Commit Graph

221 Commits

Author SHA1 Message Date
István Zoltán Szabó 6db4d906ad
[DOCS] Document xpack.ml.model_repository setting (#95789) 2023-05-03 17:19:13 +02:00
DeDe Morton a6c7c1f1e4
[DOCS] Describe how to use Elastic Agent to monitor Elasticsearch (#94348)
* [DOCS] Describe how to use Elastic Agent to monitor Elasticsearch

* Temporarily fix doc build

* Add question about showing Elastic Agent metrics in the monitoring UI

* Apply changes from review

* Activate link to Kibana docs

* Fix broken link

* Update docs/reference/monitoring/indices.asciidoc
2023-03-24 09:00:21 -07:00
Tim Vernum 34c270c023
Do not fail node if SAML HTTP metadata is unavailable (#92810)
This commit changes the SAML realm to use placeholder metadata (UnresolvedEntity) when the real metadata cannot be loaded over HTTPS - unless metadata.http.fail_on_error is set to true.

All future use of the realm will fail until the metadata is available, but this change allows the node to bootstrap successfully.
2023-02-16 17:32:01 +11:00
Yang Wang 9ce06fddc4
JWT realm documentation update - take 2 (#92539)
This PR is another round of documentation update for the JWT realm with the goal to achieve better clarity, differentiating more between the two token types and encourage readers to choose between them carefully.

Relates: #92409
2023-01-23 12:40:55 +11:00
Abdon Pijpelink 648d80e517
[DOCS] Add ssl.verification_mode to secure settings (#93083)
Co-authored-by: Adam Locke <adam.locke@elastic.co>
2023-01-19 17:13:55 +01:00
Yang Wang 56036676cb
JWT Realm - documentation update (#92409)
* wip

* Initial update for the JWT realm doc

* Apply suggestions from code review

Co-authored-by: amyjtechwriter <61687663+amyjtechwriter@users.noreply.github.com>

Co-authored-by: amyjtechwriter <61687663+amyjtechwriter@users.noreply.github.com>
2022-12-19 12:22:24 +00:00
Anthony McGlone d80f4a68af
[DOCS] Add missing xpack security setting (#91995)
* [DOCS] Add missing xpack security setting

* [DOCS] CR feedback for missing xpack security setting

* Update docs/reference/settings/security-settings.asciidoc

Co-authored-by: Abdon Pijpelink <abdon.pijpelink@elastic.co>

Co-authored-by: Abdon Pijpelink <abdon.pijpelink@elastic.co>
2022-12-01 14:50:06 +01:00
Mary Gouseti cfd23d512f
Disk indicator troubleshooting guides (#90504) 2022-10-14 15:24:21 +02:00
Paramdeep Singh 34ff7a9d98
Consolidated Circuit Breaker documentation to include EQL and ML infer (#90809)
Fixes #85851 

Co-authored-by: Iraklis Psaroudakis <kingherc@gmail.com>
2022-10-14 14:33:52 +03:00
Joe Gallo 21356162eb
ILM don't rollover empty indices (#89557) 2022-09-19 18:37:41 -04:00
James Baiera c570d3e88e
Add advice on restoring ILM indices into unmanaged state (#89140) 2022-09-11 23:29:54 -04:00
Keith Massey e61bfcfab8
Documenting master_is_stable health API settings (#87901) 2022-07-26 12:02:38 -05:00
James Baiera 6ce5f73e97
Add health user action for unhealthy SLM policy failure counts (#88523)
This PR adds a user action to the SLM health indicator which checks each SLM policy's invocations 
since last success field and reports degraded health (YELLOW) in the event that any policy is at or 
above the failure threshold (default is 5 failures in a row).
2022-07-25 15:58:20 -04:00
Yang Wang 36336fe471
Add setting for tcp_keepalive for oidc back-channel (#87868)
This PR adds a new setting to enable tcp keepalive probes for the
connections used by the oidc back-channel communication. It defaults to
true as tcp keepalive is generally useful for ES.

Relates: #87773
2022-07-07 11:41:14 +09:30
Yang Wang f075d505c5
Automatically close idle connections in OIDC back-channel (#87773)
In some environment, the back-channel connection can be dropped
without sending a TCP RST to ES. When that happens, reusing the same
connection results into timeout error.

