Skip to content

Commit bdd3aa6

Browse files
committed
[D&M] WIP cluster comms first pass
1 parent 7118b1b commit bdd3aa6

20 files changed

+664
-1223
lines changed

deploy-manage/deploy/cloud-on-k8s/k8s-kibana-http-configuration.md

Lines changed: 0 additions & 62 deletions
This file was deleted.

deploy-manage/deploy/cloud-on-k8s/kibana-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ The following sections describe how to customize a {{kib}} deployment to suit yo
2424
* [Secure settings](k8s-kibana-secure-settings.md)
2525
* [HTTP Configuration](k8s-kibana-http-configuration.md)
2626

27-
* [Load balancer settings and TLS SANs](k8s-kibana-http-configuration.md#k8s-kibana-http-publish)
28-
* [Provide your own certificate](k8s-kibana-http-configuration.md#k8s-kibana-http-custom-tls)
29-
* [Disable TLS](k8s-kibana-http-configuration.md#k8s-kibana-http-disable-tls)
27+
* [Load balancer settings and TLS SANs](/deploy-manage/security/secure-http-communications.md#k8s-kibana-http-publish)
28+
* [Provide your own certificate](/deploy-manage/security/secure-http-communications.md#k8s-kibana-http-custom-tls)
29+
* [Disable TLS](/deploy-manage/security/secure-http-communications.md#k8s-kibana-http-disable-tls)
3030
* [Install {{kib}} plugins](k8s-kibana-plugins.md)
3131

3232
* [Autoscaling stateless applications](../../autoscaling/autoscaling-in-eck.md#k8s-stateless-autoscaling): Use [Horizontal Pod Autoscaler](https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/) for {{kib}} or other stateless applications.

deploy-manage/security/different-ca.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
---
2+
applies_to:
3+
self: ga
24
navigation_title: "With a different CA"
35
mapped_pages:
46
- https://www.elastic.co/guide/en/elasticsearch/reference/current/update-node-certs-different.html
57
---
68

79

8-
910
# Different CA [update-node-certs-different]
1011

1112

deploy-manage/security/install-stack-demo-secure.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
applies_to:
33
deployment:
44
self: ga
5+
mapped_urls:
6+
- https://www.elastic.co/guide/en/elastic-stack/current/install-stack-demo-secure.html
57
---
68

79
# Tutorial: Securing a self-managed {{stack}} [install-stack-demo-secure]

deploy-manage/security/same-ca.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
applies_to:
3+
self: ga
24
navigation_title: "With the same CA"
35
mapped_pages:
46
- https://www.elastic.co/guide/en/elasticsearch/reference/current/update-node-certs-same.html
Lines changed: 66 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,33 +1,84 @@
11
---
2+
applies_to:
3+
deployment:
4+
self:
5+
eck:
6+
ece:
27
mapped_urls:
38
- https://www.elastic.co/guide/en/cloud-on-k8s/current/k8s-security.html
49
- https://www.elastic.co/guide/en/elasticsearch/reference/current/security-basic-setup.html
510
- https://www.elastic.co/guide/en/kibana/current/elasticsearch-mutual-tls.html
611
---
712

13+
14+
% TODO: what to do about this page that doesn't exist
15+
% * [/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-security.md](/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-security.md)
16+
17+
818
# Secure cluster communications
919

10-
% What needs to be done: Refine
20+
This page explains how to secure communications between components in your {{stack}} deployment.
1121

12-
% GitHub issue: https://github.com/elastic/docs-projects/issues/346
22+
For {{ech}} and {{serverless-full}} deployments, communications security is fully managed by Elastic with no configuration required.
1323

14-
% Use migrated content from existing pages that map to this page:
24+
For ECE, ECK, and self-managed deployments, this page provides specific configuration guidance to secure the various communication channels between components.
1525

16-
% - [ ] ./raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-security.md
17-
% - [ ] ./raw-migrated-files/elasticsearch/elasticsearch-reference/security-basic-setup.md
18-
% Notes: concepts
19-
% - [ ] ./raw-migrated-files/kibana/kibana/elasticsearch-mutual-tls.md
26+
:::{tip}
27+
For a complete comparison of security feature availability and responsibility by deployment type, see [Security features by deployment type](../security.md#security-features-by-deployment-type).
28+
:::
2029

21-
% Internal links rely on the following IDs being on this page (e.g. as a heading ID, paragraph ID, etc):
30+
## Communication channels overview
2231

