Skip to content

Commit 62e8e9e

Browse files
authored
Merge branch 'main' into docs-autoops-patch-1
2 parents 553844f + aae5de4 commit 62e8e9e

File tree

7 files changed

+69
-22
lines changed

7 files changed

+69
-22
lines changed

deploy-manage/tools/snapshot-and-restore/s3-repository.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,7 @@ See [this video](https://www.youtube.com/watch?v=ACqfyzWf-xs) for a walkthrough
2222

2323
## Getting started [repository-s3-usage]
2424

25-
To register an S3 repository, specify the type as `s3` when creating the repository. The repository defaults to using [ECS IAM Role](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-iam-roles.html) credentials for authentication. You can also use [Kubernetes service accounts](#iam-kubernetes-service-accounts) for authentication.
26-
27-
The only mandatory setting is the bucket name:
25+
To register an S3 repository, specify the type as `s3` when creating the repository. The only mandatory setting is the bucket name:
2826

2927
```console
3028
PUT _snapshot/my_s3_repository
@@ -36,6 +34,7 @@ PUT _snapshot/my_s3_repository
3634
}
3735
```
3836

37+
By default, an S3 repository will attempt to obtain its credentials automatically from the environment. For instance, if {{es}} is running on an AWS EC2 instance then it will attempt to use the [EC2 Instance Metadata Service](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html) to obtain temporary credentials for the [instance IAM role](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html). Likewise, if {{es}} is running in AWS EC2, then it will automatically obtain temporary [ECS IAM Role](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-iam-roles.html) credentials for authentication. You can also use [Kubernetes service accounts](#iam-kubernetes-service-accounts) for authentication. To disable this behavior, specify an access key, a secret key, and optionally a session token, in the {{es}} keystore.
3938

4039
## Client settings [repository-s3-client]
4140

@@ -65,7 +64,7 @@ bin/elasticsearch-keystore add s3.client.default.session_token
6564

6665
If you do not configure these settings then {{es}} will attempt to automatically obtain credentials from the environment in which it is running:
6766

68-
* Nodes running on an instance in AWS EC2 will attempt to use the EC2 Instance Metadata Service (IMDS) to obtain instance role credentials. {{es}} supports both IMDS version 1 and IMDS version 2.
67+
* Nodes running on an instance in AWS EC2 will attempt to use the EC2 Instance Metadata Service (IMDS) to obtain instance role credentials. {{es}} supports IMDS version 2 only.
6968
* Nodes running in a container in AWS ECS and AWS EKS will attempt to obtain container role credentials similarly.
7069

7170
You can switch from using specific credentials back to the default of using the instance role or container role by removing these settings from the keystore as follows:
@@ -385,7 +384,7 @@ There are a number of storage systems that provide an S3-compatible API, and the
385384

386385
By default {{es}} communicates with your storage system using HTTPS, and validates the repository’s certificate chain using the JVM-wide truststore. Ensure that the JVM-wide truststore includes an entry for your repository. If you wish to use unsecured HTTP communication instead of HTTPS, set `s3.client.CLIENT_NAME.protocol` to `http`.
387386

388-
There are many systems, including some from very well-known storage vendors, which claim to offer an S3-compatible API despite failing to emulate S3’s behavior in full. If you are using such a system for your snapshots, consider using a [shared filesystem repository](shared-file-system-repository.md) based on a standardized protocol such as NFS to access your storage system instead. The `s3` repository type requires full compatibility with S3. In particular it must support the same set of API endpoints, with the same parameters, return the same errors in case of failures, and offer consistency and performance at least as good as S3 even when accessed concurrently by multiple nodes. You will need to work with the supplier of your storage system to address any incompatibilities you encounter. Don't report {{es}} issues involving storage systems which claim to be S3-compatible unless you can demonstrate that the same issue exists when using a genuine AWS S3 repository.
387+
There are many systems, including some from very well-known storage vendors, which claim to offer an S3-compatible API despite failing to emulate S3’s behavior in full. If you are using such a system for your snapshots, consider using a [shared filesystem repository](shared-file-system-repository.md) based on a standardized protocol such as NFS to access your storage system instead. The `s3` repository type requires full compatibility with S3. In particular it must support the same set of API endpoints, with the same parameters, return the same errors in case of failures, and offer consistency, performance, and reliability at least as good as S3 even when accessed concurrently by multiple nodes. You will need to work with the supplier of your storage system to address any incompatibilities you encounter. Don't report {{es}} issues involving storage systems which claim to be S3-compatible unless you can demonstrate that the same issue exists when using a genuine AWS S3 repository.
389388

