You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/deploy/cloud-enterprise/post-installation-steps.md
+12-4Lines changed: 12 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,12 @@ To start creating {{es}} deployments directly, refer to [](./working-with-deploy
18
18
19
19
* Add your own [load balancer](./ece-load-balancers.md). Load balancers are user supplied and we do not currently provide configuration steps for you.
20
20
21
+
*[Add more capacity](/deploy-manage/maintenance/ece/scale-out-installation.md) to your ECE installation, [resize your deployment](./resize-deployment.md), [upgrade to a newer {{es}} version](/deploy-manage/upgrade/deployment-or-cluster/upgrade-on-ece.md), and [add some plugins](./add-plugins.md).
22
+
23
+
*[Configure ECE system deployments](./system-deployments-configuration.md) to ensure a highly available and resilient setup.
24
+
25
+
*[Configure ECE for deployment templates](./configure-deployment-templates.md) to indicate what kind of hardware you have available for {{stack}} deployments.
26
+
21
27
* In production systems, add your own [Cloud UI and Proxy certificates](../../security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md) to enable secure connections over HTTPS. The proxy certificate must be a wildcard certificate signed for the needed DNS records of your domain.
22
28
23
29
::::{note}
@@ -32,19 +38,21 @@ To start creating {{es}} deployments directly, refer to [](./working-with-deploy
32
38
For example, if your proxy certificate is signed for `*.elastic-cloud-enterprise.example.com` and you have a wildcard DNS register pointing `*.elastic-cloud-enterprise.example.com` to your load balancer, you should configure `elastic-cloud-enterprise.example.com` as the **deployment domain name** in Platform → Settings. Refer to [](./change-endpoint-urls.md) for more details.
33
39
::::
34
40
35
-
*If you received a license from Elastic, [manage the licenses](../../license/manage-your-license-in-ece.md)for your {{ece}} installation.
41
+
*[Add a snapshot repository](../../tools/snapshot-and-restore/cloud-enterprise.md)to enable regular backups of your {{es}} clusters.
36
42
37
43
*[Add more platform users](../../users-roles/cloud-enterprise-orchestrator/manage-users-roles.md) with role-based access control.
38
44
39
-
*[Add a snapshot repository](../../tools/snapshot-and-restore/cloud-enterprise.md) to enable regular backups of your {{es}} clusters.
40
-
41
45
* Consider enabling encryption-at-rest (EAR) on your hosts.
42
46
43
47
:::{{note}}
44
48
Encryption-at-rest is not implemented out of the box in {{ece}}. [Learn more](/deploy-manage/security/secure-your-elastic-cloud-enterprise-installation.md#ece_encryption).
45
49
:::
46
50
47
-
* Learn about common maintenance activities—such as adding capacity, applying OS patches, and addressing host failures--at [](../../maintenance/ece.md).
51
+
* Set up [traffic filters](/deploy-manage/security/network-security.md) to restrict traffic to your deployment to only trusted IP addresses or VPCs.
52
+
53
+
* Learn how to work around host maintenance or a host failure by [moving nodes off of an allocator](/deploy-manage/maintenance/ece/move-nodes-instances-from-allocators.md). For an overview of common ECE maintenance activities, refer to [ECE maintenance](../../maintenance/ece.md).
54
+
55
+
* If you received a license from Elastic, [manage the licenses](../../license/manage-your-license-in-ece.md) for your {{ece}} installation.
48
56
49
57
::::{warning}
50
58
During installation, the system generates secrets that are placed into the `/mnt/data/elastic/bootstrap-state/bootstrap-secrets.json` secrets file, unless you passed in a different path with the --host-storage-path parameter. Keep the information in the `bootstrap-secrets.json` file secure by removing it from its default location and placing it into a secure storage location.
Copy file name to clipboardExpand all lines: deploy-manage/distributed-architecture/discovery-cluster-formation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ products:
8
8
---
9
9
10
10
::::{important}
11
-
The information provided in this section is applicable to all deployment types. However, the configuration settings detailed here are only valid for self-managed {{es}} deployments. For {{ecloud}} and {{serverless-full}} deployments this seciton should only be used for general information.
11
+
The information provided in this section is applicable to all deployment types. However, the configuration settings detailed here are only valid for fully self-managed {{es}} deployments. For ECE, ECK, and ECH deployments, this section should only be used for general information and troubleshooting.
12
12
::::
13
13
14
14
# Discovery and cluster formation [modules-discovery]
Copy file name to clipboardExpand all lines: deploy-manage/monitor/autoops/cc-autoops-as-cloud-connected.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ products:
12
12
13
13
# AutoOps for self-managed clusters
14
14
15
-
For ECE ({{ece}}), ECK ({{eck}}), and self-managed {{es}} clusters, AutoOps can be set up in all supported [regions](ec-autoops-regions.md#autoops-for-self-managed-clusters-regions)through [Cloud Connect](/deploy-manage/cloud-connect.md). More regions are coming soon.
15
+
For ECE ({{ece}}), ECK ({{eck}}), and self-managed {{es}} clusters, AutoOps can be set up through [Cloud Connect](/deploy-manage/cloud-connect.md).
16
16
17
17
Cloud Connect enables users of ECE, ECK, and self-managed clusters to use {{ecloud}} services. This means you can take advantage of the simplified cluster monitoring, real-time issue detection, and performance recommendations of AutoOps without having to run and manage the underlying infrastructure.
$$$autoops-metrics-cost$$$**Does shipping metrics data to {{ecloud}} incur additional costs?**
92
92
: Elastic does not charge extra for this service, but your cloud service provider (CSP) might. When sending metrics data from your cluster in a CSP region to {{ecloud}}, shipping costs are determined by your agreement with that CSP.
