Commit graph

173 commits

Author SHA1 Message Date
debadair
777598d602
[DOCS] Remove redirect pages (#88738)
* [DOCS] Remove manual redirects

* [DOCS] Removed refs to modules-discovery-hosts-providers

* [DOCS] Fixed broken internal refs

* Fixing bad cross links in ES book, and adding redirects.asciidoc[] back into docs/reference/index.asciidoc.

* Update docs/reference/search/point-in-time-api.asciidoc

Co-authored-by: James Rodewig <james.rodewig@elastic.co>

* Update docs/reference/setup/restart-cluster.asciidoc

Co-authored-by: James Rodewig <james.rodewig@elastic.co>

* Update docs/reference/sql/endpoints/translate.asciidoc

Co-authored-by: James Rodewig <james.rodewig@elastic.co>

* Update docs/reference/snapshot-restore/restore-snapshot.asciidoc

Co-authored-by: James Rodewig <james.rodewig@elastic.co>

* Update repository-azure.asciidoc

* Update node-tool.asciidoc

* Update repository-azure.asciidoc

---------

Co-authored-by: amyjtechwriter <61687663+amyjtechwriter@users.noreply.github.com>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
Co-authored-by: Amy Jonsson <amy.jonsson@elastic.co>
Co-authored-by: James Rodewig <james.rodewig@elastic.co>
2023-05-24 12:32:46 +01:00
Daniel Mitterdorfer
3aed3499ff
Bootstrap profiling indices at startup (#95666)
With this commit we bootstrap all indices and related structures that
are required for Elastic Universal Profiling.
2023-05-16 16:56:51 +02:00
Francisco Fernández Castaño
da9bb382f5
Add support for custom endpoints in the Azure repository (#94576)
Closes #94537
2023-03-22 11:40:19 +01:00
Stef Nestor
69d3039726
Doc about elasticsearch#78276 (#93873)
👋🏼 Regardless of if we decide to validation enforce #78276, may we please drop a doc note that users should avoid duplicating repositories (particularly bucket / base paths).
2023-02-22 21:08:15 +01:00
Francisco Fernández Castaño
da387b430c
Link to the time-units doc in S3 repository docs instead of explaining it in words (#93351) 2023-01-31 11:59:20 +01:00
Francisco Fernández Castaño
ed9246f8d4
Amend read_timeout S3 repository setting description (#93136) 2023-01-23 15:34:46 +01:00
Iraklis Psaroudakis
6ff081beef
Clarify searchable snapshot repository reliability (#93023)
To make it clear that repository snapshots should be available and reliable for any mounted searchable snapshots.

Co-authored-by: David Turner <david.turner@elastic.co>
2023-01-19 14:31:01 +02:00
David Turner
82ed1fbcc9
Clarify use of S3 lifecycle policies (#92427)
Clarifies that it doesn't work to transition to Glacier tiers, nor does
it work to use object expiry, and that the consequences can be severe.
2022-12-19 09:04:29 +00:00
amyjtechwriter
c0e624b3b1
Removing 'or closed' from ignore_unavalible in line with new default behviour. (#92233) 2022-12-12 09:18:27 +00:00
Andrei Dan
261f184c22
[DOCS] disable the ILM history store on full cluster restore (#88515) 2022-11-23 16:54:54 +00:00
Iraklis Psaroudakis
7bfc672eb4
Tie snapshot speed to node bandwidth settings (#91021)
If the recovery node bandwidth settings exist,
then the default value for max snapshot speed will
be infinite, and the speed will be rate limited
by the recovery rate limit as well.

Fixes #57023
2022-11-15 16:13:09 +02:00
Anthony McGlone
0249d1650f
[DOCS] Update the feature state example in the snapshot and restore docs (#90328) 2022-11-01 10:17:29 +09:00
debadair
ef7aaec815
[DOCS] Fixed footnote. Closes #89403 (#90541) 2022-09-29 16:48:02 -07:00
Joe Gallo
f262f36564
Add master_timeout to the snapshot delete docs (#90032) 2022-09-14 12:23:46 -04:00
Pooya Salehi
72b2bd90e2
Update running snapshot state value to STARTED (#89863)
The get snapshot status API will currently return a value of `STARTED` for the state of a snapshot that is currently running. The documentation says that the `state` value for a running snapshot is `IN_PROGRESS`. This documentation change will align the docs with the actual result of the get snapshot status API.