390389
You can perform some basic checks of the suitability of your storage system using the [repository analysis API](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-snapshot-repository-analyze). If this API does not complete successfully, or indicates poor performance, then your storage system is not fully compatible with AWS S3 and therefore unsuitable for use as a snapshot repository. However, these checks do not guarantee full compatibility.
391390

explore-analyze/find-and-organize/saved-objects.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Granting access to `Saved Objects Management` authorizes users to manage all sav
6060

6161
Use import and export to move objects between different {{kib}} instances. These actions are useful when you have multiple environments for development and production. Import and export also work well when you have a large number of objects to update and want to batch the process.
6262

63-
{{kib}} also provides import and export saved objects APIs for your [Elastic Stack deployments](https://www.elastic.co/docs/api/doc/kibana/group/endpoint-saved-objects) and [serverless projects](https://www.elastic.co/docs/api/doc/serverless/operation/operation-exportsavedobjectsdefault) to automate this process.
63+
{{kib}} also provides import and export saved objects APIs for your [Elastic Stack deployments](https://www.elastic.co/docs/api/doc/kibana/group/endpoint-saved-objects) and [serverless projects](https://www.elastic.co/docs/api/doc/serverless/group/endpoint-saved-objects) to automate this process.
6464

6565

6666
### Import [saved-objects-import]

reference/fleet/fleet-settings.md

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -99,22 +99,6 @@ To add or edit an output:
9999
If the options for editing an output are grayed out, outputs are configured outside of {{fleet}}. For more information, refer to [{{fleet}} settings in {{kib}}](kibana://reference/configuration-reference/fleet-settings.md).
100100
::::
101101

102-
103-
104-
## Agent binary download settings [fleet-agent-binary-download-settings]
105-
106-
{{agent}}s must be able to access the {{artifact-registry}} to download binaries during upgrades. By default {{agent}}s download artifacts from the artifact registry at `https://artifacts.elastic.co/downloads/`.
107-
108-
For {{agent}}s that cannot access the internet, you can specify agent binary download settings, and then configure agents to download their artifacts from the alternate location. For more information about running {{agent}}s in a restricted environment, refer to [Air-gapped environments](/reference/fleet/air-gapped.md).
109-
110-
To add or edit the source of binary downloads:
111-
112-
1. Go to **{{fleet}} > Settings**.
113-
2. Under **Agent Binary Download**, select **Add agent binary source** or **Edit**.
114-
3. Set the agent binary source name.
115-
4. For **Host**, specify the address where you are hosting the artifacts repository.
116-
5. (Optional) To make this location the default, select **Make this host the default for all agent policies**. {{agent}}s use the default location if you don’t select a different agent binary source in the agent policy.
117-
118102
## Agent binary download settings [fleet-agent-binary-download-settings]
119103

120104
{{agent}}s must be able to access the {{artifact-registry}} to download binaries during upgrades. By default {{agent}}s download artifacts from the artifact registry at `https://artifacts.elastic.co/downloads/`.

release-notes/elastic-cloud-serverless/index.md

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,47 @@ products:
99
# {{serverless-full}} changelog [elastic-cloud-serverless-changelog]
1010
Review the changes, fixes, and more to {{serverless-full}}.
1111

