Skip to content

Commit 913b811

Browse files
committed
little formatting thingies
1 parent da366d6 commit 913b811

9 files changed

+24
-24
lines changed

deploy-manage/remote-clusters/ec-enable-ccs-for-eck.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The first step is to establish trust between the two clusters.
7878

7979

8080

81-
## Setup CCS/R [ec_setup_ccsr]
81+
## Set up CCS/R [ec_setup_ccsr]
8282

8383
Now that trust has been established, you can set up CCS/R from the ECK cluster to the {{ech}} cluster or from the {{ech}} cluster to the ECK cluster.
8484

deploy-manage/remote-clusters/ec-remote-cluster-ece.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,20 +34,20 @@ On the local cluster side, not every local user needs to access every piece of d
3434
If you run into any issues, refer to [Troubleshooting](/troubleshoot/elasticsearch/remote-clusters.md).
3535

3636

37-
#### Prerequisites and limitations [ec_prerequisites_and_limitations_3]
37+
### Prerequisites and limitations [ec_prerequisites_and_limitations_3]
3838

3939
* The local and remote deployments must be on {{stack}} 8.14 or later.
4040
* API key authentication can’t be used in combination with traffic filters.
4141
* Contrary to the certificate security model, the API key security model does not require that both local and remote clusters trust each other.
4242

4343

44-
#### Create a cross-cluster API key on the remote deployment [ec_create_a_cross_cluster_api_key_on_the_remote_deployment_3]
44+
### Create a cross-cluster API key on the remote deployment [ec_create_a_cross_cluster_api_key_on_the_remote_deployment_3]
4545

4646
* On the deployment you will use as remote, use the [{{es}} API](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) or [{{kib}}](../api-keys/elasticsearch-api-keys.md) to create a cross-cluster API key. Configure it with access to the indices you want to use for {{ccs}} or {{ccr}}.
4747
* Copy the encoded key (`encoded` in the response) to a safe location. You will need it in the next step.
4848

4949

50-
#### Configure the local deployment [ec_configure_the_local_deployment]
50+
### Configure the local deployment [ec_configure_the_local_deployment]
5151

5252
The API key created previously will be used by the local deployment to authenticate with the corresponding set of permissions to the remote deployment. For that, you need to add the API key to the local deployment’s keystore.
5353

@@ -126,7 +126,7 @@ If you later need to update the remote connection with different permissions, yo
126126
::::::
127127

128128
::::::{tab-item} TLS certificate (deprecated)
129-
#### Configuring trust with clusters of an {{ece}} environment [ec-trust-ece]
129+
### Configuring trust with clusters of an {{ece}} environment [ec-trust-ece]
130130

131131
A deployment can be configured to trust all or specific deployments in a remote ECE environment:
132132

deploy-manage/remote-clusters/ec-remote-cluster-other-ess.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,20 +33,20 @@ On the local cluster side, not every local user needs to access every piece of d
3333
If you run into any issues, refer to [Troubleshooting](/troubleshoot/elasticsearch/remote-clusters.md).
3434

3535

36-
#### Prerequisites and limitations [ec_prerequisites_and_limitations_2]
36+
### Prerequisites and limitations [ec_prerequisites_and_limitations_2]
3737

3838
* The local and remote deployments must be on {{stack}} 8.14 or later.
3939
* API key authentication can’t be used in combination with traffic filters.
4040
* Contrary to the certificate security model, the API key security model does not require that both local and remote clusters trust each other.
4141

4242

43-
#### Create a cross-cluster API key on the remote deployment [ec_create_a_cross_cluster_api_key_on_the_remote_deployment_2]
43+
### Create a cross-cluster API key on the remote deployment [ec_create_a_cross_cluster_api_key_on_the_remote_deployment_2]
4444

4545
* On the deployment you will use as remote, use the [{{es}} API](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) or [{{kib}}](../api-keys/elasticsearch-api-keys.md) to create a cross-cluster API key. Configure it with access to the indices you want to use for {{ccs}} or {{ccr}}.
4646
* Copy the encoded key (`encoded` in the response) to a safe location. You will need it in the next step.
4747

