Skip to content

Commit 9315da5

Browse files
committed
removed references to enterprise search
1 parent a42c977 commit 9315da5

11 files changed

+11
-65
lines changed

deploy-manage/deploy/cloud-on-k8s.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ mapped_urls:
1010

1111
# Elastic Cloud on Kubernetes [k8s-overview]
1212

13-
Built on the Kubernetes Operator pattern, {{eck}} (ECK) extends the basic Kubernetes orchestration capabilities to support the setup and management of Elasticsearch, Kibana, APM Server, Enterprise Search, Beats, Elastic Agent, Elastic Maps Server, and Logstash on Kubernetes.
13+
Built on the Kubernetes Operator pattern, {{eck}} (ECK) extends the basic Kubernetes orchestration capabilities to support the setup and management of Elasticsearch, Kibana, APM Server, Beats, Elastic Agent, Elastic Maps Server, and Logstash on Kubernetes.
1414

1515
## ECK overview
1616

@@ -26,7 +26,7 @@ This section provides everything you need to install, configure, and manage Elas
2626

2727
- [](./cloud-on-k8s/deploy-an-orchestrator.md): ECK installation methods and configuration options. Deploy ECK on managed Kubernetes platforms like GKE, AKS, and EKS, on self-managed Kubernetes clusters, on OpenShift, and even in air-gapped environments.
2828
- [](./cloud-on-k8s/manage-deployments.md): Handle {{es}} clusters and {{kib}} instances through ECK.
29-
- [](./cloud-on-k8s/orchestrate-other-elastic-applications.md): Run APM Server, Enterprise Search, Beats, Elastic Agent, Elastic Maps Server, and Logstash on Kubernetes.
29+
- [](./cloud-on-k8s/orchestrate-other-elastic-applications.md): Run APM Server, Beats, Elastic Agent, Elastic Maps Server, and Logstash on Kubernetes.
3030
- [](./cloud-on-k8s/tools-apis.md): A collection of tools and APIs available in ECK based environments.
3131

3232
Other sections of the documentation include the following important topics around ECK:

deploy-manage/deploy/cloud-on-k8s/air-gapped-install.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Once the ECK operator image is copied internally, replace the original image nam
8888

8989
## Override the default container registry [k8s-container-registry-override]
9090

91-
When creating custom resources (Elasticsearch, Kibana, APM Server, Enterprise Search, Beats, Elastic Agent, Elastic Maps Server, and Logstash), the operator defaults to using container images pulled from the `docker.elastic.co` registry. If you are in an environment where external network access is restricted, you can configure the operator to use a different default container registry by starting the operator with the `--container-registry` command-line flag. Check [*Configure ECK*](../../../deploy-manage/deploy/cloud-on-k8s/configure-eck.md) for more information on how to configure the operator using command-line flags and environment variables.
91+
When creating custom resources (Elasticsearch, Kibana, APM Server, Beats, Elastic Agent, Elastic Maps Server, and Logstash), the operator defaults to using container images pulled from the `docker.elastic.co` registry. If you are in an environment where external network access is restricted, you can configure the operator to use a different default container registry by starting the operator with the `--container-registry` command-line flag. Check [*Configure ECK*](../../../deploy-manage/deploy/cloud-on-k8s/configure-eck.md) for more information on how to configure the operator using command-line flags and environment variables.
9292

9393
The operator expects container images to be located at specific repositories in the default container registry. Make sure that your container images are stored in the right repositories and are tagged correctly with the Stack version number. For example, if your private registry is `my.registry` and you wish to deploy components from Stack version 8.16.1, the following image names should exist:
9494

deploy-manage/deploy/cloud-on-k8s/configure-validating-webhook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Validating webhooks are defined using a `ValidatingWebhookConfiguration` object
2626

2727
When using the default `operator.yaml` manifest, ECK is installed with a `ValidatingWebhookConfiguration` configured as follows:
2828

29-
* Validate all known Elastic custom resources (Elasticsearch, Kibana, APM Server, Enterprise Search, Beats, Elastic Agent, Elastic Maps Server, and Logstash) on create and update.
29+
* Validate all known Elastic custom resources (Elasticsearch, Kibana, APM Server, Beats, Elastic Agent, Elastic Maps Server, and Logstash) on create and update.
3030
* The operator itself is the webhook server — which is exposed through a service named `elastic-webhook-server` in the `elastic-system` namespace.
3131
* The operator generates a certificate for the webhook and stores it in a secret named `elastic-webhook-server-cert` in the `elastic-system` namespace. This certificate is automatically rotated by the operator when it is due to expire.
3232

deploy-manage/deploy/cloud-on-k8s/deploy-eck-on-openshift.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,6 @@ This section shows how to run ECK on OpenShift.
1717
* [Grant privileged permissions to Beats](k8s-openshift-beats.md)
1818
* [Grant host access permission to Elastic Agent](k8s-openshift-agent.md)
1919

