mirror of
https://github.com/elastic/kibana.git
synced 2025-04-25 10:23:14 -04:00
Migrate docs from AsciiDoc to Markdown. The preview can be built after #212557 is merged. @florent-leborgne please tag reviewers, add the appropriate label(s), and take this out of draft when you're ready. Note: More files are deleted than added here because the content from some files was moved to [elastic/docs-content](https://github.com/elastic/docs-content). **What has moved to [elastic/docs-content](https://github.com/elastic/docs-content)?** Public-facing narrative and conceptual docs have moved. Most can now be found under the following directories in the new docs: - explore-analyze: Discover, Dashboards, Visualizations, Reporting, Alerting, dev tools... - deploy-manage: Stack management (Spaces, user management, remote clusters...) - troubleshooting: .... troubleshooting pages **What is staying in the Kibana repo?** - Reference content (= anything that is or could be auto-generated): Settings, syntax references - Release notes - Developer guide --------- Co-authored-by: Florent Le Borgne <florent.leborgne@elastic.co>
1.4 KiB
1.4 KiB
kibana-encryption-keys [kibana-encryption-keys]
The kibana-encryption-keys
command helps you generate encryption keys that {{kib}} uses to protect sensitive information.
{{kib}} uses encryption keys in several areas, ranging from encrypting data in {{kib}} associated indices to storing session information. By defining these encryption keys in your configuration, you’ll ensure consistent operations across restarts.
Usage [_usage]
bin/kibana-encryption-keys [command] [options]
Commands [encryption-key-parameters]
generate
- Generate encryption keys.
Unless interactive mode (
-i
) is used, the generated encryption keys will be output to your console only. From here, you should manually copy the keys into eitherkibana.yml
or where else you’re configurating {{kib}}.-i, --interactive
- Prompts you for which encryption keys to set and optionally where to save a sample configuration file.
-q, --quiet
- Outputs the config options/encryption keys only (without helper information).
-f, --force
- Generates new keys for all settings. By default, only un-configured encryption keys will be generated.
-h, --help
- Shows help information.
Examples [_examples]
bin/kibana-encryption-keys generate