Skip to content
This repository was archived by the owner on Dec 14, 2022. It is now read-only.

Commit 2ad83c9

Browse files
author
Chris Wiechmann
authored
Update README.md
1 parent 82e0d8b commit 2ad83c9

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

README.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -229,15 +229,15 @@ __4. Setup cluster nodes__
229229
Since you now have several Elasticsearch Cluster nodes available, they must now be stored in the configuration for failover. Instead of a single cluster node you now specify the configured nodes in your `.env` file as follows:
230230

231231
```
232-
ELASTICSEARCH_HOSTS==https://elasticsearch1:9200,https://elasticsearch2:9201
232+
ELASTICSEARCH_HOSTS=https://elasticsearch1:9200,https://elasticsearch2:9201
233233
```
234234
Ports can be the same depending on your Elasticsearch Cluster-Configuration.
235235

236236
### Activate user authentication
237237

238238
__1. Generate Built-In user passwords__
239239

240-
_This step can be ignored, when it's planned to use an existing Elasticsearch cluster._
240+
_This step can be ignored, when you are using an existing Elasticsearch cluster._
241241
Elasticsearch is initially configured with a number of built-in users, that don't have a password by default. So, the first step is to generate passwords for these users.
242242
```
243243
docker exec elasticsearch1 /bin/bash -c "bin/elasticsearch-setup-passwords auto --batch --url https://localhost:9200"
@@ -307,8 +307,9 @@ To activate these changes the Filebeat service must be restarted.
307307

308308
### Custom certificates
309309

310-
The project is shipped with long running certificates/keys that should help you to get started with the solution. For a production environment these certificates and keys
311-
should be replaced with custom certificates.
310+
_If you are using an existing Elasticsearch cluster, you have to provide the required CA to the solution to allow certificate validation._
311+
312+
The project is shipped with long running certificates/keys that should help you to get started with the solution. For a production environment these certificates and keys should be replaced with custom certificates.
312313

313314
After you have created the corresponding certificates and keys based on your CA, you must save them in the folder: `certificates`.
314315
Afterwards these certificates must be configured in the `.env` file.
@@ -331,11 +332,11 @@ By default the configured Admin Node Manager host is used or the configured API
331332
```
332333
API_MANAGER=http://my.apimanager.com:443
333334
```
334-
If you have several API Managers within your domain, you have to configure via a mapping which group (groupId) belongs to which API Manager. The following syntax is used for this:
335+
If you have several API Managers within your domain, you have to configure a mapping which group (groupId) belongs to which API Manager. The following syntax is used for this:
335336
```
336337
API_MANAGER=group-2#https://api-manager-1:8075, group-5#https://api-manager-2:8275
337338
```
338-
When the API Builder is started, to validate the configuration, a login to each API-Manager is performed. Currently the same
339+
When the API Builder is started, to validate the configuration, a login to each API-Manager is performed. Currently the same
339340
API manager user (API_MANAGER_USERNAME/API_MANAGER_PASSWORD) is used for each API Manager.
340341

341342
### Secure API-Builder Traffic-Monitor API

0 commit comments

Comments
 (0)