mirror of
https://github.com/elastic/kibana.git
synced 2025-04-24 01:38:56 -04:00
[Reporting] Update docs to use screenshotting config properties (#127518)
* [Reporting] Update docs to use screenshotting config properties * add the remaining capture settings moved from reporting Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
This commit is contained in:
parent
1591bfba24
commit
ec2062ae4e
2 changed files with 23 additions and 23 deletions
|
@ -63,6 +63,9 @@ Reporting generates reports in the background and jobs are coordinated using doc
|
|||
in {es}. Depending on how often you generate reports and the overall number of
|
||||
reports, you might need to change the following settings.
|
||||
|
||||
`xpack.reporting.capture.maxAttempts` {ess-icon}::
|
||||
If capturing a report fails for any reason, {kib} will re-queue the report job for retry, as many times as this setting. Defaults to `3`.
|
||||
|
||||
`xpack.reporting.queue.indexInterval`::
|
||||
How often the index that stores reporting jobs rolls over to a new index. Valid values are `year`, `month`, `week`, `day`, and `hour`. Defaults to `week`.
|
||||
|
||||
|
@ -86,26 +89,23 @@ Specifies the {time-units}[time] that the reporting poller waits between polling
|
|||
[[reporting-capture-settings]]
|
||||
==== Capture settings
|
||||
|
||||
Reporting works by capturing screenshots from {kib}. The following settings control the capturing process.
|
||||
Reporting uses an internal "screenshotting" plugin to capture screenshots from {kib}. The following settings control the capturing process.
|
||||
|
||||
`xpack.reporting.capture.timeouts.openUrl` {ess-icon}::
|
||||
`xpack.screenshotting.capture.timeouts.openUrl` {ess-icon}::
|
||||
Specify the {time-units}[time] to allow the Reporting browser to wait for the "Loading..." screen to dismiss and find the initial data for the page. If the time is exceeded, a screenshot is captured showing the current page, and the download link shows a warning message. Can be specified as number of milliseconds. Defaults to `1m`.
|
||||
|
||||
`xpack.reporting.capture.timeouts.waitForElements` {ess-icon}::
|
||||
`xpack.screenshotting.capture.timeouts.waitForElements` {ess-icon}::
|
||||
Specify the {time-units}[time] to allow the Reporting browser to wait for all visualization panels to load on the page. If the time is exceeded, a screenshot is captured showing the current page, and the download link shows a warning message. Can be specified as number of milliseconds. Defaults to `30s`.
|
||||
|
||||
`xpack.reporting.capture.timeouts.renderComplete` {ess-icon}::
|
||||
`xpack.screenshotting.capture.timeouts.renderComplete` {ess-icon}::
|
||||
Specify the {time-units}[time] to allow the Reporting browser to wait for all visualizations to fetch and render the data. If the time is exceeded, a screenshot is captured showing the current page, and the download link shows a warning message. Can be specified as number of milliseconds. Defaults to `30s`.
|
||||
|
||||
NOTE: If any timeouts from `xpack.reporting.capture.timeouts.*` settings occur when
|
||||
NOTE: If any timeouts from `xpack.screenshotting.capture.timeouts.*` settings occur when
|
||||
running a report job, Reporting will log the error and try to continue
|
||||
capturing the page with a screenshot. As a result, a download will be
|
||||
available, but there will likely be errors in the visualizations in the report.
|
||||
|
||||
`xpack.reporting.capture.maxAttempts` {ess-icon}::
|
||||
If capturing a report fails for any reason, {kib} will re-attempt other reporting job, as many times as this setting. Defaults to `3`.
|
||||
|
||||
`xpack.reporting.capture.loadDelay`::
|
||||
`xpack.screenshotting.capture.loadDelay`::
|
||||
deprecated:[8.0.0,This setting has no effect.] Specify the {time-units}[amount of time] before taking a screenshot when visualizations are not evented. All visualizations that ship with {kib} are evented, so this setting should not have much effect. If you are seeing empty images instead of visualizations, try increasing this value. Defaults to `3s`. *NOTE*: This setting exists for backwards compatibility, but is unused and therefore does not have an affect on reporting performance.
|
||||
|
||||
[float]
|
||||
|
@ -114,16 +114,16 @@ deprecated:[8.0.0,This setting has no effect.] Specify the {time-units}[amount o
|
|||
|
||||
For PDF and PNG reports, Reporting spawns a headless Chromium browser process on the server to load and capture a screenshot of the {kib} app. When installing {kib} on Linux and Windows platforms, the Chromium binary comes bundled with the {kib} download. For Mac platforms, the Chromium binary is downloaded the first time {kib} is started.
|
||||
|
||||
`xpack.reporting.capture.browser.chromium.disableSandbox`::
|
||||
`xpack.screenshotting.browser.chromium.disableSandbox`::
|
||||
It is recommended that you research the feasibility of enabling unprivileged user namespaces. An exception is if you are running {kib} in Docker because the container runs in a user namespace with the built-in seccomp/bpf filters. For more information, refer to <<reporting-chromium-sandbox>>. Defaults to `false` for all operating systems except Debian and Red Hat Linux, which use `true`.
|
||||
|
||||
`xpack.reporting.capture.browser.chromium.proxy.enabled`::
|
||||
Enables the proxy for Chromium to use. When set to `true`, you must also specify the `xpack.reporting.capture.browser.chromium.proxy.server` setting. Defaults to `false`.
