mirror of
https://github.com/elastic/kibana.git
synced 2025-04-24 09:48:58 -04:00
Allow setting of Monitoring CCS and Screenshotting Sandbox via env vars (#187018)
## Summary #183795 Allow configuration of monitoring.ui.ccs.enabled and xpack.screenshotting.browser.chromium.disableSandbox settings via environment variables in the kibana-docker startup script within the official Kibana Docker Image. ### Checklist Delete any items that are not applicable to this PR. ### Risk Matrix Delete this section if it is not applicable to this PR. ### For maintainers - [ ] This was checked for breaking API changes and was [labeled appropriately](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
This commit is contained in:
parent
33e9757779
commit
8713ea3cd6
1 changed files with 2 additions and 0 deletions
|
@ -117,6 +117,7 @@ kibana_vars=(
|
|||
monitoring.cluster_alerts.email_notifications.email_address
|
||||
monitoring.kibana.collection.enabled
|
||||
monitoring.kibana.collection.interval
|
||||
monitoring.ui.ccs.enabled
|
||||
monitoring.ui.container.elasticsearch.enabled
|
||||
monitoring.ui.container.logstash.enabled
|
||||
monitoring.ui.elasticsearch.hosts
|
||||
|
@ -362,6 +363,7 @@ kibana_vars=(
|
|||
xpack.reporting.roles.allow
|
||||
xpack.reporting.roles.enabled
|
||||
xpack.ruleRegistry.write.enabled
|
||||
xpack.screenshotting.browser.chromium.disableSandbox
|
||||
xpack.security.accessAgreement.message
|
||||
xpack.security.audit.appender.fileName
|
||||
xpack.security.audit.appender.layout.highlight
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue