remote-clusters.asciidoc 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. [[remote-clusters]]
  2. == Remote clusters
  3. You can connect a local cluster to other {es} clusters, known as _remote
  4. clusters_. Remote clusters can be located in different datacenters or
  5. geographic regions, and contain indices or data streams that can be replicated
  6. with {ccr} or searched by a local cluster using {ccs}.
  7. [[remote-clusters-ccr]]
  8. [discrete]
  9. === {ccr-cap}
  10. With <<xpack-ccr,{ccr}>>, you ingest data to an index on a remote cluster. This
  11. _leader_ index is replicated to one or more read-only _follower_ indices on your
  12. local cluster. Creating a multi-cluster architecture with {ccr} enables you to
  13. configure disaster recovery, bring data closer to your users, or establish a
  14. centralized reporting cluster to process reports locally.
  15. [[remote-clusters-ccs]]
  16. [discrete]
  17. === {ccs-cap}
  18. <<modules-cross-cluster-search,{ccs-cap}>> enables you to run a search request
  19. against one or more remote clusters. This capability provides each region with a
  20. global view of all clusters, allowing you to send a search request from a local
  21. cluster and return results from all connected remote clusters. For full {ccs}
  22. capabilities, the local and remote cluster must be on the same
  23. {subscriptions}[subscription level].
  24. [[add-remote-clusters]]
  25. [discrete]
  26. === Add remote clusters
  27. To add remote clusters, you can choose between
  28. <<remote-clusters-security-models,two security models>> and
  29. <<sniff-proxy-modes,two connection modes>>. Both security models are compatible
  30. with either of the connection modes.
  31. [[remote-clusters-security-models]]
  32. [discrete]
  33. ==== Security models
  34. API key based security model::
  35. beta:[]
  36. For clusters on version 8.10 or later, you can use an API key to authenticate
  37. and authorize cross-cluster operations to a remote cluster. This model offers
  38. administrators of both the local and the remote cluster fine-grained access
  39. controls. <<remote-clusters-api-key>>.
  40. Certificate based security model::
  41. Uses mutual TLS authentication for cross-cluster operations. User authentication
  42. is performed on the local cluster and a user's role names are passed to the
  43. remote cluster. In this model, a superuser on the local cluster gains total read
  44. access to the remote cluster, so it is only suitable for clusters that are in
  45. the same security domain. <<remote-clusters-cert>>.
  46. [[sniff-proxy-modes]]
  47. [discrete]
  48. ==== Connection modes
  49. [[sniff-mode]]
  50. Sniff mode::
  51. In sniff mode, a cluster is created using a name and a list of seed nodes. When
  52. a remote cluster is registered, its cluster state is retrieved from one of the
  53. seed nodes and up to three _gateway nodes_ are selected as part of remote
  54. cluster requests. This mode requires that the gateway node's publish addresses
  55. are accessible by the local cluster.
  56. +
  57. Sniff mode is the default connection mode.
  58. +
  59. [[gateway-nodes-selection]]
  60. The _gateway nodes_ selection depends on the following criteria:
  61. +
  62. * *version*: Remote nodes must be compatible with the cluster they are
  63. registered to.
  64. * *role*: By default, any non-<<master-node,master-eligible>> node can act as a
  65. gateway node. Dedicated master nodes are never selected as gateway nodes.
  66. * *attributes*: You can define the gateway nodes for a cluster by setting
  67. <<cluster-remote-node-attr,`cluster.remote.node.attr.gateway`>> to `true`.
  68. However, such nodes still have to satisfy the two above requirements.
  69. [[proxy-mode]]
  70. Proxy mode::
  71. In proxy mode, a cluster is created using a name and a single proxy address.
  72. When you register a remote cluster, a configurable number of socket connections
  73. are opened to the proxy address. The proxy is required to route those
  74. connections to the remote cluster. Proxy mode does not require remote cluster
  75. nodes to have accessible publish addresses.
  76. +
  77. The proxy mode is not the default connection mode and must be configured.
  78. Proxy mode has the same <<gateway-nodes-selection, version compatibility
  79. requirements>> as sniff mode.
  80. include::cluster/remote-clusters-api-key.asciidoc[]
  81. include::cluster/remote-clusters-cert.asciidoc[]
  82. include::cluster/remote-clusters-migration.asciidoc[]
  83. include::cluster/remote-clusters-settings.asciidoc[]
  84. include::cluster/remote-clusters-troubleshooting.asciidoc[]