mirror of
https://github.com/elastic/elasticsearch.git
synced 2025-06-28 17:34:17 -04:00
Update docs to reflect new validation in reload_secure_settings api (#103550)
This commit is contained in:
parent
1900a99018
commit
52eba9c8ca
1 changed files with 11 additions and 11 deletions
|
@ -6,11 +6,11 @@ their values is not sufficient. For this use case, {es} provides a
|
|||
keystore and the <<elasticsearch-keystore,`elasticsearch-keystore` tool>> to
|
||||
manage the settings in the keystore.
|
||||
|
||||
IMPORTANT: Only some settings are designed to be read from the keystore. However,
|
||||
the keystore has no validation to block unsupported settings. Adding unsupported
|
||||
settings to the keystore causes {es} to fail to start. To see whether a setting
|
||||
is supported in the keystore, look for a "Secure" qualifier in the setting
|
||||
reference.
|
||||
IMPORTANT: Only some settings are designed to be read from the keystore.
|
||||
Adding unsupported settings to the keystore causes the validation in the
|
||||
`_nodes/reload_secure_settings` API to fail and if not addressed, will
|
||||
cause {es} to fail to start. To see whether a setting is supported in the
|
||||
keystore, look for a "Secure" qualifier in the setting reference.
|
||||
|
||||
All the modifications to the keystore take effect only after restarting {es}.
|
||||
|
||||
|
@ -42,12 +42,12 @@ POST _nodes/reload_secure_settings
|
|||
|
||||
<1> The password that the {es} keystore is encrypted with.
|
||||
|
||||
This API decrypts and re-reads the entire keystore, on every cluster node,
|
||||
but only the *reloadable* secure settings are applied. Changes to other
|
||||
settings do not go into effect until the next restart. Once the call returns,
|
||||
the reload has been completed, meaning that all internal data structures
|
||||
dependent on these settings have been changed. Everything should look as if the
|
||||
settings had the new value from the start.
|
||||
This API decrypts, re-reads the entire keystore and validates all settings on
|
||||
every cluster node, but only the *reloadable* secure settings are applied.
|
||||
Changes to other settings do not go into effect until the next restart. Once
|
||||
the call returns, the reload has been completed, meaning that all internal data
|
||||
structures dependent on these settings have been changed. Everything should
|
||||
look as if the settings had the new value from the start.
|
||||
|
||||
When changing multiple *reloadable* secure settings, modify all of them on each
|
||||
cluster node, then issue a <<cluster-nodes-reload-secure-settings, `reload_secure_settings`>>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue