Skip to content

Commit 29572d1

Browse files
Merge branch 'master' into refactor-containers
2 parents d038e88 + cb914d4 commit 29572d1

File tree

749 files changed

+20385
-7982
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

749 files changed

+20385
-7982
lines changed

.ci/Jenkinsfile_flaky

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ kibanaPipeline(timeoutMinutes: 180) {
3535
if (!IS_XPACK) {
3636
kibanaPipeline.buildOss()
3737
if (CI_GROUP == '1') {
38-
runbld("./test/scripts/jenkins_build_kbn_tp_sample_panel_action.sh", "Build kbn tp sample panel action for ciGroup1")
38+
runbld("./test/scripts/jenkins_build_kbn_sample_panel_action.sh", "Build kbn tp sample panel action for ciGroup1")
3939
}
4040
} else {
4141
kibanaPipeline.buildXpack()

.github/CODEOWNERS

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -177,17 +177,23 @@
177177
# Elasticsearch UI
178178
/src/plugins/console/ @elastic/es-ui
179179
/src/plugins/es_ui_shared/ @elastic/es-ui
180-
/x-pack/plugins/console_extensions/ @elastic/es-ui
181180
/x-pack/legacy/plugins/cross_cluster_replication/ @elastic/es-ui
182181
/x-pack/legacy/plugins/index_lifecycle_management/ @elastic/es-ui
183182
/x-pack/legacy/plugins/index_management/ @elastic/es-ui
184183
/x-pack/legacy/plugins/license_management/ @elastic/es-ui
185-
/x-pack/plugins/remote_clusters/ @elastic/es-ui
186184
/x-pack/legacy/plugins/rollup/ @elastic/es-ui
187-
/x-pack/plugins/searchprofiler/ @elastic/es-ui
188-
/x-pack/plugins/painless_lab/ @elastic/es-ui
189185
/x-pack/legacy/plugins/snapshot_restore/ @elastic/es-ui
190186
/x-pack/legacy/plugins/upgrade_assistant/ @elastic/es-ui
187+
/x-pack/plugins/console_extensions/ @elastic/es-ui
188+
/x-pack/plugins/es_ui_shared/ @elastic/es-ui
189+
/x-pack/plugins/grokdebugger/ @elastic/es-ui
190+
/x-pack/plugins/index_management/ @elastic/es-ui
191+
/x-pack/plugins/license_management/ @elastic/es-ui
192+
/x-pack/plugins/painless_lab/ @elastic/es-ui
193+
/x-pack/plugins/remote_clusters/ @elastic/es-ui
194+
/x-pack/plugins/rollup/ @elastic/es-ui
195+
/x-pack/plugins/searchprofiler/ @elastic/es-ui
196+
/x-pack/plugins/snapshot_restore/ @elastic/es-ui
191197
/x-pack/plugins/upgrade_assistant/ @elastic/es-ui
192198
/x-pack/plugins/watcher/ @elastic/es-ui
193199

docs/canvas/canvas-elements.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ By default, most of the elements you create use demo data until you change the d
2323

2424
* *{es} SQL* — Access your data in {es} using SQL syntax. For information about SQL syntax, refer to {ref}/sql-spec.html[SQL language].
2525

26-
* *{es} raw data* — Access your raw data in {es} without the use of aggregations. Use {es} raw data when you have low volume datasets, or to plot exact, non-aggregated values.
26+
* *{es} documents* &mdash; Access your data in {es} without using aggregations. To use, select an index and fields, and optionally enter a query using the <<lucene-query,Lucene Query Syntax>>. Use the *{es} documents* data source when you have low volume datasets, to view raw documents, or to plot exact, non-aggregated values on a chart.
2727

2828
* *Timelion* &mdash; Access your time series data using <<timelion,Timelion>> queries. To use Timelion queries, you can enter a query using the <<lucene-query,Lucene Query Syntax>>.
2929

docs/logs/images/logs-console.png

-466 KB
Loading

docs/logs/using.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Log entries for the specified time appear in the middle of the page. To quickly
3838
[[logs-customize]]
3939
=== Customize your view
4040
Click *Customize* to customize the view.
41-
Here, you can set the scale to use for the minimap timeline, choose whether to wrap long lines, and choose your preferred text size.
41+
Here, you can choose whether to wrap long lines, and choose your preferred text size.
4242

4343
[float]
4444
=== Configuring the data to use for your logs

docs/migration/migrate_8_0.asciidoc

Lines changed: 37 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -61,24 +61,53 @@ for example, `logstash-*`.
6161
*Impact:* Use `xpack.security.authc.providers` instead.
6262

