Skip to content

Commit 7d2ff99

Browse files
committed
[DOCS] Set explicit anchors for TLS/SSL settings (#42524)
1 parent adca6a8 commit 7d2ff99

File tree

4 files changed

+22
-1
lines changed

4 files changed

+22
-1
lines changed

docs/reference/settings/monitoring-settings.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -285,5 +285,6 @@ For example: `["elasticsearch_version_mismatch","xpack_license_expiration"]`.
285285
:component: {monitoring}
286286
:verifies:
287287
:server!:
288+
:ssl-context: monitoring
288289

289290
include::ssl-settings.asciidoc[]

docs/reference/settings/notification-settings.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,7 @@ Specifies the maximum size an HTTP response is allowed to have, defaults to
7171
:component: {watcher}
7272
:verifies:
7373
:server!:
74+
:ssl-context: watcher
7475

7576
include::ssl-settings.asciidoc[]
7677

docs/reference/settings/security-settings.asciidoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1465,6 +1465,7 @@ http layer.
14651465
:client-auth-default: none
14661466
:verifies!:
14671467
:server:
1468+
:ssl-context: security-http
14681469

14691470
include::ssl-settings.asciidoc[]
14701471

@@ -1474,6 +1475,7 @@ include::ssl-settings.asciidoc[]
14741475
:client-auth-default!:
14751476
:verifies:
14761477
:server:
1478+
:ssl-context: security-transport
14771479

14781480
include::ssl-settings.asciidoc[]
14791481

docs/reference/settings/ssl-settings.asciidoc

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
21
==== {component} TLS/SSL Settings
32
ifeval::["{component}"=="Auditing"]
43
ifdef::asciidoctor[]
@@ -52,7 +51,13 @@ Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8
5251
Java Cryptography Architecture documentation]. Defaults to the value of
5352
`xpack.ssl.cipher_suites`.
5453

54+
ifdef::asciidoctor[]
55+
[#{ssl-context}-tls-ssl-key-trusted-certificate-settings]
5556
===== {component} TLS/SSL Key and Trusted Certificate Settings
57+
endif::[]
58+
ifndef::asciidoctor[]
59+
===== anchor:{ssl-context}-tls-ssl-key-trusted-certificate-settings[] {component} TLS/SSL Key and Trusted Certificate Settings
60+
endif::[]
5661

5762
The following settings are used to specify a private key, certificate, and the
5863
trusted certificates that should be used when communicating over an SSL/TLS connection.
@@ -118,7 +123,13 @@ Password to the truststore.
118123
+{ssl-prefix}.ssl.truststore.secure_password+ (<<secure-settings,Secure>>)::
119124
Password to the truststore.
120125

126+
ifdef::asciidoctor[]
127+
[#{ssl-context}-pkcs12-files]
121128
===== PKCS#12 Files
129+
endif::[]
130+
ifndef::asciidoctor[]
131+
===== anchor:{ssl-context}-pkcs12-files[] PKCS#12 Files
132+
endif::[]
122133

123134
{es} can be configured to use PKCS#12 container files (`.p12` or `.pfx` files)
124135
that contain the private key, certificate and certificates that should be trusted.
@@ -156,7 +167,13 @@ Password to the PKCS#12 file.
156167
+{ssl-prefix}.ssl.truststore.secure_password+ (<<secure-settings,Secure>>)::
157168
Password to the PKCS#12 file.
158169

170+
ifdef::asciidoctor[]
171+
[#{ssl-context}-pkcs11-tokens]
159172
===== PKCS#11 Tokens
173+
endif::[]
174+
ifndef::asciidoctor[]
175+
===== anchor:{ssl-context}-pkcs11-tokens[] PKCS#11 Tokens
176+
endif::[]
160177

161178
{es} can be configured to use a PKCS#11 token that contains the private key,
162179
certificate and certificates that should be trusted.

0 commit comments

Comments
 (0)