Skip to content

Commit b3999e5

Browse files
authored
Merge branch 'main' into 3720-value-report
2 parents dd25dd2 + 6393095 commit b3999e5

26 files changed

+200
-79
lines changed

deploy-manage/deploy/cloud-enterprise/post-installation-steps.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,12 @@ To start creating {{es}} deployments directly, refer to [](./working-with-deploy
1818

1919
* Add your own [load balancer](./ece-load-balancers.md). Load balancers are user supplied and we do not currently provide configuration steps for you.
2020

21+
* [Add more capacity](/deploy-manage/maintenance/ece/scale-out-installation.md) to your ECE installation, [resize your deployment](./resize-deployment.md), [upgrade to a newer {{es}} version](/deploy-manage/upgrade/deployment-or-cluster/upgrade-on-ece.md), and [add some plugins](./add-plugins.md).
22+
23+
* [Configure ECE system deployments](./system-deployments-configuration.md) to ensure a highly available and resilient setup.
24+
25+
* [Configure ECE for deployment templates](./configure-deployment-templates.md) to indicate what kind of hardware you have available for {{stack}} deployments.
26+
2127
* In production systems, add your own [Cloud UI and Proxy certificates](../../security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md) to enable secure connections over HTTPS. The proxy certificate must be a wildcard certificate signed for the needed DNS records of your domain.
2228

2329
::::{note}
@@ -32,19 +38,21 @@ To start creating {{es}} deployments directly, refer to [](./working-with-deploy
3238
For example, if your proxy certificate is signed for `*.elastic-cloud-enterprise.example.com` and you have a wildcard DNS register pointing `*.elastic-cloud-enterprise.example.com` to your load balancer, you should configure `elastic-cloud-enterprise.example.com` as the **deployment domain name** in Platform → Settings. Refer to [](./change-endpoint-urls.md) for more details.
3339
::::
3440

35-
* If you received a license from Elastic, [manage the licenses](../../license/manage-your-license-in-ece.md) for your {{ece}} installation.
41+
* [Add a snapshot repository](../../tools/snapshot-and-restore/cloud-enterprise.md) to enable regular backups of your {{es}} clusters.
3642

3743
* [Add more platform users](../../users-roles/cloud-enterprise-orchestrator/manage-users-roles.md) with role-based access control.
3844

39-
* [Add a snapshot repository](../../tools/snapshot-and-restore/cloud-enterprise.md) to enable regular backups of your {{es}} clusters.
40-
4145
* Consider enabling encryption-at-rest (EAR) on your hosts.
4246

4347
:::{{note}}
4448
Encryption-at-rest is not implemented out of the box in {{ece}}. [Learn more](/deploy-manage/security/secure-your-elastic-cloud-enterprise-installation.md#ece_encryption).
4549
:::
4650

47-
* Learn about common maintenance activities—such as adding capacity, applying OS patches, and addressing host failures--at [](../../maintenance/ece.md).
51+
* Set up [traffic filters](/deploy-manage/security/network-security.md) to restrict traffic to your deployment to only trusted IP addresses or VPCs.
52+
53+
* Learn how to work around host maintenance or a host failure by [moving nodes off of an allocator](/deploy-manage/maintenance/ece/move-nodes-instances-from-allocators.md). For an overview of common ECE maintenance activities, refer to [ECE maintenance](../../maintenance/ece.md).
54+
55+
* If you received a license from Elastic, [manage the licenses](../../license/manage-your-license-in-ece.md) for your {{ece}} installation.
4856

4957
::::{warning}
5058
During installation, the system generates secrets that are placed into the `/mnt/data/elastic/bootstrap-state/bootstrap-secrets.json` secrets file, unless you passed in a different path with the --host-storage-path parameter. Keep the information in the `bootstrap-secrets.json` file secure by removing it from its default location and placing it into a secure storage location.

deploy-manage/distributed-architecture/discovery-cluster-formation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ products:
88
---
99

1010
::::{important}
11-
The information provided in this section is applicable to all deployment types. However, the configuration settings detailed here are only valid for self-managed {{es}} deployments. For {{ecloud}} and {{serverless-full}} deployments this seciton should only be used for general information.
11+
The information provided in this section is applicable to all deployment types. However, the configuration settings detailed here are only valid for fully self-managed {{es}} deployments. For ECE, ECK, and ECH deployments, this section should only be used for general information and troubleshooting.
1212
::::
1313

