Commit graph

66 commits

Author SHA1 Message Date
Kaarina Tungseth
b7f4c6a43a
[DOCS] Changed discover to home in configuring docs (#45827) 2019-09-16 15:57:32 -05:00
Josh Dover
5071c74945
Replace CSP 'nonce-<base64>' directive with 'self' directive (#43553) 2019-08-21 14:11:38 -05:00
Aleh Zasypkin
6be8b321d5
Add TLS client authentication support. (#43090) 2019-08-14 22:57:54 +02:00
laraMorenoIgle
ef8072da2b
Update settings.asciidoc (#42820)
vega.enableExternalUrls setting missing but it still supported, so needed to be added
2019-08-08 18:44:16 +02:00
Court Ewing
9950b39cf9
[csp] reject legacy browsers by default (#41700)
* [csp] reject legacy browsers by default

The csp.strict config is now enabled by default, so legacy browsers like
IE11 will not be able to access Kibana unless the deployment has
explicitly enabled it.

* docs: csp.strict breaking change
2019-07-24 09:16:52 -04:00
Jonathan Budzenski
e08f92b0f0
configurable global socket timeouts (#31603)
* configurable global socket timeouts

* update snapshots

* update tests

* add test

* add test

* add test

* happy path

* test happy path

* docs

* stop server after
2019-07-03 12:22:26 -05:00
Joe Reuter
4d88aaa274
Add configs for terminate_after (#37643) 2019-06-24 15:27:18 +02:00
chongzhe
4d755722ab
[Code] initial commit for Code doc (#38521) 2019-06-10 16:14:18 -07:00
Ahmad Bamieh
5cc980979b
[Docs] i18n docs add japanese (#37233) 2019-05-29 15:33:34 +03:00
Nathan Reese
f77d67d740
[Maps] update docs for proxyElasticMapsServiceInMaps configuration (#36914)
* [Maps] update docs for proxyElasticMapsServiceInMaps configuration

* Update docs/setup/settings.asciidoc

Co-Authored-By: gchaps <33642766+gchaps@users.noreply.github.com>

* Update docs/setup/settings.asciidoc

Co-Authored-By: gchaps <33642766+gchaps@users.noreply.github.com>

* Update docs/setup/settings.asciidoc

Co-Authored-By: gchaps <33642766+gchaps@users.noreply.github.com>
2019-05-23 14:26:44 -06:00
Sarah Hersh
3d7030cb07
fix link for 18n settings (#35413) 2019-04-22 13:56:59 -04:00
Sarah Hersh
d59576b22f
add logging.json setting (#34581) 2019-04-18 09:31:24 -04:00
Sarah Hersh
4bca194d35
resolve merge conflict between master and 6.7 (#34570)
[DOCS] Adds i18n docs to master
2019-04-04 14:15:14 -04:00
Peter Pisljar
61e5300391
adding yml switch for using interpreter in expressions (#33832) 2019-04-01 15:35:12 +02:00
CJ Cenizal
4e51ab863a
Fix docs typo sniffOnConectionFault -> sniffOnConnectionFault. (#34189) 2019-03-29 12:50:06 -07:00
Sarah Hersh
6e02912e69
[DOCS]Replaces deprecated timezone (#33330) 2019-03-19 13:09:38 -04:00
Sarah Hersh
f64fde7353
[DOCS]Adds info on index naming conventions (#33321) 2019-03-18 09:33:46 -04:00
Lisa Cawley
e513c6e96c
[DOCS] Sorts the list of Kibana settings (#30551) 2019-02-11 09:20:19 -08:00
Lisa Cawley
f05f0e18d4
[DOCS] Removes X-Pack settings section (#30554) 2019-02-11 08:17:25 -08:00
CJ Cenizal
1c5c175e8d
Update settings docs with new xpack.rollup and xpack.license_management settings. (#30259) 2019-02-06 12:48:07 -08:00
Court Ewing
7094548bca
Warn legacy browsers that do not support Content Security Policy (#29957)
* csp: warn legacy browsers that do not support CSP

The new csp.warnLegacyBrowsers configuration is enabled by default, and
it shows a warning message to any legacy browser when they access Kibana
to indicate that they are not enforcing the basic security protections
of the current install.

The protections check is the same as csp.strict, so this feature is
designed to be used as an alternative to aid in BWC. When csp.strict is
enabled, warnLegacyBrowsers is effectively ignored.

* fix ChromeService tests

* more test fixes

* csp injectvars in legacy test bundle

* update warning text and make it translatable

* no need to warn in legacy browser unit tests

* tests for chrome legacy browser warning

* document legacy browser warning breaking change

* update csp warning toast message

* add period, remove dev code
2019-02-05 12:27:56 -05:00
Court Ewing
475dd5651b
Content security policy strict mode (#29856)
A content security policy is a great addition to the protections built
into Kibana, but it's not effective in older browsers (like IE11) that
do not enforce the policy.