This PR adds a new http.connection_pool_ttl setting to control how long
a connection in the OIDC back-channel pool can be idle before it is
closed. This allows ES to more actively close idle connections to avoid
the timeout issue.

The new setting has a 3min default which means idle connections are
closed every 3 min if server response does not specify a shorter keep-alive.

Resolves: #75515
2022-06-20 22:31:17 +10:00
David Kilfoyle 40e9f3097c
[DOCS] Add TSDS docs, take two (#87703)
* Revert "Revert "[DOCS] Add TSDS docs (#86905)" (#87702)"

This reverts commit 0c86d7b9b2.

* First fix to tests

* Add data_stream object to index template

* small rewording

* Add enable data stream object in gradle example setup

* Add bullet about data stream must be enabled in template
2022-06-16 12:44:10 -04:00
David Kilfoyle 0c86d7b9b2
Revert "[DOCS] Add TSDS docs (#86905)" (#87702)
Reverts elastic/elasticsearch#86905
2022-06-15 13:32:12 -04:00
David Kilfoyle d57f4ac2c6
[DOCS] Add TSDS docs (#86905)
* [DOCS] Add TSDB docs

* Update docs/build.gradle

Co-authored-by: Adam Locke <adam.locke@elastic.co>

* Address Nik's comments, part 1

* Address Nik's comments, part deux

* Reword write index

* Add feature flags

* Wrap one more section in feature flag

* Small fixes

* set index.routing_path to optional

* Update storage reduction value

* Update create index template code example

Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>
Co-authored-by: Adam Locke <adam.locke@elastic.co>
2022-06-15 12:22:07 -04:00
Przemysław Witek 8656a29675
[Transform] Implement per-transform num_failure_retries setting. (#87361) 2022-06-09 15:22:06 +02:00
Yang Wang f5ceed19fc
User Profile - remove feature flag (#87383)
The feature flag is no longer necessary in the 8.4 release cycle. The
feature itself is still in beta.
2022-06-08 10:18:18 -04:00
Adam Locke 03f75416b5
[DOCS] JWT doc enhancements (#86411)
* [DOCS] Add examples for run-as privileges

* Add JWT run_as and realm examples

* Adding examples for run_as, moving that section, and other 🔥 edits

* Add section headers 🖍️

* Incorporate Justin's suggestions from code review

Co-authored-by: Justin Cranford <89857999+justincr-elastic@users.noreply.github.com>

* Edits and clarifications based on reviewer feedback.

* Clarify run_as privilege in roles

* Fix typo

* Add redirect to fix cross-book linking

* Expand the run_as examples

* Update request

* Remove NOTCONSOLE from curl commands

* Update run_as example and expand section on unsupported realms

* Split note for unsupported realms

* Remove note that OAuth2 tokens aren't supported and clarify run_as from unsupported realms

* Apply Justin's suggestions from code review

Co-authored-by: Justin Cranford <89857999+justincr-elastic@users.noreply.github.com>

* Update support for different authentication mechanisms

* Apply suggestions from code review

Co-authored-by: Justin Cranford <89857999+justincr-elastic@users.noreply.github.com>

* Add note from review, cleanup, and typo fixes

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
Co-authored-by: Justin Cranford <89857999+justincr-elastic@users.noreply.github.com>
2022-06-03 18:12:36 -04:00
Justin Cranford 7b75311382
List rp.signature_algorithm supported values in docs (#87365) 2022-06-03 13:56:00 -04:00
Adam Locke acc22de4fd
[DOCS] Document when security auto configuration is skipped (#86575)
* [DOCS] Document when security auto configuration is skipped