20-
::::{warning}
21-
Some Docker images are incompatible with the `restricted` SCC. This is the case for the **APM Server before 7.9** and for **Enterprise Search 7.9 and 7.10**. You can use this [workaround](k8s-openshift-anyuid-workaround.md) to run those images with the `anyuid` SCC.
22-
::::
23-
2420
## Before you begin [k8s-openshift-before-you-begin]
2521

2622
1. To run the instructions on this page, you must be a `system:admin` user or a user with the privileges to create Projects, CRDs, and RBAC resources at the cluster level.

deploy-manage/deploy/cloud-on-k8s/install-using-yaml-manifest-quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ To learn about other installation methods, refer to [](/deploy-manage/deploy/clo
1515

1616
During the installation, the following components are installed or updated:
1717

18-
* `CustomResourceDefinition` objects for all supported resource types (Elasticsearch, Kibana, APM Server, Enterprise Search, Beats, Elastic Agent, Elastic Maps Server, and Logstash).
18+
* `CustomResourceDefinition` objects for all supported resource types (Elasticsearch, Kibana, APM Server, Beats, Elastic Agent, Elastic Maps Server, and Logstash).
1919
* `Namespace` named `elastic-system` to hold all operator resources.
2020
* `ServiceAccount`, `ClusterRole` and `ClusterRoleBinding` to allow the operator to manage resources throughout the cluster.
2121
* `ValidatingWebhookConfiguration` to validate Elastic custom resources on admission.

deploy-manage/deploy/cloud-on-k8s/install.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ mapped_urls:
88

99
# Install ECK [k8s-installing-eck]
1010

11-
Elastic Cloud on Kubernetes (ECK) is a [Kubernetes operator](https://kubernetes.io/docs/concepts/extend-kubernetes/operator/) that helps you deploy and manage Elastic applications on Kubernetes, including Elasticsearch, Kibana, APM Server, Enterprise Search, Beats, Elastic Agent, Elastic Maps Server, and Logstash.
11+
Elastic Cloud on Kubernetes (ECK) is a [Kubernetes operator](https://kubernetes.io/docs/concepts/extend-kubernetes/operator/) that helps you deploy and manage Elastic applications on Kubernetes, including Elasticsearch, Kibana, APM Server, Beats, Elastic Agent, Elastic Maps Server, and Logstash.
1212

1313
ECK relies on a set of [Custom Resource Definitions (CRDs)](https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/#customresourcedefinitions) to define how applications are deployed. CRDs are global resources, shared across the entire Kubernetes cluster, so installing them requires [specific permissions](../../../deploy-manage/deploy/cloud-on-k8s/required-rbac-permissions.md#k8s-eck-permissions-installing-crds).
1414

@@ -21,7 +21,7 @@ You can install multiple instances of ECK in the same Kubernetes cluster, but on
2121
::::
2222

2323
::::{warning}
24-
Deleting CRDs will trigger deletion of all custom resources (Elasticsearch, Kibana, APM Server, Enterprise Search, Beats, Elastic Agent, Elastic Maps Server, and Logstash) in all namespaces of the cluster, regardless of whether they are managed by a single operator or multiple operators.
24+
Deleting CRDs will trigger deletion of all custom resources (Elasticsearch, Kibana, APM Server, Beats, Elastic Agent, Elastic Maps Server, and Logstash) in all namespaces of the cluster, regardless of whether they are managed by a single operator or multiple operators.
2525
::::
2626

2727
For a list of supported Kubernetes versions refer to [](../cloud-on-k8s.md#k8s-supported)

deploy-manage/deploy/cloud-on-k8s/k8s-openshift-anyuid-workaround.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ mapped_pages:
77

88
# Deploy Docker images with anyuid SCC [k8s-openshift-anyuid-workaround]
99

10-
Starting with version 7.9, it is possible to run the APM Server with the `restricted` SCC. For APM versions older than 7.9 and Enterprise Search version 7.9, you can use this workaround which allows the Pod to run with the default `uid 1000` by assigning it to the `anyuid` SCC:
10+
Starting with version 7.9, it is possible to run the APM Server with the `restricted` SCC. For APM versions older than 7.9, you can use this workaround which allows the Pod to run with the default `uid 1000` by assigning it to the `anyuid` SCC:
1111

