Skip to content

Commit 4dd58fb

Browse files
committed
fixing internal links and added temp anchors back
1 parent 494da67 commit 4dd58fb

File tree

7 files changed

+38
-11
lines changed

7 files changed

+38
-11
lines changed

deploy-manage/deploy/cloud-on-k8s/k8s-kibana-advanced-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ If you already looked at the [Elasticsearch on ECK](elasticsearch-configuration.
1212

1313
* [Customize the Pod configuration](#k8s-kibana-pod-configuration)
1414
* [Customize the product configuration](#k8s-kibana-configuration)
15-
* [Manage HTTP settings](k8s-kibana-http-configuration.md)
15+
* [Manage HTTP settings](/deploy-manage/security/secure-http-communications.md#k8s-kibana-http-configuration)
1616
* [Use secure settings](k8s-kibana-secure-settings.md)
1717
* [Install {{kib}} plugins](k8s-kibana-plugins.md)
1818

deploy-manage/deploy/cloud-on-k8s/kibana-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ The following sections describe how to customize a {{kib}} deployment to suit yo
2222
* [Scaling out a {{kib}} deployment](k8s-kibana-advanced-configuration.md#k8s-kibana-scaling)
2323

2424
* [Secure settings](k8s-kibana-secure-settings.md)
25-
* [HTTP Configuration](k8s-kibana-http-configuration.md)
25+
* [HTTP Configuration](/deploy-manage/security/secure-http-communications.md#k8s-kibana-http-configuration)
2626

2727
* [Load balancer settings and TLS SANs](/deploy-manage/security/secure-http-communications.md#k8s-kibana-http-publish)
2828
* [Provide your own certificate](/deploy-manage/security/secure-http-communications.md#k8s-kibana-http-custom-tls)

deploy-manage/security/install-stack-demo-secure.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16,15 +16,15 @@ Since {{stack}} 8.0, security is enabled by default, meaning that traffic betwee
1616

1717
For traffic to be encrypted between {{es}} cluster nodes and between {{kib}} and {{es}}, SSL certificates must be created for the transport ({{es}} inter-node communication) and HTTP (for the {{es}} REST API) layers. Similarly, when setting up {{fleet-server}} you’ll generate and configure a new certificate bundle, and then {{elastic-agent}} uses the generated certificates to communicate with both {{fleet-server}} and {{es}}. The process to set things up is as follows:
1818

19-
* [Prerequisites and assumptions](secure-your-cluster-deployment.md#install-stack-demo-secure-prereqs)
20-
* [Step 1: Generate a new self-signed CA certificate](secure-your-cluster-deployment.md#install-stack-demo-secure-ca)
21-
* [Step 2: Generate a new certificate for the transport layer](secure-your-cluster-deployment.md#install-stack-demo-secure-transport)
22-
* [Step 3: Generate new certificate(s) for the HTTP layer](secure-your-cluster-deployment.md#install-stack-demo-secure-http)
23-
* [Step 4: Configure security on additional {{es}} nodes](secure-your-cluster-deployment.md#install-stack-demo-secure-second-node)
24-
* [Step 5: Generate server-side and client-side certificates for {{kib}}](secure-your-cluster-deployment.md#install-stack-demo-secure-kib-es)
25-
* [Step 6: Install {{fleet}} with SSL certificates configured](secure-your-cluster-deployment.md#install-stack-demo-secure-fleet)
26-
* [Step 7: Install {{agent}}](secure-your-cluster-deployment.md#install-stack-demo-secure-agent)
27-
* [Step 8: View your system data](secure-your-cluster-deployment.md#install-stack-demo-secure-view-data)
19+
* [Prerequisites and assumptions](#install-stack-demo-secure-prereqs)
20+
* [Step 1: Generate a new self-signed CA certificate](#install-stack-demo-secure-ca)
21+
* [Step 2: Generate a new certificate for the transport layer](#install-stack-demo-secure-transport)
22+
* [Step 3: Generate new certificate(s) for the HTTP layer](#install-stack-demo-secure-http)
23+
* [Step 4: Configure security on additional {{es}} nodes](#install-stack-demo-secure-second-node)
24+
* [Step 5: Generate server-side and client-side certificates for {{kib}}](#install-stack-demo-secure-kib-es)
25+
* [Step 6: Install {{fleet}} with SSL certificates configured](#install-stack-demo-secure-fleet)
26+
* [Step 7: Install {{agent}}](#install-stack-demo-secure-agent)
27+
* [Step 8: View your system data](#install-stack-demo-secure-view-data)
2828

2929
It should take between one and two hours to complete these steps.
3030

deploy-manage/security/secure-cluster-communications.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ mapped_urls:
1414
% TODO: what to do about this page that doesn't exist
1515
% * [/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-security.md](/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-security.md)
1616

17+
$$$encrypt-internode-communication$$$
18+
$$$generate-certificates$$$
19+
1720

1821
# Secure cluster communications
1922

deploy-manage/security/secure-http-communications.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ mapped_urls:
1818
% Internal links rely on the following IDs being on this page (e.g. as a heading ID, paragraph ID, etc):
1919

2020
$$$configuring-tls-browser-kib$$$
21+
$$$encrypt-http-communication$$$
22+
2123
% Weird redirect in current system, not sure what to do
2224

2325
# Secure HTTP communications

deploy-manage/security/secure-your-cluster-deployment.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,26 @@ applies_to:
99

1010
# Secure your cluster or deployment
1111

12+
$$$install-stack-demo-secure-agent$$$
13+
14+
$$$install-stack-demo-secure-ca$$$
15+
16+
$$$install-stack-demo-secure-fleet$$$
17+
18+
$$$install-stack-demo-secure-http$$$
19+
20+
$$$install-stack-demo-secure-kib-es$$$
21+
22+
$$$install-stack-demo-secure-prereqs$$$
23+
24+
$$$install-stack-demo-secure-second-node$$$
25+
26+
$$$install-stack-demo-secure-transport$$$
27+
28+
$$$install-stack-demo-secure-view-data$$$
29+
30+
$$$security-configure-settings$$$
31+
1232

1333
Protecting your {{es}} cluster and the data it contains is of utmost importance. Implementing a defense in depth strategy provides multiple layers of security to help safeguard your system.
1434

deploy-manage/security/using-kibana-with-security.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ mapped_urls:
66
- https://www.elastic.co/guide/en/kibana/current/using-kibana-with-security.html
77
---
88

9+
$$$kibana-roles$$$
10+
911
# Configure security in {{kib}} [using-kibana-with-security]
1012

1113
When you start {{es}} for the first time, {{stack-security-features}} are enabled on your cluster and TLS is configured automatically. The security configuration process generates a password for the `elastic` user and an enrollment token for {{kib}}. [Start the {{stack}} with security enabled](/deploy-manage/security/security-certificates-keys.md) and then enroll {{kib}} as part of the configuration process.

0 commit comments

Comments
 (0)