From 71bc7ec83c250fb47cc1c8af92986771a69a78aa Mon Sep 17 00:00:00 2001
From: Benjamin Ironside Goldstein <benjamin.ironside@elastic.co>
Date: Mon, 20 May 2024 12:47:21 -0700
Subject: [PATCH 1/2] updates govcloud support statement

---
 docs/cloud-native-security/cspm-get-started-aws.asciidoc   | 2 +-
 docs/cloud-native-security/cspm-get-started-azure.asciidoc | 2 +-
 docs/cloud-native-security/cspm-get-started-gcp.asciidoc   | 2 +-
 docs/cloud-native-security/cspm.asciidoc                   | 2 +-
 docs/cloud-native-security/kspm-get-started.asciidoc       | 2 +-
 docs/cloud-native-security/kspm.asciidoc                   | 2 +-
 6 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/docs/cloud-native-security/cspm-get-started-aws.asciidoc b/docs/cloud-native-security/cspm-get-started-aws.asciidoc
index 4870f9ae62..423fb3d3fc 100644
--- a/docs/cloud-native-security/cspm-get-started-aws.asciidoc
+++ b/docs/cloud-native-security/cspm-get-started-aws.asciidoc
@@ -12,7 +12,7 @@ This page explains how to get started monitoring the security posture of your cl
 --
 * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
 * CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. 
-* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
+* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
 * To view posture data, you need `read` privileges for the following {es} indices:
 ** `logs-cloud_security_posture.findings_latest-*`
 ** `logs-cloud_security_posture.scores-*`
diff --git a/docs/cloud-native-security/cspm-get-started-azure.asciidoc b/docs/cloud-native-security/cspm-get-started-azure.asciidoc
index 732e2ae8cd..32175641b8 100644
--- a/docs/cloud-native-security/cspm-get-started-azure.asciidoc
+++ b/docs/cloud-native-security/cspm-get-started-azure.asciidoc
@@ -12,7 +12,7 @@ This page explains how to get started monitoring the security posture of your cl
 --
 * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
 * CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. 
-* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
+* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
 * To view posture data, you need `read` privileges for the following {es} indices:
 ** `logs-cloud_security_posture.findings_latest-*`
 ** `logs-cloud_security_posture.scores-*`
diff --git a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc
index 3745844ae5..9da61b78d4 100644
--- a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc
+++ b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc
@@ -12,7 +12,7 @@ This page explains how to get started monitoring the security posture of your GC
 --
 * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
 * CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. 
-* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
+* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
 * To view posture data, you need `read` privileges for the following {es} indices:
 ** `logs-cloud_security_posture.findings_latest-*`
 ** `logs-cloud_security_posture.scores-*`
diff --git a/docs/cloud-native-security/cspm.asciidoc b/docs/cloud-native-security/cspm.asciidoc
index ff6c0989c7..492a976208 100644
--- a/docs/cloud-native-security/cspm.asciidoc
+++ b/docs/cloud-native-security/cspm.asciidoc
@@ -11,7 +11,7 @@ This feature currently supports Amazon Web Services (AWS), Google Cloud Platform
 * CSPM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
 * {stack} version 8.10 or greater.
 * CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. 
-* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
+* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
 --
 
 [discrete]
diff --git a/docs/cloud-native-security/kspm-get-started.asciidoc b/docs/cloud-native-security/kspm-get-started.asciidoc
index 87c9a41e73..7b40b1bdfb 100644
--- a/docs/cloud-native-security/kspm-get-started.asciidoc
+++ b/docs/cloud-native-security/kspm-get-started.asciidoc
@@ -7,7 +7,7 @@ This page explains how to configure the Kubernetes Security Posture Management (
 --
 * The KSPM integration is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
 * The KSPM integration only works in the `Default` Kibana space. Installing the KSPM integration on a different Kibana space will not work.
-* KSPM is not supported on EKS clusters in AWS Government Cloud (https://github.com/elastic/enhancements[request support for government cloud]).
+* KSPM is not supported on EKS clusters in AWS GovCloud (https://github.com/elastic/kibana/issues/new/choose[request support]).
 * To view posture data, ensure you have the `read` privilege for the following {es} indices:
 
 - `logs-cloud_security_posture.findings_latest-*`
diff --git a/docs/cloud-native-security/kspm.asciidoc b/docs/cloud-native-security/kspm.asciidoc
index 52d3fe80b9..ba9671e3c0 100644
--- a/docs/cloud-native-security/kspm.asciidoc
+++ b/docs/cloud-native-security/kspm.asciidoc
@@ -13,7 +13,7 @@ This integration supports Amazon EKS and unmanaged Kubernetes clusters. For setu
 [sidebar]
 --
 * The KSPM integration is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
-* KSPM is not supported on EKS clusters in AWS Government Cloud (https://github.com/elastic/enhancements[request support for government cloud]).
+* KSPM is not supported on EKS clusters in AWS GovCloud (https://github.com/elastic/kibana/issues/new/choose[request support]).
 --
 
