Skip to content

Commit 26bb244

Browse files
committed
[DOCS] Set explicit anchors for TLS/SSL settings (#42524) (fixup)
1 parent d5b59d5 commit 26bb244

File tree

4 files changed

+23
-1
lines changed

4 files changed

+23
-1
lines changed

docs/reference/settings/monitoring-settings.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -280,5 +280,6 @@ For example: `["elasticsearch_version_mismatch","xpack_license_expiration"]`.
280280
:component: {monitoring}
281281
:verifies:
282282
:server!:
283+
:ssl-context: monitoring
283284

284285
include::ssl-settings.asciidoc[]

docs/reference/settings/notification-settings.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,7 @@ Specifies the maximum size an HTTP response is allowed to have, defaults to
7171
:component: {watcher}
7272
:verifies:
7373
:server!:
74+
:ssl-context: watcher
7475

7576
include::ssl-settings.asciidoc[]
7677

docs/reference/settings/security-settings.asciidoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1426,6 +1426,7 @@ http layer.
14261426
:client-auth-default: none
14271427
:verifies!:
14281428
:server:
1429+
:ssl-context: security-http
14291430

14301431
include::ssl-settings.asciidoc[]
14311432

@@ -1435,6 +1436,7 @@ include::ssl-settings.asciidoc[]
14351436
:client-auth-default!:
14361437
:verifies:
14371438
:server:
1439+
:ssl-context: security-transport
14381440

14391441
include::ssl-settings.asciidoc[]
14401442

@@ -1458,6 +1460,7 @@ setting, this would be `transport.profiles.$PROFILE.xpack.security.ssl.key`.
14581460
:component: Auditing
14591461
:client-auth-default!:
14601462
:server!:
1463+
:ssl-context: auditing
14611464

14621465
include::ssl-settings.asciidoc[]
14631466

docs/reference/settings/ssl-settings.asciidoc

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
21
==== {component} TLS/SSL Settings
32
You can configure the following TLS/SSL settings. If the settings are not configured,
43
the {ref}/security-settings.html#ssl-tls-settings[Default TLS/SSL Settings]
@@ -41,7 +40,13 @@ Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8
4140
Java Cryptography Architecture documentation]. Defaults to the value of
4241
`xpack.ssl.cipher_suites`.
4342

43+
ifdef::asciidoctor[]
44+
[#{ssl-context}-tls-ssl-key-trusted-certificate-settings]
4445
===== {component} TLS/SSL Key and Trusted Certificate Settings
46+
endif::[]
47+
ifndef::asciidoctor[]
48+
===== anchor:{ssl-context}-tls-ssl-key-trusted-certificate-settings[] {component} TLS/SSL Key and Trusted Certificate Settings
49+
endif::[]
4550

4651
The following settings are used to specify a private key, certificate, and the
4752
trusted certificates that should be used when communicating over an SSL/TLS connection.
@@ -107,7 +112,13 @@ Password to the truststore.
107112
+{ssl-prefix}.ssl.truststore.secure_password+ (<<secure-settings,Secure>>)::
108113
Password to the truststore.
109114

115+
ifdef::asciidoctor[]
116+
[#{ssl-context}-pkcs12-files]
110117
===== PKCS#12 Files
118+
endif::[]
119+
ifndef::asciidoctor[]
120+
===== anchor:{ssl-context}-pkcs12-files[] PKCS#12 Files
121+
endif::[]
111122

112123
{es} can be configured to use PKCS#12 container files (`.p12` or `.pfx` files)
113124
that contain the private key, certificate and certificates that should be trusted.
@@ -145,7 +156,13 @@ Password to the PKCS#12 file.
145156
+{ssl-prefix}.ssl.truststore.secure_password+ (<<secure-settings,Secure>>)::
146157
Password to the PKCS#12 file.
147158

159+
ifdef::asciidoctor[]
160+
[#{ssl-context}-pkcs11-tokens]
148161
===== PKCS#11 Tokens
162+
endif::[]
163+
ifndef::asciidoctor[]
164+
===== anchor:{ssl-context}-pkcs11-tokens[] PKCS#11 Tokens
165+
endif::[]
149166

150167
{es} can be configured to use a PKCS#11 token that contains the private key,
151168
certificate and certificates that should be trusted.

0 commit comments

Comments
 (0)