Skip to content

Commit 665b656

Browse files
authored
[DOCS] Set explicit anchors for TLS/SSL settings (elastic#42524)
1 parent c261220 commit 665b656

File tree

4 files changed

+22
-1
lines changed

4 files changed

+22
-1
lines changed

docs/reference/settings/monitoring-settings.asciidoc

+1
Original file line numberDiff line numberDiff line change
@@ -283,5 +283,6 @@ For example: `["elasticsearch_version_mismatch","xpack_license_expiration"]`.
283283
:component: {monitoring}
284284
:verifies:
285285
:server!:
286+
:ssl-context: monitoring
286287

287288
include::ssl-settings.asciidoc[]

docs/reference/settings/notification-settings.asciidoc

+1
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,7 @@ corresponding endpoints are whitelisted as well.
8585
:component: {watcher}
8686
:verifies:
8787
:server!:
88+
:ssl-context: watcher
8889

8990
include::ssl-settings.asciidoc[]
9091

docs/reference/settings/security-settings.asciidoc

+2
Original file line numberDiff line numberDiff line change
@@ -1566,6 +1566,7 @@ a PKCS#12 container includes trusted certificate ("anchor") entries look for
15661566
:client-auth-default: none
15671567
:verifies!:
15681568
:server:
1569+
:ssl-context: security-http
15691570

15701571
include::ssl-settings.asciidoc[]
15711572

@@ -1575,6 +1576,7 @@ include::ssl-settings.asciidoc[]
15751576
:client-auth-default!:
15761577
:verifies:
15771578
:server:
1579+
:ssl-context: security-transport
15781580

15791581
include::ssl-settings.asciidoc[]
15801582

docs/reference/settings/ssl-settings.asciidoc

+18-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
21
==== {component} TLS/SSL Settings
32
You can configure the following TLS/SSL settings. If the settings are not configured,
43
the {ref}/security-settings.html#ssl-tls-settings[Default TLS/SSL Settings]
@@ -39,7 +38,13 @@ endif::verifies[]
3938
Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html[
4039
Java Cryptography Architecture documentation]. Defaults to ``.
4140

41+
ifdef::asciidoctor[]
42+
[#{ssl-context}-tls-ssl-key-trusted-certificate-settings]
4243
===== {component} TLS/SSL Key and Trusted Certificate Settings
44+
endif::[]
45+
ifndef::asciidoctor[]
46+
===== anchor:{ssl-context}-tls-ssl-key-trusted-certificate-settings[] {component} TLS/SSL Key and Trusted Certificate Settings
47+
endif::[]
4348

4449
The following settings are used to specify a private key, certificate, and the
4550
trusted certificates that should be used when communicating over an SSL/TLS connection.
@@ -105,7 +110,13 @@ Password to the truststore.
105110
+{ssl-prefix}.ssl.truststore.secure_password+ (<<secure-settings,Secure>>)::
106111
Password to the truststore.
107112

113+
ifdef::asciidoctor[]
114+
[#{ssl-context}-pkcs12-files]
108115
===== PKCS#12 Files
116+
endif::[]
117+
ifndef::asciidoctor[]
118+
===== anchor:{ssl-context}-pkcs12-files[] PKCS#12 Files
119+
endif::[]
109120

110121
{es} can be configured to use PKCS#12 container files (`.p12` or `.pfx` files)
111122
that contain the private key, certificate and certificates that should be trusted.
@@ -143,7 +154,13 @@ Password to the PKCS#12 file.
143154
+{ssl-prefix}.ssl.truststore.secure_password+ (<<secure-settings,Secure>>)::
144155
Password to the PKCS#12 file.
145156

157+
ifdef::asciidoctor[]
158+
[#{ssl-context}-pkcs11-tokens]
146159
===== PKCS#11 Tokens
160+
endif::[]
161+
ifndef::asciidoctor[]
162+
===== anchor:{ssl-context}-pkcs11-tokens[] PKCS#11 Tokens
163+
endif::[]
147164

148165
{es} can be configured to use a PKCS#11 token that contains the private key,
149166
certificate and certificates that should be trusted.

0 commit comments

Comments
 (0)