Commit Graph

206 Commits

Author SHA1 Message Date
David Kilfoyle 40e9f3097c
[DOCS] Add TSDS docs, take two (#87703)
* Revert "Revert "[DOCS] Add TSDS docs (#86905)" (#87702)"

This reverts commit 0c86d7b9b2.

* First fix to tests

* Add data_stream object to index template

* small rewording

* Add enable data stream object in gradle example setup

* Add bullet about data stream must be enabled in template
2022-06-16 12:44:10 -04:00
David Kilfoyle 0c86d7b9b2
Revert "[DOCS] Add TSDS docs (#86905)" (#87702)
Reverts elastic/elasticsearch#86905
2022-06-15 13:32:12 -04:00
David Kilfoyle d57f4ac2c6
[DOCS] Add TSDS docs (#86905)
* [DOCS] Add TSDB docs

* Update docs/build.gradle

Co-authored-by: Adam Locke <adam.locke@elastic.co>

* Address Nik's comments, part 1

* Address Nik's comments, part deux

* Reword write index

* Add feature flags

* Wrap one more section in feature flag

* Small fixes

* set index.routing_path to optional

* Update storage reduction value

* Update create index template code example

Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>
Co-authored-by: Adam Locke <adam.locke@elastic.co>
2022-06-15 12:22:07 -04:00
Przemysław Witek 8656a29675
[Transform] Implement per-transform num_failure_retries setting. (#87361) 2022-06-09 15:22:06 +02:00
Yang Wang f5ceed19fc
User Profile - remove feature flag (#87383)
The feature flag is no longer necessary in the 8.4 release cycle. The
feature itself is still in beta.
2022-06-08 10:18:18 -04:00
Adam Locke 03f75416b5
[DOCS] JWT doc enhancements (#86411)
* [DOCS] Add examples for run-as privileges

* Add JWT run_as and realm examples

* Adding examples for run_as, moving that section, and other 🔥 edits

* Add section headers 🖍️

* Incorporate Justin's suggestions from code review

Co-authored-by: Justin Cranford <89857999+justincr-elastic@users.noreply.github.com>

* Edits and clarifications based on reviewer feedback.

* Clarify run_as privilege in roles

* Fix typo

* Add redirect to fix cross-book linking

* Expand the run_as examples

* Update request

* Remove NOTCONSOLE from curl commands

* Update run_as example and expand section on unsupported realms

* Split note for unsupported realms

* Remove note that OAuth2 tokens aren't supported and clarify run_as from unsupported realms

* Apply Justin's suggestions from code review

Co-authored-by: Justin Cranford <89857999+justincr-elastic@users.noreply.github.com>

* Update support for different authentication mechanisms

* Apply suggestions from code review

Co-authored-by: Justin Cranford <89857999+justincr-elastic@users.noreply.github.com>

* Add note from review, cleanup, and typo fixes

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
Co-authored-by: Justin Cranford <89857999+justincr-elastic@users.noreply.github.com>
2022-06-03 18:12:36 -04:00
Justin Cranford 7b75311382
List rp.signature_algorithm supported values in docs (#87365) 2022-06-03 13:56:00 -04:00
Adam Locke acc22de4fd
[DOCS] Document when security auto configuration is skipped (#86575)
* [DOCS] Document when security auto configuration is skipped

* Add xpack autoconfiguration parameter and links

* Fix typo and add related link 🔗

* Incorporate review feedback

* Remove keystore section and instead integrate into previous section
2022-05-17 08:27:48 -04:00
Justin Cranford fc5f27cc0d
Add missing defaults for three OIDC settings (#86746) 2022-05-16 10:58:47 -04:00
Tim Vernum 6e32fed6e5
[DOCS] Fix name of OIDC JWT sig algorithm setting (#86561)
The `client_auth_jwt_signature_algorithm` was incorrectly documented.
2022-05-12 12:09:01 -04:00
Joe Gallo 6aaf0972a3
Make the ILM and SLM history_index_enabled settings dynamic (#86493) 2022-05-06 13:07:54 -04:00
Tim Vernum 4d7a516dac
Correct docs on DLS bitset cache default values (#86282)
In #50535 (ES v7.6) the default values for the
`DocumentSubsetBitsetCache` settings were changed. However, the docs
were not updated at that time, and still reflect the old values for
these settings
2022-05-01 22:40:03 -04:00
Justin Cranford d4c1c2efbd
Add missing settings hmac_jwkset and hmac_key for JWT realm to security-settings.asciidoc (#86085) 2022-04-28 16:09:53 -04:00
Justin Cranford 94b45585a1
[DOCS] Add documentation for JWT realm (#85189) 2022-04-21 11:23:12 -04:00
Yang Wang 7dee198ac7
User Profile: Initial beta overview documentations (#83766)
Add initial feature overview documentation pages for User Profile and
Security Domain.

