You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/deploy/cloud-on-k8s/elasticsearch-configuration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Before deploying and running ECK in production, review the basic and advanced se
22
22
*[Node configuration](node-configuration.md): Configure the `elasticsearch.yml` of your {{es}} nodes.
23
23
*[Volume claim templates](volume-claim-templates.md): Configure storage in your {{es}} nodes.
24
24
*[Virtual memory](virtual-memory.md): Methods to accomplish {{es}} virtual memory system configuration requirement.
25
-
*[Secure settings](/deploy-manage/security/secure-settings.md): Configure the {{es}} keystore through Kubernetes secrets.
25
+
*[Secure settings](/deploy-manage/security/k8s-secure-settings.md): Configure the {{es}} keystore through Kubernetes secrets.
26
26
*[Settings managed by ECK](settings-managed-by-eck.md): List of {{es}} settings that you shouldn't update.
27
27
*[Custom configuration files and plugins](custom-configuration-files-plugins.md): Add extra configuration files or install plugins to your {{es}} nodes.
28
28
*[Init containers for plugin downloads](init-containers-for-plugin-downloads.md): Use Kubernetes init containers to install plugins before starting {{es}}.
Copy file name to clipboardExpand all lines: deploy-manage/security.md
+6-9Lines changed: 6 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,6 @@ The documentation is organized into three main areas.
88
88
As part of your overall security strategy, you can also do the following:
89
89
90
90
* Prevent unauthorized access with [password protection and role-based access control](/deploy-manage/users-roles.md).
91
-
* Maintain an [audit trail](/deploy-manage/security/logging-configuration/security-event-audit-logging.md) for security-related events.
92
91
* Control access to dashboards and other saved objects in your UI using [Spaces](/deploy-manage/manage-spaces.md).
93
92
* Connect a local cluster to a [remote cluster](/deploy-manage/remote-clusters.md) to enable [cross-cluster replication](/deploy-manage/tools/cross-cluster-replication.md) and [cross-cluster search](/solutions/search/cross-cluster-search.md).
94
93
* Manage [API keys](/deploy-manage/api-keys.md) used for programmatic access to Elastic.
@@ -107,14 +106,14 @@ serverless: all
107
106
108
107
Elastic Cloud has built-in security. For example, HTTPS communications between Elastic Cloud and the internet, as well as inter-node communications, are secured automatically, and cluster data is encrypted at rest.
109
108
110
-
You can augment Elastic Cloud security features in the following ways:
111
-
* Configure [traffic filtering](./security/traffic-filtering.md) to prevent unauthorized access to your deployments. [Elastic Cloud Hosted]
112
-
* Encrypt your deployment with a [customer-managed encryption key](./security/encrypt-deployment-with-customer-managed-encryption-key.md). [Elastic Cloud Hosted]
113
-
* [Secure your settings](./security/secure-settings.md) using {{es}} and {{kib}} keystores. [Elastic Cloud Hosted]
109
+
In {{ech}}, you can augment these security features in the following ways:
110
+
* Configure [traffic filtering](./security/traffic-filtering.md) to prevent unauthorized access to your deployments.
111
+
* Encrypt your deployment with a [customer-managed encryption key](./security/encrypt-deployment-with-customer-managed-encryption-key.md).
112
+
* [Secure your settings](./security/secure-settings.md) using {{es}} and {{kib}} keystores.
114
113
* Use the list of [Elastic Cloud static IPs](./security/elastic-cloud-static-ips.md) to allow or restrict communications in your infrastructure.
115
114
116
115
::::{note}
117
-
While serverless projects are fully managed and secured by Elastic, additional security settings are available for you to configure individually for your {{ech}} deployments.
116
+
Serverless projects are fully managed and secured by Elastic, and do not have any configurable security features at the project level.
118
117
::::
119
118
120
119
Refer to [Elastic Cloud security](https://www.elastic.co/cloud/security) for more details about Elastic security and privacy programs.
@@ -172,10 +171,8 @@ deployment:
172
171
173
172
### Allow or deny Elastic Cloud IP ranges
174
173
```yaml {applies_to}
175
-
serverless: all
176
174
deployment:
177
175
ess: all
178
-
```
179
176
180
177
Elastic Cloud publishes a list of IP addresses used by its services for both incoming and outgoing traffic. Users can use these lists to configure their network firewalls as needed to allow or restrict traffic related to Elastic Cloud services.
181
178
@@ -208,7 +205,7 @@ If you’re using Elastic Cloud Hosted, then you can reinforce this mechanism by
208
205
::::{note}
209
206
Other deployment types don’t implement encryption at rest out of the box. For self-managed clusters, to implement encryption at rest, the hosts running the cluster must be configured with disk-level encryption, such as `dm-crypt`. In addition, snapshot targets must ensure that data is encrypted at rest as well.
210
207
211
-
Configuring `dm-crypt` or similar technologies is outside the scope of this document, and issues related to disk encryption are outside the scope of support.
208
+
Configuring `dm-crypt` or similar technologies is outside the scope of this documentation, and issues related to disk encryption are outside the scope of support.
0 commit comments