Skip to content

Commit ae2babd

Browse files
committed
Fix merge conflict
2 parents 936d9c0 + 73cea8c commit ae2babd

8 files changed

+118
-22
lines changed

docs/en/ingest-management/commands.asciidoc

-6
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,6 @@ elastic-agent enroll --fleet-server-es <string>
209209
[--force]
210210
[--header <strings>]
211211
[--help]
212-
[--non-interactive]
213212
[--proxy-disabled]
214213
[--proxy-header <strings>]
215214
[--proxy-url <string>]
@@ -352,11 +351,6 @@ verified. The content is encrypted, but the certificate is not verified.
352351
+
353352
We strongly recommend that you use a secure connection.
354353

355-
`--non-interactive`::
356-
Install {agent} in a non-interactive mode. This flag is helpful when
357-
using automation software or scripted deployments. If {agent} is
358-
already installed on the host, the installation will terminate.
359-
360354
`--proxy-disabled`::
361355
Disable proxy support including environment variables.
362356

docs/en/ingest-management/elastic-agent/configuration/outputs/output-logstash.asciidoc

+5
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,11 @@ To receive the events in {ls}, you also need to create a {ls} configuration pipe
3232
The {ls} configuration pipeline listens for incoming {agent} connections,
3333
processes received events, and then sends the events to {es}.
3434

35+
Please be aware that the structure of the documents sent from {agent} to {ls} must not be modified by the pipeline.
36+
We recommend that the pipeline doesn’t edit or remove the fields and their contents.
37+
Editing the structure of the documents coming from {agent} can prevent the {es} ingest pipelines associated to the integrations in use to work correctly.
38+
We cannot guarantee that the {es} ingest pipelines associated to the integrations using {agent} can work with missing or modified fields.
39+
3540
The following {ls} pipeline definition example configures a pipeline that listens on port `5044` for
3641
incoming {agent} connections and routes received events to {es}.
3742

docs/en/ingest-management/fleet-agent-proxy-package-registry.asciidoc

+4
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,10 @@ example:
1717
xpack.fleet.registryProxyUrl: your-nat-gateway.corp.net
1818
----
1919

20+
If your HTTP proxy requires authentication, you can include the
21+
credentials in the URI, such as `https://username:password@your-nat-gateway.corp.net`,
22+
only when using HTTPS.
23+
2024
== What information is sent to the {package-registry}?
2125

2226
In production environments, {kib}, through the {fleet} plugin, is the only service interacting with the {package-registry}. Communication happens when interacting with the Integrations UI, and when upgrading {kib}. The shared information is about discovery of Elastic packages and their available versions. In general, the only deployment-specific data that is shared is the {kib} version.
Loading
Loading

docs/en/ingest-management/release-notes/release-notes-8.16.asciidoc

+26
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@
1414

1515
This section summarizes the changes in each release.
1616

17+
* <<release-notes-8.16.4>>
1718
* <<release-notes-8.16.3>>
1819
* <<release-notes-8.16.2>>
1920
* <<release-notes-8.16.1>>
@@ -24,6 +25,31 @@ Also see:
2425
* {kibana-ref}/release-notes.html[{kib} release notes]
2526
* {beats-ref}/release-notes.html[{beats} release notes]
2627

28+
// begin 8.16.4 relnotes
29+
30+
Review important information about the {fleet} and {agent} 8.16.4 release.
31+
32+
[[release-notes-8.16.4]]
33+
== {fleet} and {agent} 8.16.4
34+
35+
[discrete]
36+
[[security-updates-8.16.4]]
37+
=== Security updates
38+
39+
{agent}::
40+
* Upgrade NodeJS to LTS v18.20.6. {agent-pull}6641[#6641]
41+
42+
[discrete]
43+
[[bug-fixes-8.16.4]]
44+
=== Bug fixes
45+
46+
{agent}::
47+
* Emit vars even if provider data is empty from the start. {agent-pull}6598[#6598]
48+
* Redact secrets within complex nested paths. {agent-pull}6710[#6710]
49+
* Improve the CLI output message when `elastic-agent uninstall` runs after the agent has previously been unenrolled. {agent-pull}6735[#6735]
50+
51+
// end 8.16.4 relnotes
52+
2753
// begin 8.16.3 relnotes
2854

2955
[[release-notes-8.16.3]]

docs/en/ingest-management/release-notes/release-notes-8.17.asciidoc

+52-3
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@
1414

1515
This section summarizes the changes in each release.
1616

17+
* <<release-notes-8.17.2>>
1718
* <<release-notes-8.17.1>>
1819
* <<release-notes-8.17.0>>
1920

@@ -22,6 +23,37 @@ Also see:
2223
* {kibana-ref}/release-notes.html[{kib} release notes]
2324
* {beats-ref}/release-notes.html[{beats} release notes]
2425

26+
// begin 8.17.2 relnotes
27+
28+
[[release-notes-8.17.2]]
29+
== {fleet} and {agent} 8.17.2
30+
31+
Review important information about the {fleet} and {agent} 8.17.2 release.
32+
33+
[discrete]
34+
[[security-updates-8.17.2]]
35+
=== Security updates
36+
37+
{fleet-server}::
38+
* Upgrade `golang.org/x/net` to v0.34.0 and `golang.org/x/crypto` to v0.32.0. {fleet-server-pull}4405[#4405]
39+
40+
41+
[discrete]
42+
[[enhancements-8.17.2]]
43+
=== Enhancements
44+
45+
{agent}::
46+
* Upgrade NodeJS for Heartbeat to LTS v18.20.6. {agent-pull}6641[#6641]
47+
48+
[discrete]
49+
[[bug-fixes-8.17.2]]
50+
=== Bug fixes
51+
52+
{agent}::
53+
* Emit variables even if provider data is empty from the start. {agent-pull}6598[#6598]
54+
55+
// end 8.17.2 relnotes
56+
2557
// begin 8.17.1 relnotes
2658