23-
$$$generate-certificates$$$
32+
Your {{stack}} deployment includes several distinct communication channels that must be secured to protect your data and infrastructure.
2433

25-
$$$encrypt-internode-communication$$$
34+
| **Channel** | **Description** | **Security needs** |
35+
|-------------|-----------------|--------------------|
36+
| [Transport layer](#transport-layer-security) | Communication between {{es}} nodes within a cluster | - Mutual TLS (required)<br>- Node authentication<br>- Node role verification |
37+
| [HTTP layer](#http-layer-security) | Communication between external clients and {{es}} through the REST API | - TLS encryption<br>- Authentication (basic auth, API keys, or token-based)<br>- Optional client certificate authentication |
38+
| [{{kib}}-to-{{es}}](#kib-to-es-communications) | Communication from the {{kib}} server to {{es}} for user requests and queries | - TLS encryption<br>- Service authentication (API keys, service tokens, or mutual TLS) |
2639

27-
**This page is a work in progress.** The documentation team is working to combine content pulled from the following pages:
2840

29-
% Doesn't exist
30-
% * [/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-security.md](/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-security.md)
41+
## Transport layer security
42+
43+
The transport layer is used for communication between {{es}} nodes in a cluster. Securing this layer prevents unauthorized nodes from joining your cluster and protects internode data.
44+
45+
**Deployment type notes:**
46+
- **Elastic Cloud & Serverless**: Transport security is fully managed by Elastic. No configuration is required.
47+
- **ECE/ECK**: Transport security is automatically configured by the operator. No direct user configuration is required.
48+
- **Self-managed**: Transport security must be manually configured following the steps in [Set up basic security](set-up-basic-security.md).
49+
50+
## HTTP layer security
51+
52+
The HTTP layer secures client communication with your {{es}} cluster via its REST API, preventing unauthorized access and protecting data in transit.
53+
54+
**Deployment type notes:**
55+
- **Elastic Cloud & Serverless**: HTTP security is fully managed by Elastic. No configuration is required.
56+
- **ECE/ECK**: HTTP security is automatically configured with self-signed certificates. Custom certificates can be configured.
57+
- **Self-managed**: HTTP security must be manually configured following [Secure HTTP communications](secure-http-communications.md).
58+
59+
## {{kib}}-to-{{es}} communications
60+
61+
{{kib}} connects to {{es}} as a client but requires special configuration as it performs operations on behalf of end users.
62+
63+
**Deployment type notes:**
64+
- **Elastic Cloud & Serverless**: {{kib}}-{{es}} communication is fully managed using HTTPS and service tokens.
65+
- **ECE/ECK**: {{kib}}-{{es}} communication is automatically secured with service tokens.
66+
- **Self-managed**: {{kib}}-{{es}} communication must be manually secured. For mutual TLS configuration, see [Mutual TLS authentication between {{kib}} and {{es}}](secure-http-communications.md#mutual-tls-kib-es).
67+
68+
## Certificate management [generate-certificates]
69+
70+
Managing certificates is critical for secure communications. Certificates have limited lifetimes and must be renewed before expiry to prevent service disruptions.
71+
72+
**Deployment type notes:**
73+
- **Elastic Cloud & Serverless**: Certificate management is fully automated by Elastic.
74+
- **ECE**: ECE generates certificates for you. Refer to [](/deploy-manage/security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md).
75+
76+
ECK**: Certificate generation and basic rotation is handled by the operator. Custom HTTP certificates require manual management.
77+
- **Self-managed**: Certificate management is your responsibility. See [Security certificates and keys](security-certificates-keys.md).
78+
79+
## Next steps
3180

32-
* [/raw-migrated-files/elasticsearch/elasticsearch-reference/security-basic-setup.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/security-basic-setup.md)
33-
* [/raw-migrated-files/kibana/kibana/elasticsearch-mutual-tls.md](/raw-migrated-files/kibana/kibana/elasticsearch-mutual-tls.md)
81+
- Configure [basic security and HTTPS](set-up-basic-security-plus-https.md) for self-managed deployments.
82+
- Learn about [HTTP communication security](secure-http-communications.md) best practices.
83+
- Understand how to securely manage [security certificates and keys](security-certificates-keys.md).
84+
- Check [SSL/TLS version compatibility](supported-ssltls-versions-by-jdk-version.md) for optimal encryption.

0 commit comments

Comments
 (0)