93
93
94
-
You can [choose the CSP region where your data is stored](/deploy-manage/monitor/autoops/ec-autoops-regions.md#autoops-for-self-managed-clusters-regions).
94
+
You can [choose the CSP region where your data is stored](#sm-autoops-metrics-storage).
95
95
96
96
$$$deployment-types$$$**Which deployment types can be connected to AutoOps through Cloud Connect?**
97
97
: You can connect to AutoOps on a standalone {{stack}}, ECE ({{ece}}), or ECK ({{eck}}) deployment, both on-premise and in private cloud environments.
@@ -117,7 +117,7 @@ $$$elastic-ip-address$$$ **Do I have to define an Elastic IP address to enable t
117
117
118
118
### Collected metrics and data in AutoOps for self-managed clusters
119
119
120
-
$$$autoops-metrics-storage$$$**Where are metrics stored in AutoOps for self-managed clusters?**
120
+
$$$sm-autoops-metrics-storage$$$**Where are metrics stored in AutoOps for self-managed clusters?**
121
121
: You can choose where to store your metrics from the following AWS regions:
* Proxies must answer TCP requests on the port 9400. Check the [prerequisites for the ports that must permit outbound or inbound traffic](../deploy/cloud-enterprise/ece-networking-prereq.md).
36
-
* Load balancers must pass-through TCP requests on port 9400. Check the [configuration details](../deploy/cloud-enterprise/ece-load-balancers.md).
35
+
* ECE proxies must answer TCP requests on the port used by the selected [security model](./security-models.md):
36
+
*`9400` when using TLS certificate–based authentication (deprecated).
37
+
*`9443` when using API key–based authentication.
38
+
39
+
For details, refer to the [remote cluster security models](./security-models.md) documentation and [ECE networking prerequisites](/deploy-manage/deploy/cloud-enterprise/ece-networking-prereq.md).
40
+
41
+
* Load balancers must pass through TCP requests on the port that corresponds to the security model:
42
+
*`9400` for TLS certificate–based authentication (deprecated).
43
+
*`9443` for API key–based authentication.
44
+
45
+
For configuration details, refer to the [ECE load balancer requirements](../deploy/cloud-enterprise/ece-load-balancers.md).
46
+
37
47
* If your deployment was created before ECE version `2.9.0`, the Remote clusters page in {{kib}} must be enabled manually from the **Security** page of your deployment, by selecting **Enable CCR** under **Trust management**.
38
48
39
49
::::{note}
@@ -62,4 +72,4 @@ The steps, information, and authentication method required to configure CCS and
62
72
63
73
## Remote clusters and network security [ece-ccs-ccr-network-security]
64
74
65
-
If you have [network security policies](/deploy-manage/security/network-security-policies.md) applied to the remote cluster, you might need to take extra steps on the remote side to allow traffic from the local cluster. Some remote cluster configurations have limited compatibility with network security. To learn more, refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security).
75
+
If you have [network security policies](/deploy-manage/security/network-security-policies.md) applied to the remote cluster, you might need to take extra steps on the remote side to allow traffic from the local cluster. Some remote cluster configurations have limited compatibility with network security. To learn more, refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security).
To use strong identity verification, the local and remote clusters must be configured to sign request headers and to verify request
374
+
headers. This can be done through the cluster settings API or `elasticsearch.yaml`.
375
+
376
+
#### On the local cluster [_certificate_identity_local_cluster]
377
+
378
+
When [adding the remote cluster](#using-the-es-api) to the local cluster, you must configure it to sign cross-cluster requests with a certificate–private key pair. You can generate a signing certificate using [elasticsearch-certutil](#remote-clusters-security-api-key-remote-action) or use an existing certificate. The private key can be encrypted and the password must be stored securely as a secure setting in Elasticsearch keystore. Refer to the [remote cluster settings reference](elasticsearch://reference/elasticsearch/configuration-reference/remote-clusters.md#remote-cluster-signing-settings) for details.
When creating a cross-cluster API key on the remote cluster, specify a `certificate_identity` pattern that matches the Distinguished
398
+
Name (DN) of the local cluster's certificate. Use the [Create Cross-Cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) API:
The `certificate_identity` field supports regular expressions. For example:
416
+
417
+
*`"CN=.*.example.com,O=Example Corp,C=US"` matches any certificate with a CN ending in"example.com"
418
+
*`"CN=local-cluster.*,O=Example Corp,C=US"` matches any certificate with a CN starting with "local-cluster"
419
+
*`"CN=.*"` matches any certificate (not recommended for production)
420
+
421
+
For a full list of available strong identity verification settings for remote clusters, refer to the [remote cluster settings reference](elasticsearch://reference/elasticsearch/configuration-reference/remote-clusters.md#remote-cluster-signing-settings).
341
422
342
423
343
424
## Configure roles and users [remote-clusters-privileges-api-key]
Copy file name to clipboardExpand all lines: explore-analyze/dashboards/arrange-panels.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ To add a collapsible section:
29
29
:::{tip}
30
30
The section must be expanded in order to place panels into it.
31
31
:::
32
-
5.Just like any other panel, you can drag and drop the collapsible section to a different position in the dashboard.
32
+
5.Like any other panel, you can drag and drop the collapsible section to a different position in the dashboard.
33
33
6. Save the dashboard.
34
34
35
35
Users viewing the dashboard will find the section in the same state as when you saved the dashboard. If you saved it with the section collapsed, then it will also be collapsed by default for users.
0 commit comments