When CSP strict mode is enabled, right before the Kibana app is
bootstrapped, a basic safety check is performed to see if "naked" inline
scripts are rejected. If inline scripting is allowed by the browser,
then an error message is presented to the user and Kibana never attempts
to bootstrap.
2019-02-04 09:09:40 -05:00
Court Ewing
7a87f03ec7
Introduce content security policy (CSP) (#29545)
* csp: nonce and unsafe-eval for scripts

To kick things off, a rudimentary CSP implementation only allows
dynamically loading new JavaScript if it includes an associated nonce
that is generated on every load of the app.

A more sophisticated content security policy is necessary, particularly
one that bans eval for scripts, but one step at a time.

* img-src is not necessary if the goal is not to restrict

* configurable CSP owned by security team

* smoke test

* remove x-content-security-policy

* document csp.rules

* fix tsconfig for test

* switch integration test back to regular js

* stop looking for tsconfig in test

* grrr, linting errors not caught by precommit

* docs: people -> you for consistency sake

Co-Authored-By: epixa <court@epixa.com>
2019-02-01 17:11:38 -05:00
Bill McConaghy
b5bb7c7a31
[DOC] Settings to disable the Rollup and License Management UI (#29278)
Add the settings to disable the Rollup and License Management UI in the Dcoumentation
2019-01-24 13:37:54 -05:00
Brandon Kobel
a3793ecac5
Disabling TLSv1 from being enabled by default (#26415)
* Disabling TLSv1 from being enabled by default

* Adding breaking change docs

* Update docs/migration/migrate_7_0.asciidoc

Co-Authored-By: kobelb <brandon.kobel@gmail.com>

* Using the schema defaults

* Fixing type definitions

* Adjusting logic for no supported protocols

* Adding minSize: 1 to the supported protocols
2018-12-18 12:38:26 -08:00
Jonathan Budzenski
b5b64f4706
Support for multiple Elasticsearch nodes and sniffing (#21928)
* Node sniffing

* update monitoring

* cleaning

* remove tests

* rewrite tests using the proxy

* fix monitoring mocha tests

* fix payload

* return full error

* default interval false

* add sniff settings to monitoring

* add docs for sniff settings

* re-add index search integration test

* catch parse error

* capital

* fix merge

* hapi upgrade

* return

* pass by prefix

* rm empty test fille

* split error handling

* fix merge

* update recent elasticsearch.url references

* prettier vs eslint

* transport.request, include query params

* mega comment

* revert elasticsearchUrl

* safe hosts

* more docs es.url references

* remove unused ml/esServerUrl

* log if both set
2018-12-18 13:22:43 -06:00
Brandon Kobel
9e86a04f21
Adding option to always present the certificate when connecting to ES (#24304)
* Adding option to always present the certificate when connecting to ES

* Updating docs

* Adding some more tests

* Adding alwaysPresentCertificate option to monitoring
2018-10-23 07:12:27 -07:00
Tim Roes
832b896877
Remove last mentions of spy panels (#23527) 2018-09-26 16:53:23 +02:00
Jonathan Budzenski
e89abb3a39
[config] logging.useUTC -> logging.timezone (#21561)
* [config] logging.useUTC -> logging.timezone

* docs

* [env] exit if starting as root

* fix import path

* add link and timezone example

* Revert "[env] exit if starting as root"

This reverts commit f6e9090833a5180fe360a9ff54543c37c0ca3a58.
2018-09-04 16:52:51 -05:00
Marius Dragomir
a5f74131c2
Add clarification for server.ssl.supportedProtocols setting (#22244)
* Add clarification for server.ssl.supportedProtocols setting

Added clarification that the setting has to be an array. With the current wording you can assume that you can just add it as a simple string.

* Update settings.asciidoc

* Update settings.asciidoc

extra dot
2018-08-22 19:57:51 +03:00
Lisa Cawley
27a0ef3fb8
[DOCS] Adds config file location (#20421) 2018-07-03 13:32:49 -07:00
Aaron Caldwell
8f206db2c5
Feature/align map config settings (#19450)
* Update config schema to allow map.tilemap & map.regionmap

* Inject map.regionmap & map.tilemap. Fall back to top-level config declarations if needed

* Warn user on use of legacy map config vals

* Don't create default map objects for deprecated entries. Add notes indicating top-level objects are deprecated

* Update map references in docs

* Shuffle map configurations in docs to be grouped together
2018-05-31 13:57:44 -06:00
Nathan Reese
20dcfb10af
add logQueries to docs (#19456)
* add logQueries to docs

* remove extra space

* logQuerie => logQueries

* better working

* use code font for logging.verbose and true, remove x-pack in front of monitoring
2018-05-29 10:44:51 -06:00
Lisa Cawley
c2e91e6d7b
[DOCS] Clarifies encrypting communications in Kibana (#19155) 2018-05-22 10:51:25 -07:00
Kelly Murphy
36a1820037
[Docs] Kibana settings to ECE (master) (#17369)
* References

These references will allow the ECE documentation to link directly to the supported settings.

