Commit graph

56 commits

Author SHA1 Message Date
Nik Everett
504d714972 Docs: Fix settings deprecation warnings
Asciidoctor requires a slightly different syntax. This makes it happy.
2019-10-18 13:05:52 -04:00
Peter Schretlen
f027fad862
revert configurable global socket timeouts (#31603) (#41837) 2019-07-24 04:42:49 -04:00
Jonathan Budzenski
836bb2d8c5
[6.8] configurable global socket timeouts (#31603) (#40906)
* configurable global socket timeouts (#31603)

* configurable global socket timeouts

* update snapshots

* update tests

* add test

* add test

* add test

* happy path

* test happy path

* docs

* stop server after

* fix/lint import ordering

* use older new platform apis

* prettier

* config => HttpConfig
2019-07-15 14:23:38 -05:00
Sarah Hersh
07e0fd0d58 backport logging.json setting 2019-04-18 10:02:29 -04:00
Ahmad Bamieh
b871926a37
[Docs] i18n asciidocs (#32547)
Context: #22349 

- [x] tell about locale
- [x] describe how to set a locale
- [x] describe how developers can use i18n engine functionality
2019-04-03 20:57:26 +05:30
CJ Cenizal
e0f4c0141d
Fix docs typo sniffOnConectionFault -> sniffOnConnectionFault. (#34189) (#34194) 2019-03-29 15:24:01 -07:00
Sarah Hersh
894167a256
replaces overwritten setting (#33521) 2019-03-19 13:37:19 -04:00
Sarah Hersh
d182d7cb74 resolve conflicts 2019-03-19 13:16:34 -04:00
Sarah Hersh
df51d363ab adds naming reqs 2019-03-18 09:44:21 -04:00
Court Ewing
652f4bb49b
Content security policy strict mode (#29856) (#30700)
A content security policy is a great addition to the protections built
into Kibana, but it's not effective in older browsers (like IE11) that
do not enforce the policy.

When CSP strict mode is enabled, right before the Kibana app is
bootstrapped, a basic safety check is performed to see if "naked" inline
scripts are rejected. If inline scripting is allowed by the browser,
then an error message is presented to the user and Kibana never attempts
to bootstrap.
2019-02-11 15:28:20 -05:00
Court Ewing
8461561683
Introduce content security policy (CSP) (#29545) (#30686)
* csp: nonce and unsafe-eval for scripts

To kick things off, a rudimentary CSP implementation only allows
dynamically loading new JavaScript if it includes an associated nonce
that is generated on every load of the app.

A more sophisticated content security policy is necessary, particularly
one that bans eval for scripts, but one step at a time.

* img-src is not necessary if the goal is not to restrict

* configurable CSP owned by security team

* smoke test

* remove x-content-security-policy

* document csp.rules

* fix tsconfig for test

* switch integration test back to regular js

* stop looking for tsconfig in test

* grrr, linting errors not caught by precommit

* docs: people -> you for consistency sake

Co-Authored-By: epixa <court@epixa.com>
2019-02-11 13:48:59 -05:00
Lisa Cawley
271afecd0f
[DOCS] Deprecate SSL settings (#29990) 2019-02-04 15:02:46 -08:00
Lisa Cawley
561dabea66
[DOCS] Deprecate elasticsearch.url (#29982) 2019-02-04 12:59:46 -08:00
Bill McConaghy
21a9b7c2a1
[DOC] Settings to disable the Rollup and License Management UI (#29277)
Add the settings to disable the Rollup and License Management UI in the Dcoumentation
2019-01-24 16:50:13 -05:00
Nathan Reese
aa552ad5bc
[6.x] Backport "map" kibana.yml configurations to 6.7 (#28592)
* backport inject_vars and schema changes

* merge documenation changes
2019-01-11 13:14:20 -07:00
Jonathan Budzenski
1275b79c68
[6.x] Support for multiple Elasticsearch nodes and sniffing (#21928) (#27431)
* Support for multiple Elasticsearch nodes and sniffing (#21928)

* Node sniffing

* update monitoring

* cleaning

* remove tests

* rewrite tests using the proxy

* fix monitoring mocha tests

* fix payload

* return full error

* default interval false

* add sniff settings to monitoring

* add docs for sniff settings

* re-add index search integration test

* catch parse error

* capital

* fix merge

* hapi upgrade

* return

* pass by prefix

* rm empty test fille

* split error handling

* fix merge

* update recent elasticsearch.url references

* prettier vs eslint

* transport.request, include query params

* mega comment

* revert elasticsearchUrl

* safe hosts

* more docs es.url references

* remove unused ml/esServerUrl

* log if both set

* tribe test

* update remaining url references
2018-12-18 19:16:04 -06:00
Brandon Kobel
ec26adf621
Adding option to always present the certificate when connecting to ES (#24304) (#24401)
* Adding option to always present the certificate when connecting to ES

* Updating docs

* Adding some more tests

* Adding alwaysPresentCertificate option to monitoring
2018-10-23 11:12:24 -07:00
Tim Roes
2cb1f3e9db
Remove last mentions of spy panels (#23527) (#23533) 2018-09-26 19:08:12 +02:00
Jonathan Budzenski
b8ad4cec73
[config] logging.useUTC -> logging.timezone (#21561) (#22697)
* [config] logging.useUTC -> logging.timezone

* docs

* [env] exit if starting as root

* fix import path

* add link and timezone example

* Revert "[env] exit if starting as root"

This reverts commit f6e9090833a5180fe360a9ff54543c37c0ca3a58.
2018-09-05 12:02:19 -05:00
Marius Dragomir
9f2c0da95c
Add clarification for server.ssl.supportedProtocols setting (#22244) (#22263)
* Add clarification for server.ssl.supportedProtocols setting

Added clarification that the setting has to be an array. With the current wording you can assume that you can just add it as a simple string.

* Update settings.asciidoc
2018-08-23 18:06:30 +03:00
Lisa Cawley
a08520eb84 [DOCS] Adds config file location (#20421) 2018-07-03 13:36:32 -07:00
CJ Cenizal
830e0806db
Revert "Feature/align map config settings (#19450) (#20283)" (#20286)
This reverts commit c3afa57fa4.
2018-06-28 06:10:34 -07:00
CJ Cenizal
c3afa57fa4
Feature/align map config settings (#19450) (#20283)
* Update config schema to allow map.tilemap & map.regionmap

* Inject map.regionmap & map.tilemap. Fall back to top-level config declarations if needed

* Warn user on use of legacy map config vals

* Don't create default map objects for deprecated entries. Add notes indicating top-level objects are deprecated

* Update map references in docs

* Shuffle map configurations in docs to be grouped together
2018-06-27 20:39:50 -07:00
Nathan Reese
fbcc6962fe
merge conflict (#19519) 2018-05-29 16:24:36 -06:00
Lisa Cawley
f3f6d1d910 [DOCS] Clarifies encrypting communications in Kibana (#19155) 2018-05-22 10:55:05 -07:00
Kelly Murphy
c3e41894f9
[Docs] Kibana settings anchors for ECE (6.x) (#17376)
* Reference anchors for links

* Cloud phrasing

* Reviewer feedback
2018-05-02 12:23:15 -05:00
Fabien Baligand
0a4f4f664d
add doc for environment variable injection (#17833) 2018-04-25 17:20:23 -05:00
Brandon Kobel
05206963ea
Revert "Support PKCS#12 encoded certificates (#17261)" (#17801) (#17802)
* Revert "Support PKCS#12 encoded certificates (#17261)"

This reverts commit de91bd0f09.

* Fixing tests
2018-04-19 14:41:49 -04:00
gchaps
8c10e9d1e0
[DOCS] In Vega, fixes broken links and adds vega.enableExternalUrls (#17646) (#17661) 2018-04-11 11:10:41 -07:00
Larry Gregory
e2aa793729
[6.x] Support PKCS#12 encoded certificates (#17261) (#17546)
* [6.x] Backport Support PKCS#12 Certificates
2018-04-05 19:48:20 -04:00
Matt Bargar
9ff0f70953
Bring back shard timeout (#17420) (#17529)
It is not very useful to have:

* shardTimeout disabled if requestTimeout is enabled (means infinite es overruns)
* shardTimeout > requestTimeout if both enabled (means finite es overruns)
* shardTimeout < requestTimeout if both enabled (means partial results from es?)

The only option that really makes sense is to have shardTimeout === requestTimeout, so that's what I've done here.
2018-04-04 13:05:47 -04:00
Thomas Neirynck
9f803a6590
Add missing EMS-param to docs (#17372) (#17398) 2018-03-26 14:19:42 -04:00
Spencer
ae0358a17a
[server/rewriteBasePath] Support rewriting basePath requests (#16724) (#16814)
* [server/rewriteBasePath] add option to enable basePath rewriting

* [server/rewriteBasePath/docs] end sentences with periods

* [server/rewriteBasePath] simplify Joi schema a smidge

* [server/rewriteBasePath] rename test file to match source

* [server/rewriteBasePath] initialize server in before/after hooks

* [server/rewriteBasePath] rephrase deprecation warning

* [server/config/schema] verify that non-strings are not accepted for basePath

* [server/config/schema] toss a trailing comma in there
2018-02-19 14:43:40 -07:00
archana
12a7dc4143 [Docs] Append more explanation to Configuring Kibana (#15615)
* [docs] uniform colons

* [docs] Add more text about elasticsearch.ssl settings

* [docs] Add more text about elasticsearch.ssl.verificationMode setting

* [docs] spelling error

* [docs] clarify wording
2018-01-23 10:53:39 -06:00
Spencer
c2a611b956
[6.x] [docs/logging] document useUTC flag (#16018) (#16019) 2018-01-12 10:40:24 -07:00
Thomas Neirynck
1e2a8300f3
Region map settings clarifications (#14893) (#15421) (#15428)
* Region map settings clarifications (#14893)

Improve documentation.

