}} Console](https://cloud.elastic.co?page=docs&placement=docs-body).
36
-
2. Select the user icon on the header bar and select **Billing** from the menu.
37
-
3. On the **Overview** page, select **Update subscription**.
38
-
4. Choose a new subscription level.
39
-
5. Save your changes.
36
+
2. From a deployment or project on the home page, select **Manage**.
37
+
3. From the lower navigation menu, select **Billing and Subscription**.
38
+
4. On the **Overview** page, select **Update subscription**.
39
+
5. Choose a new subscription level.
40
+
6. Save your changes.
40
41
41
42
::::{important}
42
43
* Changing to a higher subscription level takes place immediately. Moving to a lower subscription level takes effect 30 days after you most recently changed to a higher subscription level. In the interim, you pay the current rate. If you haven’t performed a self-service change in the past 30 days, then the change to the lower subscription level is immediate.
0 commit comments