Skip to content

Commit

Permalink
[DOCS] Fix additional TLS/API Key doc (#78232)
Browse files Browse the repository at this point in the history
This doc was missed in #76801 (ea0dc45)
  • Loading branch information
tvernum committed Sep 23, 2021
1 parent 86b8063 commit e7fd248
Showing 1 changed file with 10 additions and 10 deletions.
20 changes: 10 additions & 10 deletions x-pack/docs/en/security/securing-communications/tls-http.asciidoc
Expand Up @@ -8,7 +8,7 @@ communication between HTTP clients and the cluster is encrypted.
Enabling TLS on the HTTP layer is strongly recommended, but is not required.

IMPORTANT: In a <<dev-vs-prod-mode,production environment>>, some {es} features
such as tokens and API keys will be disabled unless you enable TLS on the HTTP
such as tokens will be disabled unless you enable TLS on the HTTP
layer.

If you enable TLS on the HTTP layer in {es}, you might need to make
Expand Down Expand Up @@ -44,11 +44,11 @@ This command generates a zip file that contains certificates and keys for use in
--

. Verify that you've copied the output files to the appropriate locations, as
specified in the readme files.
specified in the readme files.
+
--
For example, copy the `http.p12` file from the `elasticsearch` folder into a
directory within the {es} configuration directory on each node. If you chose to
For example, copy the `http.p12` file from the `elasticsearch` folder into a
directory within the {es} configuration directory on each node. If you chose to
generate one certificate per node, copy the appropriate `http.p12` file to each
node. If you want to use {kib} to access this cluster, copy the
`elasticsearch-ca.pem` file from the `kibana` folder into the {kib}
Expand Down Expand Up @@ -87,7 +87,7 @@ xpack.security.http.ssl.certificate_authorities: [ "/home/es/config/ca.crt" ] <3
must be a location within the {es} configuration directory.
--

.. If you secured the keystore or the private key with a password, add that password to a secure
.. If you secured the keystore or the private key with a password, add that password to a secure
setting in {es}.
+
--
Expand Down Expand Up @@ -119,10 +119,10 @@ therefore are not exposed via the
<<cluster-nodes-info,nodes info API>> For more
information about any of these settings, see <<security-settings>>.
* {es} monitors all files such as certificates, keys, keystores, or truststores
that are configured as values of TLS-related node settings. If you update any of
these files (for example, when your hostnames change or your certificates are
due to expire), {es} reloads them. The files are polled for changes at
a frequency determined by the global {es} `resource.reload.interval.high`
* {es} monitors all files such as certificates, keys, keystores, or truststores
that are configured as values of TLS-related node settings. If you update any of
these files (for example, when your hostnames change or your certificates are
due to expire), {es} reloads them. The files are polled for changes at
a frequency determined by the global {es} `resource.reload.interval.high`
setting, which defaults to 5 seconds.
===============================

0 comments on commit e7fd248

Please sign in to comment.