Co-authored-by: Austin Smith <76973609+asmith-elastic@users.noreply.github.com>
2022-09-08 10:12:44 +02:00
Pooya Salehi
59c1c81262
Fix typo in get-snapshot-status-api doc (#89865) 2022-09-07 15:21:41 +02:00
Seth Michael Larson
fffabae10a
Add pagination parameters to API spec and docs for 'snapshot.get' API 2022-07-20 06:35:52 -05:00
Yannick Welsch
d666ddca1d
Clarify snapshot docs on archive indices (#88417)
Should remove confusion what to do with old archive indices.
2022-07-11 12:03:18 +02:00
David Turner
58703c3a79
Clarify what to do if repo analysis fails (#88267)
The docs for the repo analysis API don't really say how to react on a
failure. This commit adds a note about this case.
2022-07-05 06:45:23 -04:00
Yannick Welsch
46b386be16
Docs for snapshots as simple archives (#86261)
Adds documentation for the new snapshots as archive feature.

Relates #81210
2022-05-30 13:23:53 +02:00
David Turner
c4532504be
Small additions to the register-repo docs (#86122)
1. Adds a note that you can restore older snapshots (to recover from a
failed upgrade) even after newer snapshots were taken.

2. Copies the note about incompatible S3 repo implementations to the top
level to avoid misunderstandings.
2022-05-09 07:37:20 +01:00
Armin Braun
b323e8e1db
Add parameter to exclude indices in a snapshot from response (#86269)
Adds a parameter `index_names` to the get snapshots API so that users may exclude the potentially very long index name lists when listing out snapshots.

closes #82937
2022-04-29 15:04:43 +02:00
David Turner
4ba9ce7a7c
Relax docs about using new repos across major versions (#85740)
Today the docs say that new major versions need new snapshot
repositories or else corruption may occur. This isn't true, we support
using the same repository across upgrades.
2022-04-07 17:28:18 +01:00
Gordon Brown
f85744de12
Re-add content from removed Security-specific snapshot pages (#85084)
This commit adds back some notes which were lost when we consolidated
the snapshot/restore documentation into a single location.

The notes in question are that:
1) If a Snapshot repository contains Security's feature state, then
   that repository contains security-sensitive information. This may
   be obvious to some, but is good to state explicitly.
2) Some files, such as the keystore and TLS keys, are not included in
   snapshots and are important to back up via other means.
2022-03-22 16:44:43 -06:00
David Turner
76b05bfd8e
Note that S3 compat includes performance (#84798)
Today the note in the docs about S3-compatible repositories notes that
the repo must behave correctly, but it's also important that it has the
same performance profile. This commit extends the docs to include this
info.
2022-03-09 12:28:17 +00:00
Gordon Brown
7d094c3e5a
Correct documentation regarding how to restore no feature_states (#83814)
This commit corrects the snapshot creation and restoration docs to
describe the usage of `"none"` to restore no feature states. Previously,
they incorrectly stated that using an empty array would accomplish this,
but specifying an empty array results in the default behavior (rather
than preventing feature state snapshot/restoration).
2022-02-16 20:04:00 -05:00
James Rodewig
e8b34c720d
[DOCS] Re-add HTTP proxy setings from #82737 (#84001)
Re-adds HTTP proxy settings for the GCS repository type. These settings
were added with https://github.com/elastic/elasticsearch/pull/82737.

The docs were accidentally removed as part of
https://github.com/elastic/elasticsearch/pull/82996.
2022-02-15 18:20:22 -05:00
Tobias Stadler
e3deacf547
[DOCS] Fix typos (#83895) 2022-02-15 12:42:17 -05:00
James Rodewig
6522e6eea2
[DOCS] Update multi-target syntax refs (#83703) 2022-02-09 13:00:07 -05:00
James Rodewig
fe2990829a
Update setting deprecation messages to remove major release references (#83528)
Updates our setting deprecation messages to avoid references to future major releases.
2022-02-04 13:53:20 -05:00
Dan Roscigno
302ce75a88
Add note about base_path and ECE to the snapshot repository docs (#83526)
Elastic Cloud Enterprise (ECE) shares snapshot repositories across multiple deployments. As a result, the `base_path` is generated by ECE, and the `base_path` setting is not allowed.  This PR adds a note to the S3, Azure, and GCS snapshot repository docs.
2022-02-04 11:34:48 -05:00
James Rodewig
88be4ed950
[DOCS] Fix get snapshot status API parameters (#81818)
* Documents `GET _snapshot/_status` and `GET _snapshot/<repository>/_status`.
* Notes the `<repository>` and `<snasphot>` parameters are optional.
* Removes erroneous mention of the `<snapshot>` parameter supporting the `_current` value.

Closes #81600

Relates to #80931
2022-02-03 10:55:23 -05:00
Joe Gallo
0935485684
Fix get-snapshot-api :docs:integTest (#83273) 2022-01-28 12:24:01 -05:00
James Rodewig
cb6265f9bd
[DOCS] Move snapshot repo types to separate pages (#82826)
With https://github.com/elastic/elasticsearch/pull/81870, the Azure, GCS, and S3 repository types have separate, dedicated pages in the Elasticsearch guide. For consistency, this PR creates separate pages for the shared file system, read-only URL, and source-only repository types.

