Commit Graph

178 Commits

Author SHA1 Message Date
Adam Locke 08865e31b2
[DOCS] Fix formatting for Watcher settings (#76491)
Adds missing description list tagging for two Watcher settings.

Resolves #76484
2021-08-13 08:33:10 -04:00
Tim Vernum 01f20a3343
Default hasher to PBKDF2_STRETCH on FIPS mode (#76274)
When running in FIPS mode, (fips_mode.enabled: true), the default
password hasher is now "pbkdf2_stretch"

In non-FIPS mode the default is still "bcrypt"

In 7.x and earlier, the default hasher was always "bcrypt"
In 8.0-alpha1, the default hasher on FIPS was "pbkdf2"

Resolves: #66840
2021-08-13 12:18:44 +10:00
Andrei Dan 57b5a1b366
Docs: ILM document behaviour for changing lifecycle setting (#75790)
Add xref

Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>
2021-07-29 08:51:08 +01:00
Tim Vernum dbfd86a56c
Remove support for configurable PKCS#11 keystores (#75404)
In theory, Elasticsearch supported configuring a PKCS#11 keystore
anywhere where a keystore/truststore could be used. For example:

    xpack.security.http.ssl.keystore.type: pkcs11

However, this support was poorly tested and broken.
This commit removes PKCS#11 support from any configurable SSL context.

It does not affect the ability to use a PKCS#11 keystore as the JRE's
system default keystore/truststore.
2021-07-19 17:56:15 +10:00
Lisa Cawley 9ab6808206
[DOCS] Clean up xpack.ml.enabled details (#74573) 2021-06-30 09:34:46 -07:00
Tim Vernum 7ce9398fcf
[DOCS] Fix client_authentication setting default (#73743)
The value of `*.ssl.client_authentication` is `required` for
everything except `xpack.security.http.ssl.client_authentication`, for
which is it `none`.

The doc template for this setting was configured to have a default
value, and allow an override. However, the default was set to `none`
when it should have been `required`.

The override for `http` was correctly set to `none` (but that didn't
really do anything, since that was the same as the default).

This commit changes the default to `required`, which matches the code
(see `XPackSettings.CLIENT_AUTH_DEFAULT`), and leaves the override for
http as `none` (see `XPackSettings.HTTP_CLIENT_AUTH_DEFAULT`).
2021-06-04 14:22:47 +10:00
Tim Vernum d58fe5159c
[DOCS] Add notes on SSL version by JDK version (#73401)
Recent JDK releases have disabled TLS v1.0 and TLS v1.1 by default

See
 - https://java.com/en/jre-jdk-cryptoroadmap.html
 - https://bugs.openjdk.java.net/browse/JDK-8202343

This change adds documentation clarifying which TLS versions are
supported on which JDKs (in general terms, rather than specific builds)
and how to change the configuration if necessary.

Co-authored-by: Adam Locke <adam.locke@elastic.co>
2021-06-02 17:33:33 +10:00
David Turner 3e0959f308
Fix Watcher HTTP connection config for longevity (#72736)
Watcher uses a connection pool for outgoing HTTP traffic, which means
that some HTTP connections may live for a long time, possibly in an idle
state. Such connections may be silently torn down by a remote device, so
that when we re-use them we encounter a `Connection reset` or similar
error.

This commit introduces a setting allowing users to set a finite expiry
time on these connections, and also enables TCP keepalives on them by
default so that a remote teardown will be actively detected sooner.

Closes #52997
2021-05-06 08:28:39 +01:00
Benjamin Trent 2ce4d175f0
[ML] increase the default value of xpack.ml.max_open_jobs from 20 to 512 for autoscaling improvements (#72487)
This commit increases the xpack.ml.max_open_jobs from 20 to 512. Additionally, it ignores nodes that cannot provide an accurate view into their native memory.

If a node does not have a view into its native memory, we ignore it for assignment.

This effectively fixes a bug with autoscaling. Autoscaling relies on jobs with adequate memory to assign jobs to nodes. If that is hampered by the xpack.ml.max_open_jobs scaling decisions are hampered.
2021-04-30 07:55:57 -04:00
István Zoltán Szabó 11c22ce23a
[DOCS] Adds backticks to xpack.ml.use_auto_machine_memory_percent. (#71814) 2021-04-19 11:12:27 +02:00
James Rodewig 693807a6d3
[DOCS] Fix double spaces (#71082) 2021-03-31 09:57:47 -04:00
Jake Landis c0f731f590
[master] docs: Add reference to reporting warning customization (#70515) (#70684)
Co-authored-by: Jake Landis <jake.landis@elastic.co>

Co-authored-by: Marcos Antonio de Almeida Ramos <almeidamarcos.a@gmail.com>
2021-03-23 08:05:36 -05:00
Andrei Dan 9831084067
ILM: Make all the shrink action steps retryable (#70107)
This aims at making the shrink action retryable. Every step is
retryable, but in order to provide an experience where ILM tries
to achieve a successful shrink even when the target node goes
missing permanently or the shrunk index cannot recover, this also
introduces a retryable shrink cycle within the shrink action.

