Skip to content

Commit 582bebe

Browse files
committed
linting fixes
1 parent 8f7b12f commit 582bebe

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

deploy-manage/remote-clusters/_snippets/eck_rcs_enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
By default, the remote cluster server interface is disabled on ECK-managed clusters. To use the API key–based security model for cross-cluster connections, you must first enable it on the remote {{es}} cluster:
1+
By default, the remote cluster server interface is deactivated on ECK-managed clusters. To use the API key–based security model for cross-cluster connections, you must first enable it on the remote {{es}} cluster:
22

33
```yaml subs=true
44
apiVersion: elasticsearch.k8s.elastic.co/v1

deploy-manage/remote-clusters/_snippets/eck_rcs_retrieve_ca.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
The certificate authority (CA) used by ECK to issue certificates for the remote cluster server interface is stored in the `ca.crt` key of the secret named `<cluster_name>-es-transport-certs-public`.
22

3-
If the external connections reach the {{es}} Pods on port `9443` without any intermediate TLS termination, you need to retrieve this CA because it will be required in the local cluster configuration to establish trust.
3+
If the external connections reach the {{es}} Pods on port `9443` without any intermediate TLS termination, you need to retrieve this CA because it is required in the local cluster configuration to establish trust.
44

55
If TLS is terminated by any intermediate component and the certificate presented is not the ECK-managed one, use the CA associated with that component, or omit the CA entirely if it uses a publicly trusted certificate.
66

0 commit comments

Comments
 (0)