Breaking changes in 8.0edit

This section discusses the changes that you need to be aware of when migrating your application to Kibana 8.0.

Coming in 8.0.0.

See also Release Highlights and Release Notes.

Index pattern changesedit

Removed support for time-based internal index patternsedit

Details: Time-based interval index patterns were deprecated in 5.x. In 6.x, you could no longer create time-based interval index patterns, but they continued to function as expected. Support for these index patterns has been removed in 8.0.

Impact: You must migrate your time_based index patterns to a wildcard pattern, for example, logstash-*.

Settings changesedit

Legacy browsers are now rejected by defaultedit

Details: csp.strict is now enabled by default, so Kibana will fail to load for older, legacy browsers that do not enforce basic Content Security Policy protections - notably Internet Explorer 11.

Impact: To allow Kibana to function for these legacy browsers, set csp.strict: false. Since this is about enforcing a security protocol, we strongly discourage disabling csp.strict unless it is critical that you support Internet Explorer 11.

Default logging timezone is now the system’s timezoneedit

Details: In prior releases the timezone used in logs defaulted to UTC. We now use the host machine’s timezone by default.

Impact: To restore the previous behavior, in kibana.yml set logging.timezone: UTC.

Responses are never logged by defaultedit

Details: Previously responses would be logged if either logging.json was true, logging.dest was specified, or a TTY was detected.

Impact: To restore the previous behavior, in kibana.yml set logging.events.response=*.

xpack.security.authProviders is no longer validedit

Details: The deprecated xpack.security.authProviders setting in the kibana.yml file has been removed.

Impact: Use xpack.security.authc.providers instead.

xpack.security.authc.saml.realm is now mandatory when using the SAML authentication provideredit

Details: Previously Kibana was choosing the appropriate Elasticsearch SAML realm automatically using the Assertion Consumer Service URL that it derived from the actual server address. Starting in 8.0.0, the Elasticsearch SAML realm name that Kibana will use should be specified explicitly.

Impact: Always define xpack.security.authc.saml.realm when using the SAML authentication provider.

xpack.security.public is no longer validedit

Details: The deprecated xpack.security.public setting in the kibana.yml file has been removed.

Impact: Define xpack.security.authc.saml.realm when using the SAML authentication provider instead.

optimize directory is now in the data folderedit

Details: Generated bundles have moved to the configured path.data folder.

Impact: Any workflow that involved manually clearing generated bundles will have to be updated with the new path.