Skip to content
This repository has been archived by the owner on Mar 30, 2023. It is now read-only.

6.3.0

Compare
Choose a tag to compare
@russcam russcam released this 13 Jul 10:27
· 168 commits to master since this release

Elasticsearch and Kibana 6.3.0

This release adds support for deploying Elasticsearch and Kibana 6.3.0 to Azure! the default Elasticsearch and Kibana version in this template version is 6.3.0 with X-Pack bundled.

Check out the Doubling down on Open blog post to learn more and also take a look at the Opening X-Pack FAQ.

Features

#196 Elasticsearch and Kibana 6.3.0 🎉

Add support for Elasticsearch and Kibana 6.3.0 to the template. The template deploys the default distribution of 6.3.0 that includes X-Pack features bundled by default, with applied license level determining which features are activated. For 6.3.0, the xPackPlugins parameter determines whether a trial license is applied to the cluster (a value of Yes), providing access to all platinum features for 30 days. A value of No will apply a perpetual basic license that does not need to be registered.

#178 Managed disks 💾

The template has been updated to move from unmanaged to managed disks. Aside from being easier to manage and deploy, they provide encryption at rest by default, through Storage Service Encryption (SSE).

#187 SSL/TLS configuration for Elasticsearch HTTP and Transport layers 🔐

The template has supported SSL/TLS from the browser to Kibana and SSL/TLS to Elasticsearch through Application Gateway for a long time now. This new feature now brings the ability to configure SSL/TLS for both the HTTP and Transport layers of Elasticsearch:

  • For HTTP layer, provide either

    • a PKCS#12 archive (esHttpCertBlob) and optional passphase (esHttpCertPassword) containing the certificate and key to use to encrypt the HTTP layer on all nodes

    or

    • a PKCS#12 archive (esHttpCaCertBlob) and optional passphase (esHttpCaCertPassword) containing the CA certificate and key to use to generate a unique certificate for each node to encrypt the HTTP layer
  • For Transport layer provide a PKCS#12 archive (esTransportCaCertBlob) and optional passphase (esTransportCaCertPassword) containing the certificate and key to use to generate a unique certificate for each node to encrypt the Transport layer

#188 SAML based Single Sign-On with Azure Active Directory 🌐

It's now super simple to configure SAML based Single Sign-On (SSO) with Azure Active Directory; you just need to configure an Enterprise application for SAML SSO and provide the App Federation Metadata Url to the template in the samlMetadataUri. You can also optionally pass the domain name that you'll use to access Kibana with the samlServiceProviderUri. A blog post will be coming out soon with full details, so keep an eye on the elastic blog.

#187 Kibana additional YAML configuration 🍰

It's been possible to pass additional YAML configuration for Elasticsearch for a while, now it's possible to do the same for Kibana! This is an expert level feature, so be sure to run your yaml through a linter before running a deployment.

Enhancements

  • #196 Support Elasticsearch and Kibana 5.6.10
  • #193 Support Elasticsearch and Kibana 5.6.9
  • #198 Support Dsv3-series VMs
  • #205 Support additional VM SKUs, including L-series VMs

Bug fixes

  • #184 Create keystore if it doesn't already exist

Deprecations

  • #187 Remove support for Elasticsearch and Kibana less than 5.3.0