mirror of
https://github.com/elastic/kibana.git
synced 2025-04-24 01:38:56 -04:00
add advanced Elastic Defend policy option: advanced.artifacts.global.ca_cert (#179138)
## Summary Elastic Defend allows to configure custom CA certificate for reaching to custom security artifacts server, applicable in air-gapped environments https://www.elastic.co/guide/en/security/current/offline-endpoint.html ### Checklist Delete any items that are not applicable to this PR. - [x] Any text added follows [EUI's writing guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses sentence case text and includes [i18n support](https://github.com/elastic/kibana/blob/main/packages/kbn-i18n/README.md) ### Risk Matrix Delete this section if it is not applicable to this PR. Before closing this PR, invite QA, stakeholders, and other developers to identify risks that should be tested prior to the change/feature release. When forming the risk matrix, consider some of the following examples and how they may potentially impact the change: | Risk | Probability | Severity | Mitigation/Notes | |---------------------------|-------------|----------|-------------------------| | Multiple Spaces—unexpected behavior in non-default Kibana Space. | Low | High | Integration tests will verify that all features are still supported in non-default Kibana Space and when user switches between spaces. | | Multiple nodes—Elasticsearch polling might have race conditions when multiple Kibana nodes are polling for the same tasks. | High | Low | Tasks are idempotent, so executing them multiple times will not result in logical error, but will degrade performance. To test for this case we add plenty of unit tests around this logic and document manual testing procedure. | | Code should gracefully handle cases when feature X or plugin Y are disabled. | Medium | High | Unit tests will verify that any feature flag or plugin combination still results in our service operational. | | [See more potential risk examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx) | ### For maintainers - [ ] This was checked for breaking API changes and was [labeled appropriately](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process) --------- Co-authored-by: Tomasz Ciecierski <tomasz.ciecierski@elastic.co>
This commit is contained in:
parent
6e215b7096
commit
7b79885fe2
1 changed files with 33 additions and 0 deletions
|
@ -1633,4 +1633,37 @@ export const AdvancedPolicySchema: AdvancedPolicySchemaType[] = [
|
|||
}
|
||||
),
|
||||
},
|
||||
{
|
||||
key: 'windows.advanced.artifacts.global.ca_cert',
|
||||
first_supported_version: '7.9',
|
||||
documentation: i18n.translate(
|
||||
'xpack.securitySolution.endpoint.policy.advanced.windows.advanced.artifacts.global.ca_cert',
|
||||
{
|
||||
defaultMessage:
|
||||
'PEM-encoded certificate for security artifacts server certificate authority.',
|
||||
}
|
||||
),
|
||||
},
|
||||
{
|
||||
key: 'mac.advanced.artifacts.global.ca_cert',
|
||||
first_supported_version: '7.9',
|
||||
documentation: i18n.translate(
|
||||
'xpack.securitySolution.endpoint.policy.advanced.mac.advanced.artifacts.global.ca_cert',
|
||||
{
|
||||
defaultMessage:
|
||||
'PEM-encoded certificate for security artifacts server certificate authority.',
|
||||
}
|
||||
),
|
||||
},
|
||||
{
|
||||
key: 'linux.advanced.artifacts.global.ca_cert',
|
||||
first_supported_version: '7.9',
|
||||
documentation: i18n.translate(
|
||||
'xpack.securitySolution.endpoint.policy.advanced.linux.advanced.artifacts.global.ca_cert',
|
||||
{
|
||||
defaultMessage:
|
||||
'PEM-encoded certificate for security artifacts server certificate authority.',
|
||||
}
|
||||
),
|
||||
},
|
||||
];
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue