Skip to content

Commit 80b8390

Browse files
committed
changes related to subs=true
1 parent 9ef75ba commit 80b8390

34 files changed

+91
-92
lines changed

deploy-manage/deploy/cloud-on-k8s/install-using-yaml-manifest-quickstart.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To deploy the ECK operator:
3939

4040
1. Install Elastic's [custom resource definitions](https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/) with [`create`](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_create/):
4141

42-
```sh
42+
```sh subs=true
4343
kubectl create -f https://download.elastic.co/downloads/eck/{{eck_version}}/crds.yaml
4444
```
4545

@@ -58,7 +58,7 @@ To deploy the ECK operator:
5858
5959
2. Using [`kubectl apply`](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_apply/), install the operator with its RBAC rules:
6060
61-
```sh
61+
```sh subs=true
6262
kubectl apply -f https://download.elastic.co/downloads/eck/{{eck_version}}/operator.yaml
6363
```
6464

deploy-manage/deploy/cloud-on-k8s/k8s-openshift-deploy-operator.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ This page shows the installation steps to deploy ECK in Openshift:
1212

1313
1. Apply the manifests the same way as described in [](./install-using-yaml-manifest-quickstart.md) document:
1414

15-
```shell
15+
```shell subs=true
1616
oc create -f https://download.elastic.co/downloads/eck/{{eck_version}}/crds.yaml
1717
oc apply -f https://download.elastic.co/downloads/eck/{{eck_version}}/operator.yaml
1818
```

deploy-manage/deploy/cloud-on-k8s/k8s-service-mesh-istio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The operator itself must be connected to the service mesh to deploy and manage E
3535

3636
2. Install ECK:
3737

38-
```sh
38+
```sh subs=true
3939
kubectl create -f https://download.elastic.co/downloads/eck/{{eck_version}}/crds.yaml
4040
kubectl apply -f https://download.elastic.co/downloads/eck/{{eck_version}}/operator.yaml
4141
```

deploy-manage/deploy/cloud-on-k8s/k8s-service-mesh-linkerd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ These instructions have been tested with Linkerd 2.7.0.
1919

2020
In order to connect the operator to the service mesh, Linkerd sidecar must be injected into the ECK deployment. This can be done during installation as follows:
2121

22-
```sh
22+
```sh subs=true
2323
kubectl create -f https://download.elastic.co/downloads/eck/{{eck_version}}/crds.yaml
2424
linkerd inject https://download.elastic.co/downloads/eck/{{eck_version}}/operator.yaml | kubectl apply -f -
2525
```

deploy-manage/deploy/self-managed.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
mapped_pages:
33
- https://www.elastic.co/guide/en/elasticsearch/reference/current/dependencies-versions.html
4-
sub:
5-
stack-version: "9.0.0"
64
applies_to:
75
deployment:
86
self:

deploy-manage/deploy/self-managed/_snippets/ca-cert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
If your library doesn’t support a method of validating the fingerprint, the auto-generated CA certificate is created in the following directory on each {{es}} node:
22

3-
```sh
3+
```sh subs=true
44
{{es-conf}}{{slash}}certs{{slash}}http_ca.crt
55
```
66

deploy-manage/deploy/self-managed/_snippets/ca-fingerprint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,6 @@ openssl x509 -fingerprint -sha256 -in config/certs/http_ca.crt
99
The command returns the security certificate, including the fingerprint. The `issuer` should be `{{es}} security auto-configuration HTTP CA`.
1010

1111
```sh
12-
issuer= /CN={{es}} security auto-configuration HTTP CA
12+
issuer= /CN=Elasticsearch security auto-configuration HTTP CA
1313
SHA256 Fingerprint=<fingerprint>
1414
```

deploy-manage/deploy/self-managed/_snippets/check-es-running.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
You can test that your {{es}} node is running by sending an HTTPS request to port `9200` on `localhost`:
22

3-
```sh
3+
```sh subs=true
44
curl --cacert {{es-conf}}{{slash}}certs{{slash}}http_ca.crt {{escape}} <1>
55
-u elastic:$ELASTIC_PASSWORD https://localhost:9200 <2>
66
```

deploy-manage/deploy/self-managed/_snippets/cmd-line-config.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,14 @@
22

33
```sh subs=true
44
{{es-conf}}{{slash}}elasticsearch.yml
5+
```
56

67
The format of this config file is explained in [](/deploy-manage/deploy/self-managed/configure-elasticsearch.md).
78

89
Any settings that can be specified in the config file can also be specified on the command line, using the `-E` syntax as follows:
910

10-
```sh
11-
.\bin\elasticsearch.bat -Ecluster.name=my_cluster -Enode.name=node_1
11+
```sh subs=true
12+
.{{slash}}bin{{slash}}elasticsearch{{auto}} -Ecluster.name=my_cluster -Enode.name=node_1
1213
```
1314

1415
:::{note}

deploy-manage/deploy/self-managed/_snippets/connect-clients.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
When you start {{es}} for the first time, TLS is configured automatically for the HTTP layer. A CA certificate is generated and stored on disk at:
55

6-
```sh
6+
```sh subs=true
77
{{es-conf}}{{slash}}certs{{slash}}http_ca.crt
88
```
99

0 commit comments

Comments
 (0)