You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/security/secure-cluster-communications.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ The HTTP layer secures client communication with your {{es}} cluster via its RES
63
63
**Deployment type notes:**
64
64
-**Elastic Cloud & Serverless**: {{kib}}-{{es}} communication is fully managed using HTTPS and service tokens.
65
65
-**ECE/ECK**: {{kib}}-{{es}} communication is automatically secured with service tokens.
66
-
-**Self-managed**: {{kib}}-{{es}} communication must be manually secured. For mutual TLS configuration, see [Mutual TLS authentication between {{kib}} and {{es}}](secure-http-communications.md#mutual-tls-kib-es).
66
+
-**Self-managed**: {{kib}}-{{es}} communication must be manually secured. For mutual TLS configuration, see [Mutual TLS authentication between {{kib}} and {{es}}](secure-http-communications.md#elasticsearch-mutual-tls).
@@ -232,7 +232,7 @@ These instructions assume that you are using the default name for {{metricbeat}}
232
232
233
233
To create users and roles from Stack Management in {{kib}}, select**Roles** or **Users** from the side navigation.
234
234
235
-
**Next**: [Create a setup role](secure-http-communications.md#beats-setup-role)
235
+
**Next**: [Create a setup role](#beats-setup-role)
236
236
237
237
238
238
##### Create a setup role and user [beats-setup-role]
@@ -263,7 +263,7 @@ Setting up {{metricbeat}} is an admin-level task that requires extra privileges.
263
263
|`ingest_admin`| Set up index templates and, if available, ingest pipelines |
264
264
265
265
266
-
**Next**: [Create a monitoring role](secure-http-communications.md#beats-monitoring-role)
266
+
**Next**: [Create a monitoring role](#beats-monitoring-role)
267
267
268
268
269
269
##### Create a monitoring role and user [beats-monitoring-role]
@@ -302,12 +302,12 @@ You can use the built-in `beats_system` user, if it’s available in your enviro
302
302
|`monitoring_user`| Use Stack Monitoring in {{kib}} to monitor {{metricbeat}} |
303
303
304
304
305
-
**Next**: [Create a writer role](secure-http-communications.md#beats-writer-role)
305
+
**Next**: [Create a writer role](#beats-writer-role)
306
306
307
307
308
308
##### Create a writer role and user [beats-writer-role]
309
309
310
-
Users who publish events to {{es}} need to create and write to {{metricbeat}} indices. To minimize the privileges required by the writer role, use the setup role to pre-load dependencies. This section assumes that you’ve [created the setup role](secure-http-communications.md#beats-setup-role).
310
+
Users who publish events to {{es}} need to create and write to {{metricbeat}} indices. To minimize the privileges required by the writer role, use the setup role to pre-load dependencies. This section assumes that you’ve [created the setup role](#beats-setup-role).
311
311
312
312
1. Create the writer role:
313
313
2. Enter **metricbeat_writer** as the role name.
@@ -325,7 +325,7 @@ Users who publish events to {{es}} need to create and write to {{metricbeat}} in
325
325
|`remote_monitoring_agent`| Send monitoring data to the monitoring cluster |
326
326
327
327
328
-
**Next**: [Create a reader role](secure-http-communications.md#beats-reader-role)
328
+
**Next**: [Create a reader role](#beats-reader-role)
329
329
330
330
331
331
##### Create a reader role and user [beats-reader-role]
@@ -352,7 +352,7 @@ Users who publish events to {{es}} need to create and write to {{metricbeat}} in
352
352
|`beats_admin`| Create and manage configurations in {{beats}} centralmanagement. Only assign this role to users who need to use {{beats}} centralmanagement. |
353
353
354
354
355
-
**Next**: [Configure {{metricbeat}} to use TLS](secure-http-communications.md#configure-metricbeat-tls)
355
+
**Next**: [Configure {{metricbeat}} to use TLS](#configure-metricbeat-tls)
356
356
357
357
358
358
#### Configure {{metricbeat}} to use TLS [configure-metricbeat-tls]
@@ -368,7 +368,7 @@ In production environments, we strongly recommend using a separate cluster (refe
368
368
::::
369
369
370
370
371
-
1. On the node where you [generated certificates for the HTTP layer](secure-http-communications.md#encrypt-http-communication), navigate to the `/kibana` directory.
371
+
1. On the node where you [generated certificates for the HTTP layer](#encrypt-http-communication), navigate to the `/kibana` directory.
372
372
2. Copy the `elasticsearch-ca.pem` certificate to the directory where you installed {{metricbeat}}.
373
373
3. Open the `metricbeat.yml` configuration file and configure the connection to {{es}}.
Copy file name to clipboardExpand all lines: deploy-manage/security/using-kibana-with-security.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ You should use SSL/TLS encryption to ensure that traffic between browsers and th
87
87
88
88
### Enabling mutual TLS between {{kib}} and {{es}}
89
89
90
-
Refer to [](/deploy-manage/security/secure-http-communications#elasticsearch-mutual-tls) for information on how to enable mutual TLS between {{kib}} and {{es}}.
90
+
Refer to [](/deploy-manage/security/secure-http-communications.md#elasticsearch-mutual-tls) for information on how to enable mutual TLS between {{kib}} and {{es}}.
91
91
92
92
### Use {{stack}} {{security-features}} [configuring-kibana-shield]
0 commit comments