2759
[[release-notes-8.17.1]]
@@ -40,9 +72,26 @@ impact to your application.
4072
{agent}::
4173
* {agent} Docker images for {ecloud} have been reverted from having been based off of Ubuntu 24.04 to being based off of Ubuntu 20.04. This is to ensure compatibility with {ece}, support for new Wolfi-based images, and for GNU C Library (glibc) compatibility. {agent-pull}6393[#6393]
4274

43-
//*Impact* +
44-
//<Describe how users should mitigate the change.> For more information, refer to {fleet-guide}/fleet-server.html[Fleet Server].
45-
//====
75+
[discrete]
76+
[[known-issues-8.17.1]]
77+
=== Known issues
78+
79+
[[known-issue-1671]]
80+
.{kib} out of memory crashes on 1 GB {ecloud} {kib} instances using {elastic-sec} view
81+
[%collapsible]
82+
====
83+
84+
*Details*
85+
86+
{ecloud} deployments that use the smallest available {kib} instance size of 1 GB may crash due to out of memory errors when the Security UI is loaded.
87+
88+
*Impact* +
89+
90+
The root cause is inefficient memory allocation, and this is exacerbated when the prebuilt security rules package is installed on the initial load of the {elastic-sec} UI.
91+
92+
As a workaround, you can upgrade your deployment to 8.17.1 in which this issue has been resolved by https://github.com/elastic/kibana/pull/208869[#208869] and https://github.com/elastic/kibana/pull/208475[#208475].
93+
94+
====
4695

4796
[discrete]
4897
[[new-features-8.17.1]]

docs/en/ingest-management/security/fleet-roles-and-privileges.asciidoc

+31-13
Original file line numberDiff line numberDiff line change
@@ -7,39 +7,57 @@ Assigning the {kib} feature privileges `Fleet` and `Integrations` grants access
77

88
`all`:: Grants full read-write access.
99
`read`:: Grants read-only access.
10+
`none`:: No access is granted.
1011

12+
Take advantage of these privilege settings by:
13+
14+
* <<fleet-roles-and-privileges-built-in,Using an {es} built-in role>>
15+
* <<fleet-roles-and-privileges-create,Creating a new role>>
16+
17+
[discrete]
18+
[[fleet-roles-and-privileges-built-in]]
19+
== Built-in roles
20+
21+
{es} comes with built-in roles that include default privileges.
22+
23+
`editor`::
1124
The built-in `editor` role grants the following privileges, supporting full read-write access to {fleet} and Integrations:
1225

13-
* {Fleet}: `All`
14-
* Integrations: `All`
26+
* {Fleet}: `all`
27+
* Integrations: `all`
1528

29+
`viewer`::
1630
The built-in `viewer` role grants the following privileges, supporting read-only access to {fleet} and Integrations:
1731

18-
* {Fleet}:: `None`
19-
* Integrations:: `Read`
32+
* {Fleet}: `read`
33+
* Integrations: `read`
2034

21-
You can also create a new role that can be assigned to a user to grant access to {fleet} and Integrations.
35+
You can also create a new role that can be assigned to a user, in order to grant more specific levels of access to {fleet} and Integrations.
2236

2337
[discrete]
2438
[[fleet-roles-and-privileges-create]]
2539
== Create a role for {fleet}
2640

27-
To create a new role with full access to use and manage {fleet} and Integrations:
41+
To create a new role with access to {fleet} and Integrations:
2842

2943
. In {kib}, go to **Management -> Stack Management**.
3044
. In the **Security** section, select **Roles**.
3145
. Select **Create role**.
3246
. Specify a name for the role.
3347
. Leave the {es} settings at their defaults, or refer to {ref}/security-privileges.html[Security privileges] for descriptions of the available settings.
34-
. In the {kib} section, select **Add Kibana privilege**.
35-
. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users needs the {kib} privileges in all spaces.
48+
. In the {kib} section, select **Assign to space**.
49+
. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users need the {kib} privileges in all spaces.
3650
. Expand the **Management** section.
37-
. Set **Fleet** privileges to **All**.
38-
. Set **Integrations** privileges to **All**.
51+
. Choose the access level that you'd like the role to have with respect to {fleet} and integrations:
3952

53+
.. To grant the role full access to use and manage {fleet} and integrations, set both the **Fleet** and **Integrations** privileges to `All`.
54+
+
4055
[role="screenshot"]
41-
image::images/kibana-fleet-privileges.png[Kibana privileges flyout showing Fleet and Integrations set to All]
56+
image::images/kibana-fleet-privileges-all.png[Kibana privileges flyout showing Fleet and Integrations set to All]
4257

43-
To create a read-only user for Integrations, follow the same steps as above but set the **Fleet** privileges to **None** and the **Integrations** privileges to **Read**.
58+
.. Similarly, to create a read-only user for {fleet} and Integrations, set both the **Fleet** and **Integrations** privileges to `Read`.
59+
+
60+
[role="screenshot"]
61+
image::images/kibana-fleet-privileges-read.png[Kibana privileges flyout showing Fleet and Integrations set to All]
4462

45-
Read-only access to {fleet} is not currently supported but is planned for development in a later release.
63+
Once you've created a new role you can assign it to any {es} user. You can edit the role at any time by returning to the **Roles** page in {kib}.

0 commit comments

Comments
 (0)