Docs: Clarify sensitive fields watcher encryption (#31551)
Clarify the scope of encrypting sensitive settings in watcher, which fields are encrypted and if users can have their own encrypted fields.
This commit is contained in:
parent
a72dc9e8fc
commit
8a6d062180
|
@ -6,6 +6,12 @@ information or details about your SMTP email service. You can encrypt this
|
||||||
data by generating a key and adding some secure settings on each node in your
|
data by generating a key and adding some secure settings on each node in your
|
||||||
cluster.
|
cluster.
|
||||||
|
|
||||||
|
Every `password` field that is used in your watch within a HTTP basic
|
||||||
|
authentication block - for example within a webhook, a HTTP input or when using
|
||||||
|
the reporting email attachment - will not be stored as plain text anymore. Also
|
||||||
|
be aware, that there is no way to configure your own fields in a watch to be
|
||||||
|
encrypted.
|
||||||
|
|
||||||
To encrypt sensitive data in {watcher}:
|
To encrypt sensitive data in {watcher}:
|
||||||
|
|
||||||
. Use the {ref}/syskeygen.html[elasticsearch-syskeygen] command to create a system key file.
|
. Use the {ref}/syskeygen.html[elasticsearch-syskeygen] command to create a system key file.
|
||||||
|
|
Loading…
Reference in New Issue