Skip to content

Commit d2fba7a

Browse files
Merge branch 'master' into dev/filter-manager/missing-store-fix
2 parents 068a0fe + 952b61e commit d2fba7a

File tree

798 files changed

+3797
-3605
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

798 files changed

+3797
-3605
lines changed

.github/CODEOWNERS

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -150,9 +150,9 @@
150150
**/*.scss @elastic/kibana-design
151151

152152
# Elasticsearch UI
153-
/src/legacy/core_plugins/console/ @elastic/es-ui
153+
/src/plugins/console/ @elastic/es-ui
154154
/src/plugins/es_ui_shared/ @elastic/es-ui
155-
/x-pack/legacy/plugins/console_extensions/ @elastic/es-ui
155+
/x-pack/plugins/console_extensions/ @elastic/es-ui
156156
/x-pack/legacy/plugins/cross_cluster_replication/ @elastic/es-ui
157157
/x-pack/legacy/plugins/index_lifecycle_management/ @elastic/es-ui
158158
/x-pack/legacy/plugins/index_management/ @elastic/es-ui

.i18nrc.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"paths": {
33
"common.ui": "src/legacy/ui",
4-
"console": "src/legacy/core_plugins/console",
4+
"console": "src/plugins/console",
55
"core": "src/core",
66
"dashboardEmbeddableContainer": "src/plugins/dashboard_embeddable_container",
77
"data": [

CONTRIBUTING.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,16 @@ yarn kbn bootstrap
174174

175175
(You can also run `yarn kbn` to see the other available commands. For more info about this tool, see https://github.com/elastic/kibana/tree/master/packages/kbn-pm.)
176176

177+
When switching branches which use different versions of npm packages you may need to run;
178+
```bash
179+
yarn kbn clean
180+
```
181+
182+
If you have failures during `yarn kbn bootstrap` you may have some corrupted packages in your yarn cache which you can clean with;
183+
```bash
184+
yarn cache clean
185+
```
186+
177187
#### Increase node.js heap size
178188

179189
Kibana is a big project and for some commands it can happen that the process hits the default heap limit and crashes with an out-of-memory error. If you run into this problem, you can increase maximum heap size by setting the `--max_old_space_size` option on the command line. To set the limit for all commands, simply add the following line to your shell config: `export NODE_OPTIONS="--max_old_space_size=2048"`.

docs/setup/settings.asciidoc

Lines changed: 72 additions & 65 deletions
Large diffs are not rendered by default.

docs/user/monitoring/monitoring-kibana.asciidoc

Lines changed: 1 addition & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -93,34 +93,7 @@ valid user ID and password in the `elasticsearch.username` and
9393
`elasticsearch.password` settings in the `kibana.yml` file. These values are
9494
used when {kib} sends monitoring data to the production cluster.
9595

96-
.. Configure {kib} to encrypt communications between the {kib} server and the
97-
production cluster. This set up involves generating a server certificate and
98-
setting `server.ssl.*` and `elasticsearch.ssl.certificateAuthorities` settings
99-
in the `kibana.yml` file on the {kib} server. For example, using a PEM-formatted
100-
certificate and private key:
101-
+
102-
--
103-
[source,yaml]
104-
--------------------------------------------------------------------------------
105-
server.ssl.key: /path/to/your/server.key
106-
server.ssl.certificate: /path/to/your/server.crt
107-
--------------------------------------------------------------------------------
108-
109-
If you are using your own certificate authority (CA) to sign certificates,
110-
specify the location of the PEM file in the `kibana.yml` file:
111-
112-
[source,yaml]
113-
--------------------------------------------------------------------------------
114-
elasticsearch.ssl.certificateAuthorities: /path/to/your/cacert.pem
115-
--------------------------------------------------------------------------------
116-
117-
NOTE: Alternatively, the PKCS #12 format can be used for the Kibana certificate
118-
and key, along with any included CA certificates, by setting
119-
`server.ssl.keystore.path`. If your CA certificate chain is in a separate trust
120-
store, you can also use `server.ssl.truststore.path`.
121-
122-
For more information, see <<using-kibana-with-security>>.
123-
--
96+
.. <<configuring-tls-kib-es,Configure encryption for traffic between {kib} and {es}>>.
12497

12598
. <<start-stop,Start {kib}>>.
12699

docs/user/security/authentication/index.asciidoc

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[role="xpack"]
22
[[kibana-authentication]]
3-
=== Authentication in Kibana
3+
=== Authentication in {kib}
44
++++
55
<titleabbrev>Authentication</titleabbrev>
66
++++
@@ -16,23 +16,23 @@
1616
[[basic-authentication]]
1717
==== Basic authentication
1818

