From 531f795037b746550b17131e067ba4e2e7cb3937 Mon Sep 17 00:00:00 2001 From: Cas Donoghue <cas.donoghue@gmail.com> Date: Fri, 3 Jan 2025 11:26:46 -0800 Subject: [PATCH] Ssl standardization breaking changes docs (#16844) * Add logstash-filter-elasticsearch obsolete ssl section to breaking changes doc Adds information about the SSL setting obsolescence for the Elasticsearch filter to the 9.0 breaking changes doc * Fix headers Co-authored-by: Cas Donoghue <cas.donoghue@gmail.com> * Add logstash-output-tcp obsolete ssl section to breaking changes doc * Fix Asciidoctor doc links * Add logstash-input-tcp obsolete ssl section to breaking changes doc * Fix asciidoc plugin links * Add logstash-filter-http obsolete ssl section to breaking changes doc * Add logstash-input-http obsolete ssl section to breaking changes doc * Add logstash-input-http_poller obsolete ssl section to breaking changes doc * Add logstash-input-elastic_serverless_forwarder ssl conf to breaking changes --------- Co-authored-by: Rob Bavey <rob.bavey@elastic.co> --- docs/static/breaking-changes-90.asciidoc | 137 +++++++++++++++++++++++ 1 file changed, 137 insertions(+) diff --git a/docs/static/breaking-changes-90.asciidoc b/docs/static/breaking-changes-90.asciidoc index cadb5620aed..79ac6c15c5f 100644 --- a/docs/static/breaking-changes-90.asciidoc +++ b/docs/static/breaking-changes-90.asciidoc @@ -43,6 +43,125 @@ removed and their replacements. ==== +[discrete] +[[input-elastic_serverless_forwarder-ssl-9.0]] +.`logstash-input-elastic_serverless_forwarder` + +[%collapsible] +==== + +[cols="<,<",options="header",] +|======================================================================= +|Setting|Replaced by +| ssl |<<plugins-inputs-elastic_serverless_forwarder-ssl_enabled>> +|======================================================================= + +==== + +[discrete] +[[input-http-ssl-9.0]] +.`logstash-input-http` + +[%collapsible] +==== + + +[cols="<,<",options="header",] +|======================================================================= +|Setting|Replaced by +| cipher_suites |<<plugins-inputs-http-ssl_cipher_suites>> +| keystore |<<plugins-inputs-http-ssl_keystore_path>> +| keystore_password |<<plugins-inputs-http-ssl_keystore_password>> +| ssl |<<plugins-inputs-http-ssl_enabled>> +| ssl_verify_mode |<<plugins-inputs-http-ssl_client_authentication>> +| tls_max_version |<<plugins-inputs-http-ssl_supported_protocols>> +| tls_min_version |<<plugins-inputs-http-ssl_supported_protocols>> +| verify_mode |<<plugins-inputs-http-ssl_client_authentication>> +|======================================================================= + +==== + +[discrete] +[[input-http_poller-ssl-9.0]] +.`logstash-input-http_poller` + +[%collapsible] +==== + +[cols="<,<",options="header",] +|======================================================================= +|Setting|Replaced by +| cacert |<<plugins-inputs-http_poller-ssl_certificate_authorities>> +| client_cert |<<plugins-inputs-http_poller-ssl_certificate>> +| client_key |<<plugins-inputs-http_poller-ssl_key>> +| keystore |<<plugins-inputs-http_poller-ssl_keystore_path>> +| keystore_password |<<plugins-inputs-http_poller-ssl_keystore_password>> +| keystore_type |<<plugins-inputs-http_poller-ssl_keystore_password>> +| truststore |<<plugins-inputs-http_poller-ssl_truststore_path>> +| truststore_password |<<plugins-inputs-http_poller-ssl_truststore_password>> +| truststore_type |<<plugins-inputs-http_poller-ssl_truststore_type>> +|======================================================================= + +==== + +[discrete] +[[input-tcp-ssl-9.0]] +.`logstash-input-tcp` + +[%collapsible] +==== + +[cols="<,<",options="header",] +|======================================================================= +|Setting|Replaced by +| ssl_cert |<<plugins-inputs-tcp-ssl_certificate>> +| ssl_enable |<<plugins-inputs-tcp-ssl_enabled>> +| ssl_verify |<<plugins-inputs-tcp-ssl_client_authentication>> in `server` mode and <<plugins-inputs-tcp-ssl_verification_mode>> in `client` mode +|======================================================================= + +==== + +[discrete] +[[filter-elasticsearch-ssl-9.0]] +.`logstash-filter-elasticsearch` + +[%collapsible] +==== + +[cols="<,<",options="header",] +|======================================================================= +|Setting|Replaced by +| ca_file |<<plugins-filters-elasticsearch-ssl_certificate_authorities>> +| keystore |<<plugins-filters-elasticsearch-ssl_keystore_path>> +| keystore_password |<<plugins-filters-elasticsearch-ssl_keystore_password>> +| ssl |<<plugins-filters-elasticsearch-ssl_enabled>> +|======================================================================= + +==== + +[discrete] +[[filter-http-ssl-9.0]] +.`logstash-filter-http` + +[%collapsible] +==== + +[cols="<,<",options="header",] +|======================================================================= +|Setting|Replaced by +| cacert |<<plugins-filters-http-ssl_certificate_authorities>> +| client_cert |<<plugins-filters-http-ssl_certificate>> +| client_key |<<plugins-filters-http-ssl_key>> +| keystore |<<plugins-filters-http-ssl_keystore_path>> +| keystore_password |<<plugins-filters-http-ssl_keystore_password>> +| keystore_type |<<plugins-filters-http-ssl_keystore_type>> +| truststore |<<plugins-filters-http-ssl_truststore_path>> +| truststore_password |<<plugins-filters-http-ssl_truststore_password>> +| truststore_type |<<plugins-filters-http-ssl_truststore_type>> +|======================================================================= + +==== + [discrete] [[output-elasticsearch-ssl-9.0]] .`logstash-output-elasticsearch` @@ -86,3 +205,21 @@ removed and their replacements. |======================================================================= ==== + +[discrete] +[[output-tcp-ssl-9.0]] +.`logstash-output-tcp` + +[%collapsible] +==== + +[cols="<,<",options="header",] +|======================================================================= +|Setting|Replaced by +| ssl_cacert |<<plugins-outputs-tcp-ssl_certificate_authorities>> +| ssl_cert |<<plugins-outputs-tcp-ssl_certificate>> +| ssl_enable |<<plugins-outputs-tcp-ssl_enabled>> +| ssl_verify |<<plugins-outputs-tcp-ssl_client_authentication>> in `server` mode and <<plugins-outputs-tcp-ssl_verification_mode>> in `client` mode +|======================================================================= + +====