Skip to content

Commit 899e7bf

Browse files
[DOC] Server UUID Setting (elastic#128399) (elastic#131179)
The `server.uuid` setting MUST be a valid UUIDv4. Also, the setting was added in the middle of other SSL settings and it was misleading (due to a banner related to SSL settings). (cherry picked from commit 9a34c20) Co-authored-by: Luca Belluccini <[email protected]>
1 parent 5981e6b commit 899e7bf

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

docs/setup/settings.asciidoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -599,10 +599,6 @@ inactive socket. *Default: `"120000"`*
599599
| Paths to a PEM-encoded X.509 server certificate and its corresponding private key. These
600600
are used by {kib} to establish trust when receiving inbound SSL/TLS connections from users.
601601

602-
|[[server-uuid]] `server.uuid:`
603-
| The unique identifier for this {kib} instance.
604-
605-
606602
|===
607603

608604
[NOTE]
@@ -683,6 +679,9 @@ all http requests to https over the port configured as <<server-port, `server.po
683679
| An array of supported protocols with versions.
684680
Valid protocols: `TLSv1`, `TLSv1.1`, `TLSv1.2`, `TLSv1.3`. *Default: TLSv1.1, TLSv1.2, TLSv1.3*
685681

682+
|[[server-uuid]] `server.uuid:`
683+
| The unique identifier for this {kib} instance. It must be a valid UUIDv4. It gets automatically generated on the first startup if not specified and persisted in the `data` path.
684+
686685
| [[settings-xsrf-allowlist]] `server.xsrf.allowlist:`
687686
| It is not recommended to disable protections for
688687
arbitrary API endpoints. Instead, supply the `kbn-xsrf` header.

0 commit comments

Comments
 (0)