Skip to content

Commit 796e752

Browse files
committed
Address review comments pt. 2 (changes in 'Secure connections' docs)
1 parent bc73bd2 commit 796e752

File tree

5 files changed

+50
-3
lines changed

5 files changed

+50
-3
lines changed

reference/fleet/certificates-rotation.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ mapped_pages:
33
- https://www.elastic.co/guide/en/fleet/current/certificates-rotation.html
44
applies_to:
55
stack: ga
6+
serverless: unavailable
67
products:
78
- id: fleet
89
- id: elastic-agent

reference/fleet/mutual-tls.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ mapped_pages:
33
- https://www.elastic.co/guide/en/fleet/current/mutual-tls.html
44
applies_to:
55
stack: ga
6+
serverless: ga
67
products:
78
- id: fleet
89
- id: elastic-agent
@@ -54,6 +55,12 @@ When you run {{agent}} with the {{elastic-defend}} integration, the [TLS certifi
5455

5556
## On-premise deployments [mutual-tls-on-premise]
5657

58+
```{applies_to}
59+
deployment:
60+
self: ga
61+
ece: ga
62+
```
63+
5764
:::{image} images/mutual-tls-on-prem.png
5865
:alt: Diagram of mutual TLS on premise deployment model
5966
:::
@@ -132,6 +139,12 @@ ssl.key: /path/to/cert_key
132139

133140
## {{fleet-server}} on {{ecloud}} [mutual-tls-cloud]
134141

142+
```{applies_to}
143+
serverless: ga
144+
deployment:
145+
ess: ga
146+
```
147+
135148
In this deployment model, all traffic ingress into {{ecloud}} has its TLS connection terminated at the {{ecloud}} boundary. Since this termination is not handled on a per-tenant basis, a client-specific certificate can NOT be used at this point.
136149

137150
:::{image} images/mutual-tls-cloud.png
@@ -143,6 +156,12 @@ We currently don’t support mTLS in this deployment model. An alternate deploym
143156

144157
## {{fleet-server}} on {{ecloud}} using a proxy [mutual-tls-cloud-proxy]
145158

159+
```{applies_to}
160+
deployment:
161+
ess: ga
162+
serverless: ga
163+
```
164+
146165
In this scenario, where you have access to the proxy, you can configure mTLS between the agent and your proxy.
147166

148167
:::{image} images/mutual-tls-cloud-proxy.png
@@ -164,6 +183,11 @@ During {{agent}} installation on premise use the following options:
164183

165184
## {{fleet-server}} on-premise and {{ech}} [mutual-tls-on-premise-hosted-es]
166185

186+
```{applies_to}
187+
deployment:
188+
ess: ga
189+
```
190+
167191
In some scenarios you may want to deploy {{fleet-server}} on your own premises. In this case, you’re able to provide your own certificates and certificate authority to enable mTLS between {{fleet-server}} and {{agent}}.
168192

169193
However, as with the [{{fleet-server}} on {{ecloud}}](#mutual-tls-cloud) use case, the data plane TLS connections terminate at the {{ecloud}} boundary. {{ecloud}} is not a multi-tenanted service and therefore can’t provide per-user certificates.

reference/fleet/secure-connections.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ mapped_pages:
33
- https://www.elastic.co/guide/en/fleet/current/secure-connections.html
44
applies_to:
55
stack: ga
6+
serverless: unavailable
67
products:
78
- id: fleet
89
- id: elastic-agent
@@ -85,7 +86,7 @@ This section describes how to use the `certutil` tool provided by {{es}}, but yo
8586
Store the files in a secure location. You’ll need these files later to encrypt traffic between {{agent}}s and {{fleet-server}}.
8687

8788

88-
## Configure SSL/TLS using CLI [fleet-server-ssl-cli-settings]
89+
## Configure SSL/TLS using CLI [fleet-server-ssl-cli-settings]
8990

9091
Use the CLI to configure SSL or TLS when installing or enrolling {{fleet-server}}. This method gives you granular control over certificate paths, verification modes, and authentication behavior.
9192

reference/fleet/secure.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ mapped_pages:
44
- https://www.elastic.co/guide/en/fleet/current/secure.html
55
applies_to:
66
stack: ga
7+
serverless: ga
78
products:
89
- id: fleet
910
- id: elastic-agent
@@ -14,7 +15,7 @@ products:
1415

1516
Some connections may require you to generate certificates and configure SSL/TLS.
1617

17-
* [Configure SSL/TLS for self-managed {{fleet-server}}s](/reference/fleet/secure-connections.md)
18+
* [Configure SSL/TLS for self-managed {{fleet-server}}s](/reference/fleet/secure-connections.md) {applies_to}`serverless: unavailable`
1819
* [{{agent}} deployment models with mutual TLS](/reference/fleet/mutual-tls.md)
1920
* [Configure SSL/TLS for the {{ls}} output](/reference/fleet/secure-logstash-connections.md)
2021

reference/fleet/tls-overview.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ mapped_pages:
33
- https://www.elastic.co/guide/en/fleet/current/tls-overview.html
44
applies_to:
55
stack: ga
6+
serverless: ga
67
products:
78
- id: fleet
89
- id: elastic-agent
@@ -21,6 +22,10 @@ You can also configure one-way and mutual TLS connections using {{kib}}. {applie
2122

2223
## Simple one-way TLS connection [one-way-tls-connection]
2324

25+
```{applies_to}
26+
serverless: unavailable
27+
```
28+
2429
The following `elastic-agent install` command configures a {{fleet-server}} with the required certificates and certificate authorities to enable one-way TLS connections between the components involved:
2530

2631
```shell
@@ -59,6 +64,10 @@ During the TLS connection setup, {{fleet-server}} presents its certificate `flee
5964

6065
## Mutual TLS connection [mutual-tls-connection]
6166

67+
```{applies_to}
68+
serverless: unavailable
69+
```
70+
6271
The following `elastic-agent install` command configures a {{fleet-server}} with the required certificates and certificate authorities to enable mutual TLS connections between the components involved:
6372

6473
```shell
@@ -103,14 +112,25 @@ You can also configure mutual TLS for {{fleet-server}} and {{agent}} [using a pr
103112
:::
104113

105114
## Configure TLS/mTLS settings in the Fleet UI [tls-ui-settings]
115+
106116
```{applies_to}
107117
stack: ga 9.1
108118
```
109119

110-
You can configure TLS and mutual TLS (mTLS) settings for {{fleet-server}} and outputs using the {{fleet}} UI.
120+
In self-managed and {{ech}} deployments, you can configure TLS and mutual TLS (mTLS) for {{fleet-server}} and outputs in the {{fleet}} UI.
121+
122+
:::{{note}}
123+
:applies_to: serverless: ga
124+
125+
On {{serverless-short}}, the {{fleet-server}} settings are managed, but you can still configure TLS/mTLS for your outputs.
126+
:::
111127

112128
### Fleet Server SSL options
113129

130+
```{applies_to}
131+
serverless: unavailable
132+
```
133+
114134
To access these settings:
115135

116136
1. In **Kibana**, go to **Management > {{fleet}} > Settings**.

0 commit comments

Comments
 (0)