1414
# Discovery and cluster formation [modules-discovery]
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,12 @@
11
| Region | Name |
22
| --- | --- |
3+
| us-east-1 | US East (N. Virginia) |
34
| us-east-2 | US East (Ohio) |
5+
| us-west-2 | US West (Oregon) |
46
| eu-west-1 | EU (Ireland) |
7+
| eu-west-2 | Europe (London) |
8+
| eu-central-1 | Europe (Frankfurt) |
59
| ap-northeast-1 | Asia Pacific (Tokyo) |
10+
| ap-southeast-1 | Asia Pacific (Singapore) |
611

712
More regions are coming soon.

deploy-manage/monitor/autoops/cc-autoops-as-cloud-connected.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ products:
1212

1313
# AutoOps for self-managed clusters
1414

15-
For ECE ({{ece}}), ECK ({{eck}}), and self-managed {{es}} clusters, AutoOps can be set up in all supported [regions](ec-autoops-regions.md#autoops-for-self-managed-clusters-regions) through [Cloud Connect](/deploy-manage/cloud-connect.md). More regions are coming soon.
15+
For ECE ({{ece}}), ECK ({{eck}}), and self-managed {{es}} clusters, AutoOps can be set up through [Cloud Connect](/deploy-manage/cloud-connect.md).
1616

1717
Cloud Connect enables users of ECE, ECK, and self-managed clusters to use {{ecloud}} services. This means you can take advantage of the simplified cluster monitoring, real-time issue detection, and performance recommendations of AutoOps without having to run and manage the underlying infrastructure.
1818

deploy-manage/monitor/autoops/cc-connect-self-managed-to-autoops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -211,7 +211,7 @@ If you manually assign privileges, you won't be able to allow {{agent}} to acces
211211

212212
:::::
213213
* **System architecture**: Select the system architecture of the machine running the agent.
214-
* **Metrics storage location**: Select where to store your metrics data from the list of available AWS regions.
214+
* **Metrics storage location**: Select where to store your metrics data from the list of available AWS regions:
215215

216216
:::{include} ../_snippets/autoops-cc-regions.md
217217
:::

deploy-manage/monitor/autoops/ec-autoops-faq.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Whether you are using AutoOps in your [{{ech}} deployment](/deploy-manage/monito
4343
* [Do I have to define an Elastic IP address to enable the agent to send data to {{ecloud}}?](#elastic-ip-address)
4444

4545
**Collected metrics and data in AutoOps for self-managed clusters**
46-
* [Where are metrics stored in AutoOps for self-managed clusters?](#autoops-metrics-storage)
46+
* [Where are metrics stored in AutoOps for self-managed clusters?](#sm-autoops-metrics-storage)
4747
* [What information does {{agent}} gather from my cluster?](#extracted-info)
4848
* [How does AutoOps gather data from my cluster and ensure its security?](#data-gathering)
4949
* [Can I view the data gathered by {{agent}}?](#data-viewing-config)
@@ -91,7 +91,7 @@ $$$additional-payment$$$ **Does AutoOps for self-managed clusters incur addition
9191
$$$autoops-metrics-cost$$$ **Does shipping metrics data to {{ecloud}} incur additional costs?**
9292
: Elastic does not charge extra for this service, but your cloud service provider (CSP) might. When sending metrics data from your cluster in a CSP region to {{ecloud}}, shipping costs are determined by your agreement with that CSP.
9393

94-
You can [choose the CSP region where your data is stored](/deploy-manage/monitor/autoops/ec-autoops-regions.md#autoops-for-self-managed-clusters-regions).
94+
You can [choose the CSP region where your data is stored](#sm-autoops-metrics-storage).
9595

9696
$$$deployment-types$$$ **Which deployment types can be connected to AutoOps through Cloud Connect?**
9797
: You can connect to AutoOps on a standalone {{stack}}, ECE ({{ece}}), or ECK ({{eck}}) deployment, both on-premise and in private cloud environments.
@@ -117,7 +117,7 @@ $$$elastic-ip-address$$$ **Do I have to define an Elastic IP address to enable t
117117

118118
### Collected metrics and data in AutoOps for self-managed clusters
119119

120-
$$$autoops-metrics-storage$$$ **Where are metrics stored in AutoOps for self-managed clusters?**
120+
$$$sm-autoops-metrics-storage$$$ **Where are metrics stored in AutoOps for self-managed clusters?**
121121
: You can choose where to store your metrics from the following AWS regions:
122122

123123
:::{include} ../_snippets/autoops-cc-regions.md

deploy-manage/monitor/autoops/ec-autoops-regions.md

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,9 @@ navigation_title: Regions
55
applies_to:
66
serverless:
77
deployment:
8-
self:
9-
ece:
10-
eck:
118
ess: all
129
products:
1310
- id: cloud-hosted
14-
- id: cloud-kubernetes
15-
- id: cloud-enterprise
1611
---
1712