Co-authored-by: Adam Locke <adam.locke@elastic.co>
Co-authored-by: Tim Vernum <tim@adjective.org>
Co-authored-by: Albert Zaharovits <albert.zaharovits@gmail.com>
2022-04-15 00:38:41 +10:00
Justin Cranford 070dec4603
Add JWT cache to JWT realm. (#84842) 2022-03-21 13:55:32 -04:00
Lee Hinman ef01949562
Add list of allowed domains for Watcher email action (#84894)
This adds the `xpack.notification.email.account.domain_allowlist` dynamic cluster setting that
allows an administrator to specify a list of domains to which emails are allowed to be sent. The
default value for this setting is `["*"]` which means all domains are allowed. It supports
rudimentary globbing (`*`) in the domain name, so `*.company.com` will work as a valid option.

Resolves https://github.com/elastic/elasticsearch/issues/84739
2022-03-16 08:03:58 -06:00
Justin Cranford d103af2d06
Add JWT realm support for JWT validation (#83155) 2022-02-21 01:54:39 -05:00
Nicole Albee 5b6164f8fd
[Docs] Watcher clarification on CSV formulas warning. (#83088)
* Update docs for Watcher notification settings to include default xpack.notification.reporting.warning.kbn-csv-contains-formulas.text value and link to the Kibana documentation.

* Apply suggestions from code review

Co-authored-by: Adam Locke <adam.locke@elastic.co>

* Apply suggestions from code review

Co-authored-by: Adam Locke <adam.locke@elastic.co>

Co-authored-by: Adam Locke <adam.locke@elastic.co>
2022-01-27 09:23:12 -05:00
Lisa Cawley 6faff3e453
[DOCS] Updates xpack.security.enabled description (#82692) 2022-01-17 14:58:54 -08:00
Justin Cranford e467424043
Add JwtRealmSettings (#81680)
Add JwtRealmSettings

Include unit tests and realm security settings documentation. Covers all settings except client authentication mTLS option, and HTTP proxy option.

Refactor Open ID Connect realm to reuse ClaimSetting.java and ClaimParser.java for JWT realm.
2021-12-21 16:28:33 -05:00
James Rodewig 4d19702221
[DOCS] Update xrefs for snapshot restore docs (#81023)
Changes:

* Removes a leading slash from the restore snapshot API's prerequisites.
* Updates several xrefs that point to redirected pages.
2021-11-29 11:52:02 -05:00
James Rodewig 659e0d3fd3
[DOCS] Overhaul snapshot and restore docs (#79081)
Makes several changes to consolidate snapshot and backup-related docs.

Highlights:

* Adds info about supported ESS snapshot repository types
* Adds docs for Kibana's Snapshot and Restore feature
* Combines tutorial pages related to taking and managing snapshots
* Consolidates explanations of the snapshot process
* Incorporates SLM into the snapshot tutorial
* Removes duplicate "back up a cluster" pages
2021-11-15 12:45:07 -05:00
David Roberts a61088063e
[ML] use_auto_machine_memory_percent now defaults max_model_memory_limit (#80532)
If the xpack.ml.use_auto_machine_memory_percent setting is true,
and xpack.ml.max_model_memory_limit is not set then
xpack.ml.max_model_memory_limit is now considered to be set to
the largest size that could be assigned in the cluster.

