Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -388,7 +388,7 @@ In this section, you configure {{ls}} to send the Metricbeat and Filebeat data t
ilm_enabled => true
cloud_id => "<DeploymentName>:<ID>" <1>
cloud_auth => "elastic:<Password>" <2>
ssl => true
ssl_enabled => true
# api_key => "<myAPIid:myAPIkey>"
}
}
Expand Down Expand Up @@ -455,7 +455,7 @@ In this section, you configure {{ls}} to send the Metricbeat and Filebeat data t
elasticsearch {
index => "%{[@metadata][beat]}-%{[@metadata][version]}"
cloud_id => "<myDeployment>"
ssl => true
ssl_enabled => true
ilm_enabled => true
api_key => "2GBe63fBcxgJAetmgZeh:aB1cdeF-GJI23jble4NOH4"
# user => "<Username>"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -294,7 +294,7 @@ In this section, we configure Logstash to send the MySQL data to Elasticsearch.
ilm_enabled => false
cloud_id => "<DeploymentName>:<ID>" <1>
cloud_auth => "elastic:<Password>" <2>
ssl => true
ssl_enabled => true
# api_key => "<myAPIid:myAPIkey>"
}
}
Expand Down Expand Up @@ -355,7 +355,7 @@ In this section, we configure Logstash to send the MySQL data to Elasticsearch.
elasticsearch {
index => "rdbms_idx"
cloud_id => "<myDeployment>"
ssl => true
ssl_enabled => true
ilm_enabled => false
api_key => "2TBR42gBabmINotmvZjv:tV1dnfF-GHI59ykgv4N0U3"
# user => "<Username>"
Expand Down
4 changes: 2 additions & 2 deletions reference/fleet/ls-output-settings.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ input {
ssl_certificate_authorities => ["<ca_path>"]
ssl_certificate => "<server_cert_path>"
ssl_key => "<server_cert_key_in_pkcs8>"
ssl_verify_mode => "force_peer"
ssl_client_authentication => "required"
}
}
output {
Expand All @@ -41,7 +41,7 @@ output {
api_key => "<api_key>" <3>
data_stream => true
ssl_enabled => true
# cacert => "<elasticsearch_ca_path>"
ssl_certificate_authorities => "<elasticsearch_ca_path>"
}
}
```
Expand Down
6 changes: 3 additions & 3 deletions reference/fleet/secure-logstash-connections.md
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,7 @@ output {
cloud_id => "xxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxx=" <1>
api_key => "xxxx:xxxx" <2>
data_stream => true
ssl => true <3>
ssl_enabled => true <3>
}
}
```
Expand Down Expand Up @@ -147,8 +147,8 @@ output {
hosts => "https://xxxx:9200"
api_key => "xxxx:xxxx"
data_stream => true
ssl => true
cacert => "/path/to/http_ca.crt" <1>
ssl_enabled => true
ssl_certificate_authorities => "/path/to/http_ca.crt" <1>
}
}
```
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -301,19 +301,19 @@
* `ssl`: When set to true, enables {{ls}} to use SSL/TLS.
* `ssl_certificate_authorities`: Configures {{ls}} to trust any certificates signed by the specified CA.
* `ssl_certificate` and `ssl_key`: Specify the certificate and key that {{ls}} uses to authenticate with the client.
* `ssl_verify_mode`: Specifies whether the {{ls}} server verifies the client certificate against the CA. You need to specify either `peer` or `force_peer` to make the server ask for the certificate and validate it. If you specify `force_peer`, and APM Server doesn’t provide a certificate, the {{ls}} connection will be closed. If you choose not to use [`certutil`](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.
* `ssl_client_authentication`: Specifies whether the {{ls}} server verifies the client certificate against the CA. If you specify `required` and APM Server doesn’t provide a certificate, the {{ls}} connection will be closed. If you choose not to use [`certutil`](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md), the certificates that you obtain must allow for both `clientAuth` and `serverAuth` if the extended key usage extension is present.

Check notice on line 304 in solutions/observability/apm/apm-server/configure-logstash-output.md

View workflow job for this annotation

GitHub Actions / vale

Elastic.FutureTense: 'will be' might be in future tense. Write in the present tense to describe the state of the product as it is now.

For example:

```json
input {
beats {
port => 5044
ssl => true
ssl_enabled => true
ssl_certificate_authorities => ["/etc/ca.crt"]
ssl_certificate => "/etc/server.crt"
ssl_key => "/etc/server.key"
ssl_verify_mode => "force_peer"
ssl_client_authentication => "required"
}
}
```
Expand Down
Loading