diff --git a/deploy-manage/remote-clusters/remote-clusters-self-managed.md b/deploy-manage/remote-clusters/remote-clusters-self-managed.md index c6b9ddec57..572e790069 100644 --- a/deploy-manage/remote-clusters/remote-clusters-self-managed.md +++ b/deploy-manage/remote-clusters/remote-clusters-self-managed.md @@ -35,14 +35,14 @@ $$$sniff-mode$$$ Sniff mode : In sniff mode, a cluster alias is registered with a name of your choosing and a list of addresses of *seed* nodes specified with the `cluster.remote..seeds` setting. When you register a remote cluster using sniff mode, {{es}} retrieves from one of the seed nodes the addresses of up to three *gateway nodes*. Each `remote_cluster_client` node in the local {{es}} cluster then opens several TCP connections to the publish addresses of the gateway nodes. This mode therefore requires that the gateway nodes' publish addresses are accessible to nodes in the local cluster. - Sniff mode is the default connection mode. See [Sniff mode remote cluster settings](remote-clusters-settings.md#remote-cluster-sniff-settings) for more information about configuring sniff mode. + Sniff mode is the default connection mode. See [Sniff mode remote cluster settings](elasticsearch://docs/reference/elasticsearch/configuration-reference/remote-clusters.md#remote-cluster-sniff-settings) for more information about configuring sniff mode. $$$gateway-nodes-selection$$$ The *gateway nodes* selection depends on the following criteria: * **version**: Remote nodes must be compatible with the cluster they are registered to. * **role**: By default, any non-[master-eligible](/deploy-manage/distributed-architecture/clusters-nodes-shards/node-roles.md#master-node-role) node can act as a gateway node. Dedicated master nodes are never selected as gateway nodes. - * **attributes**: You can define the gateway nodes for a cluster by setting [`cluster.remote.node.attr.gateway`](remote-clusters-settings.md#cluster-remote-node-attr) to `true`. However, such nodes still have to satisfy the two above requirements. + * **attributes**: You can define the gateway nodes for a cluster by setting [`cluster.remote.node.attr.gateway`](elasticsearch://docs/reference/elasticsearch/configuration-reference/remote-clusters.md#cluster-remote-node-attr) to `true`. However, such nodes still have to satisfy the two above requirements. $$$proxy-mode$$$ @@ -50,6 +50,6 @@ $$$proxy-mode$$$ Proxy mode : In proxy mode, a cluster alias is registered with a name of your choosing and the address of a TCP (layer 4) reverse proxy specified with the `cluster.remote..proxy_address` setting. You must configure this proxy to route connections to one or more nodes of the remote cluster. When you register a remote cluster using proxy mode, {{es}} opens several TCP connections to the proxy address and uses these connections to communicate with the remote cluster. In proxy mode {{es}} disregards the publish addresses of the remote cluster nodes which means that the publish addresses of the remote cluster nodes need not be accessible to the local cluster. - Proxy mode is not the default connection mode, so you must set `cluster.remote..mode: proxy` to use it. See [Proxy mode remote cluster settings](remote-clusters-settings.md#remote-cluster-proxy-settings) for more information about configuring proxy mode. + Proxy mode is not the default connection mode, so you must set `cluster.remote..mode: proxy` to use it. See [Proxy mode remote cluster settings](elasticsearch://docs/reference/elasticsearch/configuration-reference/remote-clusters.md#remote-cluster-proxy-settings) for more information about configuring proxy mode. Proxy mode has the same [version compatibility requirements](#gateway-nodes-selection) as sniff mode. diff --git a/deploy-manage/remote-clusters/remote-clusters-settings.md b/deploy-manage/remote-clusters/remote-clusters-settings.md deleted file mode 100644 index 77130baba7..0000000000 --- a/deploy-manage/remote-clusters/remote-clusters-settings.md +++ /dev/null @@ -1,75 +0,0 @@ ---- -mapped_pages: - - https://www.elastic.co/guide/en/elasticsearch/reference/current/remote-clusters-settings.html -applies_to: - deployment: - self: ga -products: - - id: elasticsearch ---- - -# Remote cluster settings [remote-clusters-settings] - -The following settings apply to both [sniff