Skip to content

Commit

Permalink
docs: Restore keystore docs (#12113) (#12139)
Browse files Browse the repository at this point in the history
* restore old keystore doc

* restore keystore section in command reference

* add new advanced settings pages to list

* add a note

(cherry picked from commit 50815d1)

Co-authored-by: Colleen McGinnis <[email protected]>
Co-authored-by: mergify[bot] <37929162+mergify[bot]@users.noreply.github.com>
  • Loading branch information
mergify[bot] and colleenmcginnis authored Dec 4, 2023
1 parent 2ff77d9 commit 671c727
Show file tree
Hide file tree
Showing 3 changed files with 176 additions and 0 deletions.
63 changes: 63 additions & 0 deletions docs/command-reference.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,7 @@ ifdef::serverless[]
endif::serverless[]

:help-command-short-desc: Shows help for any command
:keystore-command-short-desc: Manages the <<keystore,secrets keystore>>
:modules-command-short-desc: Manages configured modules
:package-command-short-desc: Packages the configuration and executable into a zip file
:remove-command-short-desc: Removes the specified function from your serverless environment
Expand Down Expand Up @@ -106,6 +107,9 @@ ifdef::apm-server[]
endif::[]
|<<export-command,`export`>> |{export-command-short-desc}.
|<<help-command,`help`>> |{help-command-short-desc}.
ifndef::serverless[]
|<<keystore-command,`keystore`>> |{keystore-command-short-desc}.
endif::[]
ifeval::["{beatname_lc}"=="functionbeat"]
|<<package-command,`package`>> |{package-command-short-desc}.
|<<remove-command,`remove`>> |{remove-command-short-desc}.
Expand Down Expand Up @@ -430,6 +434,65 @@ Specifies the name of the command to show help for.
{beatname_lc} help export
-----

ifndef::serverless[]
[float]
[[keystore-command]]
==== `keystore` command

{keystore-command-short-desc}.

*SYNOPSIS*

["source","sh",subs="attributes"]
----
{beatname_lc} keystore SUBCOMMAND [FLAGS]
----

*`SUBCOMMAND`*

*`add KEY`*::
Adds the specified key to the keystore. Use the `--force` flag to overwrite an
existing key. Use the `--stdin` flag to pass the value through `stdin`.

*`create`*::
Creates a keystore to hold secrets. Use the `--force` flag to overwrite the
existing keystore.

*`list`*::
Lists the keys in the keystore.

*`remove KEY`*::
Removes the specified key from the keystore.

*FLAGS*

*`--force`*::
Valid with the `add` and `create` subcommands. When used with `add`, overwrites
the specified key. When used with `create`, overwrites the keystore.

*`--stdin`*::
When used with `add`, uses the stdin as the source of the key's value.

*`-h, --help`*::
Shows help for the `keystore` command.


{global-flags}

*EXAMPLES*

["source","sh",subs="attributes"]
-----
{beatname_lc} keystore create
{beatname_lc} keystore add ES_PWD
{beatname_lc} keystore remove ES_PWD
{beatname_lc} keystore list
-----

See <<keystore>> for more examples.

endif::[]

ifeval::["{beatname_lc}"=="functionbeat"]
[float]
[[package-command]]
Expand Down
109 changes: 109 additions & 0 deletions docs/keystore.asciidoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,109 @@
[[keystore]]
=== Secrets keystore for secure settings

++++
<titleabbrev>Secrets keystore</titleabbrev>
++++

IMPORTANT: The APM Server keystore only applies to the APM Server binary installation method.

When you configure APM Server, you might need to specify sensitive settings,
such as passwords. Rather than relying on file system permissions to protect
these values, you can use the APM Server keystore to securely store secret
values for use in configuration settings.

After adding a key and its secret value to the keystore, you can use the key in
place of the secret value when you configure sensitive settings.

The syntax for referencing keys is identical to the syntax for environment
variables:

`${KEY}`

Where KEY is the name of the key.

For example, imagine that the keystore contains a key called `ES_PWD` with the
value `yourelasticsearchpassword`:

* In the configuration file, use `output.elasticsearch.password: "${ES_PWD}"`
* On the command line, use: `-E "output.elasticsearch.password=\${ES_PWD}"`

When APM Server unpacks the configuration, it resolves keys before resolving
environment variables and other variables.

Notice that the APM Server keystore differs from the {es} keystore.
Whereas the {es} keystore lets you store `elasticsearch.yml` values by
name, the APM Server keystore lets you specify arbitrary names that you can
reference in the APM Server configuration.

To create and manage keys, use the `keystore` command.
See the <<keystore-command,command reference>> for the full command syntax,
including optional flags.

NOTE: The `keystore` command must be run by the same user who will run
APM Server.

[discrete]
[[creating-keystore]]
=== Create a keystore

To create a secrets keystore, use:

[source,sh]
-----
apm-server keystore create
-----

APM Server creates the keystore in the directory defined by the `path.data`
configuration setting.

[discrete]
[[add-keys-to-keystore]]
=== Add keys

To store sensitive values, such as authentication credentials for {es},
use the `keystore add` command:

[source,sh]
-----
apm-server keystore add ES_PWD
-----

When prompted, enter a value for the key.

To overwrite an existing key's value, use the `--force` flag:

[source,sh]
-----
apm-server keystore add ES_PWD --force
-----

To pass the value through stdin, use the `--stdin` flag. You can also use
`--force`:

[source,sh]
-----
cat /file/containing/setting/value | apm-server keystore add ES_PWD --stdin --force
-----

[discrete]
[[list-settings]]
=== List keys

To list the keys defined in the keystore, use:

[source,sh]
-----
apm-server keystore list
-----

[discrete]
[[remove-settings]]
=== Remove keys

To remove a key from the keystore, use:

[source,sh]
-----
apm-server keystore remove ES_PWD
-----
4 changes: 4 additions & 0 deletions docs/setting-up-and-running.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -12,12 +12,16 @@ for basic installation and running instructions.
This section includes additional information on how to set up and run APM Server, including:

* <<directory-layout>>
* <<keystore>>
* <<command-line-options>>
* <<tune-data-ingestion>>
* <<high-availability>>
* <<running-on-docker>>

include::{docdir}/shared-directory-layout.asciidoc[]

include::{docdir}/keystore.asciidoc[]

include::{docdir}/command-reference.asciidoc[]

include::{docdir}/data-ingestion.asciidoc[]
Expand Down

0 comments on commit 671c727

Please sign in to comment.