Skip to content

Commit 2468cc7

Browse files
committed
wajiha feedback
1 parent 0566b5e commit 2468cc7

File tree

2 files changed

+16
-14
lines changed

2 files changed

+16
-14
lines changed

deploy-manage/security/secure-cluster-communications.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,12 @@ mapped_pages:
44
- https://www.elastic.co/guide/en/elasticsearch/reference/current/security-basic-setup.html
55
- https://www.elastic.co/guide/en/kibana/current/elasticsearch-mutual-tls.html
66
applies_to:
7+
serverless:
78
deployment:
89
self:
910
eck:
1011
ece:
12+
ess:
1113
products:
1214
- id: elasticsearch
1315
- id: kibana

deploy-manage/security/set-up-basic-security.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -47,28 +47,28 @@ When you manually set up transport TLS, you can choose from the following CA opt
4747

4848
You can use the `elasticsearch-certutil` tool to generate a CA for your cluster. Using `elasticsearch-certutil` guarantees that your certificates meet {{es}} certificate requirements and security best practices.
4949

50-
1. Before starting {{es}}, use the `elasticsearch-certutil` tool on any single node to generate a CA for your cluster.
50+
1. Before starting {{es}}, generate the CA:
51+
1. Use the `elasticsearch-certutil` tool on any single node to generate a CA for your cluster.
5152

5253
```shell
5354
./bin/elasticsearch-certutil ca
5455
```
5556

56-
1. When prompted, accept the default file name, which is `elastic-stack-ca.p12`. This file contains the public certificate for your CA and the private key used to sign certificates for each node.
57-
2. Enter a password for your CA. You can choose to leave the password blank if you’re not deploying to a production environment.
57+
2. When prompted, accept the default file name, which is `elastic-stack-ca.p12`. This file contains the public certificate for your CA and the private key used to sign certificates for each node.
58+
3. Enter a password for your CA. You can choose to leave the password blank if you’re not deploying to a production environment.
5859

59-
2. On any single node, generate a certificate and private key for the nodes in your cluster. You include the `elastic-stack-ca.p12` output file that you generated in the previous step.
60+
2. Generate the certificate:
61+
1. On any single node, generate a certificate and private key for the nodes in your cluster. Include the `elastic-stack-ca.p12` output file that you generated in the previous step.
6062

61-
```shell
62-
./bin/elasticsearch-certutil cert --ca elastic-stack-ca.p12
63-
```
64-
65-
`--ca <ca_file>`
66-
: Name of the CA file used to sign your certificates. The default file name from the `elasticsearch-certutil` tool is `elastic-stack-ca.p12`.
63+
```shell
64+
./bin/elasticsearch-certutil cert --ca elastic-stack-ca.p12 <1>
65+
```
66+
1. The `--ca` flag must contain the name of the CA file used to sign your certificates. The default file name from the `elasticsearch-certutil` tool is `elastic-stack-ca.p12`.
6767

68-
1. Enter the password for your CA, or press **Enter** if you did not configure one in the previous step.
69-
2. Create a password for the certificate and accept the default file name.
68+
2. Enter the password for your CA, or press **Enter** if you did not configure one in the previous step.
69+
3. Create a password for the certificate and accept the default file name.
7070

71-
The output file is a keystore named `elastic-certificates.p12`. This file contains a node certificate, node key, and CA certificate.
71+
The output file is a keystore named `elastic-certificates.p12`. This file contains a node certificate, node key, and CA certificate.
7272

7373

7474
### Provide certificates from an external CA [external-ca]
@@ -86,7 +86,7 @@ The transport networking layer is used for internal communication between nodes
8686

8787
Now that you’ve obtained your certificates, you’ll update your cluster to use these files.
8888

89-
These steps assume that you [generated a CA and certificates](#generate-certificates) using `elasticsearch-certutil`. The `xpack.security.transport.ssl` settings that you need to set differ if you're using a certificate generated with an external CA. Refer to [Transport TLS/SSL settings](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#transport-tls-ssl-settings) full list of available settings.
89+
These steps assume that you [generated a CA and certificates](#generate-certificates) using `elasticsearch-certutil`. The `xpack.security.transport.ssl` settings that you need to set differ if you're using a certificate generated with an external CA. Refer to [Transport TLS/SSL settings](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#transport-tls-ssl-settings) for a full list of available settings.
9090

9191
::::{note}
9292
{{es}} monitors all files such as certificates, keys, keystores, or truststores that are configured as values of TLS-related node settings. If you update any of these files, such as when your hostnames change or your certificates are due to expire, {{es}} reloads them. The files are polled for changes at a frequency determined by the global {{es}} `resource.reload.interval.high` setting, which defaults to 5 seconds.

0 commit comments

Comments
 (0)