4848

49-
#### Add the cross-cluster API key to the keystore of the local deployment [ec_add_the_cross_cluster_api_key_to_the_keystore_of_the_local_deployment_2]
49+
### Add the cross-cluster API key to the keystore of the local deployment [ec_add_the_cross_cluster_api_key_to_the_keystore_of_the_local_deployment_2]
5050

5151
The API key created previously will be used by the local deployment to authenticate with the corresponding set of permissions to the remote deployment. For that, you need to add the API key to the local deployment’s keystore.
5252

@@ -76,7 +76,7 @@ If you later need to update the remote connection with different permissions, yo
7676
::::::
7777

7878
::::::{tab-item} TLS certificate (deprecated)
79-
#### Specify the deployments trusted to be used as remote clusters [ec-trust-other-organization]
79+
### Specify the deployments trusted to be used as remote clusters [ec-trust-other-organization]
8080

8181
A deployment can be configured to trust all or specific deployments in another {{ech}} [organization](../users-roles/cloud-organization.md). To add cross-organization trust:
8282

deploy-manage/remote-clusters/ec-remote-cluster-self-managed.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,20 +34,20 @@ On the local cluster side, not every local user needs to access every piece of d
3434
If you run into any issues, refer to [Troubleshooting](/troubleshoot/elasticsearch/remote-clusters.md).
3535

3636

37-
#### Prerequisites and limitations [ec_prerequisites_and_limitations_4]
37+
### Prerequisites and limitations [ec_prerequisites_and_limitations_4]
3838

3939
* The local and remote deployments must be on {{stack}} 8.14 or later.
4040
* API key authentication can’t be used in combination with traffic filters.
4141
* Contrary to the certificate security model, the API key security model does not require that both local and remote clusters trust each other.
4242

4343

44-
#### Create a cross-cluster API key on the remote deployment [ec_create_a_cross_cluster_api_key_on_the_remote_deployment_4]
44+
### Create a cross-cluster API key on the remote deployment [ec_create_a_cross_cluster_api_key_on_the_remote_deployment_4]
4545

4646
* On the deployment you will use as remote, use the [{{es}} API](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) or [{{kib}}](../api-keys/elasticsearch-api-keys.md) to create a cross-cluster API key. Configure it with access to the indices you want to use for {{ccs}} or {{ccr}}.
4747
* Copy the encoded key (`encoded` in the response) to a safe location. You will need it in the next step.
4848

4949

50-
#### Configure the local deployment [ec_configure_the_local_deployment_2]
50+
### Configure the local deployment [ec_configure_the_local_deployment_2]
5151

5252
The API key created previously will be used by the local deployment to authenticate with the corresponding set of permissions to the remote deployment. For that, you need to add the API key to the local deployment’s keystore.
5353

@@ -116,7 +116,7 @@ If you later need to update the remote connection with different permissions, yo
116116
::::::
117117

118118
::::::{tab-item} TLS certificate (deprecated)
119-
#### Specify the deployments trusted to be used as remote clusters [ec-trust-self-managed]
119+
### Specify the deployments trusted to be used as remote clusters [ec-trust-self-managed]
120120

121121
A deployment can be configured to trust all or specific deployments in any environment:
122122

@@ -176,7 +176,7 @@ Generate new node certificates for an entire cluster using the file input mode o
176176
::::
177177
178178
179-
::::{dropdown} **Using the API**
179+
::::{dropdown} Using the API
180180
You can update a deployment using the appropriate trust settings for the {{es}} payload.
181181
182182
In order to trust a cluster whose nodes present certificates with the subject names: "CN = node1.example.com", "CN = node2.example.com" and "CN = node3.example.com" in a self-managed environment, you could update the trust settings with an additional direct trust relationship like this:

deploy-manage/remote-clusters/ece-enable-ccs-for-eck.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The first step is to establish trust between the two clusters.
7878

