Skip to content

Commit 5fda3ee

Browse files
committed
attempting to present remote cluster filters
1 parent 5cee36a commit 5fda3ee

File tree

10 files changed

+200
-44
lines changed

10 files changed

+200
-44
lines changed

deploy-manage/remote-clusters.md

Lines changed: 50 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,53 @@ Depending on the environment the local and remote clusters are deployed on and t
3434

3535
Find the instructions with details on the supported security models and available connection modes for your specific scenario:
3636

37-
- [Remote clusters with {{ech}}](remote-clusters/ec-enable-ccs.md)
38-
- [Remote clusters with {{ece}}](remote-clusters/ece-enable-ccs.md)
39-
- [Remote clusters with {{eck}}](remote-clusters/eck-remote-clusters.md)
40-
- [Remote clusters with self-managed installations](remote-clusters/remote-clusters-self-managed.md)
37+
- [Remote clusters on {{ech}}](remote-clusters/ec-enable-ccs.md)
38+
- [Remote clusters on {{ece}}](remote-clusters/ece-enable-ccs.md)
39+
- [Remote clusters on {{eck}}](remote-clusters/eck-remote-clusters.md)
40+
- [Remote clusters on self-managed installations](remote-clusters/remote-clusters-self-managed.md)
41+
42+
## Remote clusters and network security [network-security]
43+
```{applies_to}
44+
deployment:
45+
ece: ga
46+
ess: ga
47+
```
48+
49+
In {{ech}} (ECH) and {{ece}} (ECE), the remote clusters functionality interacts with [network security](/deploy-manage/security/network-security.md) traffic filtering rules in different ways, depending on the [security model](/deploy-manage/remote-clusters/remote-clusters-self-managed.md#remote-clusters-security-models) you use.
50+
51+
* **TLS certificate–based authentication (deprecated):**
52+
For remote clusters configured using the TLS certificate–based security model, network security policies or rule sets have no effect on remote clusters functionality. Connections established with this method (mTLS) are already considered secure and are always accepted, regardless of any filtering policies or rule sets applied on the local or remote deployment to restrict other traffic.
53+
54+
* **API key–based authentication (recommended):**
55+
When remote clusters use the API key–based authentication model, network security policies or rule sets on the **destination deployment** do affect remote cluster functionality if enabled. In this case, you can use traffic filters to explicitly control which deployments are allowed to connect to the remote clusters service endpoint.
56+
57+
::::{note}
58+
Because of [how network security works](/deploy-manage/security/network-security.md#how-network-security-works):
59+
* If network security is disabled, all traffic is allowed by default, and remote clusters work without requiring any specific filtering policy.
60+
* If network security is enabled on the remote cluster, apply a [remote cluster filter](/deploy-manage/security/remote-cluster-filtering.md#create-remote-cluster-filter) to allow incoming connections from the local clusters. Without this filter, the connections are blocked.
61+
::::
62+
63+
This section explains how remote clusters interact with network security when using API key–based authentication, and describes the supported use cases.
64+
65+
### Filter types for remote clusters traffic
66+
67+
Traffic filtering for remote clusters incoming connections using API key authentication supports two types of filters:
68+
69+
* [IP-based filters](/deploy-manage/security/ip-filtering.md), which allow traffic based on IP addresses or CIDR ranges. These can be difficult to manage in orchestration environments, where the source IP of individual {{es}} instances may change.
70+
* [Remote cluster filters](/deploy-manage/security/remote-cluster-filtering.md), which allow filtering by Organization or {{es}} cluster ID. This method is more reliable and recommended, as it combines mTLS with API key authentication for stronger security.
71+
72+
### Use cases for remote clusters and network security
73+
74+
Network security is supported to control remote cluster traffic in the following scenarios:
75+
76+
* Local and remote clusters are {{ech}} deployments in the same organization
77+
* Local and remote clusters are {{ech}} deployments in different organizations
78+
* Local and remote clusters are {{ece}} deployments in the same ECE environment
79+
* Local and remote clusters are {{ece}} deployments in different ECE environments
80+
* The local deployment is on {{ech}} and the remote deployment is on an {{ece}} environment
81+
82+
::::{note}
83+
Network security isn’t supported for cross-cluster operations initiated from an {{ece}} environment to a remote {{ech}} deployment.
84+
::::
85+
86+
Refer to [Remote cluster filtering](/deploy-manage/security/remote-cluster-filtering.md) for instructions on creating and applying remote cluster filters in ECH or ECE.

deploy-manage/remote-clusters/ec-enable-ccs.md

Lines changed: 4 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ You can configure an {{ech}} deployment to remotely access or (be accessed by) a
1919
* A deployment in an {{eck}} installation
2020
* A self-managed installation.
2121

22+
::::{note}
23+
Refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security) for details on how remote clusters interact with network security filters and the implications for your deployments.
24+
::::
25+
2226