The shrink action will generate a unique index name that'll be the
shrunk index name. The generated index name is stored in the lifecycle
state.

If the shrink action ends up waiting for the source shards to
colocate or for the shrunk index to recover for more than the configured
`LIFECYCLE_STEP_WAIT_TIME_THRESHOLD` setting, it will move back
to clean up the attempted (and failed) shrunk index and will retry
generating a new index name and attempting to shrink the source
to the newly generated index name.
2021-03-18 16:05:15 +00:00
Ioannis Kakavas 2b48bd789a
Add doc reference for client_auth_method (#70124)
Support for additional Client authentication methods was added in
the OIDC realm in #58708. This change adds the `rp.client_auth_method`
and `rp.client_auth_signature_algorithm` settings in the realm settings 
reference doc.
2021-03-10 12:34:01 +02:00
Ioannis Kakavas 060b3aadd6
Remove references to type parameter for realms (#70011)
Type configuration parameter was removed in 7.0. This change cleans
up some sentences where references to it had remained even after
we removed the parameter itself.
2021-03-10 12:01:20 +02:00
Lisa Cawley 2caba7b11f
[DOCS] Edits machine learning settings (#69947)
Co-authored-by: David Roberts <dave.roberts@elastic.co>
2021-03-09 10:59:12 -08:00
Lisa Cawley 8c0439f803
[DOCS] Add operator privileges to ML settings (#69766) 2021-03-03 08:20:39 -08:00
Lisa Cawley 4c39136837
[DOCS] Fix link in machine learning nightly maintenance setting (#69760) 2021-03-01 17:14:21 -08:00
Lyudmila Fokina ee66d6f11f
Support audit ignore policy by actions (#67477)
* Support audit ignore policy by index privileges

Adding new audit ignore policy - privileges
For example, following policy will filter out all events, which actions
minimal required privilege is either "read" or "delete":

xpack.security.audit.logfile.events.ignore_filters:
  example:
    privileges: ["read", "delete"]

Resolve: #60877
Related: #10836
Related: #37148

* Support audit ignore policy by index privileges

Adding new audit ignore policy - privileges
For example, following policy will filter out all events, which actions
required privilege is either "read" or "delete":

xpack.security.audit.logfile.events.ignore_filters:
  example:
    privileges: ["read", "delete"]

Resolve: #60877
Related: #10836
Related: #37148

* To avoid ambiguity (as cluster and index policies may have the same
name) changing implementation to have to separate policies for
`index_privileges` and `cluster_privileges`.
If both are set for the same policy, throw the IllegalArgumentException.

* To avoid ambiguity (as cluster and index policies may have the same
name) changing implementation to have to separate policies for
`index_privileges` and `cluster_privileges`.
If both are set for the same policy, throw the IllegalArgumentException.

* Fixing Api key related privilege check which expects request and
authentication by introducing overloaded
version of findPrivilegesThatGrant
just checking if privileges which can grant the action regardless of the
 request and authentication context.

* Fixing a test; adding a caching mechanism to avoid calling
findPrivilegesThatGrant each
 time.

* Support audit ignore policy by index privileges

Addressing review feedback

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Revert "Support audit ignore policy by index privileges"

This reverts commit 152821e7

* Revert "Support audit ignore policy by index privileges"

This reverts commit 79649e9a

* Revert "Support audit ignore policy by index privileges"

This reverts commit 96d22a42

* Revert "Support audit ignore policy by index privileges"

This reverts commit 67574b2f

* Revert "Support audit ignore policy by index privileges"

This reverts commit 35573c8b

* Revert "Fixing a test; adding a caching mechanism to avoid calling findPrivilegesThatGrant each  time."

This reverts commit 7faa52f3

* Revert "Fixing Api key related privilege check which expects request and authentication by introducing overloaded version of findPrivilegesThatGrant just checking if privileges which can grant the action regardless of the  request and authentication context."

This reverts commit 72b9aefe

* Revert "To avoid ambiguity (as cluster and index policies may have the same name) changing implementation to have to separate policies for `index_privileges` and `cluster_privileges`. If both are set for the same policy, throw the IllegalArgumentException."

