diff --git a/deploy-manage/deploy/cloud-on-k8s/elastic-maps-server.md b/deploy-manage/deploy/cloud-on-k8s/elastic-maps-server.md index 4a119d2311..add0176581 100644 --- a/deploy-manage/deploy/cloud-on-k8s/elastic-maps-server.md +++ b/deploy-manage/deploy/cloud-on-k8s/elastic-maps-server.md @@ -35,6 +35,11 @@ The following sections describe how to customize an Elastic Maps Server deployme * [Disable TLS](http-configuration.md#k8s-maps-http-disable-tls) * [Ingress and Kibana configuration](http-configuration.md#k8s-maps-ingress) +:::{admonition} Support scope for Ingress Controllers +[Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/) is a standard Kubernetes concept. While ECK-managed workloads can be publicly exposed using ingress resources, and we provide [example configurations](/deploy-manage/deploy/cloud-on-k8s/recipes.md), setting up an Ingress controller requires in-house Kubernetes expertise. + +If ingress configuration is challenging or unsupported in your environment, consider using standard `LoadBalancer` services as a simpler alternative. +::: diff --git a/deploy-manage/deploy/cloud-on-k8s/http-configuration.md b/deploy-manage/deploy/cloud-on-k8s/http-configuration.md index 3b1f11268e..44a0534f0b 100644 --- a/deploy-manage/deploy/cloud-on-k8s/http-configuration.md +++ b/deploy-manage/deploy/cloud-on-k8s/http-configuration.md @@ -33,5 +33,10 @@ You can disable the generation of the self-signed certificate and hence disable To use Elastic Maps Server from your Kibana instances, you need to configure Kibana to fetch maps from your Elastic Maps Server instance by using the [`map.emsUrl`](/explore-analyze/visualize/maps/maps-connect-to-ems.md#elastic-maps-server-kibana) configuration key. The value of this setting needs to be the URL where the Elastic Maps Server instance is reachable from your browser. The certificates presented by Elastic Maps Server need to be trusted by the browser, and the URL must have the same origin as the URL where your Kibana is hosted to avoid cross origin resource issues. Check the [recipe section](https://github.com/elastic/cloud-on-k8s/tree/2.16/config/recipes/) for an example on how to set this up using an Ingress resource. +:::{admonition} Support scope for Ingress Controllers +[Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/) is a standard Kubernetes concept. While ECK-managed workloads can be publicly exposed using ingress resources, and we provide [example configurations](/deploy-manage/deploy/cloud-on-k8s/recipes.md), setting up an Ingress controller requires in-house Kubernetes expertise. + +If ingress configuration is challenging or unsupported in your environment, consider using standard `LoadBalancer` services as a simpler alternative. +::: diff --git a/deploy-manage/deploy/cloud-on-k8s/managing-deployments-using-helm-chart.md b/deploy-manage/deploy/cloud-on-k8s/managing-deployments-using-helm-chart.md index 46a8daa5d4..0235de0a6f 100644 --- a/deploy-manage/deploy/cloud-on-k8s/managing-deployments-using-helm-chart.md +++ b/deploy-manage/deploy/cloud-on-k8s/managing-deployments-using-helm-chart.md @@ -101,6 +101,13 @@ helm install es-quickstart elastic/eck-elasticsearch -n elastic-stack --create-n ## Adding Ingress to the Elastic stack [k8s-eck-stack-ingress] +:::{admonition} Support scope for Ingress Controllers +[Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/) is a standard Kubernetes concept. While ECK-managed workloads can be publicly exposed using ingress resources, and we provide [example configurations](/deploy-manage/deploy/cloud-on-k8s/recipes.md), setting up an Ingress controller requires in-house Kubernetes expertise. + +If ingress configuration is challenging or unsupported in your environment, consider using standard `LoadBalancer` services as a simpler alternative. +::: + + Both {{es}} and {{kib}} support [Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/), which can be enabled using the following options: **If an individual chart is used (not eck-stack)** diff --git a/deploy-manage/deploy/cloud-on-k8s/recipes.md b/deploy-manage/deploy/cloud-on-k8s/recipes.md index c4ae1a0ab3..14bbdcedbc 100644 --- a/deploy-manage/deploy/cloud-on-k8s/recipes.md +++ b/deploy-manage/deploy/cloud-on-k8s/recipes.md @@ -22,4 +22,11 @@ This section includes recipes that provide configuration examples for some commo Compared to other configuration examples that are consistently tested, like [fleet-managed Elastic Agent on ECK](configuration-examples-fleet.md), [standalone Elastic Agent on ECK](configuration-examples-standalone.md), or [Beats on ECK](/deploy-manage/deploy/cloud-on-k8s/configuration-examples-beats.md), the recipes in this section are not regularly tested by our automation system, and therefore should not be considered to be production-ready. :::: +:::{admonition} Support scope for Ingress Controllers +[Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/) is a standard Kubernetes concept. While ECK-managed workloads can be publicly exposed using ingress resources, and we provide [example configurations](/deploy-manage/deploy/cloud-on-k8s/recipes.md), setting up an Ingress controller requires in-house Kubernetes expertise. + +If ingress configuration is challenging or unsupported in your environment, consider using standard `LoadBalancer` services as a simpler alternative. +::: + + diff --git a/deploy-manage/deploy/cloud-on-k8s/requests-routing-to-elasticsearch-nodes.md b/deploy-manage/deploy/cloud-on-k8s/requests-routing-to-elasticsearch-nodes.md index 903b665d23..01864075db 100644 --- a/deploy-manage/deploy/cloud-on-k8s/requests-routing-to-elasticsearch-nodes.md +++ b/deploy-manage/deploy/cloud-on-k8s/requests-routing-to-elasticsearch-nodes.md @@ -12,6 +12,13 @@ The default Kubernetes service created by ECK, named `-es-http`, i As an alternative, you can use features provided by third-party software such as service meshes and ingress controllers to achieve more advanced traffic management configurations. Check the [recipes directory](https://github.com/elastic/cloud-on-k8s/tree/2.16/config/recipes) in the ECK source repository for a few examples. +:::{admonition} Support scope for Ingress Controllers +[Ingress](https://kubernetes.io/docs/concepts/services-networking/ingress/) is a standard Kubernetes concept. While ECK-managed workloads can be publicly exposed using ingress resources, and we provide [example configurations](/deploy-manage/deploy/cloud-on-k8s/recipes.md), setting up an Ingress controller requires in-house Kubernetes expertise. + +If ingress configuration is challenging or unsupported in your environment, consider using standard `LoadBalancer` services as a simpler alternative. +::: + + The service configurations shown in these sections are based on the following Elasticsearch cluster definition: ```yaml