2.16.0 release highlights
edit2.16.0 release highlights
editKnown issues
edit-
Enabling a Kibana hardened security context (only supported in Kibana 7.10+) as well as enabling Kibana audit logs will cause Kibana to go into a
CrashLoopBackoff
state with the errorread-only file system, open '/usr/share/kibana/logs/audit.log'
. - Enabling a Kibana hardened security context (only supported in Kibana 7.10+) as well as utilizing Kibana plugins would cause the plugins to fail to load.
New and notable
editNew and notable changes in version 2.16.0.
Remote clusters support using API keys
editECK 2.16.0 includes a technical preview for connecting to remote clusters using API key authentication.
Refer to the Remote clusters section for more information.
Hardened Security Context for Kibana container
editThe default SecurityContext
of the Kibana containers has been hardened, it includes the following specification by default in version 7.10.0 and above when set-default-security-context
is either true
or auto-detect
:
securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL privileged: false readOnlyRootFilesystem: true
Also note that this change will cause the Kibana pod(s) to be restarted as this change is applied during the upgrade.
eck-fleet-server Helm chart breaking changes
editThe eck-fleet-server
Helm chart has had the default values updated to remove the setting of the deployment model to be deployment
.
This was required because of an upstream Helm bug when using parent/child charts. Refer to https://github.com/elastic/cloud-on-k8s/issues/7429 for details.
Check Elastic Cloud on Kubernetes version 2.16.0 for the full list of changes.