1813
# AutoOps regions [ec-autoops-regions]
@@ -73,14 +68,3 @@ AutoOps for {{serverless-short}} is set up and enabled automatically in the foll
7368
The only exception is the **Search AI Lake** view, which is available in all CSP regions across AWS, Azure, and GCP.
7469

7570
Learn how to [access](/deploy-manage/monitor/autoops/access-autoops-for-serverless.md) AutoOps in your {{serverless-short}} project.
76-
77-
## AutoOps for self-managed clusters regions
78-
79-
You can also use AutoOps with your ECE ({{ece}}), ECK ({{eck}}), or self-managed clusters through [Cloud Connect](/deploy-manage/cloud-connect.md).
80-
81-
This service is currently available in the following regions for AWS:
82-
83-
:::{include} ../_snippets/autoops-cc-regions.md
84-
:::
85-
86-
Learn how to [set up](/deploy-manage/monitor/autoops/cc-connect-self-managed-to-autoops.md) AutoOps in your ECE, ECK, or self-managed cluster.

deploy-manage/remote-clusters/ece-enable-ccs.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,18 @@ To use CCS or CCR, your environment must meet the following criteria:
3232
:::{include} _snippets/remote-cluster-certificate-compatibility.md
3333
:::
3434

35-
* Proxies must answer TCP requests on the port 9400. Check the [prerequisites for the ports that must permit outbound or inbound traffic](../deploy/cloud-enterprise/ece-networking-prereq.md).
36-
* Load balancers must pass-through TCP requests on port 9400. Check the [configuration details](../deploy/cloud-enterprise/ece-load-balancers.md).
35+
* ECE proxies must answer TCP requests on the port used by the selected [security model](./security-models.md):
36+
* `9400` when using TLS certificate–based authentication (deprecated).
37+
* `9443` when using API key–based authentication.
38+
39+
For details, refer to the [remote cluster security models](./security-models.md) documentation and [ECE networking prerequisites](/deploy-manage/deploy/cloud-enterprise/ece-networking-prereq.md).
40+
41+
* Load balancers must pass through TCP requests on the port that corresponds to the security model:
42+
* `9400` for TLS certificate–based authentication (deprecated).
43+
* `9443` for API key–based authentication.
44+
45+
For configuration details, refer to the [ECE load balancer requirements](../deploy/cloud-enterprise/ece-load-balancers.md).
46+
3747
* If your deployment was created before ECE version `2.9.0`, the Remote clusters page in {{kib}} must be enabled manually from the **Security** page of your deployment, by selecting **Enable CCR** under **Trust management**.
3848

3949
::::{note}
@@ -62,4 +72,4 @@ The steps, information, and authentication method required to configure CCS and
6272

6373
## Remote clusters and network security [ece-ccs-ccr-network-security]
6474

65-
If you have [network security policies](/deploy-manage/security/network-security-policies.md) applied to the remote cluster, you might need to take extra steps on the remote side to allow traffic from the local cluster. Some remote cluster configurations have limited compatibility with network security. To learn more, refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security).
75+
If you have [network security policies](/deploy-manage/security/network-security-policies.md) applied to the remote cluster, you might need to take extra steps on the remote side to allow traffic from the local cluster. Some remote cluster configurations have limited compatibility with network security. To learn more, refer to [Remote clusters and network security](/deploy-manage/remote-clusters.md#network-security).

deploy-manage/remote-clusters/remote-clusters-api-key.md

Lines changed: 82 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@ To add a remote cluster using API key authentication:
2525
1. [Review the prerequisites](#remote-clusters-prerequisites-api-key)
2626
2. [Establish trust with a remote cluster](#remote-clusters-security-api-key)
2727
3. [Connect to a remote cluster](#remote-clusters-connect-api-key)
28-
4. [Configure roles and users](#remote-clusters-privileges-api-key)
28+
4. (Optional) [Configure strong identity verification](#remote-cluster-strong-verification)
29+
5. [Configure roles and users](#remote-clusters-privileges-api-key)
30+
2931

3032
If you run into any issues, refer to [Troubleshooting](/troubleshoot/elasticsearch/remote-clusters.md).
3133

@@ -338,6 +340,85 @@ cluster:
338340
3. The address for the proxy endpoint used to connect to `cluster_three`.
339341

