You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
dedicated API key API /_security/cross_cluster/api_key
CA trust is required (as before)
additional port for the remote connections (default 9443)
There are few open questions:
creating the API key requires user input to tailor the permissions to the specific use case. Automating a wildcard api key that allows access to everything would be giving a way the main benefit of the new security model
our current API does not allow to specify the permissions
Do we want to inline the access section into our CRD? Do we want to leave this as a step to be executed by the user (not very attractive if we want to facilitate automatic setup of these remote cluster relationships) Can we leverage stack config policies in a novel way to do this.
Elasticsearch starting with version 8.10 supports a new security model for remote cluster connections using API keys (currently in beta):
https://www.elastic.co/guide/en/elasticsearch/reference/current/remote-clusters-api-key.html
We should support this in ECK for the fully managed remote cluster connection setup documented here:
https://www.elastic.co/guide/en/cloud-on-k8s/current/k8s-remote-clusters.html#k8s-remote-clusters-connect-internal
There are few open questions:
creating the API key requires user input to tailor the permissions to the specific use case. Automating a wildcard api key that allows access to everything would be giving a way the main benefit of the new security model
our current API does not allow to specify the permissions
But we would need to express the cross-cluster API key permission model somehow:
Do we want to inline the
access
section into our CRD? Do we want to leave this as a step to be executed by the user (not very attractive if we want to facilitate automatic setup of these remote cluster relationships) Can we leverage stack config policies in a novel way to do this.Another question is how migration would work (if we support that at all from old world to new world). The stack documentation is to be found here: https://www.elastic.co/guide/en/elasticsearch/reference/current/remote-clusters-migrate.html
The text was updated successfully, but these errors were encountered: