﻿---
title: Remote clusters on self-managed installations
description: The instructions that follow describe how to create a remote connection from a self-managed cluster. You can also set up cross-cluster search and cross-cluster...
url: https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/remote-clusters/remote-clusters-self-managed
products:
  - Elasticsearch
applies_to:
  - Self-managed Elastic deployments: Generally available
---

# Remote clusters on self-managed installations
The instructions that follow describe how to create a remote connection from a self-managed cluster. You can also set up cross-cluster search and cross-cluster replication from an [Elastic Cloud Hosted deployment](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/remote-clusters/ec-enable-ccs), from an [Elastic Cloud Enterprise deployment](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/remote-clusters/ece-enable-ccs), or from an [Elastic Cloud on Kubernetes cluster](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/remote-clusters/eck-remote-clusters-landing).

## Add remote clusters

To add remote clusters, you can choose between [two security models](#remote-clusters-security-models) and [two connection modes](#sniff-proxy-modes). Both security models are compatible with either of the connection modes.

### Security models

<definitions>
  <definition term="API key">
    For clusters on Elastic Stack 8.14 or later, you can use an API key to authenticate and authorize cross-cluster operations to a remote cluster. This model offers administrators of both the local and the remote cluster fine-grained access controls. [Add remote clusters using API key authentication](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/remote-clusters/remote-clusters-api-key).
  </definition>
  <definition term="TLS certificate (deprecated in Elastic Stack 9.0.0)">
    Uses mutual TLS authentication for cross-cluster operations. User authentication is performed on the local cluster and a user’s role names are passed to the remote cluster. In this model, a superuser on the local cluster gains total read access to the remote cluster, so it is only suitable for clusters that are in the same security domain. [Add remote clusters using TLS certificate authentication](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/remote-clusters/remote-clusters-cert).
  </definition>
</definitions>


### Connection modes


<definitions>
  <definition term="Sniff mode">
    In sniff mode, a cluster alias is registered with a name of your choosing and a list of addresses of *seed* nodes specified with the `cluster.remote.<cluster_alias>.seeds` setting. When you register a remote cluster using sniff mode, Elasticsearch retrieves from one of the seed nodes the addresses of up to three *gateway nodes*. Each `remote_cluster_client` node in the local Elasticsearch cluster then opens several TCP connections to the publish addresses of the gateway nodes. This mode therefore requires that the gateway nodes' publish addresses are accessible to nodes in the local cluster.
    Sniff mode is the default connection mode. See [Sniff mode remote cluster settings](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3028/reference/elasticsearch/configuration-reference/remote-clusters#remote-cluster-sniff-settings) for more information about configuring sniff mode.
    The *gateway nodes* selection depends on the following criteria:
    - **version**: Remote nodes must be compatible with the cluster they are registered to.
    - **role**: By default, any non-[master-eligible](/elastic/docs-builder/docs/3028/deploy-manage/distributed-architecture/clusters-nodes-shards/node-roles#master-node-role) node can act as a gateway node. Dedicated master nodes are never selected as gateway nodes.
    - **attributes**: You can define the gateway nodes for a cluster by setting [`cluster.remote.node.attr.gateway`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3028/reference/elasticsearch/configuration-reference/remote-clusters#cluster-remote-node-attr) to `true`. However, such nodes still have to satisfy the two above requirements.
  </definition>
</definitions>


<definitions>
  <definition term="Proxy mode">
    In proxy mode, a cluster alias is registered with a name of your choosing and the address of a TCP (layer 4) reverse proxy specified with the `cluster.remote.<cluster_alias>.proxy_address` setting. You must configure this proxy to route connections to one or more nodes of the remote cluster. When you register a remote cluster using proxy mode, Elasticsearch opens several TCP connections to the proxy address and uses these connections to communicate with the remote cluster. In proxy mode Elasticsearch disregards the publish addresses of the remote cluster nodes which means that the publish addresses of the remote cluster nodes need not be accessible to the local cluster.
    Proxy mode is not the default connection mode, so you must set `cluster.remote.<cluster_alias>.mode: proxy` to use it. See [Proxy mode remote cluster settings](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3028/reference/elasticsearch/configuration-reference/remote-clusters#remote-cluster-proxy-settings) for more information about configuring proxy mode.
    Proxy mode has the same [version compatibility requirements](#gateway-nodes-selection) as sniff mode.
  </definition>
</definitions>