This reverts commit 7dd8fe7d

* Revert "To avoid ambiguity (as cluster and index policies may have the same name) changing implementation to have to separate policies for `index_privileges` and `cluster_privileges`. If both are set for the same policy, throw the IllegalArgumentException."

This reverts commit cb5bc09c

* Revert "Support audit ignore policy by index privileges"

This reverts commit a918da10

* Support audit ignore policy by actions

Getting back to action filtering

* Support audit ignore policy by actions

Cleaning up some tests

* Support audit ignore policy by actions

Cleaning up some tests

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2021-03-01 18:44:57 +01:00
Lisa Cawley 4d1abd1494
[DOCS] Clarifies default ML and transform node settings (#67671) 2021-01-19 14:19:37 -08:00
Albert Zaharovits e05d83f7a8
DOC Audit security config change (#66839)
Audit log doc changes about:
* the new security_config_change event type (main scope of this PR)
* remove mentions of the 6.5 audit format changes (the JSON format)
* mention the new archiving and rotation by size (in v8 only)
* mention the request.id event attribute used to correlate audit events
* mention that audit is only available on certain subscription levels
* add an exhaustive audit event example list (because schema became too complex to explain in words 😢 given the new security_config_change events)
* move the ignore policies are explained on a separate page (it was collocated with the logfile output since we had multiple outputs and the policies were specific the the logfile only).

Co-authored-by: Lisa Cawley lcawley@elastic.co

Relates #62916
Closes #29912
2021-01-16 19:09:03 +02:00
Przemko Robakowski 6dfdacdc8f
Remove watcher history clean up from monitoring (#67154)
Monitoring should not clean up watcher history - indices are managed by ILM policy now.
It was deprecated in 7.x, removing it now in 8
2021-01-11 21:35:29 +01:00
Lisa Cawley 6b463a7b7a
[DOCS] Clarify use of CCS on ML nodes (#66616)
Co-authored-by: David Roberts <dave.roberts@elastic.co>
2020-12-22 10:11:09 -08:00
Lisa Cawley 709068da7c
[DOCS] Adds xpack.ml.max_ml_node_size (#66285) 2020-12-16 12:55:34 -08:00
Lisa Cawley 35cc6bf8a0
[DOCS] Changes static ML setting to dynamic (#66286) 2020-12-16 08:32:57 -08:00
Lyudmila Fokina c758dc7f4a
Introduce an additional hasher (PBKDF2_STRETCH) (#65328)
* Introduce an additional hasher that is PBKDF2 but pads the input to > 14 chars before hashing to comply with FIPS Approve Only mode

* Introduce an additional hasher that is PBKDF2 but pads the input to > 14 chars before hashing to comply with FIPS Approve Only mode

* Addressing the PR feedback
adding doc changes

* Renaming the hash function + rephrasing the doc descriptions

* Removing leftover from the doc

* Return HexCharArray instead of Base64 encoding and avoid intermediate
String

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2020-11-26 13:29:19 +01:00
James Rodewig f83ed81cb3
[DOCS] Document `xpack.http.proxy.scheme` setting (#65264) 2020-11-19 15:31:24 -05:00
Adam Locke b0a98f9515
[DOCS] Adding authorization_realms setting for OIDC (#64877)
* Adding authorization_realms setting for OIDC.

* Fix typo

* Splitting note into separate notes.
2020-11-16 11:22:46 -05:00
James Rodewig 1e13b11213
[DOCS] Document reloadable Watcher settings (#64998) 2020-11-16 08:34:45 -05:00
Andrei Dan d061c11899
[DOCS]: ILM rollover max_age condition disregards origination date (#64404) 2020-11-02 09:30:48 +00:00
James Rodewig 1ea83359bb
[DOCS] Fix case for 'Boolean' (#64299) 2020-10-29 09:04:43 -04:00
Benjamin Trent 165e063b50
[ML] add new setting xpack.ml.use_auto_machine_memory_percent for auto calculating native memory percentage allowed for machine learning jobs (#63887)
When running ML, sometimes it is best to automatically adjust the
memory allotted for machine learning based on the nodesize
and how much space is given to the JVM

This commit adds a new static setting xpack.ml.use_auto_machine_memory_percent for
allowing this dynamic calculation. The old setting remains as a backup
just in case the limit cannot be automatically determined due to
lack of information.

Closes #63795
2020-10-21 12:50:55 -04:00
Adam Locke 789ee2d73e
[DOCS] Combining important config settings into a single page (#63849)
* Combining important config settings into a single page.

