Skip to content

Commit ff597db

Browse files
committed
[DOCS] Set explicit anchors for TLS/SSL settings (#42524) (fixup)
1 parent 1372e40 commit ff597db

File tree

4 files changed

+23
-1
lines changed

4 files changed

+23
-1
lines changed

docs/reference/settings/monitoring-settings.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -280,5 +280,6 @@ For example: `["elasticsearch_version_mismatch","xpack_license_expiration"]`.
280280
:component: {monitoring}
281281
:verifies:
282282
:server!:
283+
:ssl-context: monitoring
283284

284285
include::ssl-settings.asciidoc[]

docs/reference/settings/notification-settings.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ Specifies the maximum size an HTTP response is allowed to have, defaults to
7070
:component: {watcher}
7171
:verifies:
7272
:server!:
73+
:ssl-context: watcher
7374

7475
include::ssl-settings.asciidoc[]
7576

docs/reference/settings/security-settings.asciidoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1420,6 +1420,7 @@ http layer.
14201420
:client-auth-default: none
14211421
:verifies!:
14221422
:server:
1423+
:ssl-context: security-http
14231424

14241425
include::ssl-settings.asciidoc[]
14251426

@@ -1429,6 +1430,7 @@ include::ssl-settings.asciidoc[]
14291430
:client-auth-default!:
14301431
:verifies:
14311432
:server:
1433+
:ssl-context: security-transport
14321434

14331435
include::ssl-settings.asciidoc[]
14341436

@@ -1452,6 +1454,7 @@ setting, this would be `transport.profiles.$PROFILE.xpack.security.ssl.key`.
14521454
:component: Auditing
14531455
:client-auth-default!:
14541456
:server!:
1457+
:ssl-context: auditing
14551458

14561459
include::ssl-settings.asciidoc[]
14571460

docs/reference/settings/ssl-settings.asciidoc

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
21
==== {component} TLS/SSL Settings
32
You can configure the following TLS/SSL settings. If the settings are not configured,
43
the {ref}/security-settings.html#ssl-tls-settings[Default TLS/SSL Settings]
@@ -41,7 +40,13 @@ Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8
4140
Java Cryptography Architecture documentation]. Defaults to the value of
4241
`xpack.ssl.cipher_suites`.
4342

43+
ifdef::asciidoctor[]
44+
[#{ssl-context}-tls-ssl-key-trusted-certificate-settings]
4445
===== {component} TLS/SSL Key and Trusted Certificate Settings
46+
endif::[]
47+
ifndef::asciidoctor[]
48+
===== anchor:{ssl-context}-tls-ssl-key-trusted-certificate-settings[] {component} TLS/SSL Key and Trusted Certificate Settings
49+
endif::[]
4550

4651
The following settings are used to specify a private key, certificate, and the
4752
trusted certificates that should be used when communicating over an SSL/TLS connection.
@@ -107,7 +112,13 @@ Password to the truststore.
107112
+{ssl-prefix}.ssl.truststore.secure_password+ (<<secure-settings,Secure>>)::
108113
Password to the truststore.
109114

115+
ifdef::asciidoctor[]
116+
[#{ssl-context}-pkcs12-files]
110117
===== PKCS#12 Files
118+
endif::[]
119+
ifndef::asciidoctor[]
120+
===== anchor:{ssl-context}-pkcs12-files[] PKCS#12 Files
121+
endif::[]
111122

112123
{es} can be configured to use PKCS#12 container files (`.p12` or `.pfx` files)
113124
that contain the private key, certificate and certificates that should be trusted.
@@ -145,7 +156,13 @@ Password to the PKCS#12 file.
145156
+{ssl-prefix}.ssl.truststore.secure_password+ (<<secure-settings,Secure>>)::
146157
Password to the PKCS#12 file.
147158

159+
ifdef::asciidoctor[]
160+
[#{ssl-context}-pkcs11-tokens]
148161
===== PKCS#11 Tokens
162+
endif::[]
163+
ifndef::asciidoctor[]
164+
===== anchor:{ssl-context}-pkcs11-tokens[] PKCS#11 Tokens
165+
endif::[]
149166

150167
{es} can be configured to use a PKCS#11 token that contains the private key,
151168
certificate and certificates that should be trusted.

0 commit comments

Comments
 (0)