Role-based access control, and more
editRole-based access control, and more
editIntroducing role-based access control
Role-based access control introduces standard roles in Elasticsearch Service. Those roles are assigned to users under an organization, allowing for more granular permissions management. Role mapping happens on a per-role and per-deployment level. To learn more, check out the documentation.
Features
editSupport Elasticsearch plugins built against the stable plugin API. Added support for Elasticsearch plugins built against the stable plugin API introduced in Elasticsearch 8.7.0.
Enhancements
editMake sure the request future executions are requested in parallel. Improved deployment search API performance and response times.
Deprecations
editRemoved transactionGroupBucketSize The xpack.apm.ui.transactionGroupBucketSize
APM configuration setting has been removed from the Kibana User Settings for deployments with version 8.7 and later.
Bug fixes
editFix user lookup by email: Include users without organizations. Fix API user management bug affecting user lookup for users that haven’t started their trials.
Return subscribed = true
for organizations that are allowedToProvision. _introspect
API will now return linked organizations marked as subscribed = True
if the organization is allowed_to_provision_without_payment_established
as opposed to before, that only was returned to true if the organization was paying.
Add changes to accounter-syncs to accomodate dynamic configuration for monitors. The monitoring results had metadata.enabled
and metadata.muted
present for missing-skus
, but is missing for accounter-syncs
.
Fixing bug with deployment template creation on logs/metrics page. Fixing a bug that didn’t allow users to deselect sending monitoring data of either logs or metrics.
Abort boot on missing user plugin. Fixed a bug where Elasticsearch instances would silently ignore a user plugin that failed to download at boot time. Behavior is now corrected to keep retrying until success or plan timeout.