This functionality will be crucial for Cloud once the Elasticsearch
startup code is setting the Elasticsearch JVM heap size. Then the
Cloud code will no longer be able to accurately set
xpack.ml.max_model_memory_limit, so will not set it at all.
Instead the Cloud code will just set
xpack.ml.use_auto_machine_memory_percent and the ML code will
calculate the appropriate maximum model_memory_limit that should
be permitted.
2021-11-10 08:38:02 +00:00
Lisa Cawley f9abc3aa13
[DOCS] Deprecate monitoring settings (#79977)
Co-authored-by: Adam Locke <adam.locke@elastic.co>
2021-11-01 11:56:48 -07:00
Adam Locke 2481b18329
[DOCS] Clarify HTTP and transport TLS settings (#79952)
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2021-10-27 16:46:58 -04:00
Adam Locke 2dfb5f957e
Update monitoring-settings.asciidoc (#78896) (#79169)
* Update monitoring-settings.asciidoc

* Update wording

Co-authored-by: Adam Locke <adam.locke@elastic.co>

Co-authored-by: Sandeep Kanabar <sandeepkanabar@gmail.com>
2021-10-14 13:10:12 -04:00
Tim Vernum ea0dc45146
Remove HTTPS check for API Keys & Service Accounts (#76801)
This commit removes the checks that prevented the use of API Keys and
Service Account (Service Tokens) on nodes without HTTPS
(xpack.security.http.ssl.enabled)

As a consequence of removing this check, the API Key service is now
automatically enabled, but can be explicitly disabled with

     xpack.security.authc.api_key.enabled: false
2021-09-22 07:32:03 +10:00
Adam Locke 08865e31b2
[DOCS] Fix formatting for Watcher settings (#76491)
Adds missing description list tagging for two Watcher settings.

Resolves #76484
2021-08-13 08:33:10 -04:00
Tim Vernum 01f20a3343
Default hasher to PBKDF2_STRETCH on FIPS mode (#76274)
When running in FIPS mode, (fips_mode.enabled: true), the default
password hasher is now "pbkdf2_stretch"

In non-FIPS mode the default is still "bcrypt"

In 7.x and earlier, the default hasher was always "bcrypt"
In 8.0-alpha1, the default hasher on FIPS was "pbkdf2"

Resolves: #66840
2021-08-13 12:18:44 +10:00
Andrei Dan 57b5a1b366
Docs: ILM document behaviour for changing lifecycle setting (#75790)
Add xref

Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>
2021-07-29 08:51:08 +01:00
Tim Vernum dbfd86a56c
Remove support for configurable PKCS#11 keystores (#75404)
In theory, Elasticsearch supported configuring a PKCS#11 keystore
anywhere where a keystore/truststore could be used. For example:

    xpack.security.http.ssl.keystore.type: pkcs11

However, this support was poorly tested and broken.
This commit removes PKCS#11 support from any configurable SSL context.

It does not affect the ability to use a PKCS#11 keystore as the JRE's
system default keystore/truststore.
2021-07-19 17:56:15 +10:00
Lisa Cawley 9ab6808206
[DOCS] Clean up xpack.ml.enabled details (#74573) 2021-06-30 09:34:46 -07:00
Tim Vernum 7ce9398fcf
[DOCS] Fix client_authentication setting default (#73743)
The value of `*.ssl.client_authentication` is `required` for
everything except `xpack.security.http.ssl.client_authentication`, for
which is it `none`.

The doc template for this setting was configured to have a default
value, and allow an override. However, the default was set to `none`
when it should have been `required`.

The override for `http` was correctly set to `none` (but that didn't
really do anything, since that was the same as the default).

This commit changes the default to `required`, which matches the code
(see `XPackSettings.CLIENT_AUTH_DEFAULT`), and leaves the override for
http as `none` (see `XPackSettings.HTTP_CLIENT_AUTH_DEFAULT`).
2021-06-04 14:22:47 +10:00
Tim Vernum d58fe5159c
[DOCS] Add notes on SSL version by JDK version (#73401)
Recent JDK releases have disabled TLS v1.0 and TLS v1.1 by default

See
 - https://java.com/en/jre-jdk-cryptoroadmap.html
 - https://bugs.openjdk.java.net/browse/JDK-8202343

This change adds documentation clarifying which TLS versions are
supported on which JDKs (in general terms, rather than specific builds)
and how to change the configuration if necessary.

