Configure ECK
ECK
This section covers ECK configuration mechanisms and use cases, starting with the basic setup of the operator using the provided ConfigMap
and extending to more advanced configuration scenarios that require detailed procedures.
This content focuses on ECK operator configuration. For details on available features and how to configure your Elasticsearch and Kibana deployments, refer to Configure deployments.
The following guides cover common ECK configuration tasks:
Apply ECK configuration settings: Apply configuration changes, such the CA certificate validity period, the namespaces where the operator is allowed to work, or the log verbosity level for ECK.
Configure the validating webhook: Enable or disable the webhook, and configure multiple SSL certificate generation options.
Restrict cross-namespace resource associations: Configure access control rules for cross-namespace associations. This functionality is disabled by default.
Create custom images: Use your own images with Elasticsearch plugins already installed rather than installing them through init containers.
Service meshes: Connect ECK and managed Elastic Stack applications to some of the most popular service mesh implementations in the Kubernetes ecosystem.
Network policies: Use Kubernetes network policies to isolate pods by restricting incoming and outgoing network connections to a trusted set of sources and destinations.
Webhook namespace selectors: Restrict the namespaces that the validation webhook applies to, allowing multiple operators to coexist efficiently in the same cluster.
Other sections of the Elastic documentation cover additional topics related to ECK configuration:
Monitoring
- Configure the metrics endpoint (monitor an orchestrator)
Licensing
Maintenance