|
||||
`xpack.screenshotting.browser.chromium.proxy.enabled`::
|
||||
Enables the proxy for Chromium to use. When set to `true`, you must also specify the `xpack.screenshotting.browser.chromium.proxy.server` setting. Defaults to `false`.
|
||||
|
||||
`xpack.reporting.capture.browser.chromium.proxy.server`::
|
||||
`xpack.screenshotting.browser.chromium.proxy.server`::
|
||||
The uri for the proxy server. Providing the username and password for the proxy server via the uri is not supported.
|
||||
|
||||
`xpack.reporting.capture.browser.chromium.proxy.bypass`::
|
||||
`xpack.screenshotting.browser.chromium.proxy.bypass`::
|
||||
An array of hosts that should not go through the proxy server and should use a direct connection instead. Examples of valid entries are "elastic.co", "*.elastic.co", ".elastic.co", ".elastic.co:5601".
|
||||
|
||||
[float]
|
||||
|
@ -136,13 +136,13 @@ If the Chromium browser is asked to send a request that violates the network pol
|
|||
|
||||
NOTE: {kib} installations are not designed to be publicly accessible over the internet. The Reporting network policy and other capabilities of the Elastic Stack security features do not change this condition.
|
||||
|
||||
`xpack.reporting.capture.networkPolicy`::
|
||||
`xpack.screenshotting.networkPolicy`::
|
||||
Capturing a screenshot from a {kib} page involves sending out requests for all the linked web assets. For example, a Markdown visualization can show an image from a remote server.
|
||||
|
||||
`xpack.reporting.capture.networkPolicy.enabled`::
|
||||
`xpack.screenshotting.networkPolicy.enabled`::
|
||||
When `false`, disables the *Reporting* network policy. Defaults to `true`.
|
||||
|
||||
`xpack.reporting.capture.networkPolicy.rules`::
|
||||
`xpack.screenshotting.networkPolicy.rules`::
|
||||
A policy is specified as an array of objects that describe what to allow or deny based on a host or protocol. If a host or protocol is not specified, the rule matches any host or protocol.
|
||||
|
||||
The rule objects are evaluated sequentially from the beginning to the end of the array, and continue until there is a matching rule. If no rules allow a request, the request is denied.
|
||||
|
@ -150,14 +150,14 @@ The rule objects are evaluated sequentially from the beginning to the end of the
|
|||
[source,yaml]
|
||||
-------------------------------------------------------
|
||||
# Only allow requests to placeholder.com
|
||||
xpack.reporting.capture.networkPolicy:
|
||||
xpack.screenshotting.networkPolicy:
|
||||
rules: [ { allow: true, host: "placeholder.com" } ]
|
||||
-------------------------------------------------------
|
||||
|
||||
[source,yaml]
|
||||
-------------------------------------------------------
|
||||
# Only allow requests to https://placeholder.com
|
||||
xpack.reporting.capture.networkPolicy:
|
||||
xpack.screenshotting.networkPolicy:
|
||||
rules: [ { allow: true, host: "placeholder.com", protocol: "https:" } ]
|
||||
-------------------------------------------------------
|
||||
|
||||
|
@ -166,7 +166,7 @@ A final `allow` rule with no host or protocol allows all requests that are not e
|
|||
[source,yaml]
|
||||
-------------------------------------------------------
|
||||
# Denies requests from http://placeholder.com, but anything else is allowed.
|
||||
xpack.reporting.capture.networkPolicy:
|
||||
xpack.screenshotting.networkPolicy:
|
||||
rules: [{ allow: false, host: "placeholder.com", protocol: "http:" }, { allow: true }];
|
||||
-------------------------------------------------------
|
||||
|
||||
|
@ -175,7 +175,7 @@ A network policy can be composed of multiple rules:
|
|||
[source,yaml]
|
||||
-------------------------------------------------------
|
||||
# Allow any request to http://placeholder.com but for any other host, https is required
|
||||
xpack.reporting.capture.networkPolicy
|
||||
xpack.screenshotting.networkPolicy
|
||||
rules: [
|
||||
{ allow: true, host: "placeholder.com", protocol: "http:" },
|
||||
{ allow: true, protocol: "https:" },
|
||||
|
|
|
@ -31,10 +31,10 @@ distributions don't have user namespaces enabled by default, or they require the
|
|||
automatically disable the sandbox when it is running on Debian because additional steps are required to enable
|
||||
unprivileged usernamespaces. In these situations, you'll see the following message in your {kib} startup logs:
|
||||
`Chromium sandbox provides an additional layer of protection, but is not supported for your OS.
|
||||
Automatically setting 'xpack.reporting.capture.browser.chromium.disableSandbox: true'.`
|
||||
Automatically setting 'xpack.screenshotting.browser.chromium.disableSandbox: true'.`
|
||||
|
||||
Reporting automatically enables the Chromium sandbox at startup when a supported OS is detected. However, if your kernel is 3.8 or newer, it's
|
||||
recommended to set `xpack.reporting.capture.browser.chromium.disableSandbox: false` in your `kibana.yml` to explicitly enable usernamespaces.
|
||||
recommended to set `xpack.screenshotting.browser.chromium.disableSandbox: false` in your `kibana.yml` to explicitly enable usernamespaces.
|
||||
|
||||
[float]
|
||||
[[reporting-docker-sandbox]]
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue