Loading

Remote clusters with Elastic Cloud Hosted

Elastic Cloud Hosted

You can configure an Elastic Cloud Hosted deployment to remotely access or (be accessed by) a cluster from:

  • Another Elastic Cloud Hosted deployment of your Elastic Cloud organization, across any region or cloud provider (AWS, GCP, Azure…​)
  • An Elastic Cloud Hosted deployment of another Elastic Cloud organization
  • A deployment in an Elastic Cloud Enterprise installation
  • A deployment in an Elastic Cloud on Kubernetes installation
  • A self-managed installation.

To use CCS or CCR, your deployments must meet the following criteria:

  • The local and remote clusters must run on compatible versions of Elasticsearch. Review the version compatibility table.

  • If your deployment was created before February 2021, the Remote clusters page in Kibana must be enabled manually from the Security page of your deployment, by selecting Enable CCR under Trust management.

The steps, information, and authentication method required to configure CCS and CCR can vary depending on where the clusters you want to use as remote are hosted.

Note

Traffic filtering isn’t supported for cross-cluster operations initiated from an Elastic Cloud Enterprise environment to a remote Elastic Cloud Hosted deployment.

For remote clusters configured using TLS certificate authentication, traffic filtering can be enabled to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.

Traffic filtering for remote clusters supports 2 methods:

Note

When setting up traffic filters for a remote connection to an Elastic Cloud Enterprise environment, you also need to upload the region’s TLS certificate of the local cluster to the Elastic Cloud Enterprise environment’s proxy. You can find that region’s TLS certificate in the Security page of any deployment of the environment initiating the remote connection.