Skip to content

Commit 809b5b7

Browse files
authored
ECPTRAFFIC-1376: Update traffic filter docs to remove traffic filter inconsistency (#2063)
Updated the documentation for using traffic filters with remote connections that stated that traffic filters cannot be used with API key auth. This is incorrect and left users with no option given that TLS Certificates are deprecated and traffic filters are not enforced for that auth method anyway. I also added clarification for the region TLS cert callout in the event there is confusion with that only being relevant for TLS Certificate auth (deprecated). Ticket: https://elasticco.atlassian.net/browse/ECPTRAFFIC-1376
1 parent f8586c4 commit 809b5b7

File tree

6 files changed

+5
-11
lines changed

6 files changed

+5
-11
lines changed

deploy-manage/remote-clusters/ec-enable-ccs.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,15 +58,13 @@ The steps, information, and authentication method required to configure CCS and
5858
Traffic filtering isn’t supported for cross-cluster operations initiated from an {{ece}} environment to a remote {{ech}} deployment.
5959
::::
6060

61-
API key authentication for remote clusters cannot be used in combination with traffic filtering.
62-
63-
For remote clusters configured using TLS certificate authentication, [traffic filtering](../security/traffic-filtering.md) can be enabled to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.
61+
You can enable [traffic filtering](../security/traffic-filtering.md) to restrict access to deployments used as a local or remote cluster, without impacting cross-cluster search or cross-cluster replication.
6462

6563
Traffic filtering for remote clusters supports 2 methods:
6664

6765
* [Filtering by IP addresses and Classless Inter-Domain Routing (CIDR) masks](../security/ip-traffic-filtering.md)
6866
* Filtering by Organization or {{es}} cluster ID with a Remote cluster type filter. You can configure this type of filter from the **Security** > **Traffic filters** page of your organization or using the [{{ecloud}} RESTful API](https://www.elastic.co/docs/api/doc/cloud) and apply it from each deployment’s **Security** page.
6967

7068
::::{note}
71-
When setting up traffic filters for a remote connection to an {{ece}} environment, you also need to upload the region’s TLS certificate of the local cluster to the {{ece}} environment’s proxy. You can find that region’s TLS certificate in the **Security** page of any deployment of the environment initiating the remote connection.
69+
When setting up traffic filters for a remote connection to an {{ece}} environment, you also need to upload the region’s TLS certificate of the local cluster to the {{ece}} environment’s proxy. You can find that region’s TLS certificate in the **Security** page of any deployment of the environment initiating the remote connection. This is regardless of whether you are using API key or TLS Certificates (deprecated) to authenticate remote connections.
7270
::::

deploy-manage/remote-clusters/ec-remote-cluster-ece.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,6 @@ If you run into any issues, refer to [Troubleshooting](/troubleshoot/elasticsear
3939
### Prerequisites and limitations [ec_prerequisites_and_limitations_3]
4040

4141
* The local and remote deployments must be on {{stack}} 8.14 or later.
42-
* API key authentication can’t be used in combination with traffic filters.
4342
* Contrary to the certificate security model, the API key security model does not require that both local and remote clusters trust each other.
4443

4544

deploy-manage/remote-clusters/ec-remote-cluster-other-ess.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,6 @@ If you run into any issues, refer to [Troubleshooting](/troubleshoot/elasticsear
4242
### Prerequisites and limitations [ec_prerequisites_and_limitations_2]
4343

4444
* The local and remote deployments must be on {{stack}} 8.14 or later.
45-
* API key authentication can’t be used in combination with traffic filters.
4645
* Contrary to the certificate security model, the API key security model does not require that both local and remote clusters trust each other.
4746

4847

@@ -239,4 +238,4 @@ The response will include just the remote clusters from the same {{ecloud}} orga
239238

240239
## Configure roles and users [ec_configure_roles_and_users_2]
241240

242-
To use a remote cluster for {{ccr}} or {{ccs}}, you need to create user roles with [remote indices privileges](../users-roles/cluster-or-deployment-auth/role-structure.md#roles-remote-indices-priv) on the local cluster. Refer to [Configure roles and users](remote-clusters-api-key.md#remote-clusters-privileges-api-key).
241+
To use a remote cluster for {{ccr}} or {{ccs}}, you need to create user roles with [remote indices privileges](../users-roles/cluster-or-deployment-auth/role-structure.md#roles-remote-indices-priv) on the local cluster. Refer to [Configure roles and users](remote-clusters-api-key.md#remote-clusters-privileges-api-key).

deploy-manage/remote-clusters/ec-remote-cluster-same-ess.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,6 @@ If you run into any issues, refer to [Troubleshooting](/troubleshoot/elasticsear
4242
### Prerequisites and limitations [ec_prerequisites_and_limitations]
4343

4444
* The local and remote deployments must be on {{stack}} 8.14 or later.
45-
* API key authentication can’t be used in combination with traffic filters.
4645
* Contrary to the certificate security model, the API key security model does not require that both local and remote clusters trust each other.
4746

4847

deploy-manage/remote-clusters/ec-remote-cluster-self-managed.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,6 @@ If you run into any issues, refer to [Troubleshooting](/troubleshoot/elasticsear
3939
### Prerequisites and limitations [ec_prerequisites_and_limitations_4]
4040

4141
* The local and remote deployments must be on {{stack}} 8.14 or later.
42-
* API key authentication can’t be used in combination with traffic filters.
4342
* Contrary to the certificate security model, the API key security model does not require that both local and remote clusters trust each other.
4443

4544

@@ -321,4 +320,4 @@ The response will include just the remote clusters from the same {{ecloud}} orga
321320

322321
## Configure roles and users [ec_configure_roles_and_users_4]
323322

324-
To use a remote cluster for {{ccr}} or {{ccs}}, you need to create user roles with [remote indices privileges](../users-roles/cluster-or-deployment-auth/role-structure.md#roles-remote-indices-priv) on the local cluster. Refer to [Configure roles and users](remote-clusters-api-key.md#remote-clusters-privileges-api-key).
323+
To use a remote cluster for {{ccr}} or {{ccs}}, you need to create user roles with [remote indices privileges](../users-roles/cluster-or-deployment-auth/role-structure.md#roles-remote-indices-priv) on the local cluster. Refer to [Configure roles and users](remote-clusters-api-key.md#remote-clusters-privileges-api-key).

deploy-manage/remote-clusters/ece-enable-ccs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,5 +73,5 @@ Traffic filtering for remote clusters supports 2 methods:
7373
* Filtering by Organization or {{es}} cluster ID with a Remote cluster type filter. You can configure this type of filter from the **Platform** > **Security** page of your environment or using the [{{ece}} API](https://www.elastic.co/docs/api/doc/cloud-enterprise) and apply it from each deployment’s **Security** page.
7474

7575
::::{note}
76-
When setting up traffic filters for a remote connection to an {{ece}} environment, you also need to upload the region’s TLS certificate of the local cluster to the {{ece}} environment’s proxy. You can find that region’s TLS certificate in the **Security** page of any deployment of the environment initiating the remote connection.
76+
When setting up traffic filters for a remote connection to an {{ece}} environment, you also need to upload the region’s TLS certificate of the local cluster to the {{ece}} environment’s proxy. You can find that region’s TLS certificate in the **Security** page of any deployment of the environment initiating the remote connection. This is regardless of whether you are using API key or TLS Certificates (deprecated) to authenticate remote connections. This applies regardless of whether you are using API key or TLS Certificates (deprecated) to authenticate remote connections.
7777
::::

0 commit comments

Comments
 (0)