340342

343+
## Strong identity verification [remote-cluster-strong-verification]
344+
```{applies_to}
345+
deployment:
346+
stack: preview 9.3
347+
```
348+
349+
Cross-cluster API keys can be configured with strong identity verification to provide an additional layer of security. To enable this feature, a
350+
cross-cluster API key is created on the remote cluster with a certificate identity pattern that specifies which certificates are allowed
351+
to use it. The local cluster must then sign each request with its private key and include a certificate whose subject Distinguished Name
352+
(DN) matches the pattern. The remote cluster validates both that the certificate is trusted by its configured certificate authorities
353+
and that the certificate's subject matches the API key's identity pattern.
354+
355+
Each remote cluster alias on the local cluster can have different remote signing configurations.
356+
357+
### How strong identity verification works [_how_strong_verification_works]
358+
359+
When a local cluster makes a request to a remote cluster using a cross-cluster API key:
360+
361+
1. The local cluster signs the request headers with its configured private key and sends the signature and certificate chain as header
362+
in the request to the remote cluster.
363+
2. The remote cluster verifies that the API key is valid.
364+
3. If the API key has a certificate identity pattern configured, the remote cluster extracts the Distinguished Name (DN) from the
365+
certificate chain's leaf certificate and matches it against the certificate identity pattern.
366+
4. The remote cluster validates that the provided certificate chain is trusted.
367+
5. The remote cluster validates the signature and checks that the certificate is not expired.
368+
369+
If any of these validation steps fail, the request is rejected.
370+
371+
### Configure strong identity verification [_configure_strong_verification]
372+
373+
To use strong identity verification, the local and remote clusters must be configured to sign request headers and to verify request
374+
headers. This can be done through the cluster settings API or `elasticsearch.yaml`.
375+
376+
#### On the local cluster [_certificate_identity_local_cluster]
377+
378+
When [adding the remote cluster](#using-the-es-api) to the local cluster, you must configure it to sign cross-cluster requests with a certificate–private key pair. You can generate a signing certificate using [elasticsearch-certutil](#remote-clusters-security-api-key-remote-action) or use an existing certificate. The private key can be encrypted and the password must be stored securely as a secure setting in Elasticsearch keystore. Refer to the [remote cluster settings reference](elasticsearch://reference/elasticsearch/configuration-reference/remote-clusters.md#remote-cluster-signing-settings) for details.
379+
380+
```yaml
381+
cluster.remote.my_remote_cluster.signing.certificate: "path/to/signing/certificate.crt"
382+
cluster.remote.my_remote_cluster.signing.key: "path/to/signing/key.key"
383+
```
384+
385+
::::{note}
386+
Replace `my_remote_cluster` with your remote cluster alias, and the paths with the paths to your certificate and key files.
387+
::::
388+
389+
#### On the remote cluster [_certificate_identity_remote_cluster]
390+
391+
The remote cluster must be configured with a certificate authority that trusts the certificate that was used to sign the request headers.
392+
393+
```yaml
394+
cluster.remote.signing.certificate_authorities: "path/to/signing/certificate_authorities.crt"
395+
```
396+
397+
When creating a cross-cluster API key on the remote cluster, specify a `certificate_identity` pattern that matches the Distinguished
398+
Name (DN) of the local cluster's certificate. Use the [Create Cross-Cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) API:
399+
400+
```console
401+
POST /_security/cross_cluster/api_key
402+
{
403+
"name": "my-cross-cluster-api-key",
404+
"access": {
405+
"search": [
406+
{
407+
"names": ["logs-*"]
408+
}
409+
]
410+
},
411+
"certificate_identity": "CN=local-cluster.example.com,O=Example Corp,C=US"
412+
}
413+
```
414+
415+
The `certificate_identity` field supports regular expressions. For example:
416+
417+
* `"CN=.*.example.com,O=Example Corp,C=US"` matches any certificate with a CN ending in "example.com"
418+
* `"CN=local-cluster.*,O=Example Corp,C=US"` matches any certificate with a CN starting with "local-cluster"
419+
* `"CN=.*"` matches any certificate (not recommended for production)
420+
421+
For a full list of available strong identity verification settings for remote clusters, refer to the [remote cluster settings reference](elasticsearch://reference/elasticsearch/configuration-reference/remote-clusters.md#remote-cluster-signing-settings).
341422

342423

343424
## Configure roles and users [remote-clusters-privileges-api-key]

explore-analyze/dashboards/arrange-panels.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To add a collapsible section:
2929
:::{tip}
3030
The section must be expanded in order to place panels into it.
3131
:::
32-
5. Just like any other panel, you can drag and drop the collapsible section to a different position in the dashboard.
32+
5. Like any other panel, you can drag and drop the collapsible section to a different position in the dashboard.
3333
6. Save the dashboard.
3434

3535
Users viewing the dashboard will find the section in the same state as when you saved the dashboard. If you saved it with the section collapsed, then it will also be collapsed by default for users.

0 commit comments

Comments
 (0)