1212
1. Create a service account to run the APM Server:
1313

@@ -71,7 +71,6 @@ Starting with version 7.9, it is possible to run the APM Server with the `restri
7171
kibana-sample-kb-97c6b6b8d-lqfd2 scc:restricted
7272
```
7373
74-
7574
:::{important}
7675
Enterprise Search is not available in versions 9.0+.
7776
:::

deploy-manage/deploy/cloud-on-k8s/manage-compute-resources.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ A [known Kubernetes issue](https://github.com/kubernetes/kubernetes/issues/51135
104104

105105

106106

107-
### Set compute resources for Kibana, Enterprise Search, Elastic Maps Server, APM Server and Logstash [k8s-compute-resources-kibana-and-apm]
107+
### Set compute resources for Kibana, Elastic Maps Server, APM Server and Logstash [k8s-compute-resources-kibana-and-apm]
108108

109109
```yaml
110110
apiVersion: kibana.k8s.elastic.co/v1
@@ -287,7 +287,6 @@ If `resources` is not defined in the specification of an object, then the operat
287287
| Beat | `300Mi` | `300Mi` |
288288
| Elastic Agent | `400Mi` | `400Mi` |
289289
| Elastic Maps Server | `200Mi` | `200Mi` |
290-
| Enterprise Search | `4Gi` | `4Gi` |
291290
| Logstash | `2Gi` | `2Gi` |
292291

293292
If the Kubernetes cluster is configured with [LimitRanges](https://kubernetes.io/docs/tasks/administer-cluster/manage-resources/memory-default-namespace/) that enforce a minimum memory constraint, they could interfere with the operator defaults and cause object creation to fail.

deploy-manage/deploy/cloud-on-k8s/manage-deployments.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ applies:
77
This section provides detailed guidance on deploying, configuring, and managing Elasticsearch and Kibana within ECK. A **deployment** refers to an {{es}} cluster, optionally with one or more {{kib}} instances connected to it.
88

99
::::{tip}
10-
This content focuses on Elasticsearch and Kibana deployments. To orchestrate other Elastic Stack applications such as APM Server, Enterprise Search, Beats, Elastic Agent, Elastic Maps Server, and Logstash, refer to the [Orchestrating other Elastic Stack applications](./orchestrate-other-elastic-applications.md).
10+
This content focuses on Elasticsearch and Kibana deployments. To orchestrate other Elastic Stack applications such as APM Server, Beats, Elastic Agent, Elastic Maps Server, and Logstash, refer to the [Orchestrating other Elastic Stack applications](./orchestrate-other-elastic-applications.md).
1111
::::
1212

1313
## What You'll Learn

deploy-manage/deploy/cloud-on-k8s/network-policies.md

Lines changed: 0 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -274,53 +274,6 @@ spec:
274274
common.k8s.elastic.co/type: apm-server
275275
```
276276
277-
278-
## Isolating Enterprise Search [k8s-network-policies-enterprise-search-isolation]
279-
280-
| | |
281-
| --- | --- |
282-
| Egress (outgoing) | * TCP port 9200 to {{es}} nodes in the namespace.<br>* UDP port 53 for DNS lookup.<br> |
283-
| Ingress (incoming) | * TCP port 3002 from other pods in the namespace.<br> |
284-
285-
```yaml
286-
apiVersion: networking.k8s.io/v1
287-
kind: NetworkPolicy
288-
metadata:
289-
name: eck-enterprise-search
290-
namespace: team-a
291-
spec:
292-
egress:
293-
- ports:
294-
- port: 9200
295-
protocol: TCP
296-
to:
297-
- namespaceSelector:
298-
matchLabels:
299-
eck.k8s.elastic.co/tenant: team-a
300-
podSelector:
301-
matchLabels:
302-
common.k8s.elastic.co/type: elasticsearch
303-
- ports:
304-
- port: 53
305-
protocol: UDP
306-
ingress:
307-
- from:
308-
- namespaceSelector:
309-
matchLabels:
310-
eck.k8s.elastic.co/tenant: team-a
311-
# [Optional] Allow ingress controller pods from the ingress-nginx namespace.
312-
#- namespaceSelector:
313-
# matchLabels:
314-
# name: ingress-nginx
315-
ports:
316-
- port: 3002
317-
protocol: TCP
318-
podSelector:
319-
matchLabels:
320-
common.k8s.elastic.co/type: enterprise-search
321-
```
322-
323-
324277
## Isolating Beats [k8s-network-policies-beats-isolation]
325278
326279
::::{note}

0 commit comments

Comments
 (0)