diff --git a/playbook/standalone.yml b/playbook/standalone.yml index 1e4f15afb0955c4ff4b639bdbb608c567cbdbd43..eb5096433b52271c3cce308a8fb19ccb89c5cd4b 100644 --- a/playbook/standalone.yml +++ b/playbook/standalone.yml @@ -94,7 +94,7 @@ name: kibana state: stopped - name: stop kibana - shell: kill -9 $(ps -ef | grep "nohup /opt/kibana/bin/kibana --allow-root &" | grep -v grep | awk '{print $2}') + shell: kill -9 $(ps -ef | grep "nohup /opt/kibana/bin/kibana &" | grep -v grep | awk '{print $2}') - name: start kibana shell: nohup /opt/kibana/bin/kibana & become: yes diff --git a/playbook/templates/kibana/kibana.yml.j2 b/playbook/templates/kibana/kibana.yml.j2 index 5e6e57afe1c5db05c4239c085d6acd51c1d8cf17..5680d96e30bf117eaa7c58e757b45834fb841082 100644 --- a/playbook/templates/kibana/kibana.yml.j2 +++ b/playbook/templates/kibana/kibana.yml.j2 @@ -67,6 +67,13 @@ server.ssl.key: {{ kibana_ssl_key_file }} #elasticsearch.ssl.certificate: /path/to/your/client.crt #elasticsearch.ssl.key: /path/to/your/client.key +xpack.fleet.agents.enabled: true +xpack.encryptedSavedObjects.encryptionKey: 7c3f32b06754df3652415819495205c1 +xpack.reporting.encryptionKey: fe0907696290a6ee18ecd717b255b422 +xpack.security.encryptionKey: 59f67be53851cdfb3216980ce2ea63f2 +server.xsrf.disableProtection: true +xpack.fleet.registryUrl: http://{{ groups['fleet'][0] }}:8080 + # Optional setting that enables you to specify a path to the PEM file for the certificate # authority for your Elasticsearch instance. {% if needSSL == "true" %}