Skip to content

Commit 924eb1a

Browse files
committed
[DOCS] Set explicit anchors for TLS/SSL settings (#42524) (fixup)
1 parent 011aa22 commit 924eb1a

File tree

4 files changed

+17
-1
lines changed

4 files changed

+17
-1
lines changed

docs/reference/settings/monitoring-settings.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -281,5 +281,6 @@ For example: `["elasticsearch_version_mismatch","xpack_license_expiration"]`.
281281
:component: {monitoring}
282282
:verifies:
283283
:server!:
284+
:ssl-context: monitoring
284285

285286
include::ssl-settings.asciidoc[]

docs/reference/settings/notification-settings.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,7 @@ Specifies the maximum size a HTTP response is allowed to have, defaults to
6464
:component: {watcher}
6565
:verifies:
6666
:server!:
67+
:ssl-context: watcher
6768

6869
include::ssl-settings.asciidoc[]
6970

docs/reference/settings/security-settings.asciidoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1256,6 +1256,7 @@ a PKCS#12 container includes trusted certificate ("anchor") entries look for
12561256
:client-auth-default: none
12571257
:verifies!:
12581258
:server:
1259+
:ssl-context: security-http
12591260

12601261
include::ssl-settings.asciidoc[]
12611262

@@ -1265,6 +1266,7 @@ include::ssl-settings.asciidoc[]
12651266
:client-auth-default!:
12661267
:verifies:
12671268
:server:
1269+
:ssl-context: security-transport
12681270

12691271
include::ssl-settings.asciidoc[]
12701272

@@ -1288,6 +1290,7 @@ setting, this would be `transport.profiles.$PROFILE.xpack.security.ssl.key`.
12881290
:component: Auditing
12891291
:client-auth-default!:
12901292
:server!:
1293+
:ssl-context: auditing
12911294

12921295
include::ssl-settings.asciidoc[]
12931296

docs/reference/settings/ssl-settings.asciidoc

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
21
==== {component} TLS/SSL Settings
32
You can configure the following TLS/SSL settings. If the settings are not configured,
43
the {ref}/security-settings.html#ssl-tls-settings[Default TLS/SSL Settings]
@@ -41,7 +40,13 @@ Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8
4140
Java Cryptography Architecture documentation]. Defaults to the value of
4241
`xpack.ssl.cipher_suites`.
4342

43+
ifdef::asciidoctor[]
44+
[#{ssl-context}-tls-ssl-key-trusted-certificate-settings]
4445
===== {component} TLS/SSL Key and Trusted Certificate Settings
46+
endif::[]
47+
ifndef::asciidoctor[]
48+
===== anchor:{ssl-context}-tls-ssl-key-trusted-certificate-settings[] {component} TLS/SSL Key and Trusted Certificate Settings
49+
endif::[]
4550

4651
The following settings are used to specify a private key, certificate, and the
4752
trusted certificates that should be used when communicating over an SSL/TLS connection.
@@ -107,7 +112,13 @@ Password to the truststore.
107112
+{ssl-prefix}.ssl.truststore.secure_password+ (<<secure-settings,Secure>>)::
108113
Password to the truststore.
109114

115+
ifdef::asciidoctor[]
116+
[#{ssl-context}-pkcs12-files]
110117
===== PKCS#12 Files
118+
endif::[]
119+
ifndef::asciidoctor[]
120+
===== anchor:{ssl-context}-pkcs12-files[] PKCS#12 Files
121+
endif::[]
111122

112123
{security} can be configured to use PKCS#12 container files (`.p12` or `.pfx` files)
113124
that contain the private key, certificate and certificates that should be trusted.

0 commit comments

Comments
 (0)