[DOCS] Adds the 8.6.0 release notes (#145768)

## Summary

Adds the release notes for the 8.6.0 release.

Co-authored-by: Lisa Cawley <lcawley@elastic.co>
Co-authored-by: Aleh Zasypkin <aleh.zasypkin@gmail.com>
Co-authored-by: Marco Liberati <dej611@users.noreply.github.com>
Co-authored-by: Brandon Morelli <brandon.morelli@elastic.co>
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
This commit is contained in:
Kaarina Tungseth 2022-12-15 14:37:36 -06:00 committed by GitHub
parent 8fc7affcbf
commit 4290e35d8f
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
9 changed files with 2941 additions and 24 deletions

File diff suppressed because it is too large Load diff

View file

@ -19,7 +19,7 @@ We would recommend waiting until later in `7.x` to upgrade your plugins if possi
If you would like to keep up with progress on the visualizations plugin in the meantime,
here are a few resources:
* The <<breaking-changes-8.0.0,breaking changes>> documentation, where we try to capture any changes to the APIs as they occur across minors.
* The {kibana-ref-all}/8.0/release-notes-8.0.0.html#breaking-changes-8.0.0[8.0.0 breaking changes], where we try to capture any changes to the APIs as they occur across minors.
* link:https://github.com/elastic/kibana/issues/44121[Meta issue] which is tracking the move of the plugin to the new {kib} platform
* Our link:https://www.elastic.co/blog/join-our-elastic-stack-workspace-on-slack[Elastic Stack workspace on Slack].
* The {kib-repo}blob/{branch}/src/plugins/visualizations[source code], which will continue to be

View file

@ -8,7 +8,7 @@
Alerting and actions are enabled by default in {kib}, but require you to configure the following:
. <<using-kibana-with-security,Set up {kib} to work with {stack} {security-features}>>.
. <<configuring-tls-kib-es,Set up TLS encryption between {kib} and {es}>>.
. {ref}/security-basic-setup-https.html#encrypt-kibana-elasticsearch[Encrypt traffic between {kib} and {es}].
. If you are using an *on-premises* Elastic Stack deployment, <<general-alert-action-settings,specify a value for `xpack.encryptedSavedObjects.encryptionKey`>>.
You can configure the following settings in the `kibana.yml` file.

View file

@ -214,7 +214,7 @@ To automatically generate reports with {watcher}, you must configure {watcher} t
. Enable {stack-security-features} on your {es} cluster. For more information, see {ref}/security-getting-started.html[Getting started with security].
. Configure TLS/SSL encryption for the {kib} server. For more information, see <<configuring-tls>>.
. Configure TLS/SSL encryption for the {kib} server. For more information, check {ref}/security-basic-setup-https.html#encrypt-kibana-http[Encrypt HTTP client communications for {kib}].
. Specify the {kib} server CA certificate chain in `elasticsearch.yml`:
+

View file

@ -31,7 +31,7 @@ Different versions of {kib} running against the same {es} index, such as during
+
Make sure you remove or update any configurations
that are indicated in the <<breaking-changes-8.0.0,breaking changes>> documentation
that are indicated in the {kibana-ref-all}/8.0/release-notes-8.0.0.html#breaking-changes-8.0.0[8.0.0 breaking changes],
otherwise {kib} will fail to start.
--
. Upgrade any plugins by removing the existing plugin and reinstalling the
@ -52,7 +52,7 @@ and becomes a new instance in the monitoring data.
--
. Copy the files from the `config` directory from your old installation to your
new installation. Make sure you remove or update any configurations that are
indicated in the <<breaking-changes-8.0.0,breaking changes>> documentation
indicated in the {kibana-ref-all}/8.0/release-notes-8.0.0.html#breaking-changes-8.0.0[8.0.0 breaking changes],
otherwise {kib} will fail to start.
. Copy the files from the `data` directory from your old installation to your
new installation.

View file

@ -105,7 +105,7 @@ valid user ID and password in the `elasticsearch.username` and
`elasticsearch.password` settings in the `kibana.yml` file. These values are
used when {kib} sends monitoring data to the production cluster.
.. <<configuring-tls-kib-es,Configure encryption for traffic between {kib} and {es}>>.
.. {ref}/security-basic-setup-https.html#encrypt-kibana-elasticsearch[Encrypt traffic between {kib} and {es}].
. <<start-stop,Start {kib}>>.

View file

@ -56,7 +56,7 @@ If these settings are omitted, {kib} uses the `elasticsearch.username` and
information, see {kibana-ref}/using-kibana-with-security.html[Configuring security in {kib}].
. (Optional) Configure {kib} to encrypt communications between the {kib} server
and the monitoring cluster. See <<configuring-tls>>.
and the monitoring cluster. For more information, check {ref}/security-basic-setup-https.html#encrypt-kibana-http[Encrypt HTTP client communications for {kib}].
. If the Elastic {security-features} are enabled on the {kib} server, only users
that have the authority to access {kib} indices and to read the monitoring indices

View file

@ -117,7 +117,7 @@ access tokens. All subsequent requests to {es} APIs on behalf of users will be a
Prior to configuring {kib}, ensure that the PKI realm is enabled in {es} and configured to permit delegation. See {ref}/configuring-pki-realm.html[Configuring a PKI realm] for more information.
To enable the PKI authentication provider in {kib}, you must first <<configuring-tls,configure {kib} to encrypt communications between the browser and {kib} server>>. You must also enable TLS client authentication and include the certificate authority (CA) used to sign client certificates into a list of CAs trusted by {kib} in your `kibana.yml`:
To enable the PKI authentication provider in {kib}, you must first {ref}/security-basic-setup-https.html#encrypt-kibana-http[configure {kib} to encrypt communications between the browser and {kib} server]. You must also enable TLS client authentication and include the certificate authority (CA) used to sign client certificates into a list of CAs trusted by {kib} in your `kibana.yml`:
NOTE: You can configure only one PKI provider per {kib} instance.

View file

@ -46,7 +46,7 @@ If you haven't already, start {kib} and connect it to {es} using the
--
{kib} uses the client certificate and corresponding private key when connecting to {es}.
NOTE: This is not the same as the <<configuring-tls-browser-kib,server certificate>> that {kib} will present to web browsers.
NOTE: This is not the same as the {ref}/security-basic-setup-https.html#encrypt-kibana-http[server certificate] that {kib} will present to web browsers.
You may choose to generate a client certificate and private key using the {ref}/certutil.html[`elasticsearch-certutil`] tool. If you followed the {es} documentation for {ref}/security-basic-setup.html#generate-certificates[generating the certificates authority], then you already have a certificate authority (CA) to sign
the {es} server certificate. You may choose to use the same CA to sign the {kib}