7979

8080

81-
## Setup CCS/R [ece_setup_ccsr]
81+
## Set up CCS/R [ece_setup_ccsr]
8282

8383
Now that trust has been established, you can set up CCS/R from the ECK cluster to the {{ece}} cluster or from the {{ece}} cluster to the ECK cluster.
8484

deploy-manage/remote-clusters/ece-remote-cluster-other-ece.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
applies_to:
33
deployment:
44
ece: ga
5-
navigation_title: With a different {{ece}} environment
5+
navigation_title: With a different ECE environment
66
mapped_pages:
77
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-remote-cluster-other-ece.html
88
---

deploy-manage/remote-clusters/ece-remote-cluster-same-ece.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
applies_to:
33
deployment:
44
ece: ga
5-
navigation_title: Within the same {{ece}} environment
5+
navigation_title: Within the same ECE environment
66
mapped_pages:
77
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-remote-cluster-same-ece.html
88
---

deploy-manage/remote-clusters/eck-remote-clusters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ The remote clusters feature requires a valid Enterprise license or Enterprise tr
2222

2323
To create a remote cluster connection to another {{es}} cluster deployed within the same Kubernetes cluster, specify the `remoteClusters` attribute in your {{es}} spec.
2424

25-
### Security Models [k8s_security_models]
25+
### Security models [k8s_security_models]
2626

2727
Before you start, consider the security model that you would prefer to use for authenticating remote connections between clusters, and follow the corresponding steps.
2828

deploy-manage/remote-clusters/remote-clusters-cert.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -253,7 +253,7 @@ The following requests use the [create or update roles API](https://www.elastic.
253253
The {{ccr}} user requires different cluster and index privileges on the remote cluster and local cluster. Use the following requests to create separate roles on the local and remote clusters, and then create a user with the required roles.
254254

255255

256-
##### Remote cluster [_remote_cluster]
256+
#### Remote cluster [_remote_cluster]
257257

258258
On the remote cluster that contains the leader index, the {{ccr}} role requires the `read_ccr` cluster privilege, and `monitor` and `read` privileges on the leader index.
259259

@@ -290,7 +290,7 @@ POST /_security/role/remote-replication
290290
```
291291

292292

293-
##### Local cluster [_local_cluster]
293+
#### Local cluster [_local_cluster]
294294

295295
On the local cluster that contains the follower index, the `remote-replication` role requires the `manage_ccr` cluster privilege, and `monitor`, `read`, `write`, and `manage_follow_index` privileges on the follower index.
296296

@@ -341,7 +341,7 @@ You can then [configure {{ccr}}](../tools/cross-cluster-replication/set-up-cross
341341
The {{ccs}} user requires different cluster and index privileges on the remote cluster and local cluster. The following requests create separate roles on the local and remote clusters, and then create a user with the required roles.
342342

343343

344-
##### Remote cluster [_remote_cluster_2]
344+
#### Remote cluster [_remote_cluster_2]
345345

346346
On the remote cluster, the {{ccs}} role requires the `read` and `read_cross_cluster` privileges for the target indices.
347347

@@ -375,7 +375,7 @@ POST /_security/role/remote-search
375375
```
376376

377377

378-
##### Local cluster [_local_cluster_2]
378+
#### Local cluster [_local_cluster_2]
379379

380380
On the local cluster, which is the cluster used to initiate cross cluster search, a user only needs the `remote-search` role. The role privileges can be empty.
381381

@@ -418,7 +418,7 @@ To grant users read access on the remote data streams and indices, you must crea
418418
For example, you might be actively indexing {{ls}} data on a local cluster and and periodically offload older time-based indices to an archive on your remote cluster. You want to search across both clusters, so you must enable {{kib}} users on both clusters.
419419

420420

421-
##### Local cluster [_local_cluster_3]
421+
#### Local cluster [_local_cluster_3]
422422

423423
On the local cluster, create a `logstash-reader` role that grants `read` and `view_index_metadata` privileges on the local `logstash-*` indices.
424424

@@ -458,7 +458,7 @@ PUT /_security/user/cross-cluster-kibana
458458
```
459459

460460

461-
##### Remote cluster [_remote_cluster_3]
461+
#### Remote cluster [_remote_cluster_3]
462462

463463
On the remote cluster, create a `logstash-reader` role that grants the `read_cross_cluster` privilege and `read` and `view_index_metadata` privileges for the `logstash-*` indices.
464464

0 commit comments

Comments
 (0)