Skip to content

Commit 4b425d3

Browse files
committed
[DOCS] Fix invalid links
1 parent 8c737fb commit 4b425d3

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

docs/reference/elasticsearch-plugins/discovery-ec2-usage.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -22,22 +22,24 @@ discovery.seed_providers: ec2
2222
2323
## Configuring EC2 discovery [_configuring_ec2_discovery]
2424
25-
EC2 discovery supports a number of settings. Some settings are sensitive and must be stored in the [{{es}} keystore](docs-content://deploy-manage/security/secure-settings.md). For example, to authenticate using a particular access key and secret key, add these keys to the keystore by running the following commands:
25+
EC2 discovery supports a number of settings. Some settings are sensitive and must be stored in the {{es}} keystore. For example, to authenticate using a particular access key and secret key, add these keys to the keystore by running the following commands:
2626
2727
```sh
2828
bin/elasticsearch-keystore add discovery.ec2.access_key
2929
bin/elasticsearch-keystore add discovery.ec2.secret_key
3030
```
3131

32+
All **secure** settings of this plugin are reloadable, allowing you to update the secure settings for this plugin without needing to restart each node. For more information about secure and reloadable settings, go to [](docs-content://deploy-manage/security/secure-settings.md)
33+
3234
The available settings for the EC2 discovery plugin are as follows.
3335

34-
`discovery.ec2.access_key` ({{ref}}/secure-settings.html[Secure], [reloadable](docs-content://deploy-manage/security/secure-settings.md#reloadable-secure-settings))
36+
`discovery.ec2.access_key` (Secure, reloadable)
3537
: An EC2 access key. If set, you must also set `discovery.ec2.secret_key`. If unset, `discovery-ec2` will instead use the instance role. This setting is sensitive and must be stored in the {{es}} keystore.
3638

37-
`discovery.ec2.secret_key` ({{ref}}/secure-settings.html[Secure], [reloadable](docs-content://deploy-manage/security/secure-settings.md#reloadable-secure-settings))
39+
`discovery.ec2.secret_key` (Secure, reloadable)
3840
: An EC2 secret key. If set, you must also set `discovery.ec2.access_key`. This setting is sensitive and must be stored in the {{es}} keystore.
3941

40-
`discovery.ec2.session_token` ({{ref}}/secure-settings.html[Secure], [reloadable](docs-content://deploy-manage/security/secure-settings.md#reloadable-secure-settings))
42+
`discovery.ec2.session_token` (Secure, reloadable)
4143
: An EC2 session token. If set, you must also set `discovery.ec2.access_key` and `discovery.ec2.secret_key`. This setting is sensitive and must be stored in the {{es}} keystore.
4244

4345
`discovery.ec2.endpoint`
@@ -55,10 +57,10 @@ The available settings for the EC2 discovery plugin are as follows.
5557
`discovery.ec2.proxy.scheme`
5658
: The scheme to use when connecting to the EC2 service endpoint through proxy specified in `discovery.ec2.proxy.host`. Valid values are `http` or `https`. Defaults to `http`.
5759

58-
`discovery.ec2.proxy.username` ({{ref}}/secure-settings.html[Secure], [reloadable](docs-content://deploy-manage/security/secure-settings.md#reloadable-secure-settings))
60+
`discovery.ec2.proxy.username` (Secure, reloadable)
5961
: When the address of an HTTP proxy is given in `discovery.ec2.proxy.host`, this setting determines the username to use to connect to the proxy. When not set, no username is used. This setting is sensitive and must be stored in the {{es}} keystore.
6062

61-
`discovery.ec2.proxy.password` ({{ref}}/secure-settings.html[Secure], [reloadable](docs-content://deploy-manage/security/secure-settings.md#reloadable-secure-settings))
63+
`discovery.ec2.proxy.password` (Secure, reloadable)
6264
: When the address of an HTTP proxy is given in `discovery.ec2.proxy.host`, this setting determines the password to use to connect to the proxy. When not set, no password is used. This setting is sensitive and must be stored in the {{es}} keystore.
6365

6466
`discovery.ec2.read_timeout`
@@ -100,9 +102,6 @@ The names of tags used for discovery may only contain ASCII letters, numbers, hy
100102
`discovery.ec2.node_cache_time`
101103
: Sets the length of time for which the collection of discovered instances is cached. {{es}} waits at least this long between requests for discovery information from the EC2 API. AWS may reject discovery requests if they are made too often, and this would cause discovery to fail. Defaults to `10s`.
102104

103-
All **secure** settings of this plugin are [reloadable](docs-content://deploy-manage/security/secure-settings.md#reloadable-secure-settings), allowing you to update the secure settings for this plugin without needing to restart each node.
104-
105-
106105
## Recommended EC2 permissions [discovery-ec2-permissions]
107106

108107
The `discovery-ec2` plugin works by making a `DescribeInstances` call to the AWS EC2 API. You must configure your AWS account to allow this, which is normally done using an IAM policy. You can create a custom policy via the IAM Management Console. It should look similar to this.

0 commit comments

Comments
 (0)