* Add xpack autoconfiguration parameter and links

* Fix typo and add related link 🔗

* Incorporate review feedback

* Remove keystore section and instead integrate into previous section
2022-05-17 08:27:48 -04:00
Justin Cranford fc5f27cc0d
Add missing defaults for three OIDC settings (#86746) 2022-05-16 10:58:47 -04:00
Tim Vernum 6e32fed6e5
[DOCS] Fix name of OIDC JWT sig algorithm setting (#86561)
The `client_auth_jwt_signature_algorithm` was incorrectly documented.
2022-05-12 12:09:01 -04:00
Joe Gallo 6aaf0972a3
Make the ILM and SLM history_index_enabled settings dynamic (#86493) 2022-05-06 13:07:54 -04:00
Tim Vernum 4d7a516dac
Correct docs on DLS bitset cache default values (#86282)
In #50535 (ES v7.6) the default values for the
`DocumentSubsetBitsetCache` settings were changed. However, the docs
were not updated at that time, and still reflect the old values for
these settings
2022-05-01 22:40:03 -04:00
Justin Cranford d4c1c2efbd
Add missing settings hmac_jwkset and hmac_key for JWT realm to security-settings.asciidoc (#86085) 2022-04-28 16:09:53 -04:00
Justin Cranford 94b45585a1
[DOCS] Add documentation for JWT realm (#85189) 2022-04-21 11:23:12 -04:00
Yang Wang 7dee198ac7
User Profile: Initial beta overview documentations (#83766)
Add initial feature overview documentation pages for User Profile and
Security Domain.

Co-authored-by: Adam Locke <adam.locke@elastic.co>
Co-authored-by: Tim Vernum <tim@adjective.org>
Co-authored-by: Albert Zaharovits <albert.zaharovits@gmail.com>
2022-04-15 00:38:41 +10:00
Justin Cranford 070dec4603
Add JWT cache to JWT realm. (#84842) 2022-03-21 13:55:32 -04:00
Lee Hinman ef01949562
Add list of allowed domains for Watcher email action (#84894)
This adds the `xpack.notification.email.account.domain_allowlist` dynamic cluster setting that
allows an administrator to specify a list of domains to which emails are allowed to be sent. The
default value for this setting is `["*"]` which means all domains are allowed. It supports
rudimentary globbing (`*`) in the domain name, so `*.company.com` will work as a valid option.

Resolves https://github.com/elastic/elasticsearch/issues/84739
2022-03-16 08:03:58 -06:00
Justin Cranford d103af2d06
Add JWT realm support for JWT validation (#83155) 2022-02-21 01:54:39 -05:00
Nicole Albee 5b6164f8fd
[Docs] Watcher clarification on CSV formulas warning. (#83088)
* Update docs for Watcher notification settings to include default xpack.notification.reporting.warning.kbn-csv-contains-formulas.text value and link to the Kibana documentation.

* Apply suggestions from code review

Co-authored-by: Adam Locke <adam.locke@elastic.co>

* Apply suggestions from code review

Co-authored-by: Adam Locke <adam.locke@elastic.co>

Co-authored-by: Adam Locke <adam.locke@elastic.co>
2022-01-27 09:23:12 -05:00
Lisa Cawley 6faff3e453
[DOCS] Updates xpack.security.enabled description (#82692) 2022-01-17 14:58:54 -08:00
Justin Cranford e467424043
Add JwtRealmSettings (#81680)
Add JwtRealmSettings

Include unit tests and realm security settings documentation. Covers all settings except client authentication mTLS option, and HTTP proxy option.

Refactor Open ID Connect realm to reuse ClaimSetting.java and ClaimParser.java for JWT realm.
2021-12-21 16:28:33 -05:00
James Rodewig 4d19702221
[DOCS] Update xrefs for snapshot restore docs (#81023)
Changes:

* Removes a leading slash from the restore snapshot API's prerequisites.
* Updates several xrefs that point to redirected pages.
2021-11-29 11:52:02 -05:00
James Rodewig 659e0d3fd3
[DOCS] Overhaul snapshot and restore docs (#79081)
Makes several changes to consolidate snapshot and backup-related docs.

Highlights:

* Adds info about supported ESS snapshot repository types
* Adds docs for Kibana's Snapshot and Restore feature
* Combines tutorial pages related to taking and managing snapshots
* Consolidates explanations of the snapshot process
* Incorporates SLM into the snapshot tutorial
* Removes duplicate "back up a cluster" pages
2021-11-15 12:45:07 -05:00
David Roberts a61088063e
[ML] use_auto_machine_memory_percent now defaults max_model_memory_limit (#80532)
If the xpack.ml.use_auto_machine_memory_percent setting is true,
and xpack.ml.max_model_memory_limit is not set then
xpack.ml.max_model_memory_limit is now considered to be set to
the largest size that could be assigned in the cluster.

