Skip to content

Commit f0ffbf0

Browse files
committed
fix links
1 parent 0308c69 commit f0ffbf0

File tree

3 files changed

+12
-12
lines changed

3 files changed

+12
-12
lines changed

deploy-manage/security/secure-cluster-communications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The HTTP layer secures client communication with your {{es}} cluster via its RES
6363
**Deployment type notes:**
6464
- **Elastic Cloud & Serverless**: {{kib}}-{{es}} communication is fully managed using HTTPS and service tokens.
6565
- **ECE/ECK**: {{kib}}-{{es}} communication is automatically secured with service tokens.
66-
- **Self-managed**: {{kib}}-{{es}} communication must be manually secured. For mutual TLS configuration, see [Mutual TLS authentication between {{kib}} and {{es}}](secure-http-communications.md#mutual-tls-kib-es).
66+
- **Self-managed**: {{kib}}-{{es}} communication must be manually secured. For mutual TLS configuration, see [Mutual TLS authentication between {{kib}} and {{es}}](secure-http-communications.md#elasticsearch-mutual-tls).
6767

6868
## Certificate management [generate-certificates]
6969

deploy-manage/security/set-up-basic-security-plus-https.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Complete all steps in [Set up basic security for the Elastic Stack](secure-clust
103103
4. Start {{es}}.
104104

105105

106-
**Next**: [Encrypt HTTP client communications for {{kib}}](secure-http-communications.md#encrypt-kibana-http)
106+
**Next**: [Encrypt HTTP client communications for {{kib}}](#encrypt-kibana-http)
107107

108108

109109
## Encrypt HTTP client communications for {{kib}} [encrypt-kibana-http]
@@ -140,7 +140,7 @@ You must create a separate `elasticsearch-ca.pem` security file for the monitori
140140
:::::
141141

142142

143-
**Next**: [Encrypt traffic between your browser and {{kib}}](secure-http-communications.md#encrypt-kibana-browser)
143+
**Next**: [Encrypt traffic between your browser and {{kib}}](#encrypt-kibana-browser)
144144

145145

146146
### Encrypt traffic between your browser and {{kib}} [encrypt-kibana-browser]
@@ -198,7 +198,7 @@ After making these changes, you must always access {{kib}} via HTTPS. For exampl
198198
::::
199199

200200

201-
**Next**: [Configure {{beats}} security](secure-http-communications.md#configure-beats-security)
201+
**Next**: [Configure {{beats}} security](#configure-beats-security)
202202

203203

204204

@@ -232,7 +232,7 @@ These instructions assume that you are using the default name for {{metricbeat}}
232232

233233
To create users and roles from Stack Management in {{kib}}, select **Roles** or **Users** from the side navigation.
234234

235-
**Next**: [Create a setup role](secure-http-communications.md#beats-setup-role)
235+
**Next**: [Create a setup role](#beats-setup-role)
236236

237237

238238
##### Create a setup role and user [beats-setup-role]
@@ -263,7 +263,7 @@ Setting up {{metricbeat}} is an admin-level task that requires extra privileges.
263263
| `ingest_admin` | Set up index templates and, if available, ingest pipelines |
264264

265265

266-
**Next**: [Create a monitoring role](secure-http-communications.md#beats-monitoring-role)
266+
**Next**: [Create a monitoring role](#beats-monitoring-role)
267267

268268

269269
##### Create a monitoring role and user [beats-monitoring-role]
@@ -302,12 +302,12 @@ You can use the built-in `beats_system` user, if it’s available in your enviro
302302
| `monitoring_user` | Use Stack Monitoring in {{kib}} to monitor {{metricbeat}} |
303303

304304

305-
**Next**: [Create a writer role](secure-http-communications.md#beats-writer-role)
305+
**Next**: [Create a writer role](#beats-writer-role)
306306

307307

308308
##### Create a writer role and user [beats-writer-role]
309309

310-
Users who publish events to {{es}} need to create and write to {{metricbeat}} indices. To minimize the privileges required by the writer role, use the setup role to pre-load dependencies. This section assumes that you’ve [created the setup role](secure-http-communications.md#beats-setup-role).
310+
Users who publish events to {{es}} need to create and write to {{metricbeat}} indices. To minimize the privileges required by the writer role, use the setup role to pre-load dependencies. This section assumes that you’ve [created the setup role](#beats-setup-role).
311311

312312
1. Create the writer role:
313313
2. Enter **metricbeat_writer** as the role name.
@@ -325,7 +325,7 @@ Users who publish events to {{es}} need to create and write to {{metricbeat}} in
325325
| `remote_monitoring_agent` | Send monitoring data to the monitoring cluster |
326326

327327

328-
**Next**: [Create a reader role](secure-http-communications.md#beats-reader-role)
328+
**Next**: [Create a reader role](#beats-reader-role)
329329

330330

331331
##### Create a reader role and user [beats-reader-role]
@@ -352,7 +352,7 @@ Users who publish events to {{es}} need to create and write to {{metricbeat}} in
352352
| `beats_admin` | Create and manage configurations in {{beats}} centralmanagement. Only assign this role to users who need to use {{beats}} centralmanagement. |
353353

354354

355-
**Next**: [Configure {{metricbeat}} to use TLS](secure-http-communications.md#configure-metricbeat-tls)
355+
**Next**: [Configure {{metricbeat}} to use TLS](#configure-metricbeat-tls)
356356

357357

358358
#### Configure {{metricbeat}} to use TLS [configure-metricbeat-tls]
@@ -368,7 +368,7 @@ In production environments, we strongly recommend using a separate cluster (refe
368368
::::
369369

370370

371-
1. On the node where you [generated certificates for the HTTP layer](secure-http-communications.md#encrypt-http-communication), navigate to the `/kibana` directory.
371+
1. On the node where you [generated certificates for the HTTP layer](#encrypt-http-communication), navigate to the `/kibana` directory.
372372
2. Copy the `elasticsearch-ca.pem` certificate to the directory where you installed {{metricbeat}}.
373373
3. Open the `metricbeat.yml` configuration file and configure the connection to {{es}}.
374374

deploy-manage/security/using-kibana-with-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ You should use SSL/TLS encryption to ensure that traffic between browsers and th
8787

8888
### Enabling mutual TLS between {{kib}} and {{es}}
8989

90-
Refer to [](/deploy-manage/security/secure-http-communications#elasticsearch-mutual-tls) for information on how to enable mutual TLS between {{kib}} and {{es}}.
90+
Refer to [](/deploy-manage/security/secure-http-communications.md#elasticsearch-mutual-tls) for information on how to enable mutual TLS between {{kib}} and {{es}}.
9191

9292
### Use {{stack}} {{security-features}} [configuring-kibana-shield]
9393

0 commit comments

Comments
 (0)