-
Notifications
You must be signed in to change notification settings - Fork 73
Doc: FIPS for Ingest tools 8.19 #1833
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
A documentation preview will be available soon. Request a new doc build by commenting
If your PR continues to fail for an unknown reason, the doc build pipeline may be broken. Elastic employees can check the pipeline status here. |
878f349
to
ac83954
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
For adding a link from APM Server, I would place a FIPS page linking to this in https://www.elastic.co/guide/en/observability/8.18/apm-securing-apm-server.html. |
|
||
preview::[] | ||
|
||
{agent}, {fleet}, {filebeat}, {metricbeat}, and APM Server binaries are built and can be configured to use FIPS 140-2 compliant cryptography. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@simitt @ycombinator nit: should we say can be configured
or are configured
? Aren't the defaults using FIPS compliant crypto for these builds?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think "are configured" is more accurate.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good... because I already made the change. :-)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM - only one nit comment, but I'm also ok to merge as-is.
|
||
- link:https://www.elastic.co/docs/reference/integrations/azure/events[Azure Logs Integration (v2 preview)] | ||
- link:https://www.elastic.co/docs/reference/integrations/azure/eventhub[Azure Event Hub Input] | ||
- link:https://www.elastic.co/docs/reference/integrations/sql[SQL Input] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
New addition from @shmsr
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved! Two non-blocking comments.
FIPS compatible binaries for {agent}, {fleet}, {filebeat}, {metricbeat}, and APM Server are available for link:https://www.elastic.co/downloads[download]. | ||
Look for the `Linux 64-bit (FIPS)` or `Linux aarch64 (FIPS)` platform option on the product download pages for {agent} and {fleet}, {filebeat}, and {metricbeat}. | ||
Look for the `Linux x86_64 (FIPS)` or `Linux aarch64 (FIPS)` platform option on the APM Server download page. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These read like discrete instructions. I wonder if they could be structured like a list.
Support for encrypted private keys is not available, as the cryptographic modules used for decrypting password protected keys are not FIPS validated. If an output or any other component with an SSL key that is password protected is configured, the components will fail to load the key. When running in FIPS mode, you must provide non-encrypted keys. | ||
Be sure to enforce security in your FIPS environments through other means, such as strict file permissions and access controls on the key file itself, for example. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same thing here. Could this be presented as a list of recommendations / considerations?
29630 |
Expands docs for FIPS compliance to include FIPS mode for Ingest tools
In this PR, we take the content created and reviewed in docs-content#2136 , convert it to MD, and replace links from new docs system with classic doc links. There's no comparable file location in pre-9.0 docs, and the Fleet and Agent Guide seemed like the best fit.
PREVIEW: https://ingest-docs_bk_1833.docs-preview.app.elstc.co/guide/en/fleet/8.19/fips-ingest.html
Related issue:
Related PR:
Remaining work