You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/security/install-stack-demo-secure.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,15 +16,15 @@ Since {{stack}} 8.0, security is enabled by default, meaning that traffic betwee
16
16
17
17
For traffic to be encrypted between {{es}} cluster nodes and between {{kib}} and {{es}}, SSL certificates must be created for the transport ({{es}} inter-node communication) and HTTP (for the {{es}} REST API) layers. Similarly, when setting up {{fleet-server}} you’ll generate and configure a new certificate bundle, and then {{elastic-agent}} uses the generated certificates to communicate with both {{fleet-server}} and {{es}}. The process to set things up is as follows:
18
18
19
-
*[Prerequisites and assumptions](secure-your-cluster-deployment.md#install-stack-demo-secure-prereqs)
20
-
*[Step 1: Generate a new self-signed CA certificate](secure-your-cluster-deployment.md#install-stack-demo-secure-ca)
21
-
*[Step 2: Generate a new certificate for the transport layer](secure-your-cluster-deployment.md#install-stack-demo-secure-transport)
22
-
*[Step 3: Generate new certificate(s) for the HTTP layer](secure-your-cluster-deployment.md#install-stack-demo-secure-http)
23
-
*[Step 4: Configure security on additional {{es}} nodes](secure-your-cluster-deployment.md#install-stack-demo-secure-second-node)
24
-
*[Step 5: Generate server-side and client-side certificates for {{kib}}](secure-your-cluster-deployment.md#install-stack-demo-secure-kib-es)
25
-
*[Step 6: Install {{fleet}} with SSL certificates configured](secure-your-cluster-deployment.md#install-stack-demo-secure-fleet)
Copy file name to clipboardExpand all lines: deploy-manage/security/secure-your-cluster-deployment.md
+20Lines changed: 20 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,26 @@ applies_to:
9
9
10
10
# Secure your cluster or deployment
11
11
12
+
$$$install-stack-demo-secure-agent$$$
13
+
14
+
$$$install-stack-demo-secure-ca$$$
15
+
16
+
$$$install-stack-demo-secure-fleet$$$
17
+
18
+
$$$install-stack-demo-secure-http$$$
19
+
20
+
$$$install-stack-demo-secure-kib-es$$$
21
+
22
+
$$$install-stack-demo-secure-prereqs$$$
23
+
24
+
$$$install-stack-demo-secure-second-node$$$
25
+
26
+
$$$install-stack-demo-secure-transport$$$
27
+
28
+
$$$install-stack-demo-secure-view-data$$$
29
+
30
+
$$$security-configure-settings$$$
31
+
12
32
13
33
Protecting your {{es}} cluster and the data it contains is of utmost importance. Implementing a defense in depth strategy provides multiple layers of security to help safeguard your system.
# Configure security in {{kib}} [using-kibana-with-security]
10
12
11
13
When you start {{es}} for the first time, {{stack-security-features}} are enabled on your cluster and TLS is configured automatically. The security configuration process generates a password for the `elastic` user and an enrollment token for {{kib}}. [Start the {{stack}} with security enabled](/deploy-manage/security/security-certificates-keys.md) and then enroll {{kib}} as part of the configuration process.
0 commit comments