* Updating ids for two pages causing link errors and implementing redirects.
2020-10-19 10:02:22 -04:00
David Kyle 6784e826a8
[ML] Audit message when nightly maintenance times out (#63252)
During deletion of old ml data set the delete by query timeout to 8 hours and 
audit a job message when the nightly maintenance task times out.
2020-10-06 15:01:40 +01:00
James Rodewig b7b7e12f3c
[DOCS] Document static/dynamic watcher settings (#62218) 2020-10-05 15:34:47 -04:00
Inbar Shimshon 3938392204
Update ilm-settings.asciidoc 2020-09-25 16:25:00 +03:00
James Rodewig 9b9889b17e
[DOCS] Document static/dynamic security settings (#62181) 2020-09-16 09:36:42 -04:00
James Rodewig 1f03fdc1b7
[DOCS] Add static/dynamic type to audit logging settings (#61235) 2020-09-15 16:30:30 -04:00
James Rodewig a70c00a62c
[DOCS] Document dynamic cluster settings (#61760)
Co-authored-by: Adam Locke <adam.locke@elastic.co>
2020-09-01 15:48:45 -04:00
Lisa Cawley b22ade49af
[DOCS] Document static monitoring settings (#61748) 2020-08-31 12:27:53 -07:00
James Rodewig e0efa26d81
[DOCS] Document static ILM settings (#61745) 2020-08-31 13:43:51 -04:00
Adam Locke dc7153c7ce
[DOCS] Update audit-settings.asciidoc (#61610) (#61646)
* Update audit-settings.asciidoc

"I think" all {ess-icon} should be replaced by {ece-icon} because:
- audit logging is not allowed on ESS, as per https://www.elastic.co/guide/en/cloud/current/ec-add-user-settings.html and https://www.elastic.co/guide/en/cloud/current/ec-restrictions.html#ec-restrictions-security
- audit logging is allowed setting on ECE, as per https://www.elastic.co/guide/en/cloud-enterprise/current/ece-enable-auditing.html

* Removing ESS icons for audit settings

Co-authored-by: Adam Locke <adam.locke@elastic.co>

Co-authored-by: Leaf-Lin <39002973+Leaf-Lin@users.noreply.github.com>
2020-08-27 15:05:51 -04:00
Lisa Cawley e12d6f168c
[DOCS] Document static machine learning settings (#61382) 2020-08-24 07:29:25 -07:00
Lisa Cawley ec7939364b
[DOCS] Document static dynamic transform settings (#61384) 2020-08-21 13:02:29 -07:00
István Zoltán Szabó 9fdf6e6e90
[DOCS] Replaces transform.node with node.roles: [ transform ] in transforms settings. (#61267) 2020-08-18 15:45:34 +02:00
István Zoltán Szabó f8e572fb54
[DOCS] Replaces ml.node with node.roles: [ ml ] in ML settings (#61017) 2020-08-18 11:23:13 +02:00
Adam Locke 610a47c792
[DOCS] Update CCR docs to focus on Kibana (#60555)
* First crack at rewriting the CCR introduction.

* Emphasizing Kibana in configuring CCR (part one).

* Many more edits, plus new files.

* Fixing test case.

* Removing overview page and consolidating that information in the main page.

* Adding redirects for moved and deleted pages.

* Removing, consolidating, and adding redirects.

* Fixing duplicate ID in redirects and removing outdated reference.

* Adding test case and steps for recreating a follower index.

* Adding steps for managing CCR tasks in Kibana.

* Adding tasks for managing auto-follow patterns.

* Fixing glossary link.

* Fixing glossary link, again.

* Updating the upgrade information and other stuff.

* Apply suggestions from code review

* Incorporating review feedback.

* Adding more edits.

* Fixing link reference.

* Adding use cases for #59812.

* Incorporating feedback from reviewers.

* Apply suggestions from code review

* Incorporating more review comments.

* Condensing some of the steps for accessing Kibana.

* Incorporating small changes from reviewers.

Co-authored-by: debadair <debadair@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2020-08-17 15:36:54 -04:00
James Rodewig a94e5cb7c4
[DOCS] Replace Wikipedia links with attribute (#61171) 2020-08-17 09:44:24 -04:00
James Rodewig 3c6655eeb2
[DOCS] Fix typo in Watcher docs (#60326) (#60387)
Co-authored-by: Martin-Kemp <30285179+Martin-Kemp@users.noreply.github.com>
2020-07-29 10:15:00 -04:00
James Rodewig 2774cd6938
[DOCS] Swap `[float]` for `[discrete]` (#60124)
Changes instances of `[float]` in our docs for `[discrete]`.

Asciidoctor prefers the `[discrete]` tag for floating headings:
https://asciidoctor.org/docs/asciidoc-asciidoctor-diffs/#blocks
2020-07-23 11:48:22 -04:00