12+
## October 6, 2025 [serverless-changelog-10062025]
13+
14+
### Features and enhancements [serverless-changelog-10062025-features-enhancements]
15+
* Adds support for encrypted headers in the Webhook connector to enhance security [#233695]({{kib-pull}}233695)
16+
* Allows users to add custom fields to the IBM Resilient connector [#236144]({{kib-pull}}236144)
17+
* Renames Fleet Server Host SSL options for clarity [#236887]({{kib-pull}}236887)
18+
* Enables Discover tabs by default, allowing you to manage multiple data explorations in parallel [#235150]({{kib-pull}}235150)
19+
* Automatically extracts case observables in the **Add to case** workflow [#233027]({{kib-pull}}233027)
20+
* Introduces missing icons and updates v2 icons for the ECH Observability navigation [#236808]({{kib-pull}}236808)
21+
* Adds a metrics dashboard for non-EDOT agents in the OpenTelemetry native ingestion path [#236978]({{kib-pull}}236978)
22+
* Adds public APIs for Attack Discovery and Attack Discovery schedules [#236736]({{kib-pull}}236736)
23+
* Enables automatic observable extraction in the Alerts table [#235433]({{kib-pull}}235433)
24+
* Turns on the `newDataViewPickerEnabled` feature flag [#234101]({{kib-pull}}234101)
25+
* Adds the ability to discover privileged users from the Entity Analytics Okta integration [#237129]({{kib-pull}}237129)
26+
* Allows you to select which AI Assistant to show in the Elastic header; moves the **AI Assistant visibility** setting to the **GenAI Settings** page [#233727]({{kib-pull}}233727)
27+
* Adds a new `update_all` endpoint for product documentation management [#231884]({{kib-pull}}231884)
28+
* Adds an icon for Contextual AI in the AI Connector and Inference endpoint creation UI [#236951]({{kib-pull}}236951)
29+
* Enables the new background search experience for improved performance [#236818]({{kib-pull}}236818)
30+
* Adds triple-quote support to the Manual Ingest Pipeline Processor editor [#236595]({{kib-pull}}236595)
31+
* Introduces the German locale for Kibana in `beta` [#236903]({{kib-pull}}236903)
32+
* Adds an advanced option to disable filtering of file-backed volumes and CD-ROMs in the **Device Control** plugin [#236620]({{kib-pull}}236620)
33+
34+
### Fixes [serverless-changelog-10062025-fixes]
35+
* Rolls over the reporting data stream automatically when a newer template version is available [#234119]({{kib-pull}}234119)
36+
* Fixes an issue where exported CSV columns in Lens tables could appear out of order [#236673]({{kib-pull}}236673)
37+
* Fixes a bug causing Controls to fetch data twice [#237169]({{kib-pull}}237169)
38+
* Removes the incorrect `fleet.ssl` configuration option [#236788]({{kib-pull}}236788)
39+
* Fixes MSI commands (#233750) [#236994]({{kib-pull}}236994)
40+
* Removes unnecessary span documents from the `getServiceAgent` function [#236732]({{kib-pull}}236732)
41+
* Cleans up extra Synthetics package policies [#235200]({{kib-pull}}235200)
42+
* Reverts a change to the page attachment type in {{obs-serverless}} [#236958]({{kib-pull}}236958)
43+
* Removes `null` values in the confirmation dialog when bulk-editing index patterns for rules [#236572]({{kib-pull}}236572)
44+
* Increases the z-index of Timeline and related flyout components so they appear above the side navigation [#236655]({{kib-pull}}236655)
45+
* Adds support for API key wildcard search [#221959]({{kib-pull}}221959)
46+
* Hides the **Show forecast** button when changing jobs in the Single Metric Viewer [#236724]({{kib-pull}}236724)
47+
* Improves performance of the Trained Models list [#237072]({{kib-pull}}237072)
48+
* Fixes partition field settings errors in the Single Metric Viewer dashboard panels [#237046]({{kib-pull}}237046)
49+
* Fixes layout issues with the **Parse in streams** button on smaller flyouts [#236548]({{kib-pull}}236548)
50+
* Displays `(missing value)` and `(empty)` instead of `null` in charts and tables [#233369]({{kib-pull}}233369)
51+
* Fixes privilege requirements for reindexing indices in Upgrade Assistant [#237055]({{kib-pull}}237055)
52+
1253
## September 29, 2025 [serverless-changelog-09292025]
1354

1455
### Features and enhancements [serverless-changelog-09292025-features-enhancements]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
navigation_title: "Use different models"
3+
applies_to:
4+
stack: preview 9.2
5+
serverless:
6+
elasticsearch: preview
7+
---
8+
9+
:::{warning}
10+
These pages are currently hidden from the docs TOC and have `noindexed` meta headers.
11+
12+
**Go to the docs [landing page](/solutions/search/elastic-agent-builder.md).**
13+
:::
14+
15+
# Using different models in {{agent-builder}}

solutions/toc.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@ toc:
4646
- file: search/using-openai-compatible-models.md
4747
- hidden: search/elastic-agent-builder.md
4848
- hidden: search/agent-builder/get-started.md
49+
- hidden: search/agent-builder/models.md
4950
- hidden: search/agent-builder/chat.md
5051
- hidden: search/agent-builder/agent-builder-agents.md
5152
- hidden: search/agent-builder/tools.md

troubleshoot/ingest/opentelemetry/edot-sdks/android/index.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -169,3 +169,10 @@ Follow [this quick guide](../../../../../solutions/observability/apm/api-keys.md
169169

170170
Follow [this guide](https://www.elastic.co/docs/api/doc/kibana/operation/operation-createagentkey) to create an API Key with a set of privileges that are scoped for the APM Agent use case only.
171171

172+
## Missing general attributes
173+
174+
Some [general attributes](https://opentelemetry.io/docs/specs/semconv/general/attributes/) require Android permissions to be granted for the host app; otherwise, they cannot be collected. The ones affected are the following:
175+
176+
| Attribute | Required permission |
177+
|------------------------------|----------------------------------------------------------------------------------------------------------|
178+
| `network.connection.subtype` | [READ_PHONE_STATE](https://developer.android.com/reference/android/Manifest.permission#READ_PHONE_STATE) |

0 commit comments

Comments
 (0)