You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For example, the following request creates a `remote_monitor` user that has the
80
+
`remote_monitoring_agent` role:
71
81
+
72
82
--
73
83
[source, sh]
@@ -84,12 +94,17 @@ POST /_xpack/security/user/remote_monitor
84
94
--
85
95
86
96
.. On each node in the cluster that is being monitored, configure the `http`
87
-
exporter to use the appropriate credentials when data is shipped to the monitoring cluster.
97
+
exporter to use the appropriate credentials when data is shipped to the
98
+
monitoring cluster.
88
99
+
89
100
--
90
-
If SSL/TLS is enabled on the monitoring cluster, you must use the HTTPS protocol in the `host` setting. You must also include the CA certificate in each node's trusted certificates in order to verify the identities of the nodes in the monitoring cluster.
101
+
If SSL/TLS is enabled on the monitoring cluster, you must use the HTTPS protocol
102
+
in the `host` setting. You must also include the CA certificate in each node's
103
+
trusted certificates in order to verify the identities of the nodes in the
104
+
monitoring cluster.
91
105
92
-
The following example specifies the location of the PEM encoded certificate with the `certificate_authorities` setting:
106
+
The following example specifies the location of the PEM encoded certificate with
0 commit comments