Co-authored-by: Adam Locke <adam.locke@elastic.co>
2021-06-02 17:33:33 +10:00
David Turner 3e0959f308
Fix Watcher HTTP connection config for longevity (#72736)
Watcher uses a connection pool for outgoing HTTP traffic, which means
that some HTTP connections may live for a long time, possibly in an idle
state. Such connections may be silently torn down by a remote device, so
that when we re-use them we encounter a `Connection reset` or similar
error.

This commit introduces a setting allowing users to set a finite expiry
time on these connections, and also enables TCP keepalives on them by
default so that a remote teardown will be actively detected sooner.

Closes #52997
2021-05-06 08:28:39 +01:00
Benjamin Trent 2ce4d175f0
[ML] increase the default value of xpack.ml.max_open_jobs from 20 to 512 for autoscaling improvements (#72487)
This commit increases the xpack.ml.max_open_jobs from 20 to 512. Additionally, it ignores nodes that cannot provide an accurate view into their native memory.

If a node does not have a view into its native memory, we ignore it for assignment.

This effectively fixes a bug with autoscaling. Autoscaling relies on jobs with adequate memory to assign jobs to nodes. If that is hampered by the xpack.ml.max_open_jobs scaling decisions are hampered.
2021-04-30 07:55:57 -04:00
István Zoltán Szabó 11c22ce23a
[DOCS] Adds backticks to xpack.ml.use_auto_machine_memory_percent. (#71814) 2021-04-19 11:12:27 +02:00
James Rodewig 693807a6d3
[DOCS] Fix double spaces (#71082) 2021-03-31 09:57:47 -04:00
Jake Landis c0f731f590
[master] docs: Add reference to reporting warning customization (#70515) (#70684)
Co-authored-by: Jake Landis <jake.landis@elastic.co>

Co-authored-by: Marcos Antonio de Almeida Ramos <almeidamarcos.a@gmail.com>
2021-03-23 08:05:36 -05:00
Andrei Dan 9831084067
ILM: Make all the shrink action steps retryable (#70107)
This aims at making the shrink action retryable. Every step is
retryable, but in order to provide an experience where ILM tries
to achieve a successful shrink even when the target node goes
missing permanently or the shrunk index cannot recover, this also
introduces a retryable shrink cycle within the shrink action.

The shrink action will generate a unique index name that'll be the
shrunk index name. The generated index name is stored in the lifecycle
state.

If the shrink action ends up waiting for the source shards to
colocate or for the shrunk index to recover for more than the configured
`LIFECYCLE_STEP_WAIT_TIME_THRESHOLD` setting, it will move back
to clean up the attempted (and failed) shrunk index and will retry
generating a new index name and attempting to shrink the source
to the newly generated index name.
2021-03-18 16:05:15 +00:00
Ioannis Kakavas 2b48bd789a
Add doc reference for client_auth_method (#70124)
Support for additional Client authentication methods was added in
the OIDC realm in #58708. This change adds the `rp.client_auth_method`
and `rp.client_auth_signature_algorithm` settings in the realm settings 
reference doc.
2021-03-10 12:34:01 +02:00
Ioannis Kakavas 060b3aadd6
Remove references to type parameter for realms (#70011)
Type configuration parameter was removed in 7.0. This change cleans
up some sentences where references to it had remained even after
we removed the parameter itself.
2021-03-10 12:01:20 +02:00
Lisa Cawley 2caba7b11f
[DOCS] Edits machine learning settings (#69947)
Co-authored-by: David Roberts <dave.roberts@elastic.co>
2021-03-09 10:59:12 -08:00
Lisa Cawley 8c0439f803
[DOCS] Add operator privileges to ML settings (#69766) 2021-03-03 08:20:39 -08:00
Lisa Cawley 4c39136837
[DOCS] Fix link in machine learning nightly maintenance setting (#69760) 2021-03-01 17:14:21 -08:00
Lyudmila Fokina ee66d6f11f
Support audit ignore policy by actions (#67477)
* Support audit ignore policy by index privileges