2327
## Prerequisites [ec-ccs-ccr-prerequisites]
2428

@@ -50,21 +54,3 @@ The steps, information, and authentication method required to configure CCS and
5054
* [From an ECE deployment](ece-remote-cluster-ece-ess.md)
5155
* [From a self-managed cluster](remote-clusters-self-managed.md)
5256
* [From an ECK environment](ec-enable-ccs-for-eck.md)
53-
54-
55-
## Remote clusters and network security [ec-ccs-ccr-network-security]
56-
57-
::::{note}
58-
[Network security](../security/network-security.md) isn’t supported for cross-cluster operations initiated from an {{ece}} environment to a remote {{ech}} deployment.
59-
::::
60-
61-
You can use [network security policies](../security/network-security.md) to restrict access to deployments used as a local or remote cluster, without impacting cross-cluster search or cross-cluster replication.
62-
63-
Network security for remote clusters supports the following methods:
64-
65-
* [Filtering by IP addresses and Classless Inter-Domain Routing (CIDR) masks](../security/ip-filtering.md)
66-
* Filtering by Organization or {{es}} cluster ID with a **Remote cluster** private connection policy. You can configure this type of policy from the **Access and security** > **Network security** page of your organization or using the [{{ecloud}} RESTful API](https://www.elastic.co/docs/api/doc/cloud) and apply it from each deployment’s **Security** page.
67-
68-
::::{note}
69-
When setting up network security policies for a remote connection to an {{ece}} environment, you also need to upload the region’s TLS certificate of the local cluster to the {{ece}} environment’s proxy. You can find that region’s TLS certificate in the **Security** page of any deployment of the environment initiating the remote connection. This is regardless of whether you are using API key or TLS Certificates (deprecated) to authenticate remote connections.
70-
::::

deploy-manage/remote-clusters/ec-remote-cluster-ece.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,10 @@ products:
1414

1515
This section explains how to configure a deployment to connect remotely to clusters belonging to an {{ECE}} (ECE) environment.
1616

17+
::::{note}
18+
If network security filters are applied to the remote cluster on ECE, the remote cluster administrator must configure a [remote cluster security filter](/deploy-manage/security/remote-cluster-filtering.md), using either the organization ID or the Elasticsearch cluster ID of the local ECH cluster as the filtering criteria. For detailed instructions, refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security).
19+
::::
20+
1721
## Allow the remote connection [ec_allow_the_remote_connection_3]
1822

1923
Before you start, consider the security model that you would prefer to use for authenticating remote connections between clusters, and follow the corresponding steps.
@@ -143,7 +147,7 @@ A deployment can be configured to trust all or specific deployments in a remote
143147

144148
7. Provide a name for the trusted environment. That name will appear in the trust summary of your deployment’s **Security** page.
145149
8. Select **Create trust** to complete the configuration.
146-
9. Configure the corresponding deployments of the ECE environment to [trust this deployment](/deploy-manage/remote-clusters/ece-enable-ccs.md). You will only be able to connect two deployments successfully when both of them trust each other.
150+
9. Configure the corresponding deployments of the ECE environment to [trust this deployment](/deploy-manage/remote-clusters/ece-remote-cluster-ece-ess.md#ece-trust-ec). You will only be able to connect two deployments successfully when both of them trust each other.
147151

148152
::::{note}
149153
The environment ID and cluster IDs must be entered fully and correctly. For security reasons, verification of the IDs is not possible. If cross-environment trust does not appear to be working, double-checking the IDs is a good place to start.

deploy-manage/remote-clusters/ec-remote-cluster-other-ess.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ products:
1414
This section explains how to configure a deployment to connect remotely to clusters belonging to a different {{ecloud}} organization.
1515

1616
::::{note}
17-
If network security policies are applied to the remote cluster, the remote cluster administrator must configure a private connection policy of type remote cluster, using either the organization ID or the Elasticsearch cluster ID as the filtering criteria. For detailed instructions, refer to [Remote clusters and network security](/deploy-manage/remote-clusters/ec-enable-ccs.md#ec-ccs-ccr-network-security).
17+
If network security policies are applied to the remote cluster, the remote cluster administrator must configure a [private connection policy of type remote cluster](/deploy-manage/security/remote-cluster-filtering.md), using either the organization ID or the Elasticsearch cluster ID of the local cluster as the filtering criteria. For detailed instructions, refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security).
1818
::::
1919

2020
## Allow the remote connection [ec_allow_the_remote_connection_2]

deploy-manage/remote-clusters/ec-remote-cluster-same-ess.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ products:
1414
This section explains how to configure a deployment to connect remotely to clusters belonging to the same {{ecloud}} organization.
1515

1616
::::{note}
17-
If network security is enabled on the remote cluster, the remote cluster administrator must configure a private connection policy of type **Remote cluster**, specifying either the organization ID or the Elasticsearch cluster ID. For detailed instructions, refer to [Remote clusters and network security](/deploy-manage/remote-clusters/ec-enable-ccs.md#ec-ccs-ccr-network-security).
17+
If network security policies are applied to the remote cluster, the remote cluster administrator must configure a [private connection policy of type remote cluster](/deploy-manage/security/remote-cluster-filtering.md), using either the organization ID or the Elasticsearch cluster ID of the local cluster as the filtering criteria. For detailed instructions, refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security).
1818
::::
1919