This functionality will be crucial for Cloud once the Elasticsearch
startup code is setting the Elasticsearch JVM heap size. Then the
Cloud code will no longer be able to accurately set
xpack.ml.max_model_memory_limit, so will not set it at all.
Instead the Cloud code will just set
xpack.ml.use_auto_machine_memory_percent and the ML code will
calculate the appropriate maximum model_memory_limit that should
be permitted.
2021-11-10 08:38:02 +00:00
Lisa Cawley f9abc3aa13
[DOCS] Deprecate monitoring settings (#79977)
Co-authored-by: Adam Locke <adam.locke@elastic.co>
2021-11-01 11:56:48 -07:00
Adam Locke 2481b18329
[DOCS] Clarify HTTP and transport TLS settings (#79952)
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2021-10-27 16:46:58 -04:00
Adam Locke 2dfb5f957e
Update monitoring-settings.asciidoc (#78896) (#79169)
* Update monitoring-settings.asciidoc

* Update wording

Co-authored-by: Adam Locke <adam.locke@elastic.co>

Co-authored-by: Sandeep Kanabar <sandeepkanabar@gmail.com>
2021-10-14 13:10:12 -04:00
Tim Vernum ea0dc45146
Remove HTTPS check for API Keys & Service Accounts (#76801)
This commit removes the checks that prevented the use of API Keys and
Service Account (Service Tokens) on nodes without HTTPS
(xpack.security.http.ssl.enabled)

As a consequence of removing this check, the API Key service is now
automatically enabled, but can be explicitly disabled with

     xpack.security.authc.api_key.enabled: false
2021-09-22 07:32:03 +10:00
Adam Locke 08865e31b2
[DOCS] Fix formatting for Watcher settings (#76491)
Adds missing description list tagging for two Watcher settings.

Resolves #76484
2021-08-13 08:33:10 -04:00
Tim Vernum 01f20a3343
Default hasher to PBKDF2_STRETCH on FIPS mode (#76274)
When running in FIPS mode, (fips_mode.enabled: true), the default
password hasher is now "pbkdf2_stretch"

In non-FIPS mode the default is still "bcrypt"

In 7.x and earlier, the default hasher was always "bcrypt"
In 8.0-alpha1, the default hasher on FIPS was "pbkdf2"

Resolves: #66840
2021-08-13 12:18:44 +10:00
Andrei Dan 57b5a1b366
Docs: ILM document behaviour for changing lifecycle setting (#75790)
Add xref

Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>
2021-07-29 08:51:08 +01:00
Tim Vernum dbfd86a56c
Remove support for configurable PKCS#11 keystores (#75404)
In theory, Elasticsearch supported configuring a PKCS#11 keystore
anywhere where a keystore/truststore could be used. For example:

    xpack.security.http.ssl.keystore.type: pkcs11

However, this support was poorly tested and broken.
This commit removes PKCS#11 support from any configurable SSL context.

It does not affect the ability to use a PKCS#11 keystore as the JRE's
system default keystore/truststore.
2021-07-19 17:56:15 +10:00
Lisa Cawley 9ab6808206
[DOCS] Clean up xpack.ml.enabled details (#74573) 2021-06-30 09:34:46 -07:00
Tim Vernum 7ce9398fcf
[DOCS] Fix client_authentication setting default (#73743)
The value of `*.ssl.client_authentication` is `required` for
everything except `xpack.security.http.ssl.client_authentication`, for
which is it `none`.

The doc template for this setting was configured to have a default
value, and allow an override. However, the default was set to `none`
when it should have been `required`.

The override for `http` was correctly set to `none` (but that didn't
really do anything, since that was the same as the default).

This commit changes the default to `required`, which matches the code
(see `XPackSettings.CLIENT_AUTH_DEFAULT`), and leaves the override for
http as `none` (see `XPackSettings.HTTP_CLIENT_AUTH_DEFAULT`).
2021-06-04 14:22:47 +10:00
Tim Vernum d58fe5159c
[DOCS] Add notes on SSL version by JDK version (#73401)
Recent JDK releases have disabled TLS v1.0 and TLS v1.1 by default

See
 - https://java.com/en/jre-jdk-cryptoroadmap.html
 - https://bugs.openjdk.java.net/browse/JDK-8202343

This change adds documentation clarifying which TLS versions are
supported on which JDKs (in general terms, rather than specific builds)
and how to change the configuration if necessary.

Co-authored-by: Adam Locke <adam.locke@elastic.co>
2021-06-02 17:33:33 +10:00