Skip to content

self-signed statements reviewed in ECK http and transport TLS docs#6111

Merged
eedugon merged 3 commits into
mainfrom
eck_self_signed_terms
May 4, 2026
Merged

self-signed statements reviewed in ECK http and transport TLS docs#6111
eedugon merged 3 commits into
mainfrom
eck_self_signed_terms

Conversation

@eedugon
Copy link
Copy Markdown
Contributor

@eedugon eedugon commented Apr 24, 2026

Both the transport and http docs of ECK include some statements about ECK creating self-signed certificates for the instances, where that's not really the case.

ECK now generates a CAs (self-signed of course) for transport and http, and then uses the CAs to issue the required certs for the instances, hence ECK is not using self-signed certs.

Besides that I've added the following small improvements:

  • Provide the command to grab the HTTP CA (which is actually more useful than providing the command to grab the cert that we are currently giving and it's not really useful (except if the cert was really self-signed :) )
  • Change isCA: true to false in one of the manifests for cert-manager, as the objective of the manifest is to create a server cert and not a CA.
  • Updated hulk examples to quickstart.

PS - I strongly believe in the past ECK was probably creating self-signed certs for HTTP by default, because multiple items point to that:

  • The spec feature is called tls.selfSignedCertificate, even if it's creating a CA + cert.
  • Originally we told the user to grab tls.crt from the public HTTP secret, which is not useful anymore if that cert is signed by a private ECK-managed CA (a user needs the CA and not the HTTP cert for trusting purposes).

@eedugon eedugon requested a review from a team as a code owner April 24, 2026 12:22
@eedugon eedugon requested a review from pkoutsovasilis April 24, 2026 12:22
@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented Apr 24, 2026

@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented Apr 24, 2026

Vale Linting Results

Summary: 3 suggestions found

💡 Suggestions (3)
File Line Rule Message
deploy-manage/security/k8s-https-settings.md 250 Elastic.WordChoice Consider using 'deactivate, deselect, hide, turn off' instead of 'Disable', unless the term is in the UI.
deploy-manage/security/k8s-https-settings.md 252 Elastic.WordChoice Consider using 'deactivate, deselect, hide, turn off' instead of 'disable', unless the term is in the UI.
deploy-manage/security/k8s-transport-settings.md 126 Elastic.WordChoice Consider using 'deactivates, deselects, hides, turns off, makes unavailable' instead of 'Disables', unless the term is in the UI.

The Vale linter checks documentation changes against the Elastic Docs style guide.

To use Vale locally or report issues, refer to Elastic style guide for Vale.

```

Here is how to issue multiple {{es}} certificates from a single self-signed CA. This is useful for example for [Remote clusters](/deploy-manage/remote-clusters/eck-remote-clusters.md) which need to trust each other’s CA, in order to avoid mounting N CAs when a cluster is connected to N other clusters.
#### Custom private CA and certificate using cert-manager [k8s_custom_http_ca_using_cert_manager]
Copy link
Copy Markdown
Contributor Author

@eedugon eedugon Apr 24, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've added a new header because the example below does not create a self-signed cert (previous header and example), but a CA + cert.

Copy link
Copy Markdown
Member

@marciw marciw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM with one small suggestion

Comment thread deploy-manage/security/k8s-https-settings.md Outdated
eedugon and others added 2 commits May 4, 2026 13:29
Co-authored-by: Marci W <333176+marciw@users.noreply.github.com>
@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented May 4, 2026

Elastic Docs AI PR menu

Check the box to run an AI review for this pull request.

  • Review docs changes (docs-review). Status: not started.

Powered by GitHub Agentic Workflows and docs-actions. For more information, reach out to the docs team.

@eedugon eedugon merged commit 7ba1cfb into main May 4, 2026
11 checks passed
@eedugon eedugon deleted the eck_self_signed_terms branch May 4, 2026 11:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants