Skip to content

Commit

Permalink
Merge branch '7.x' of https://github.com/elastic/kibana into 7/ua/es_…
Browse files Browse the repository at this point in the history
…deprecation_tests
  • Loading branch information
alisonelizabeth committed Sep 3, 2021
2 parents 6d7da3a + ee32afb commit 0b90123
Show file tree
Hide file tree
Showing 838 changed files with 15,588 additions and 7,508 deletions.
4 changes: 2 additions & 2 deletions .buildkite/scripts/lifecycle/build_status.js
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,11 @@ const { BuildkiteClient } = require('kibana-buildkite-library');
console.log(status.success ? 'true' : 'false');
process.exit(0);
} catch (ex) {
console.error('Buildkite API Error', ex.message);
if (ex.response) {
console.error('HTTP Error Response Body', ex.response.data);
console.error('HTTP Error Response Status', ex.response.status);
console.error('HTTP Error Response Body', ex.response.data);
}
console.error(ex);
process.exit(1);
}
})();
6 changes: 5 additions & 1 deletion .buildkite/scripts/lifecycle/ci_stats_complete.js
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,11 @@ const { CiStats } = require('kibana-buildkite-library');
try {
await CiStats.onComplete();
} catch (ex) {
console.error(ex);
console.error('CI Stats Error', ex.message);
if (ex.response) {
console.error('HTTP Error Response Status', ex.response.status);
console.error('HTTP Error Response Body', ex.response.data);
}
process.exit(1);
}
})();
6 changes: 5 additions & 1 deletion .buildkite/scripts/lifecycle/ci_stats_start.js
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,11 @@ const { CiStats } = require('kibana-buildkite-library');
try {
await CiStats.onStart();
} catch (ex) {
console.error(ex);
console.error('CI Stats Error', ex.message);
if (ex.response) {
console.error('HTTP Error Response Status', ex.response.status);
console.error('HTTP Error Response Body', ex.response.data);
}
process.exit(1);
}
})();
2 changes: 1 addition & 1 deletion .ci/Dockerfile
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# NOTE: This Dockerfile is ONLY used to run certain tasks in CI. It is not used to run Kibana or as a distributable.
# If you're looking for the Kibana Docker image distributable, please see: src/dev/build/tasks/os_packages/docker_generator/templates/dockerfile.template.ts

ARG NODE_VERSION=14.17.5
ARG NODE_VERSION=14.17.6

FROM node:${NODE_VERSION} AS base

Expand Down
19 changes: 19 additions & 0 deletions .eslintrc.js
Original file line number Diff line number Diff line change
Expand Up @@ -1659,5 +1659,24 @@ module.exports = {
'@typescript-eslint/prefer-ts-expect-error': 'error',
},
},

/**
* Disallow `export *` syntax in plugin/core public/server/common index files and instead
* require that plugins/core explicitly export the APIs that should be accessible outside the plugin.
*
* To add your plugin to this list just update the relevant glob with the name of your plugin
*/
{
files: [
'src/core/{server,public,common}/index.ts',
'src/plugins/*/{server,public,common}/index.ts',
'src/plugins/*/*/{server,public,common}/index.ts',
'x-pack/plugins/*/{server,public,common}/index.ts',
'x-pack/plugins/*/*/{server,public,common}/index.ts',
],
rules: {
'@kbn/eslint/no_export_all': 'error',
},
},
],
};
1 change: 1 addition & 0 deletions .i18nrc.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"paths": {
"alerts": "packages/kbn-alerts/src",
"autocomplete": "packages/kbn-securitysolution-autocomplete/src",
"kbnConfig": "packages/kbn-config/src",
"console": "src/plugins/console",
"core": "src/core",
"discover": "src/plugins/discover",
Expand Down
2 changes: 1 addition & 1 deletion .node-version
Original file line number Diff line number Diff line change
@@ -1 +1 @@
14.17.5
14.17.6
2 changes: 1 addition & 1 deletion .nvmrc
Original file line number Diff line number Diff line change
@@ -1 +1 @@
14.17.5
14.17.6
12 changes: 6 additions & 6 deletions WORKSPACE.bazel
Original file line number Diff line number Diff line change
Expand Up @@ -27,13 +27,13 @@ check_rules_nodejs_version(minimum_version_string = "3.8.0")
# we can update that rule.
node_repositories(
node_repositories = {
"14.17.5-darwin_amd64": ("node-v14.17.5-darwin-x64.tar.gz", "node-v14.17.5-darwin-x64", "2e40ab625b45b9bdfcb963ddd4d65d87ddf1dd37a86b6f8b075cf3d77fe9dc09"),
"14.17.5-linux_arm64": ("node-v14.17.5-linux-arm64.tar.xz", "node-v14.17.5-linux-arm64", "3a2e674b6db50dfde767c427e8f077235bbf6f9236e1b12a4cc3496b12f94bae"),
"14.17.5-linux_s390x": ("node-v14.17.5-linux-s390x.tar.xz", "node-v14.17.5-linux-s390x", "7d40eee3d54241403db12fb3bc420cd776e2b02e89100c45cf5e74a73942e7f6"),
"14.17.5-linux_amd64": ("node-v14.17.5-linux-x64.tar.xz", "node-v14.17.5-linux-x64", "2d759de07a50cd7f75bd73d67e97b0d0e095ee3c413efac7d1b3d1e84ed76fff"),
"14.17.5-windows_amd64": ("node-v14.17.5-win-x64.zip", "node-v14.17.5-win-x64", "a99b7ee08e846e5d1f4e70c4396265542819d79ed9cebcc27760b89571f03cbf"),
"14.17.6-darwin_amd64": ("node-v14.17.6-darwin-x64.tar.gz", "node-v14.17.6-darwin-x64", "e3e4c02240d74fb1dc8a514daa62e5de04f7eaee0bcbca06a366ece73a52ad88"),
"14.17.6-linux_arm64": ("node-v14.17.6-linux-arm64.tar.xz", "node-v14.17.6-linux-arm64", "9c4f3a651e03cd9b5bddd33a80e8be6a6eb15e518513e410bb0852a658699156"),
"14.17.6-linux_s390x": ("node-v14.17.6-linux-s390x.tar.xz", "node-v14.17.6-linux-s390x", "3677f35b97608056013b5368f86eecdb044bdccc1b3976c1d4448736c37b6a0c"),
"14.17.6-linux_amd64": ("node-v14.17.6-linux-x64.tar.xz", "node-v14.17.6-linux-x64", "3bbe4faf356738d88b45be222bf5e858330541ff16bd0d4cfad36540c331461b"),
"14.17.6-windows_amd64": ("node-v14.17.6-win-x64.zip", "node-v14.17.6-win-x64", "b83e9ce542fda7fc519cec6eb24a2575a84862ea4227dedc171a8e0b5b614ac0"),
},
node_version = "14.17.5",
node_version = "14.17.6",
node_urls = [
"https://nodejs.org/dist/v{version}/{filename}",
],
Expand Down
4 changes: 0 additions & 4 deletions dev_docs/key_concepts/anatomy_of_a_plugin.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -83,12 +83,8 @@ plugins/

`optionalPlugins` - [Optional] If your plugin has an optional dependency on other plugins, you must list them here by id. If any of the optional plugins are disabled or not installed, your plugin will still load, however that plugin's API contract will be undefined in the second parameter of the setup and start functions.

# <<<<<<< HEAD:dev_docs/tutorials/building_a_plugin.mdx

`requiredBundles` - [Required in certain situations] Don't worry about getting this right. The build optimizer will complain if any of these values are incorrect.

> > > > > > > b9f398875a0 (Add more information on kibana.json properties, update example plugins (#107600)):dev_docs/key_concepts/anatomy_of_a_plugin.mdx
<DocCallOut>
You don't need to declare a dependency on a plugin if you only wish to access its types.
</DocCallOut>
Expand Down
122 changes: 122 additions & 0 deletions docs/CHANGELOG.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ Review important information about the {kib} 7.x releases.
// Best practices:
// * When there are changes to kibana.yml settings, include the links to the new settings.

* <<release-notes-7.14.1>>
* <<release-notes-7.14.0>>
* <<release-notes-7.13.4>>
* <<release-notes-7.13.3>>
Expand Down Expand Up @@ -61,6 +62,127 @@ Review important information about the {kib} 7.x releases.

--

[[release-notes-7.14.1]]
== {kib} 7.14.1

For information about the 7.14.1 release, review the following information.

[float]
[[security-updates-v7.14.1]]
=== Security updates
Review the security updates that were found in previous versions of {kib}.
[discrete]
[[code-execution-issue]]
.Code execution issue
[%collapsible]
====
*Details* +
In {kib} 7.10.2 to 7.14.0, users with Fleet admin privileges could insecurely upload malicious packages. Due to an older version of the js-yaml library, attackers were able to execute commands on the {kib} server. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22150[CVE-2021-22150]
*Solution* +
Upgrade to {kib} 7.14.1.
====
[discrete]
[[path-traversal-issue]]
.Path traversal issue
[%collapsible]
====
*Details* +
In {kib} 7.13.4 and earlier, {kib} was not validating the user supplied paths that upload .pbf files, allowing malicious users to arbitrarily traverse the {kib} host to load internal files that end in the .pbf extension. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22151[CVE-2021-22151]
Thanks to Luat Nguyen of CyberJutsu for reporting this issue.
*Solution* +
Upgrade to {kib} 7.14.1.
====
[discrete]
[[html-injection-issue]]
.HTML injection issue
[%collapsible]
====
*Details* +
In {kib} 7.14.0, {kib} was not sanitizing document fields that contain HTML snippets, allowing attackers with the ability to write documents to an {es} index to inject HTML. When *Discover* highlighted a search term that contained the HTML, the term was rendered. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37936[CVE-2021-37936]
*Solution* +
In <<advanced-options,*Advanced Settings*>>, set `doc_table:highlight` to `false`. If you do not want to change the *Advanced Settings*, upgrade to {kib} 7.14.1.
====
[discrete]
[[nodejs-security-vulnerabilities]]
.Node.js security vulnerabilities
[%collapsible]
====
*Details* +
In {kib} 7.14.0 and earlier, Node.js 14.17.3 is affected by the following security vulnerabilities:
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930[CVE-2021-22930]
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672[CVE-2021-3672]
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22931[CVE-2021-22931]
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930[CVE-2021-22930]
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939[CVE-2021-22939]
We do not believe an attacker can exploit the security vulnerabilities against {kib}, but are upgrading Node.js out of an abudance of caution. To resolve the security vulnerabilities, {kib} 7.14.1 upgrades Node.js to 14.17.5.
*Solution* +
Upgrade to {kib} 7.14.1.
====

[float]
[[breaking-changes-v7.14.1]]
=== Breaking changes
Breaking changes can prevent your application from optimal operation and performance. Before you upgrade to 7.14.1, review the <<breaking-changes-7.14.0,7.14.0 breaking changes>>.

To review the breaking changes in previous versions, refer to the following:

{kibana-ref-all}/7.13/release-notes-7.13.0.html#breaking-changes-7.13.0[7.13] | {kibana-ref-all}/7.12/release-notes-7.12.0.html#breaking-changes-7.12.0[7.12] | {kibana-ref-all}/7.11/breaking-changes-7.11.html[7.11] | {kibana-ref-all}/7.10/breaking-changes-7.10.html[7.10] |
{kibana-ref-all}/7.9/breaking-changes-7.9.html[7.9] | {kibana-ref-all}/7.8/breaking-changes-7.8.html[7.8] | {kibana-ref-all}/7.7/breaking-changes-7.7.html[7.7] |
{kibana-ref-all}/7.6/breaking-changes-7.6.html[7.6] | {kibana-ref-all}/7.5/breaking-changes-7.5.html[7.5] |
{kibana-ref-all}/7.4/breaking-changes-7.4.html[7.4] | {kibana-ref-all}/7.3/breaking-changes-7.3.html[7.3] | {kibana-ref-all}/7.2/breaking-changes-7.2.html[7.2]
| {kibana-ref-all}/7.1/breaking-changes-7.1.html[7.1] | {kibana-ref-all}/7.0/breaking-changes-7.0.html[7.0]

[float]
[[enhancement-v7.14.1]]
=== Enhancements
Elastic Security::
For the Elastic Security 7.14.1 release information, refer to {security-guide}/release-notes.html[_Elastic Security Solution Release Notes_].
Platform::
* Adds new SavedObjectsRespository error type for 404 that do not originate from {es} responses {kibana-pull}107301[#107301]

[float]
[[fixes-v7.14.1]]
=== Bug Fixes
Alerting::
* Fixed bug that prevented the index threshold rule from properly working with a threshold below a value {kibana-pull}105626[#105626]
Canvas::
* Fixes numeric variable casting {kibana-pull}109744[#109744]
Dashboard::
* Adds ability to defer embeddable loaded state {kibana-pull}107227[#107227]
Design::
* Fixes accessibility focus trap issue {kibana-pull}107292[#107292]
Discover::
* Do not set source field when reading fields from source {kibana-pull}109069[#109069]
* Fixes limit of 50 documents using classic table {kibana-pull}108322[#108322]
Elastic Security::
For the Elastic Security 7.14.1 release information, refer to {security-guide}/release-notes.html[_Elastic Security Solution Release Notes_].
Fleet::
* Fixes integrations count in category facet {kibana-pull}107652[#107652]
Lens & Visualizations::
* Fixes small multiple title in dark mode {kibana-pull}109966[#109966]
Machine Learning::
* Fixes the job audit messages service {kibana-pull}108526[#108526]
Management::
* Fixes bug with highlighting in String field formatter {kibana-pull}109401[#109401]
* Fixed _meta field failing server validation {kibana-pull}109295[#109295]
* No data experience to handle default Fleet assets {kibana-pull}108887[#108887]
* Load index pattern list without loading field lists {kibana-pull}108823[#108823]
* Fixes policy request flyout requiring policy name to show json {kibana-pull}108550[#108550]
* Searchsource should send all index patterns defined on the runtime field {kibana-pull}108549[#108549]
* Fixes bug where search sessions management UI displays wrong warning {kibana-pull}107556[#107556]
Maps::
* Fixes a bug where auto fit to bounds was not working when map was embedded in a dashboard {kibana-pull}109479[#109479]
* Fixes a bug where TableListView empty view trapped users with no action to create new item {kibana-pull}109345[#109345]
* Fixes a bug where the edit layer settings action showed when for read-only users {kibana-pull}109321[#109321]
* Fixes fonts api {kibana-pull}107768[#107768]
* Fixes a bug where more than two maps embeddables with geo-shape layers resulted in empty layers for 3+ {kibana-pull}107442[#107442]
Metrics::
* Fixes a bug where default rules were created when opening the dropdown {kibana-pull}107957[#107957]
* Fixes metric threshold preview regression {kibana-pull}107674[#107674]
Platform::
* Updated onboarding interstitial to handle default Fleet assets {kibana-pull}108193[#108193]
* Adds support of partial results to the switch expression function {kibana-pull}108086[#108086]

[[release-notes-7.14.0]]
== {kib} 7.14.0

Expand Down
25 changes: 12 additions & 13 deletions docs/apm/correlations.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -12,34 +12,33 @@ piece of hardware, like a host or pod. Or, perhaps a set of users, based on IP
address or region, is facing increased latency due to local data center issues.

To find correlations, select a service on the *Services* page in the {apm-app}
and click **View correlations**.
then select a transaction group from the *Transactions* tab.

NOTE: Queries within the {apm-app} are also applied to the correlations.

[discrete]
[[correlations-latency]]
==== Find high transaction latency correlations

The correlations on the *Latency* tab help you discover which attributes are
contributing to increased transaction latency.
The correlations on the *Latency correlations* tab help you discover which
attributes are contributing to increased transaction latency.

[role="screenshot"]
image::apm/images/correlations-hover.png[Latency correlations]

The progress bar indicates the status of the asynchronous analysis, which
performs statistical searches across a large number of attributes. For large
time ranges and services with high transaction throughput this might take some
time. To improve performance, reduce the time range on the service overview
page.
time ranges and services with high transaction throughput, this might take some
time. To improve performance, reduce the time range.

The latency distribution chart visualizes the overall latency of the
transactions in the service. If there are attributes that have a statistically
significant correlation with slow response times, they are listed in a table
below the chart. The table is sorted by correlation coefficients that range from
0 to 1. Attributes with higher correlation values are more likely to contribute
to high latency transactions. By default, the attribute with the highest
correlation value is added to the chart. To see the latency distribution for
other attributes, hover over their row in the table.
transactions in the transaction group. If there are attributes that have a
statistically significant correlation with slow response times, they are listed
in a table below the chart. The table is sorted by correlation coefficients that
range from 0 to 1. Attributes with higher correlation values are more likely to
contribute to high latency transactions. By default, the attribute with the
highest correlation value is added to the chart. To see the latency distribution
for other attributes, hover over their row in the table.

If a correlated attribute seems noteworthy, use the **Filter** quick links:

Expand Down
Binary file modified docs/apm/images/correlations-hover.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,10 @@
```typescript
readonly links: {
readonly settings: string;
readonly apm: {
readonly kibanaSettings: string;
readonly supportedServiceMaps: string;
};
readonly canvas: {
readonly guide: string;
};
Expand Down Expand Up @@ -128,6 +132,7 @@ readonly links: {
readonly rollupJobs: string;
readonly elasticsearch: Record<string, string>;
readonly siem: {
readonly privileges: string;
readonly guide: string;
readonly gettingStarted: string;
readonly ml: string;
Expand Down
Loading

0 comments on commit 0b90123

Please sign in to comment.