This also includes some additions to clarify the new includeElasticMapsService setting.

It also fully qualify all parameter names.
2017-12-05 16:08:34 -05:00
Peter Pisljar
37682b7074
Improve Region Maps for use without network connection (#15056) (#15074)
* enable turning on/off of warnings

* add tooltip

* add server setting so users can opt out of connecting to the EMS service

* replace WMS options with custom directive, so we can reuse it in region maps

* add wms settings form to Region Map

* no need to recreate map after leaflet upgrade

* add WMS map to region map

* linting issues

* fix rebase

* improve wording

* add global config

* fix typo
2017-11-21 09:08:03 +01:00
Thomas Neirynck
13fbbcf410 Improve docs on spatial reference requirements (#14422) 2017-10-11 15:35:20 -04:00
Jonathan Budzenski
4890a68eec
[docs] Sort settings page (#13514)
* [docs] Sort settings page

* Fix path.data
2017-09-12 13:03:45 -05:00
Jonathan Budzenski
d68383578e
[docs] Add path.data to setup instructions (#13513)
* [docs] Add path.data to setup instructions

* [docs] Add path.data to rpm and deb table
2017-08-31 10:18:18 -05:00
Court Ewing
7a918f17d2 Configurable custom response headers for server (#13045)
* Configurable custom response headers for server

The server.customResponseHeaders configuration allows users to configure
custom headers to send on all responses to the client from anywhere in
the Kibana server.

This can be useful for setting headers like x-frame-options when you
don't want people embedding even Kibana dashboards in an iframe.

* Consistent header overriding and explicit unknown
2017-07-21 18:35:02 -04:00
Kim Joar Bekkelund
2af99de42c Add docs about 'redirectHttpFromPort' setting (#12708) 2017-07-16 22:40:18 +02:00
Thomas Neirynck
58ef02c908 Display regionmap attribution (#12647)
This adds the attribution strings of vector data files to the map. It also enables the map to allow for individual attribution strings from each individual layer, so attribution gets updated correctly when adding/removing layers.
2017-07-13 18:15:56 -04:00
Thomas Neirynck
bcd9e7dc22 Add region map documentation and rename references from tile map to coordinate map (#12370) 2017-06-29 23:49:26 -04:00
debadair
2587c859da [DOCS] Changed settings table formatting to vertical to fix overlap. 2017-05-09 11:12:04 -07:00
Tyler Smalley
006fae00f7 Fetches control group resource information (#10402)
Adds control group data to status API and kbnServer.metrics
2017-04-11 10:20:30 -07:00
Brandon Kobel
f398dd2368 Fixing docs reference from elasticsearch.ssl.cert to certificate (#11037)
* Fixing docs reference from elasticsearch.ssl.cert to certificate

* Fixing elasticsearch.tribe.ssl doc sections
2017-04-07 07:59:10 -04:00
jasper
a8989cc2ee docs: Fixes key for Tribe's requestTimeout (#10525)
Backports PR #10503

**Commit 1:**
Update doc

Include elasticsearch.tribe.requestTimeout setting

* Original sha: 5a01e24695
* Authored by Nikhil Patel <niks999@gmail.com> on 2017-02-22T11:17:01Z
* Committed by GitHub <noreply@github.com> on 2017-02-22T11:17:01Z
2017-02-22 20:08:30 -08:00
Brandon Kobel
4662635087 Removing the server.ssl.clientAuthentication setting (#10253)
Removes the server.ssl.clientAuthentication setting, and we'll reevaluate adding this back in when addressing PKI.
2017-02-09 07:09:43 -05:00
Brandon Kobel
5a4263835d Modifying SSL settings to be consistent with the stack (#9823)
This introduces the following new settings:
- server.ssl.enabled
- server.ssl.keyPassphrase
- server.ssl.certificateAuthorities
- server.ssl.clientAuthentication
- server.ssl.supportedProtocols
- elasticsearch.ssl.keyPassphrase


and deprecates the following:
- server.ssl.cert -> server.ssl.certificate
- elasticsearch.ssl.ca -> elasticsearch.ssl.certificateAuthorities
- elasticsearch.ssl.cert -> elasticsearch.ssl.certificate
- elasticsearch.ssl.verify -> elasticsearch.ssl.verificationMode
- console.proxyConfig
2017-01-25 10:58:56 -05:00