Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Reporting] Switch Serverside Config Wrapper to NP #62500

Merged
merged 33 commits into from
Apr 15, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
33 commits
Select commit Hold shift + click to select a range
886f976
New config
tsullivan Apr 3, 2020
2073311
Merge branch 'master' into reporting/server-config-np-switch
elasticmachine Apr 6, 2020
669a82d
fix translations json
tsullivan Apr 6, 2020
cd44aa1
Merge branch 'master' into reporting/server-config-np-switch
elasticmachine Apr 6, 2020
8944f79
Merge branch 'master' into reporting/server-config-np-switch
elasticmachine Apr 7, 2020
77a943e
Merge branch 'master' into reporting/server-config-np-switch
tsullivan Apr 10, 2020
f659f09
add csv.useByteOrderMarkEncoding to schema
tsullivan Apr 10, 2020
bb90123
imports cleanup
tsullivan Apr 10, 2020
b09ff8a
restore "get default chromium sandbox disabled" functionality
tsullivan Apr 10, 2020
04c30ab
integrate getDefaultChromiumSandboxDisabled
tsullivan Apr 10, 2020
0591c0c
fix tests
tsullivan Apr 10, 2020
e423723
--wip-- [skip ci]
tsullivan Apr 10, 2020
89bdd61
add more schema tests
tsullivan Apr 10, 2020
3e92310
diff prettiness
tsullivan Apr 10, 2020
3123735
trash legacy files that moved to NP
tsullivan Apr 10, 2020
96f3a7e
create_config tests
tsullivan Apr 10, 2020
02b91b8
Hoist create_config
tsullivan Apr 10, 2020
5aab964
better disableSandbox tests
tsullivan Apr 10, 2020
b0ab462
fix ts
tsullivan Apr 10, 2020
1fb5f5f
fix export
tsullivan Apr 10, 2020
619bcb4
fix bad code
tsullivan Apr 10, 2020
1339af9
make comments better
tsullivan Apr 10, 2020
e262dec
fix i18n
tsullivan Apr 10, 2020
ccbcc02
comment
tsullivan Apr 10, 2020
7b1f8ec
automatically setting... logs
tsullivan Apr 10, 2020
84eccad
replace log_configuration
tsullivan Apr 11, 2020
c7cefe9
fix lint
tsullivan Apr 11, 2020
611e2aa
This is f2
tsullivan Apr 11, 2020
e728526
improve startup log about sandbox info
tsullivan Apr 11, 2020
a0e045b
update docs with log reference
tsullivan Apr 11, 2020
8c19295
revert log removal
tsullivan Apr 12, 2020
8916d73
Merge branch 'master' into reporting/server-config-np-switch
elasticmachine Apr 13, 2020
cc92486
Merge branch 'master' into reporting/server-config-np-switch
elasticmachine Apr 15, 2020
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions docs/user/reporting/chromium-sandbox.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -11,12 +11,12 @@ sandboxing techniques differ for each operating system.
The Linux sandbox depends on user namespaces, which were introduced with the 3.8 Linux kernel. However, many
distributions don't have user namespaces enabled by default, or they require the CAP_SYS_ADMIN capability. {reporting}
will automatically disable the sandbox when it is running on Debian and CentOS as additional steps are required to enable
unprivileged usernamespaces. In these situations, you'll see the following message in your {kib} logs:
`Enabling the Chromium sandbox provides an additional layer of protection`.
unprivileged usernamespaces. In these situations, you'll see the following message in your {kib} startup logs:
`Chromium sandbox provides an additional layer of protection, but is not supported for your OS.
Automatically setting 'xpack.reporting.capture.browser.chromium.disableSandbox: true'.`

If your kernel is 3.8 or newer, it's
recommended to enable usernamespaces and set `xpack.reporting.capture.browser.chromium.disableSandbox: false` in your
`kibana.yml` to enable the sandbox.
Reporting will automatically enable the Chromium sandbox at startup when a supported OS is detected. However, if your kernel is 3.8 or newer, it's
recommended to set `xpack.reporting.capture.browser.chromium.disableSandbox: false` in your `kibana.yml` to explicitly enable usernamespaces.

==== Docker
When running {kib} in a Docker container, all container processes are run within a usernamespace with seccomp-bpf and
Expand Down
Loading