mode](/deploy-manage/remote-clusters/remote-clusters-self-managed.md#sniff-mode) and [proxy mode](/deploy-manage/remote-clusters/remote-clusters-self-managed.md#proxy-mode). Settings that are specific to sniff mode and proxy mode are described separately. - -`cluster.remote..mode` -: The mode used for a remote cluster connection. The only supported modes are `sniff` and `proxy`. The default is `sniff`. See [Connection modes](/deploy-manage/remote-clusters/remote-clusters-self-managed.md#sniff-proxy-modes) for further information about these modes, and [Sniff mode remote cluster settings](#remote-cluster-sniff-settings) and [Proxy mode remote cluster settings](#remote-cluster-proxy-settings) for further information about their settings. - -`cluster.remote.initial_connect_timeout` -: The time to wait for remote connections to be established when the node starts. The default is `30s`. - -`remote_cluster_client` [role](elasticsearch://reference/elasticsearch/configuration-reference/node-settings.md#node-roles) -: By default, any node in the cluster can act as a cross-cluster client and connect to remote clusters. To prevent a node from connecting to remote clusters, specify the [node.roles](elasticsearch://reference/elasticsearch/configuration-reference/node-settings.md#node-roles) setting in [`elasticsearch.yml`](/deploy-manage/stack-settings.md) and exclude `remote_cluster_client` from the listed roles. Search requests targeting remote clusters must be sent to a node that is allowed to act as a cross-cluster client. Other features such as {{ml}} [data feeds](elasticsearch://reference/elasticsearch/configuration-reference/machine-learning-settings.md#general-ml-settings), [transforms](elasticsearch://reference/elasticsearch/configuration-reference/transforms-settings.md#general-transform-settings), and [{{ccr}}](../tools/cross-cluster-replication/set-up-cross-cluster-replication.md) require the `remote_cluster_client` role. - -`cluster.remote..skip_unavailable` -: Per cluster boolean setting that allows to skip specific clusters when no nodes belonging to them are available and they are the target of a remote cluster request. - -::::{important} -In {{es}} 8.15, the default value for `skip_unavailable` was changed from `false` to `true`. Before {{es}} 8.15, if you want a cluster to be treated as optional for a {{ccs}}, then you need to set that configuration. From {{es}} 8.15 forward, you need to set the configuration in order to make a cluster required for the {{ccs}}. Once you upgrade the local ("querying") cluster search coordinator node (the node you send CCS requests to) to 8.15 or later, any remote clusters that do not have an explicit setting for `skip_unavailable` will immediately change over to using the new default of true. This is true regardless of whether you have upgraded the remote clusters to 8.15, as the `skip_unavailable` search behavior is entirely determined by the setting on the local cluster where you configure the remotes. -:::: - - -`cluster.remote..transport.ping_schedule` -: Sets the time interval between regular application-level ping messages that are sent to try and keep remote cluster connections alive. If set to `-1`, application-level ping messages to this remote cluster are not sent. If unset, application-level ping messages are sent according to the global `transport.ping_schedule` setting, which defaults to `-1` meaning that pings are not sent. It is preferable to correctly configure TCP keep-alives instead of configuring a `ping_schedule`, because TCP keep-alives are handled by the operating system and not by {{es}}. By default {{es}} enables TCP keep-alives on remote cluster connections. Remote cluster connections are transport connections so the `transport.tcp.