A newer version is available. For the latest information, see the current release documentation.
You can specify secure settings with Kubernetes secrets. The secrets should contain a key-value pair for each secure setting you want to add. ECK automatically injects these settings into the keystore on each Elasticsearch node before it starts Elasticsearch.
spec: secureSettings: - secretName: one-secure-settings-secret - secretName: two-secure-settings-secret
You can export a subset of secret keys and also project keys to specific paths using the
spec: secureSettings: - secretName: your-secure-settings-secret entries: - key: key1 - key: key2 path: newkey2
See How to create automated snapshots for an example use case.
Intro to Kibana
ELK for Logs & Metrics