Skip to content

Commit 51e1b0e

Browse files
committed
extra snippet and refinement
1 parent f7211a0 commit 51e1b0e

File tree

7 files changed

+31
-39
lines changed

7 files changed

+31
-39
lines changed

deploy-manage/remote-clusters/_snippets/apikeys-local-ece-remote-private.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ It requires remote_type substitution to be defined
1818

1919
1. Fill both fields.
2020

21-
* For the **Setting name**, enter the alias of your choice. You will use this alias to connect to the remote cluster later. It must be lowercase and only contain letters, numbers, dashes and underscores.
22-
* For the **Secret**, paste the encoded cross-cluster API key.
21+
* For the **Remote cluster name**, enter the alias of your choice. You will use this alias to connect to the remote cluster later. It must be lowercase and only contain letters, numbers, dashes and underscores.
22+
* For the **Cross-cluster API key**, paste the encoded cross-cluster API key.
2323

2424
2. Click **Add** to save the API key to the keystore.
2525
3. Repeat these steps for each API key you want to add. For example, if you want to use several clusters of the remote environment for CCR or CCS.
2626

27-
8. Add the CA certificate of the remote deployment or cluster.
27+
8. Add the CA certificate of the remote environment.
2828
9. Provide a name for the trusted environment. That name will appear in the trust summary of your deployment's **Security** page.
2929
10. Select **Create trust** to complete the configuration.
3030
11. Restart the local deployment to reload the keystore with its new setting. To do that, go to the deployment's main page, locate the **Actions** menu, and select **Restart {{es}}**.

deploy-manage/remote-clusters/_snippets/apikeys-local-ech-remote-private.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ It requires remote_type substitution to be defined
2424
2. Click **Add** to save the API key to the keystore.
2525
3. Repeat these steps for each API key you want to add. For example, if you want to use several clusters of the remote environment for CCR or CCS.
2626

27-
8. Add the CA certificate of the remote deployment or cluster.
27+
8. Add the CA certificate of the remote environment.
2828
9. Provide a name for the trusted environment. That name will appear in the trust summary of your deployment's **Security** page.
2929
10. Select **Create trust** to complete the configuration.
3030
11. Restart the local deployment to reload the keystore with its new setting. To do that, go to the deployment's main page, locate the **Actions** menu, and select **Restart {{es}}**.
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
Before configuring the local deployment, retrieve the CA certificate of the remote ECE proxy. To find this certificate:
2+
3+
1. In the remote ECE environment, go to **Platform > Settings > TLS certificates**.
4+
2. Select **Show certificate chain** under **Proxy**.
5+
3. Click **Copy root certificate** and paste it into a new file. The root certificate is the last certificate shown in the chain.
6+
7+
:::{image} /deploy-manage/images/cloud-remote-clusters-proxy-certificate.png
8+
:alt: Certificate to copy from the chain
9+
:::
10+
11+
4. Save that file as `.crt`.
12+
13+
You can now proceed to configure the local deployment. The CA file you just saved will be used in one of the following steps.
14+

deploy-manage/remote-clusters/ec-edit-remove-trusted-environment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,13 +72,13 @@ If you need to update the permissions granted by a cross-cluster API key for a r
7272
4. Locate the API key currently used for connecting to the remote cluster, copy its current alias, and delete it.
7373
5. Add the new API key by selecting **Add API key**.
7474

75-
* For the **Setting name**, enter the same alias that was used for the previous key.
75+
* For the **Remote cluster name**, enter the same alias that was used for the previous key.
7676

7777
::::{note}
7878
If you use a different alias, you also need to re-create the remote cluster in {{kib}} with a **Name** that matches the new alias.
7979
::::
8080

81-
* For the **Secret**, paste the encoded cross-cluster API key, then click **Add** to save the API key to the keystore.
81+
* For the **Cross-cluster API key**, paste the encoded cross-cluster API key, then click **Add** to save the API key to the keystore.
8282

8383
6. Restart the local deployment to reload the keystore with its new setting. To do that, go to the deployment’s main page (named after your deployment’s name), locate the **Actions** menu, and select **Restart {{es}}**.<br>
8484

deploy-manage/remote-clusters/ec-remote-cluster-ece.md

Lines changed: 2 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -63,19 +63,8 @@ The steps to follow depend on whether the Certificate Authority (CA) of the remo
6363

6464
::::{dropdown} The CA is private
6565

66-
Before configuring the local deployment, retrieve the CA certificate of the remote {{ece}} environment’s proxy or load-balancing infrastructure. To find this certificate:
67-
68-
1. In the remote {{ece}} environment, go to **Platform > Settings > TLS certificates**.
69-
2. Select **Show certificate chain** under **Proxy**.
70-
3. Click **Copy root certificate** and paste it into a new file. The root certificate is the last certificate shown in the chain.
71-
72-
:::{image} /deploy-manage/images/cloud-remote-clusters-proxy-certificate.png
73-
:alt: Certificate to copy from the chain
74-
:::
75-
76-
4. Save that file as `.crt`.
77-
78-
You can now proceed to configure the local deployment. The CA file you just saved will be used in one of the following steps.
66+
:::{include} _snippets/retrieve-ece-ca.md
67+
:::
7968

8069
:::{include} _snippets/apikeys-local-ech-remote-private.md
8170
:::

deploy-manage/remote-clusters/ece-edit-remove-trusted-environment.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -68,17 +68,17 @@ If you need to update the permissions granted by a cross-cluster API key for a r
6868

6969
1. On the deployment you will use as remote, use the [{{es}} API](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) or [{{kib}}](../api-keys/elasticsearch-api-keys.md) to create a cross-cluster API key with the appropriate permissions. Configure it with access to the indices you want to use for {{ccs}} or {{ccr}}.
7070
2. Copy the encoded key (`encoded` in the response) to a safe location. You will need it in the next steps.
71-
3. Go to the **Security** page of the local deployment and locate the **Remote connections** section.
71+
3. From the navigation menu, select **Security** and locate the **Remote connections** section.
7272
4. Locate the API key currently used for connecting to the remote cluster, copy its current alias, and delete it.
73-
5. Add the new API key by selecting **Add an API key**.
73+
5. Add the new API key by selecting **Add API key**.
7474

75-
* For the **Setting name**, enter the same alias that was used for the previous key.
75+
* For the **Remote cluster name**, enter the same alias that was used for the previous key.
7676

77-
::::{note}
78-
If you use a different alias, you also need to re-create the remote cluster in {{kib}} with a **Name** that matches the new alias.
79-
::::
77+
::::{note}
78+
If you use a different alias, you also need to re-create the remote cluster in {{kib}} with a **Name** that matches the new alias.
79+
::::
8080

81-
* For the **Secret**, paste the encoded cross-cluster API key, then click **Add** to save the API key to the keystore.
81+
* For the **Cross-cluster API key**, paste the encoded cross-cluster API key, then click **Add** to save the API key to the keystore.
8282

8383
6. Restart the local deployment to reload the keystore with its new setting. To do that, go to the deployment’s main page (named after your deployment’s name), locate the **Actions** menu, and select **Restart {{es}}**.<br>
8484

deploy-manage/remote-clusters/ece-remote-cluster-other-ece.md

Lines changed: 2 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -62,19 +62,8 @@ The steps to follow depend on whether the Certificate Authority (CA) of the remo
6262

6363
::::{dropdown} The CA is private
6464

65-
Before configuring the local deployment, retrieve the CA certificate of the remote {{ece}} environment's proxy or load-balancing infrastructure. To find this certificate:
66-
67-
1. In the remote {{ece}} environment, go to **Platform > Settings > TLS certificates**.
68-
2. Select **Show certificate chain** under **Proxy**.
69-
3. Click **Copy root certificate** and paste it into a new file. The root certificate is the last certificate shown in the chain.
70-
71-
:::{image} /deploy-manage/images/cloud-enterprise-remote-clusters-proxy-certificate.png
72-
:alt: Certificate to copy from the chain
73-
:::
74-
75-
4. Save that file as `.crt`.
76-
77-
You can now proceed to configure the local deployment. The CA file you just saved will be used in one of the following steps.
65+
:::{include} _snippets/retrieve-ece-ca.md
66+
:::
7867

7968
:::{include} _snippets/apikeys-local-ece-remote-private.md
8069
:::

0 commit comments

Comments
 (0)