19-
Basic authentication requires a username and password to successfully log in to {kib}. It is enabled by default and based on the Native security realm provided by {es}. The basic authentication provider uses a Kibana provided login form, and supports authentication using the `Authorization` request header's `Basic` scheme.
19+
To successfully log in to {kib}, basic authentication requires a username and password. Basic authentication is enabled by default, and is based on the Native security realm or LDAP security realm that is provided by {es}. The basic authentication provider uses a {kib} provided login form, and supports authentication using the `Authorization` request header `Basic` scheme.
2020

21-
The session cookies that are issued by the basic authentication provider are stateless. Therefore, logging out of Kibana when using the basic authentication provider clears the session cookies from the browser but does not invalidate the session cookie for reuse.
21+
The session cookies that are issued by the basic authentication provider are stateless. Therefore, logging out of {kib} when using the basic authentication provider clears the session cookies from the browser, but does not invalidate the session cookie for reuse.
2222

2323
For more information about basic authentication and built-in users, see
2424
{ref}/setting-up-authentication.html[User authentication].
2525

2626
[[token-authentication]]
2727
==== Token authentication
2828

29-
Token authentication allows users to login using the same Kibana provided login form as basic authentication. The token authentication provider is built on {es}'s token APIs. The bearer tokens returned by {es}'s {ref}/security-api-get-token.html[get token API] can be used directly with Kibana using the `Authorization` request header with the `Bearer` scheme.
29+
Token authentication allows users to login using the same {kib} provided login form as basic authentication, and is based on the Native security realm or LDAP security realm that is provided by {es}. The token authentication provider is built on {es} token APIs. The bearer tokens returned by {es}'s {ref}/security-api-get-token.html[get token API] can be used directly with {kib} using the `Authorization` request header with the `Bearer` scheme.
3030

31-
The session cookies that are issued by the token authentication provider are stateful, and logging out of Kibana invalidates the session cookies for reuse.
31+
The session cookies that are issued by the token authentication provider are stateful, and logging out of {kib} invalidates the session cookies for reuse.
3232

33-
Prior to configuring Kibana, ensure token support is enabled in Elasticsearch. See the {ref}/security-api-get-token.html[Elasticsearch token API] documentation for more information.
33+
Prior to configuring {kib}, ensure token support is enabled in {es}. See the {ref}/security-api-get-token.html[{es} token API] documentation for more information.
3434

35-
To enable the token authentication provider in Kibana, set the following value in your `kibana.yml`:
35+
To enable the token authentication provider in {kib}, set the following value in your `kibana.yml`:
3636

3737
[source,yaml]
3838
--------------------------------------------------------------------------------
@@ -67,7 +67,7 @@ server.ssl.clientAuthentication: required
6767
xpack.security.authc.providers: [pki]
6868
--------------------------------------------------------------------------------
6969

70-
NOTE: Trusted CAs can also be specified in a PKCS #12 keystore bundled with your Kibana server certificate/key using
70+
NOTE: Trusted CAs can also be specified in a PKCS #12 keystore bundled with your {kib} server certificate/key using
7171
`server.ssl.keystore.path` or in a separate trust store using `server.ssl.truststore.path`.
7272

7373
PKI support in {kib} is designed to be the primary (or sole) authentication method for users of that {kib} instance. However, you can configure both PKI and Basic authentication for the same {kib} instance:
@@ -128,7 +128,7 @@ Basic authentication is supported _only_ if `basic` authentication provider is e
128128

129129
At the beginning of the SAML handshake, {kib} stores the initial URL in the session cookie, so it can redirect the user back to that URL after successful SAML authentication.
130130
If the URL is long, the session cookie might exceed the maximum size supported by the browser--typically 4KB for all cookies per domain. When this happens, the session cookie is truncated,
131-
or dropped completely, and you might experience sporadic failures during SAML authentication.
131+
or dropped completely, and you might experience sporadic failures during SAML authentication.
132132

133133
To remedy this issue, you can decrease the maximum
134134
size of the URL that {kib} is allowed to store during the SAML handshake. The default value is 2KB.
@@ -185,7 +185,7 @@ Users will be able to access the login page and use Basic authentication by navi
185185
[float]
186186
==== Single sign-on provider details
187187

188-
The following sections apply both to <<saml>> and <<oidc>>
188+
The following sections apply both to <<saml>> and <<oidc>>
189189

190190
[float]
191191
===== Access and refresh tokens

0 commit comments

Comments
 (0)