 [discrete]

From 2ecd769f726a51bd022d86f1432ca9d8ee5afe1d Mon Sep 17 00:00:00 2001
From: Benjamin Ironside Goldstein <benjamin.ironside@elastic.co>
Date: Mon, 20 May 2024 22:22:44 -0700
Subject: [PATCH 2/2] incorporates Janeen's review

---
 docs/cloud-native-security/cspm-get-started-aws.asciidoc   | 2 +-
 docs/cloud-native-security/cspm-get-started-azure.asciidoc | 2 +-
 docs/cloud-native-security/cspm-get-started-gcp.asciidoc   | 2 +-
 docs/cloud-native-security/cspm.asciidoc                   | 2 +-
 docs/cloud-native-security/kspm-get-started.asciidoc       | 2 +-
 docs/cloud-native-security/kspm.asciidoc                   | 2 +-
 6 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/docs/cloud-native-security/cspm-get-started-aws.asciidoc b/docs/cloud-native-security/cspm-get-started-aws.asciidoc
index 423fb3d3fc..5ae3985534 100644
--- a/docs/cloud-native-security/cspm-get-started-aws.asciidoc
+++ b/docs/cloud-native-security/cspm-get-started-aws.asciidoc
@@ -12,7 +12,7 @@ This page explains how to get started monitoring the security posture of your cl
 --
 * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
 * CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. 
-* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
+* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
 * To view posture data, you need `read` privileges for the following {es} indices:
 ** `logs-cloud_security_posture.findings_latest-*`
 ** `logs-cloud_security_posture.scores-*`
diff --git a/docs/cloud-native-security/cspm-get-started-azure.asciidoc b/docs/cloud-native-security/cspm-get-started-azure.asciidoc
index 32175641b8..8c53ad6d64 100644
--- a/docs/cloud-native-security/cspm-get-started-azure.asciidoc
+++ b/docs/cloud-native-security/cspm-get-started-azure.asciidoc
@@ -12,7 +12,7 @@ This page explains how to get started monitoring the security posture of your cl
 --
 * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
 * CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. 
-* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
+* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
 * To view posture data, you need `read` privileges for the following {es} indices:
 ** `logs-cloud_security_posture.findings_latest-*`
 ** `logs-cloud_security_posture.scores-*`
diff --git a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc
index 9da61b78d4..524fc3f54e 100644
--- a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc
+++ b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc
@@ -12,7 +12,7 @@ This page explains how to get started monitoring the security posture of your GC
 --
 * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
 * CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. 
-* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
+* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
 * To view posture data, you need `read` privileges for the following {es} indices:
 ** `logs-cloud_security_posture.findings_latest-*`
 ** `logs-cloud_security_posture.scores-*`
diff --git a/docs/cloud-native-security/cspm.asciidoc b/docs/cloud-native-security/cspm.asciidoc
index 492a976208..8826cf7a17 100644
--- a/docs/cloud-native-security/cspm.asciidoc
+++ b/docs/cloud-native-security/cspm.asciidoc
@@ -11,7 +11,7 @@ This feature currently supports Amazon Web Services (AWS), Google Cloud Platform
 * CSPM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
 * {stack} version 8.10 or greater.
 * CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. 
-* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
+* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
 --
 
 [discrete]
diff --git a/docs/cloud-native-security/kspm-get-started.asciidoc b/docs/cloud-native-security/kspm-get-started.asciidoc
index 7b40b1bdfb..9ef78eb193 100644
--- a/docs/cloud-native-security/kspm-get-started.asciidoc
+++ b/docs/cloud-native-security/kspm-get-started.asciidoc
@@ -7,7 +7,7 @@ This page explains how to configure the Kubernetes Security Posture Management (
 --
 * The KSPM integration is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
 * The KSPM integration only works in the `Default` Kibana space. Installing the KSPM integration on a different Kibana space will not work.
-* KSPM is not supported on EKS clusters in AWS GovCloud (https://github.com/elastic/kibana/issues/new/choose[request support]).
+* KSPM is not supported on EKS clusters in AWS GovCloud. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
 * To view posture data, ensure you have the `read` privilege for the following {es} indices:
 
 - `logs-cloud_security_posture.findings_latest-*`
diff --git a/docs/cloud-native-security/kspm.asciidoc b/docs/cloud-native-security/kspm.asciidoc
index ba9671e3c0..971263e567 100644
--- a/docs/cloud-native-security/kspm.asciidoc
+++ b/docs/cloud-native-security/kspm.asciidoc
@@ -13,7 +13,7 @@ This integration supports Amazon EKS and unmanaged Kubernetes clusters. For setu
 [sidebar]
 --
 * The KSPM integration is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
-* KSPM is not supported on EKS clusters in AWS GovCloud (https://github.com/elastic/kibana/issues/new/choose[request support]).
+* KSPM is not supported on EKS clusters in AWS GovCloud. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
 --
 
 [discrete]