2020
## Allow the remote connection [ec_allow_the_remote_connection]

deploy-manage/remote-clusters/ece-enable-ccs.md

Lines changed: 4 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ You can configure an {{ece}} deployment to remotely access or (be accessed by) a
1919
* A deployment running on an {{eck}} installation
2020
* A self-managed installation
2121

22+
$$$ece-ccs-ccr-network-security$$$
23+
::::{note}
24+
Refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security) for details on how remote clusters interact with network security filters and the implications for your deployments.
25+
::::
2226

2327
## Prerequisites [ece-ccs-ccr-prerequisites]
2428

@@ -56,22 +60,3 @@ The steps, information, and authentication method required to configure CCS and
5660
* [From an {{ech}} deployment](/deploy-manage/remote-clusters/ec-remote-cluster-ece.md)
5761
* [From a self-managed cluster](/deploy-manage/remote-clusters/remote-clusters-self-managed.md)
5862
* [From an ECK environment](ece-enable-ccs-for-eck.md)
59-
60-
61-
## Remote clusters and network security [ece-ccs-ccr-network-security]
62-
63-
::::{note}
64-
Network security isn’t supported for cross-cluster operations initiated from an {{ece}} environment to a remote {{ech}} deployment.
65-
::::
66-
67-
68-
For remote clusters configured using TLS certificate authentication, [network security](../security/network-security.md) can be enabled to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.
69-
70-
Traffic filtering for remote clusters supports two methods:
71-
72-
* [Filtering by IP addresses and Classless Inter-Domain Routing (CIDR) masks](../security/ip-filtering-ece.md)
73-
* Filtering by Organization or {{es}} cluster ID with a Remote cluster type filter. You can configure this type of filter from the **Platform** > **Security** page of your environment or using the [{{ece}} API](https://www.elastic.co/docs/api/doc/cloud-enterprise) and apply it from each deployment’s **Security** page.
74-
75-
::::{note}
76-
When setting up traffic filters for a remote connection to an {{ece}} environment, you also need to upload the region’s TLS certificate of the local cluster to the {{ece}} environment’s proxy. You can find that region’s TLS certificate in the **Security** page of any deployment of the environment initiating the remote connection. This is regardless of whether you are using API key or TLS Certificates (deprecated) to authenticate remote connections. This applies regardless of whether you are using API key or TLS Certificates (deprecated) to authenticate remote connections.
77-
::::

deploy-manage/remote-clusters/ece-remote-cluster-ece-ess.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,13 @@ products:
1414

1515
This section explains how to configure a deployment to connect remotely to clusters belonging to an {{ecloud}} organization.
1616

17+
::::{note}
18+
* [Network security](../security/network-security.md) policies are not supported for cross-cluster operations from an {{ece}} environment to a remote {{ech}} deployment when using the API key–based authentication model.
19+
20+
* If you configure remote clusters with the deprecated TLS certificate–based authentication model, connections work regardless of network security policies on the remote deployment.
21+
22+
For more information, refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security).
23+
::::
1724

1825
## Allow the remote connection [ece_allow_the_remote_connection_3]
1926

deploy-manage/security/network-security.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ You can also allow traffic to or from a [remote cluster](/deploy-manage/remote-c
4444
| Filter type | Description | Applicable deployment types |
4545
| --- | --- | --- |
4646
| [IP filters](ip-filtering.md) | Filter traffic from the public internet by allowlisting specific IP addresses and Classless Inter-Domain Routing (CIDR) masks.<br><br>• [In {{serverless-short}} or ECH](/deploy-manage/security/ip-filtering-cloud.md)<br><br>• [In ECE](/deploy-manage/security/ip-filtering-ece.md)<br><br>• [In ECK or self-managed](/deploy-manage/security/ip-filtering-basic.md) | {{serverless-short}}, ECH, ECE, ECK, and self-managed clusters |
47+
| [Remote cluster filters](./remote-cluster-filtering.md) | Filter incoming remote cluster traffic by validating the client certificate against its `organization_id` and `cluster_id`.<br><br> It does not support ECE -> ECH traffic. | ECH, ECE |
4748
| [Private connectivity and VPC filtering](/deploy-manage/security/private-connectivity.md) | Establish private connections between {{es}} and other resources hosted by the same cloud provider using private link services, and further secure these connections using VPC filtering. Choose the relevant option for your region:<br><br>• AWS regions: [AWS PrivateLink](/deploy-manage/security/private-connectivity-aws.md)<br><br>• Azure regions: [Azure Private Link](/deploy-manage/security/private-connectivity-azure.md)<br><br>• GCP regions: [GCP Private Service Connect](/deploy-manage/security/private-connectivity-gcp.md) | {{ech}} only |
4849
| [Kubernetes network policies](/deploy-manage/security/k8s-network-policies.md) | Isolate pods by restricting incoming and outgoing network connections to a trusted set of sources and destinations. | {{eck}} only |
4950

0 commit comments

Comments
 (0)