You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{eck}} auto-generates credentials for the `elastic` user and other users. These credentials are stored in Kubernetes Secrets and are labeled with `eck.k8s.elastic.co/credentials=true`.
You can force the auto-generated credentials to be regenerated with new values by deleting the appropriate Secret. For example, to change the password for the `elastic` user from the [quickstart example](/deploy-manage/deploy/cloud-on-k8s/elasticsearch-deployment-quickstart.md), use the following command:
This command regenerates auto-generated credentials of **all** {{stack}} applications in the namespace.
73
77
::::
74
78
79
+
### Controlling the length of auto-generated passwords
80
+
```{applies_to}
81
+
eck: ga 2.2
82
+
```
83
+
84
+
:::{note}
85
+
The ability to control the length of passwords for [file-based credentials](/deploy-manage/users-roles/cluster-or-deployment-auth/file-based.md) generated by {{eck}} requires an Enterprise license.
86
+
:::
87
+
88
+
You can control the length of generated file-based passwords in {{eck}} installations by setting either `config.policies.passwords.length` in your Helm chart values or `password-length` in the `elastic-operator` `ConfigMap` when installing with YAML manifests. Refer to the [operator configuration documentation](../../deploy/cloud-on-k7s/configure-eck.md) for details on managing these settings.
89
+
90
+
Changing these values does not update existing passwords. To rotate current credentials, refer to the [rotating credentials documentation](#k7s-rotate-credentials)
91
+
75
92
## Creating custom users
76
93
77
94
{{eck}} provides functionality to facilitate custom user creation through various authentication realms. You can create users using the native realm, file realm, or external authentication methods.
@@ -99,18 +116,3 @@ For more information, refer to [External authentication](/deploy-manage/users-ro
99
116
ECK facilitates file-based role management through Kubernetes secrets containing the roles specification. Alternatively, you can use the Role management API or the Role management UI in {{kib}}.
100
117
101
118
Refer to [Managing custom roles](/deploy-manage/users-roles/cluster-or-deployment-auth/defining-roles.md#managing-custom-roles) for details and ECK based examples.
102
-
103
-
## Controlling the length of ECK-generated passwords
104
-
```{applies_to}
105
-
eck: ga 3.2
106
-
```
107
-
108
-
:::{note}
109
-
The ability to control the length of passwords for [file-based credentials](/deploy-manage/users-roles/cluster-or-deployment-auth/file-based.md) generated by {{eck}} requires an Enterprise license.
110
-
:::
111
-
112
-
You can control the length of generated file-based passwords in {{eck}} installations by setting either `config.policies.passwords.length` in your Helm chart values or `password-length` in the `elastic-operator` `ConfigMap` when installing with YAML manifests. Refer to the [operator configuration documentation](../../deploy/cloud-on-k8s/configure-eck.md) for details on managing these settings.
113
-
114
-
:::{note}
115
-
Changing these values does not update existing passwords. To rotate current credentials, refer to the [rotating credentials documentation](#k8s-rotate-credentials)
0 commit comments