6363
[float]
64-
==== `xpack.security.authc.saml.realm` is now mandatory when using the SAML authentication provider
65-
*Details:* Previously Kibana was choosing the appropriate Elasticsearch SAML realm automatically using the `Assertion Consumer Service`
66-
URL that it derived from the actual server address. Starting in 8.0.0, the Elasticsearch SAML realm name that Kibana will use should be
67-
specified explicitly.
64+
==== `xpack.security.authc.providers` has changed value format
65+
*Details:* `xpack.security.authc.providers` setting in the `kibana.yml` has changed value format.
6866

69-
*Impact:* Always define `xpack.security.authc.saml.realm` when using the SAML authentication provider.
67+
*Impact:* Array of provider types as a value is no longer supported, use extended object format instead.
68+
69+
[float]
70+
==== `xpack.security.authc.saml` is no longer valid
71+
*Details:* The deprecated `xpack.security.authc.saml` setting in the `kibana.yml` file has been removed.
72+
73+
*Impact:* Configure SAML authentication providers using `xpack.security.authc.providers.saml.{provider unique name}.*` settings instead.
74+
75+
[float]
76+
==== `xpack.security.authc.oidc` is no longer valid
77+
*Details:* The deprecated `xpack.security.authc.oidc` setting in the `kibana.yml` file has been removed.
78+
79+
*Impact:* Configure OpenID Connect authentication providers using `xpack.security.authc.providers.oidc.{provider unique name}.*` settings instead.
7080

7181
[float]
7282
==== `xpack.security.public` is no longer valid
73-
*Details:* The deprecated `xpack.security.public` setting in the `kibana.yml` file has been removed.
83+
*Details:* Previously Kibana was choosing the appropriate Elasticsearch SAML realm automatically using the `Assertion Consumer Service`
84+
URL that it derived from the actual server address and `xpack.security.public` setting. Starting in 8.0.0, the deprecated `xpack.security.public` setting in the `kibana.yml` file has been removed and the Elasticsearch SAML realm name that Kibana will use should be specified explicitly.
7485

75-
*Impact:* Define `xpack.security.authc.saml.realm` when using the SAML authentication provider instead.
86+
*Impact:* Define `xpack.security.authc.providers.saml.{provider unique name}.realm` when using the SAML authentication providers instead.
7687

7788
[float]
7889
==== `/api/security/v1/saml` endpoint is no longer supported
7990
*Details:* The deprecated `/api/security/v1/saml` endpoint is no longer supported.
8091

81-
*Impact:* Rely on `/api/security/saml/callback` endpoint when using SAML instead. This change should be reflected in Kibana `server.xsrf.whitelist` config as well as in Elasticsearch and Identity Provider SAML settings.
92+
*Impact:* Rely on `/api/security/saml/callback` endpoint when using SAML instead. This change should be reflected in Elasticsearch and Identity Provider SAML settings.
93+
94+
[float]
95+
==== `/api/security/v1/oidc` endpoint is no longer supported
96+
*Details:* The deprecated `/api/security/v1/oidc` endpoint is no longer supported.
97+
98+
*Impact:* Rely on `/api/security/oidc/callback` endpoint when using OpenID Connect instead. This change should be reflected in Elasticsearch and OpenID Connect Provider settings.
99+
100+
[float]
101+
==== `/api/security/v1/oidc` endpoint is no longer supported for Third Party initiated login
102+
*Details:* The deprecated `/api/security/v1/oidc` endpoint is no longer supported for Third Party initiated login.
103+
104+
*Impact:* Rely on `/api/security/oidc/initiate_login` endpoint when using Third Party initiated OpenID Connect login instead. This change should be reflected in Elasticsearch and OpenID Connect Provider settings.
105+
106+
[float]
107+
==== `/api/security/v1/oidc/implicit` endpoint is no longer supported
108+
*Details:* The deprecated `/api/security/v1/oidc/implicit` endpoint is no longer supported.
109+
110+
*Impact:* Rely on `/api/security/oidc/implicit` endpoint when using OpenID Connect Implicit Flow instead. This change should be reflected in OpenID Connect Provider settings.
82111

83112
[float]
84113
=== `optimize` directory is now in the `data` folder

docs/setup/settings.asciidoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -410,9 +410,7 @@ all http requests to https over the port configured as `server.port`.
410410
supported protocols with versions. Valid protocols: `TLSv1`, `TLSv1.1`, `TLSv1.2`
411411

412412
`server.xsrf.whitelist:`:: It is not recommended to disable protections for
413-
arbitrary API endpoints. Instead, supply the `kbn-xsrf` header. There are some
414-
scenarios where whitelisting is required, however, such as
415-
<<kibana-authentication, SAML and OpenID Connect Single Sign-On setups>>.
413+
arbitrary API endpoints. Instead, supply the `kbn-xsrf` header.
416414
The `server.xsrf.whitelist` setting requires the following format:
417415

418416
[source,text]

0 commit comments

Comments
 (0)