You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/reference/modules/cluster/remote-clusters-api-key.asciidoc
+12-9Lines changed: 12 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ In this model, cross-cluster operations use <<remote_cluster.port,a dedicated
31
31
server port>> (remote cluster interface) for communication between clusters. A
32
32
remote cluster must enable this port for local clusters to connect. Configure
33
33
Transport Layer Security (TLS) for this port to maximize security (as explained
34
-
in <<remote-clusters-security-api-key>>).
34
+
in <<remote-clusters-security-api-key>>).
35
35
36
36
The local cluster must trust the remote cluster on the remote cluster interface.
37
37
This means that the local cluster trusts the remote cluster's certificate
@@ -65,15 +65,15 @@ information, refer to https://www.elastic.co/subscriptions.
65
65
===== On the remote cluster
66
66
67
67
// tag::remote-cluster-steps[]
68
-
. Enable the remote cluster server on every node of the remote cluster. In
68
+
. Enable the remote cluster server on every node of the remote cluster. In
69
69
`elasticsearch.yml`:
70
-
.. Set <<remote-cluster-network-settings,`remote_cluster_server.enabled`>> to
70
+
.. Set <<remote-cluster-network-settings,`remote_cluster_server.enabled`>> to
71
71
`true`.
72
72
.. Configure the bind and publish address for remote cluster server traffic, for
73
73
example using <<remote-cluster-network-settings,`remote_cluster.host`>>. Without
74
74
configuring the address, remote cluster traffic may be bound to the local
75
75
interface, and remote clusters running on other machines can't connect.
76
-
.. Optionally, configure the remote server port using
76
+
.. Optionally, configure the remote server port using
77
77
<<remote_cluster.port,`remote_cluster.port`>> (defaults to `9443`).
78
78
. Next, generate a certificate authority (CA) and a server certificate/key pair.
79
79
On one of the nodes of the remote cluster, from the directory where {es} has
@@ -86,8 +86,8 @@ been installed:
86
86
./bin/elasticsearch-certutil ca --pem --out=cross-cluster-ca.zip --pass CA_PASSWORD
87
87
----
88
88
+
89
-
Replace `CA_PASSWORD` with the password you want to use for the CA. You can
90
-
remove the `--pass` option and its argument if you are not deploying to a
89
+
Replace `CA_PASSWORD` with the password you want to use for the CA. You can
90
+
remove the `--pass` option and its argument if you are not deploying to a
91
91
production environment.
92
92
93
93
.. Unzip the generated `cross-cluster-ca.zip` file. This compressed file
@@ -100,7 +100,7 @@ contains the following content:
100
100
|_ ca.key
101
101
----
102
102
103
-
.. Generate a certificate and private key pair for the nodes in the remote
103
+
.. Generate a certificate and private key pair for the nodes in the remote
104
104
cluster:
105
105
+
106
106
[source,sh]
@@ -183,13 +183,16 @@ Replace `ALIAS` with the same name that you will use to create the remote cluste
183
183
later. When prompted, enter the encoded cross-cluster API key created on the
184
184
remote cluster earlier.
185
185
186
-
. Restart the local cluster to load the keystore change.
186
+
. Restart the local cluster to load changes to the keystore and settings.
187
+
188
+
**Note:** If you are configuring only the cross-cluster API key, you can call the <<cluster-nodes-reload-secure-settings>> API, instead of restarting the cluster.
189
+
Configuring the `remote_cluster_client` settings in `elasticsearch.yml` still requires a restart.
0 commit comments