Adding new audit ignore policy - privileges
For example, following policy will filter out all events, which actions
minimal required privilege is either "read" or "delete":

xpack.security.audit.logfile.events.ignore_filters:
  example:
    privileges: ["read", "delete"]

Resolve: #60877
Related: #10836
Related: #37148

* Support audit ignore policy by index privileges

Adding new audit ignore policy - privileges
For example, following policy will filter out all events, which actions
required privilege is either "read" or "delete":

xpack.security.audit.logfile.events.ignore_filters:
  example:
    privileges: ["read", "delete"]

Resolve: #60877
Related: #10836
Related: #37148

* To avoid ambiguity (as cluster and index policies may have the same
name) changing implementation to have to separate policies for
`index_privileges` and `cluster_privileges`.
If both are set for the same policy, throw the IllegalArgumentException.

* To avoid ambiguity (as cluster and index policies may have the same
name) changing implementation to have to separate policies for
`index_privileges` and `cluster_privileges`.
If both are set for the same policy, throw the IllegalArgumentException.

* Fixing Api key related privilege check which expects request and
authentication by introducing overloaded
version of findPrivilegesThatGrant
just checking if privileges which can grant the action regardless of the
 request and authentication context.

* Fixing a test; adding a caching mechanism to avoid calling
findPrivilegesThatGrant each
 time.

* Support audit ignore policy by index privileges

Addressing review feedback

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Revert "Support audit ignore policy by index privileges"

This reverts commit 152821e7

* Revert "Support audit ignore policy by index privileges"

This reverts commit 79649e9a

* Revert "Support audit ignore policy by index privileges"

This reverts commit 96d22a42

* Revert "Support audit ignore policy by index privileges"

This reverts commit 67574b2f

* Revert "Support audit ignore policy by index privileges"

This reverts commit 35573c8b

* Revert "Fixing a test; adding a caching mechanism to avoid calling findPrivilegesThatGrant each  time."

This reverts commit 7faa52f3

* Revert "Fixing Api key related privilege check which expects request and authentication by introducing overloaded version of findPrivilegesThatGrant just checking if privileges which can grant the action regardless of the  request and authentication context."

This reverts commit 72b9aefe

* Revert "To avoid ambiguity (as cluster and index policies may have the same name) changing implementation to have to separate policies for `index_privileges` and `cluster_privileges`. If both are set for the same policy, throw the IllegalArgumentException."

This reverts commit 7dd8fe7d

* Revert "To avoid ambiguity (as cluster and index policies may have the same name) changing implementation to have to separate policies for `index_privileges` and `cluster_privileges`. If both are set for the same policy, throw the IllegalArgumentException."

This reverts commit cb5bc09c

* Revert "Support audit ignore policy by index privileges"

This reverts commit a918da10

* Support audit ignore policy by actions

Getting back to action filtering

* Support audit ignore policy by actions

Cleaning up some tests

* Support audit ignore policy by actions

Cleaning up some tests

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2021-03-01 18:44:57 +01:00
Lisa Cawley 4d1abd1494
[DOCS] Clarifies default ML and transform node settings (#67671) 2021-01-19 14:19:37 -08:00
Albert Zaharovits e05d83f7a8
DOC Audit security config change (#66839)
Audit log doc changes about:
* the new security_config_change event type (main scope of this PR)
* remove mentions of the 6.5 audit format changes (the JSON format)
* mention the new archiving and rotation by size (in v8 only)
* mention the request.id event attribute used to correlate audit events
* mention that audit is only available on certain subscription levels
* add an exhaustive audit event example list (because schema became too complex to explain in words 😢 given the new security_config_change events)
* move the ignore policies are explained on a separate page (it was collocated with the logfile output since we had multiple outputs and the policies were specific the the logfile only).

Co-authored-by: Lisa Cawley lcawley@elastic.co

Relates #62916
Closes #29912
2021-01-16 19:09:03 +02:00
Przemko Robakowski 6dfdacdc8f
Remove watcher history clean up from monitoring (#67154)
Monitoring should not clean up watcher history - indices are managed by ILM policy now.
It was deprecated in 7.x, removing it now in 8
2021-01-11 21:35:29 +01:00