Skip to content

Commit 28b1bec

Browse files
Apply suggestions from code review
Co-authored-by: shainaraskas <[email protected]>
1 parent 4b1b789 commit 28b1bec

File tree

2 files changed

+7
-10
lines changed

2 files changed

+7
-10
lines changed

deploy-manage/deploy/cloud-on-k8s/elasticsearch-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Before deploying and running ECK in production, review the basic and advanced se
2222
* [Node configuration](node-configuration.md): Configure the `elasticsearch.yml` of your {{es}} nodes.
2323
* [Volume claim templates](volume-claim-templates.md): Configure storage in your {{es}} nodes.
2424
* [Virtual memory](virtual-memory.md): Methods to accomplish {{es}} virtual memory system configuration requirement.
25-
* [Secure settings](/deploy-manage/security/secure-settings.md): Configure the {{es}} keystore through Kubernetes secrets.
25+
* [Secure settings](/deploy-manage/security/k8s-secure-settings.md): Configure the {{es}} keystore through Kubernetes secrets.
2626
* [Settings managed by ECK](settings-managed-by-eck.md): List of {{es}} settings that you shouldn't update.
2727
* [Custom configuration files and plugins](custom-configuration-files-plugins.md): Add extra configuration files or install plugins to your {{es}} nodes.
2828
* [Init containers for plugin downloads](init-containers-for-plugin-downloads.md): Use Kubernetes init containers to install plugins before starting {{es}}.

deploy-manage/security.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,6 @@ The documentation is organized into three main areas.
8888
As part of your overall security strategy, you can also do the following:
8989

9090
* Prevent unauthorized access with [password protection and role-based access control](/deploy-manage/users-roles.md).
91-
* Maintain an [audit trail](/deploy-manage/security/logging-configuration/security-event-audit-logging.md) for security-related events.
9291
* Control access to dashboards and other saved objects in your UI using [Spaces](/deploy-manage/manage-spaces.md).
9392
* Connect a local cluster to a [remote cluster](/deploy-manage/remote-clusters.md) to enable [cross-cluster replication](/deploy-manage/tools/cross-cluster-replication.md) and [cross-cluster search](/solutions/search/cross-cluster-search.md).
9493
* Manage [API keys](/deploy-manage/api-keys.md) used for programmatic access to Elastic.
@@ -107,14 +106,14 @@ serverless: all
107106
108107
Elastic Cloud has built-in security. For example, HTTPS communications between Elastic Cloud and the internet, as well as inter-node communications, are secured automatically, and cluster data is encrypted at rest.
109108
110-
You can augment Elastic Cloud security features in the following ways:
111-
* Configure [traffic filtering](./security/traffic-filtering.md) to prevent unauthorized access to your deployments. [Elastic Cloud Hosted]
112-
* Encrypt your deployment with a [customer-managed encryption key](./security/encrypt-deployment-with-customer-managed-encryption-key.md). [Elastic Cloud Hosted]
113-
* [Secure your settings](./security/secure-settings.md) using {{es}} and {{kib}} keystores. [Elastic Cloud Hosted]
109+
In {{ech}}, you can augment these security features in the following ways:
110+
* Configure [traffic filtering](./security/traffic-filtering.md) to prevent unauthorized access to your deployments.
111+
* Encrypt your deployment with a [customer-managed encryption key](./security/encrypt-deployment-with-customer-managed-encryption-key.md).
112+
* [Secure your settings](./security/secure-settings.md) using {{es}} and {{kib}} keystores.
114113
* Use the list of [Elastic Cloud static IPs](./security/elastic-cloud-static-ips.md) to allow or restrict communications in your infrastructure.
115114
116115
::::{note}
117-
While serverless projects are fully managed and secured by Elastic, additional security settings are available for you to configure individually for your {{ech}} deployments.
116+
Serverless projects are fully managed and secured by Elastic, and do not have any configurable security features at the project level.
118117
::::
119118
120119
Refer to [Elastic Cloud security](https://www.elastic.co/cloud/security) for more details about Elastic security and privacy programs.
@@ -172,10 +171,8 @@ deployment:
172171
173172
### Allow or deny Elastic Cloud IP ranges
174173
```yaml {applies_to}
175-
serverless: all
176174
deployment:
177175
ess: all
178-
```
179176

180177
Elastic Cloud publishes a list of IP addresses used by its services for both incoming and outgoing traffic. Users can use these lists to configure their network firewalls as needed to allow or restrict traffic related to Elastic Cloud services.
181178

@@ -208,7 +205,7 @@ If you’re using Elastic Cloud Hosted, then you can reinforce this mechanism by
208205
::::{note}
209206
Other deployment types don’t implement encryption at rest out of the box. For self-managed clusters, to implement encryption at rest, the hosts running the cluster must be configured with disk-level encryption, such as `dm-crypt`. In addition, snapshot targets must ensure that data is encrypted at rest as well.
210207

211-
Configuring `dm-crypt` or similar technologies is outside the scope of this document, and issues related to disk encryption are outside the scope of support.
208+
Configuring `dm-crypt` or similar technologies is outside the scope of this documentation, and issues related to disk encryption are outside the scope of support.
212209
::::
213210

214211
### Secure your settings

0 commit comments

Comments
 (0)