You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 14, 2022. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -229,15 +229,15 @@ __4. Setup cluster nodes__
229
229
Since you now have several Elasticsearch Cluster nodes available, they must now be stored in the configuration for failover. Instead of a single cluster node you now specify the configured nodes in your `.env` file as follows:
Ports can be the same depending on your Elasticsearch Cluster-Configuration.
235
235
236
236
### Activate user authentication
237
237
238
238
__1. Generate Built-In user passwords__
239
239
240
-
_This step can be ignored, when it's planned to use an existing Elasticsearch cluster._
240
+
_This step can be ignored, when you are using an existing Elasticsearch cluster._
241
241
Elasticsearch is initially configured with a number of built-in users, that don't have a password by default. So, the first step is to generate passwords for these users.
242
242
```
243
243
docker exec elasticsearch1 /bin/bash -c "bin/elasticsearch-setup-passwords auto --batch --url https://localhost:9200"
@@ -307,8 +307,9 @@ To activate these changes the Filebeat service must be restarted.
307
307
308
308
### Custom certificates
309
309
310
-
The project is shipped with long running certificates/keys that should help you to get started with the solution. For a production environment these certificates and keys
311
-
should be replaced with custom certificates.
310
+
_If you are using an existing Elasticsearch cluster, you have to provide the required CA to the solution to allow certificate validation._
311
+
312
+
The project is shipped with long running certificates/keys that should help you to get started with the solution. For a production environment these certificates and keys should be replaced with custom certificates.
312
313
313
314
After you have created the corresponding certificates and keys based on your CA, you must save them in the folder: `certificates`.
314
315
Afterwards these certificates must be configured in the `.env` file.
@@ -331,11 +332,11 @@ By default the configured Admin Node Manager host is used or the configured API
331
332
```
332
333
API_MANAGER=http://my.apimanager.com:443
333
334
```
334
-
If you have several API Managers within your domain, you have to configure via a mapping which group (groupId) belongs to which API Manager. The following syntax is used for this:
335
+
If you have several API Managers within your domain, you have to configure a mapping which group (groupId) belongs to which API Manager. The following syntax is used for this:
0 commit comments