Browse Source

[DOCS] Moves securing-communications to docs (#33640)

Lisa Cawley 7 years ago
parent
commit
c3a817957d

+ 0 - 0
x-pack/docs/en/security/securing-communications/configuring-tls-docker.asciidoc → docs/reference/security/securing-communications/configuring-tls-docker.asciidoc


+ 0 - 0
x-pack/docs/en/security/securing-communications/enabling-cipher-suites.asciidoc → docs/reference/security/securing-communications/enabling-cipher-suites.asciidoc


+ 0 - 0
x-pack/docs/en/security/securing-communications/node-certificates.asciidoc → docs/reference/security/securing-communications/node-certificates.asciidoc


+ 5 - 5
x-pack/docs/en/security/securing-communications/securing-elasticsearch.asciidoc → docs/reference/security/securing-communications/securing-elasticsearch.asciidoc

@@ -29,17 +29,17 @@ information, see <<security-settings>>.
 For more information about encrypting communications across the Elastic Stack,
 see {xpack-ref}/encrypting-communications.html[Encrypting Communications].
 
-:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/x-pack/docs/en/security/securing-communications/node-certificates.asciidoc
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/node-certificates.asciidoc
 include::node-certificates.asciidoc[]
 
-:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/x-pack/docs/en/security/securing-communications/tls-transport.asciidoc
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/tls-transport.asciidoc
 include::tls-transport.asciidoc[]
 
-:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/x-pack/docs/en/security/securing-communications/tls-http.asciidoc
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/tls-http.asciidoc
 include::tls-http.asciidoc[]
 
-:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/x-pack/docs/en/security/securing-communications/tls-ad.asciidoc
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/tls-ad.asciidoc
 include::tls-ad.asciidoc[]
 
-:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/x-pack/docs/en/security/securing-communications/tls-ldap.asciidoc
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/tls-ldap.asciidoc
 include::tls-ldap.asciidoc[]

+ 2 - 2
x-pack/docs/en/security/securing-communications/separating-node-client-traffic.asciidoc → docs/reference/security/securing-communications/separating-node-client-traffic.asciidoc

@@ -37,7 +37,7 @@ transport.profiles.client.bind_host: 1.1.1.1 <2>
 <2> The bind address for the network used for client communication
 
 If separate networks are not available, then
-{xpack-ref}/ip-filtering.html[IP Filtering] can
+{stack-ov}/ip-filtering.html[IP Filtering] can
 be enabled to limit access to the profiles.
 
 When using SSL for transport, a different set of certificates can also be used
@@ -65,4 +65,4 @@ transport.profiles.client.xpack.security.ssl.client_authentication: none
 This setting keeps certificate authentication active for node-to-node traffic,
 but removes the requirement to distribute a signed certificate to transport
 clients. For more information, see
-{xpack-ref}/java-clients.html#transport-client[Configuring the Transport Client to work with a Secured Cluster].
+{stack-ov}/java-clients.html#transport-client[Configuring the Transport Client to work with a Secured Cluster].

+ 0 - 0
x-pack/docs/en/security/securing-communications/setting-up-ssl.asciidoc → docs/reference/security/securing-communications/setting-up-ssl.asciidoc


+ 0 - 0
x-pack/docs/en/security/securing-communications/tls-ad.asciidoc → docs/reference/security/securing-communications/tls-ad.asciidoc


+ 0 - 0
x-pack/docs/en/security/securing-communications/tls-http.asciidoc → docs/reference/security/securing-communications/tls-http.asciidoc


+ 0 - 0
x-pack/docs/en/security/securing-communications/tls-ldap.asciidoc → docs/reference/security/securing-communications/tls-ldap.asciidoc


+ 0 - 0
x-pack/docs/en/security/securing-communications/tls-transport.asciidoc → docs/reference/security/securing-communications/tls-transport.asciidoc


+ 12 - 4
x-pack/docs/en/security/configuring-es.asciidoc

@@ -136,10 +136,15 @@ By default, events are logged to a dedicated `elasticsearch-access.log` file in
 easier analysis and control what events are logged. 
 --
 
-include::securing-communications/securing-elasticsearch.asciidoc[]
-include::securing-communications/configuring-tls-docker.asciidoc[]
-include::securing-communications/enabling-cipher-suites.asciidoc[]
-include::securing-communications/separating-node-client-traffic.asciidoc[]
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/securing-elasticsearch.asciidoc
+include::{es-repo-dir}/security/securing-communications/securing-elasticsearch.asciidoc[]
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/configuring-tls-docker.asciidoc
+include::{es-repo-dir}/security/securing-communications/configuring-tls-docker.asciidoc[]
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/enabling-cipher-suites.asciidoc
+include::{es-repo-dir}/security/securing-communications/enabling-cipher-suites.asciidoc[]
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/separating-node-client-traffic.asciidoc
+include::{es-repo-dir}/security/securing-communications/separating-node-client-traffic.asciidoc[]
+:edit_url:
 include::authentication/configuring-active-directory-realm.asciidoc[]
 include::authentication/configuring-file-realm.asciidoc[]
 include::authentication/configuring-ldap-realm.asciidoc[]
@@ -148,6 +153,9 @@ include::authentication/configuring-pki-realm.asciidoc[]
 include::authentication/configuring-saml-realm.asciidoc[]
 :edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/x-pack/docs/en/security/authentication/configuring-kerberos-realm.asciidoc
 include::authentication/configuring-kerberos-realm.asciidoc[]
+:edit_url: 
 include::fips-140-compliance.asciidoc[]
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/settings/security-settings.asciidoc
 include::{es-repo-dir}/settings/security-settings.asciidoc[]
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/settings/audit-settings.asciidoc
 include::{es-repo-dir}/settings/audit-settings.asciidoc[]

+ 2 - 4
x-pack/docs/en/security/securing-communications.asciidoc

@@ -17,10 +17,8 @@ This section shows how to:
 The authentication of new nodes helps prevent a rogue node from joining the
 cluster and receiving data through replication.
 
-:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/x-pack/docs/en/security/securing-communications/setting-up-ssl.asciidoc
-include::securing-communications/setting-up-ssl.asciidoc[]
-
-//TO-DO: These sections can be removed when all links to them are removed.
+:edit_url: https://github.com/elastic/elasticsearch/edit/{branch}/docs/reference/security/securing-communications/setting-up-ssl.asciidoc
+include::{es-repo-dir}/security/securing-communications/setting-up-ssl.asciidoc[]
 
 [[ciphers]]
 === Enabling cipher suites for stronger encryption