[bitnami/kibana] Release 8.11.3-debian-11-r1 (#53951)

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
Bitnami Bot
2023-12-19 11:07:48 +01:00
committed by GitHub
parent b90f77f92b
commit 07dbb15f21
4 changed files with 18 additions and 23 deletions

View File

@@ -7,10 +7,10 @@ ARG TARGETARCH
LABEL com.vmware.cp.artifact.flavor="sha256:1e1b4657a77f0d47e9220f0c37b9bf7802581b93214fff7d1bd2364c8bf22e8e" \
org.opencontainers.image.base.name="docker.io/bitnami/minideb:bullseye" \
org.opencontainers.image.created="2023-12-13T04:35:10Z" \
org.opencontainers.image.created="2023-12-19T09:16:11Z" \
org.opencontainers.image.description="Application packaged by VMware, Inc" \
org.opencontainers.image.licenses="Apache-2.0" \
org.opencontainers.image.ref.name="8.11.3-debian-11-r0" \
org.opencontainers.image.ref.name="8.11.3-debian-11-r1" \
org.opencontainers.image.title="kibana" \
org.opencontainers.image.vendor="VMware, Inc." \
org.opencontainers.image.version="8.11.3"
@@ -28,7 +28,7 @@ RUN install_packages ca-certificates curl libexpat1 libgcc-s1 libnss3 libstdc++6
RUN mkdir -p /tmp/bitnami/pkg/cache/ ; cd /tmp/bitnami/pkg/cache/ ; \
COMPONENTS=( \
"yq-4.40.5-0-linux-${OS_ARCH}-debian-11" \
"kibana-8.11.3-0-linux-${OS_ARCH}-debian-11" \
"kibana-8.11.3-1-linux-${OS_ARCH}-debian-11" \
) ; \
for COMPONENT in "${COMPONENTS[@]}"; do \
if [ ! -f "${COMPONENT}.tar.gz" ]; then \

View File

@@ -3,7 +3,7 @@
"arch": "amd64",
"distro": "debian-11",
"type": "NAMI",
"version": "8.11.3-0"
"version": "8.11.3-1"
},
"yq": {
"arch": "amd64",