* Supported on ECE notes

* Self-edit
2018-05-02 12:23:36 -05:00
Fabien Baligand
c170388847 add doc for environment variable injection (#17833) 2018-04-25 17:18:06 -05:00
Brandon Kobel
97df91f36f
Revert "Support PKCS#12 encoded certificates (#17261)" (#17801)
* Revert "Support PKCS#12 encoded certificates (#17261)"

This reverts commit de91bd0f09.

* Fixing tests
2018-04-19 14:35:06 -04:00
gchaps
6c1bf403e2
[DOCS] In Vega, fixes broken links and adds vega.enableExternalUrls (#17646) 2018-04-11 09:49:13 -07:00
Larry Gregory
de91bd0f09
Support PKCS#12 encoded certificates (#17261)
Support for PKCS#12 encoded certificates
2018-04-04 10:29:31 -04:00
Matt Bargar
7c8f4d8c9b
Bring back shard timeout (#17420)
It is not very useful to have:

* shardTimeout disabled if requestTimeout is enabled (means infinite es overruns)
* shardTimeout > requestTimeout if both enabled (means finite es overruns)
* shardTimeout < requestTimeout if both enabled (means partial results from es?)

The only option that really makes sense is to have shardTimeout === requestTimeout, so that's what I've done here.
2018-04-03 16:55:10 -04:00
Thomas Neirynck
ac0a496c70
Add missing EMS-param to docs (#17372) 2018-03-26 12:15:00 -04:00
Spencer
1516e0703c
[server/rewriteBasePath] Support rewriting basePath requests (#16724)
* [server/rewriteBasePath] add option to enable basePath rewriting

* [server/rewriteBasePath/docs] end sentences with periods

* [server/rewriteBasePath] simplify Joi schema a smidge

* [server/rewriteBasePath] rename test file to match source

* [server/rewriteBasePath] initialize server in before/after hooks

* [server/rewriteBasePath] rephrase deprecation warning

* [server/config/schema] verify that non-strings are not accepted for basePath

* [server/config/schema] toss a trailing comma in there
2018-02-19 12:36:19 -07:00
Court Ewing
829985d96a
Remove tribe node support (#16397)
* Remove tribe node support

Tribe node is being removed from Elasticsearch since it has been
superseded by Cross-Cluster-Search.

* console: remove unnecessary isEnabled

The default behavior for the plugin is to be disabled when its `enabled`
configuration is set to false, so this custom isEnabled function is not
necessary any longer.
2018-01-30 14:36:38 -05:00
archana
fc34f05caa
[Docs] Append more explanation to Configuring Kibana (#15615)
* [docs] uniform colons

* [docs] Add more text about elasticsearch.ssl settings

* [docs] Add more text about elasticsearch.ssl.verificationMode setting

* [docs] spelling error

* [docs] clarify wording
2018-01-23 10:41:10 -06:00
Spencer
4b92c7481c
[docs/logging] document useUTC flag (#16018) 2018-01-12 10:39:24 -07:00
Thomas Neirynck
852fa9c6a9
Region map settings clarifications (#14893) (#15421)
* Region map settings clarifications (#14893)

Improve documentation.

This also includes some additions to clarify the new includeElasticMapsService setting.

It also fully qualify all names
2017-12-05 15:01:48 -05:00
Peter Pisljar
c56360b908
Improve Region Maps for use without network connection (#15056)
* enable turning on/off of warnings

* add tooltip

* add server setting so users can opt out of connecting to the EMS service

* replace WMS options with custom directive, so we can reuse it in region maps

* add wms settings form to Region Map

* no need to recreate map after leaflet upgrade

* add WMS map to region map

* linting issues

* fix rebase

* improve wording

* add global config

* fix typo
2017-11-21 08:27:39 +01:00
Thomas Neirynck
51b7b73e27 Improve docs on spatial reference requirements (#14422) 2017-10-11 15:33:21 -04:00
Jonathan Budzenski
1e25cf656b [docs] Sort settings page (#13514)
* [docs] Sort settings page

* Fix path.data
2017-09-12 13:02:37 -05:00
Jonathan Budzenski
3a50fd2efc [docs] Add path.data to setup instructions (#13513)
* [docs] Add path.data to setup instructions

* [docs] Add path.data to rpm and deb table
2017-08-31 10:16:50 -05:00