*` [advanced settings](elasticsearch://reference/elasticsearch/configuration-reference/networking-settings.md#transport-settings) regarding TCP keep-alives apply to them. - -`cluster.remote..transport.compress` -: Per-cluster setting that enables you to configure compression for requests to a specific remote cluster. The handling cluster will automatically compress responses to compressed requests. The setting options are `true`, `indexing_data`, and `false`. If unset, defaults to the behavior specified by the node-wide `transport.compress` setting. See the [documentation for the `transport.compress` setting](elasticsearch://reference/elasticsearch/configuration-reference/networking-settings.md#transport-settings-compress) for further information. - -`cluster.remote..transport.compression_scheme` -: Per-cluster setting that enables you to configure the compression scheme for requests to a specific cluster if those requests are selected to be compressed by to the `cluster.remote..transport.compress` setting. The handling cluster will automatically use the same compression scheme for responses as for the corresponding requests. The setting options are `deflate` and `lz4`. If unset, defaults to the behavior specified by the node-wide `transport.compression_scheme` setting. See the [documentation for the `transport.compression_scheme` setting](elasticsearch://reference/elasticsearch/configuration-reference/networking-settings.md#transport-settings-compression-scheme) for further information. - -$$$remote-cluster-credentials-setting$$$ - -`cluster.remote..credentials` -: ([Secure](../security/secure-settings.md), [Reloadable](../security/secure-settings.md#reloadable-secure-settings)) Per-cluster setting for configuring [remote clusters with the API Key based model](remote-clusters-api-key.md). This setting takes the encoded value of a [cross-cluster API key](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-create-cross-cluster-api-key) and must be set in the [{{es}} keystore](../security/secure-settings.md) on each node in the cluster. The presence (or not) of this setting determines which model a remote cluster uses. If present, the remote cluster uses the API key based model. Otherwise, it uses the certificate based model. If the setting is added, removed, or updated in the [{{es}} keystore](../security/secure-settings.md) and reloaded via the [Nodes reload secure settings](../security/secure-settings.md) API, the cluster will automatically rebuild its connection to the remote. - -## Sniff mode remote cluster settings [remote-cluster-sniff-settings] - -To use [sniff mode](/deploy-manage/remote-clusters/remote-clusters-self-managed.md#sniff-mode) to connect to a remote cluster, set `cluster.remote..mode: sniff` and then configure the following settings. You may also leave `cluster.remote..mode` unset since `sniff` is the default mode. - -`cluster.remote..seeds` -: The list of seed nodes used to sniff the remote cluster state. - -`cluster.remote..node_connections` -: The number of gateway nodes to connect to for this remote cluster. The default is `3`. - -$$$cluster-remote-node-attr$$$ - -`cluster.remote.node.attr` -: A node attribute to filter out nodes that are eligible as a gateway node in the remote cluster. For instance a node can have a node attribute `node.attr.gateway: true` such that only nodes with this attribute will be connected to if `cluster.remote.node.attr` is set to `gateway`. - - -## Proxy mode remote cluster settings [remote-cluster-proxy-settings] - -To use [proxy mode](/deploy-manage/remote-clusters/remote-clusters-self-managed.md#proxy-mode) to connect to a remote cluster, set `cluster.remote..mode: proxy` and then configure the following settings. - -`cluster.remote..proxy_address` -: The address used for all remote connections. A single address value, either an IP address or a fully qualified domain name (FQDN). - -`cluster.remote..proxy_socket_connections` -: The number of socket connections to open per remote cluster. The default is `18`. - -`cluster.remote..server_name` -: An optional hostname string which is sent in the `server_name` field of the TLS Server Name Indication extension if [TLS is enabled](../security/secure-cluster-communications.md#encrypt-internode-communication). The TLS transport will fail to open remote connections if this field is not a valid hostname as defined by the TLS SNI specification. - - diff --git a/deploy-manage/toc.yml b/deploy-manage/toc.yml index abdae564db..bd419e0278 100644 --- a/deploy-manage/toc.yml +++ b/deploy-manage/toc.yml @@ -655,7 +655,6 @@ toc: - file: remote-clusters/remote-clusters-api-key.md - file: remote-clusters/remote-clusters-cert.md - file: remote-clusters/remote-clusters-migrate.md - - file: remote-clusters/remote-clusters-settings.md - file: remote-clusters/eck-remote-clusters.md - file: cloud-connect.md - file: monitor.md