Kibana 8.0.0-alpha1
editKibana 8.0.0-alpha1
editReview the Kibana 8.0.0-alpha1 changes, then use the Upgrade Assistant to complete the upgrade.
Breaking changes
editBreaking changes can prevent your application from optimal operation and performance. Review the breaking changes, then mitigate the impact to your application.
Enterprise Search changes
editRequired security plugin in 8.0
Details
Enterprise Search now requires that you enable X-Pack Security. For more information, refer to #106307
Impact
Enable X-Pack Security.
Index pattern changes
editRemoved support for time-based interval index patterns
Details
Time-based interval index patterns were deprecated in 5.x. In 6.x, you could no longer create time-based interval index patterns, but they continued to function as expected. Support for these index patterns has been removed in 8.0. For more information, refer to #35173
Impact
You must migrate your time_based index patterns to a wildcard pattern. For example, logstash-*.
Operations changes
editRemoved platform from archive root directory
Details
After you extract an archive, the output directory no longer includes the target platform. For example, kibana-8.0.0-linux-aarch64.tar.gz
produces a kibana-8.0.0
folder. For more information, refer to #93835.
Impact
To use the new folder, update the configuration management tools and automation.
Removed default support for TLS v1.0 and v1.1
Details
The default support for TLS v1.0 and v1.1 has been removed. For more information, refer to #90511.
Impact
To enable support, set --tls-min-1.0
in the node.options
configuration file. To locate the configuration file, go to the kibana/config folder or any other configuration with the KBN_PATH_CONF
environment variable. For example, if you are using a Debian-based system, the configuration file is located in /etc/kibana.
Removed support for sysv init
Details
All supported operating systems use systemd service files. Any system that doesn’t have service
aliased to use kibana.service should use systemctl start kibana.service
instead of service start kibana
. For more information, refer to #74424.
Impact
If your installation uses .deb or .rpm packages with SysV, migrate to systemd.
Disabled response logging as a default
Details
In previous versions, all events are logged in json
when logging.json:true
. With the new logging configuration, you can choose the json
and pattern output formats with layouts. For more information, refer to #42353.
Impact
To restore the previous behavior, configure the logging format for each custom appender with the appender.layout property
in kibana.yml. There is no default for custom appenders, and each appender must be configured expilictly.
logging: appenders: custom_console: type: console layout: type: pattern custom_json: type: console layout: type: json loggers: - name: plugins.myPlugin appenders: [custom_console] root: appenders: [default, custom_json] level: warn
Reporting changes
editLegacy job parameters are no longer supported
Details
Reporting is no longer compatible with POST URL snippets generated with Kibana 6.2.0 and earlier. For more information, refer to #52539
Impact
If you use POST URL snippets to automatically generate PDF reports, regenerate the POST URL strings.
Security changes
editRemoved /api/security/v1/saml
route
Details
The /api/security/v1/saml
route has been removed and is reflected in the kibana.yml server.xsrf.whitelist
setting, Elasticsearch, and the Identity Provider SAML settings. For more information, refer to #47929
Impact
Use the /api/security/saml/callback
route, or wait to upgrade to 8.0.0-alpha2 when the /api/security/saml/callback
route breaking change is reverted.
Reject legacy browsers by default
Details
To provide the maximum level of protection for most installations, the csp.strict config is now enabled by default. Legacy browsers not supported by Kibana, such as Internet Explorer 11, are unable to access Kibana unless explicitly enabled. All browsers officially supported by Kibana do not have this issue. For more information, refer to #41700
Impact
To enable support for legacy browsers, set csp.strict: false
in kibana.yml. To effectively enforce the security protocol, we strongly discourage disabling csp.strict
unless it is critical that you support Internet Explorer 11.
Settings changes
editUse new session timeout defaults
Details
The default values for the session timeout xpack.security.session.{lifespan|idleTimeout}
settings have changed. For more information, refer to #106061
Impact
Use the following default values:
-
xpack.security.session.idleTimeout: 8h
-
xpack.security.session.lifespan: 30d
Removed support for setting server.host
to 0
Details
Support for configuring Kibana with 0
as the server.host
has been removed. Please use 0.0.0.0
instead. For more information, refer to #87114
Impact
You are now unable to use 0
as the server.host
.
Removed xpack.security.public
and xpack.security.authProviders
Details
The xpack.security.public
and xpack.security.authProviders
settings have been removed. For more information, refer to #38657
Impact
Use the xpack.security.authc.saml.realm
and xpack.security.authc.providers
settings.
Removed useUTC deprecation
Details
The logging.useUTC
setting has been removed. For more information, refer to #22696
Impact
The default timezone is UTC. To change the timezone, set logging.timezone: false
in kibana.yml. Change the timezone when the system, such as a docker container, is configured for a nonlocal timezone.
Removed environment variables CONFIG_PATH
and DATA_PATH
Details
The environment variables CONFIG_PATH
and DATA_PATH
have been removed. For more information, refer to #32049
Impact
Use the environment variable KBN_PATH_CONF
instead of CONFIG_PATH
. Use the setting path.data
instead of DATA_PATH
.
Deprecations
editThe following functionality is deprecated in 8.0.0, and will be removed in 9.0.0. Deprecated functionality does not have an immediate impact on your application, but we strongly recommend you make the necessary updates after you complete the upgrade.
Removed support for SysV init
Details
Systems that don’t have service
aliased to use kibana.service are unable to use service start kibana
. For more information, refer to #74424
Impact
If your system doesn’t have service
aliased to use kibana.service, use systemctl start kibana.service
.
Removed xpack:defaultAdminEmail
setting
Details
The xpack:default_admin_email
setting for monitoring use has been removed. For more information, refer to #33603
Impact
Use the xpack.monitoring.clusterAlertsEmail
in kibana.yml.
Bug fix
editThe 8.0.0-alpha1 release includes the following bug fix.
- Operations
-
- Moves systemd service to /usr/lib/systemd/system #83571