View File

@@ -50,16 +50,16 @@ kibana_env_vars=(
KIBANA_DISABLE_STRICT_CSP
KIBANA_CREATE_USER
KIBANA_ELASTICSEARCH_PASSWORD
ELASTICSEARCH_URL
KIBANA_ELASTICSEARCH_PORT_NUMBER
KIBANA_ELASTICSEARCH_PORT
KIBANA_PORT_NUMBER
KIBANA_INITSCRIPTS_MAX_RETRIES
KIBANA_SERVER_PUBLICBASEURL
KIBANA_XPACK_SECURITY_ENCRYPTIONKEY
KIBANA_XPACK_REPORTING_ENCRYPTIONKEY
KIBANA_NEWSFEED_ENABLED
KIBANA_ELASTICSEARCH_REQUESTTIMEOUT
ELASTICSEARCH_URL
KIBANA_ELASTICSEARCH_PORT_NUMBER
KIBANA_ELASTICSEARCH_PORT
KIBANA_PORT_NUMBER
KIBANA_INITSCRIPTS_MAX_RETRIES
)
for env_var in "${kibana_env_vars[@]}"; do
file_env_var="${env_var}_FILE"
@@ -132,11 +132,6 @@ export KIBANA_FORCE_INITSCRIPTS="${KIBANA_FORCE_INITSCRIPTS:-no}"
export SERVER_FORCE_INITSCRIPTS="$KIBANA_FORCE_INITSCRIPTS"
export KIBANA_DISABLE_STRICT_CSP="${KIBANA_DISABLE_STRICT_CSP:-no}"
export SERVER_DISABLE_STRICT_CSP="$KIBANA_DISABLE_STRICT_CSP"
export KIBANA_SERVER_PUBLICBASEURL="${KIBANA_SERVER_PUBLICBASEURL:-}"
export KIBANA_XPACK_SECURITY_ENCRYPTIONKEY="${KIBANA_XPACK_SECURITY_ENCRYPTIONKEY:-}"
export KIBANA_XPACK_REPORTING_ENCRYPTIONKEY="${KIBANA_XPACK_REPORTING_ENCRYPTIONKEY:-}"
export KIBANA_NEWSFEED_ENABLED="${KIBANA_NEWSFEED_ENABLED:-true}"
export KIBANA_ELASTICSEARCH_REQUESTTIMEOUT="${KIBANA_ELASTICSEARCH_REQUESTTIMEOUT:-30000}"
# Kibana server SSL/TLS configuration
export KIBANA_CERTS_DIR="${KIBANA_CERTS_DIR:-${SERVER_CONF_DIR}/certs}"
@@ -174,5 +169,10 @@ export SERVER_DB_CA_CERT_LOCATION="$KIBANA_ELASTICSEARCH_CA_CERT_LOCATION"
export KIBANA_DISABLE_STRICT_CSP="${KIBANA_DISABLE_STRICT_CSP:-no}"
export KIBANA_CREATE_USER="${KIBANA_CREATE_USER:-false}"
export KIBANA_ELASTICSEARCH_PASSWORD="${KIBANA_ELASTICSEARCH_PASSWORD:-}"
export KIBANA_SERVER_PUBLICBASEURL="${KIBANA_SERVER_PUBLICBASEURL:-}"
export KIBANA_XPACK_SECURITY_ENCRYPTIONKEY="${KIBANA_XPACK_SECURITY_ENCRYPTIONKEY:-}"
export KIBANA_XPACK_REPORTING_ENCRYPTIONKEY="${KIBANA_XPACK_REPORTING_ENCRYPTIONKEY:-}"
export KIBANA_NEWSFEED_ENABLED="${KIBANA_NEWSFEED_ENABLED:-true}"
export KIBANA_ELASTICSEARCH_REQUESTTIMEOUT="${KIBANA_ELASTICSEARCH_REQUESTTIMEOUT:-30000}"
# Custom environment variables may be defined below

View File

@@ -210,28 +210,23 @@ kibana_initialize() {
exit 1
fi
fi
# Override configuration
# Kibana override configuration
if [[ "$SERVER_FLAVOR" = "kibana" ]]; then
if is_boolean_yes "$KIBANA_DISABLE_STRICT_CSP"; then
kibana_conf_set "csp.strict" "false" "bool"
fi
#The publicly available URL that end-users access Kibana at
if ! is_empty_value "$KIBANA_SERVER_PUBLICBASEURL"; then
kibana_conf_set "server.publicBaseUrl" "$KIBANA_SERVER_PUBLICBASEURLL"
kibana_conf_set "server.publicBaseUrl" "$KIBANA_SERVER_PUBLICBASEURL"
fi
#Set an encryption key so that sessions are not invalidated. Use any text string that is 32 characters or longer as the encryption key.
if ! is_empty_value "$KIBANA_XPACK_SECURITY_ENCRYPTIONKEY"; then
kibana_conf_set "xpack.security.encryptionKey" "$KIBANA_XPACK_SECURITY_ENCRYPTIONKEY"
fi
#The static encryption key for reporting. Use an alphanumeric text string that is at least 32 characters. By default, Kibana generates a random key when it starts, which causes pending reports to fail
fi
if ! is_empty_value "$KIBANA_XPACK_REPORTING_ENCRYPTIONKEY"; then
kibana_conf_set "xpack.reporting.encryptionKey" "$KIBANA_XPACK_REPORTING_ENCRYPTIONKEY"
fi
#Controls whether to enable the newsfeed system for the Kibana UI notification center
if ! is_boolean_yes "$KIBANA_NEWSFEED_ENABLED"; then
kibana_conf_set "newsfeed.enabled" "false" "bool"
fi
#Time in milliseconds to wait for responses from the back end or Elasticsearch. This value must be a positive integer. Default: 30000
fi
if [[ "$KIBANA_ELASTICSEARCH_REQUESTTIMEOUT" != "30000" ]]; then
kibana_conf_set "elasticsearch.requestTimeout" "$KIBANA_ELASTICSEARCH_REQUESTTIMEOUT"
fi