Skip to content

Commit 914564f

Browse files
authored
[Cloud Posture] Remove Kibana configuration from README (#3726)
1 parent 534e517 commit 914564f

File tree

3 files changed

+6
-12
lines changed

3 files changed

+6
-12
lines changed

packages/cloud_security_posture/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "0.0.20"
3+
changes:
4+
- description: Remove Kibana configuration section from README
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/3726
27
- version: "0.0.19"
38
changes:
49
- description: Adding EKS rule templates

packages/cloud_security_posture/docs/README.md

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -20,17 +20,6 @@ CIS Kubernetes Benchmark integration is shipped including default dashboards and
2020

2121
## Deployment
2222

23-
#### Configure Kibana
24-
25-
In order for the integration to be installed, The Cloud Security Posture Kibana plugin must be enabled.
26-
27-
This could be done by adding the following configuration line to `kibana.yml`:
28-
```
29-
xpack.cloudSecurityPosture.enabled: true
30-
```
31-
For Cloud users, see [Edit Kibana user settings](https://www.elastic.co/guide/en/cloud/current/ec-manage-kibana-settings.html).
32-
33-
3423
#### Deploy the Elastic agent
3524

3625
Just like every other integration, the KSPM integration requires an Elastic agent to be deployed.

packages/cloud_security_posture/manifest.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
format_version: 1.0.0
22
name: cloud_security_posture
33
title: "CIS Kubernetes Benchmark"
4-
version: 0.0.19
4+
version: 0.0.20
55
license: basic
66
description: "Check Kubernetes cluster compliance with the Kubernetes CIS benchmark."
77
type: integration

0 commit comments

Comments
 (0)