Related changes:

- Adds redirects to the plugins docs
- Fixes a few breaking changes that refer to the Azure, GCS, and S3 repositories as plugins.

Co-authored-by: Adam Locke <adam.locke@elastic.co>
2022-01-26 17:13:39 -05:00
David Turner
9633883c64
Add note on truststore for S3-compatible repos (#82669)
Today we note that the `repository-s3` plugin uses the JVM-wide
truststore in the docs for the `protocol` client setting, but it turns
out that this is easy to overlook since most installations will not need
to change the `protocol`. This commit adds the same detail to the
section on S3-compatible repositories where it is more likely to be
found.
2022-01-26 11:16:43 +00:00
James Rodewig
6b841325f1
[DOCS] Fix headings for Azure, GCS, and S3 snapshot repo pages (#82996)
Updates the headings to use sentence case.
2022-01-24 17:14:55 -05:00
James Rodewig
cbeb2c2ce1
[DOCS] Fix typo (#82988) 2022-01-24 15:50:07 -05:00
Artem Prigoda
1ddaf253d5
Add support for HTTP Proxies for the GCS repository (#82737)
* Add support for HTTP Proxies for the GCS repository

The change adds 3 new client properties for the GCS repository:

* gcs.client.default.proxy.type
* gcs.client.default.proxy.host
* gcs.client.default.proxy.port

They allow to configure a [java.net.Proxy](https://docs.oracle.com/en/java/javase/17/docs/api/java.base/java/net/Proxy.html)
for the GCS SDK to use when communicating with the GCS API.

Resolves #82444
2022-01-20 15:46:59 +01:00
Artem Prigoda
e47b7a63f4
[s3-repository] Support IAM roles for Kubernetes service accounts (#81255)
There have been many requests to support repository-s3 authentication via IAM roles in Kubernetes service accounts.

The AWS SDK is supposed to support them out of the box with the aws-java-sdk-sts library. Unfortunately, we can't use WebIdentityTokenCredentialsProvider from the SDK. It reads the token from AWS_WEB_IDENTITY_TOKEN_FILE environment variable which is usually mounted to /var/run/secrets/eks.amazonaws.com/serviceaccount/token and the S3 repository doesn't have the read permission to read it. We don't want to hard-code a file permission for the repository, because the location of AWS_WEB_IDENTITY_TOKEN_FILE can change at any time in the future and we would also generally prefer to restrict the ability of plugins to access things outside of their config directory.

To overcome this limitation, this change adds a custom WebIdentityCredentials provider that reads the service account from a symlink to AWS_WEB_IDENTITY_TOKEN_FILE created in the repository's config directory. We expect the end user to create the symlink to indicate that they want to use service accounts for authentification.

Service accounts are checked and exchanged for session tokens by the AWS STS. To test the authentification flow, this change adds a test fixture which mocks the assume-role-with-web-identity call to the service and returns a response with test credentials.

Fixes #52625
2022-01-19 14:03:11 +01:00
Ievgen Degtiarenko
e7d89910c2
validate snapshot has global state before restoring it (#82037)
It is possible to restore from a snapshot with a global
state even if it does not have one. This pr adds validation
to prevent this from happening.
2022-01-17 15:33:19 +01:00
James Rodewig
59ab3401a2
[DOCS] Swap 7.16 for {prev-major-last} var (#82616) 2022-01-14 09:50:34 -05:00
James Rodewig
631f502206 [DOCS] Use attribute in snapshot index compatibility 2022-01-13 16:16:27 -05:00
James Rodewig
93bd599f6d
[DOCS] Update snapshot vers compat table to use minor versions (#81885)
### Changes

* Updates the snapshot version compatibility table to use minor versions rather than major versions.
* Adds a index creation version and cluster compatibility table. Updates the index compatibility section to use minor versions.
* Moves the tables to separate files. This'll help prevent merge conflicts.
* Fixes the heading level for the "Warnings" section.
2022-01-13 15:50:18 -05:00
James Rodewig
e45bfdbd1b
[DOCS] Reorder "Check SLM history" section (#81328)
Changes:

* Moves the get SLM policy API example _after_ the get SLM stats API. This seems to fit the normal workflow better where a user will drill-down into a particular policy to get more information.
* Notes some more information about what the get SLM policy API returns. In particular, it notes that you can get the error message for the last policy failure.
2022-01-13 09:01:56 -05:00
Rory Hunter
d2dbef5063
Convert repository plugins to modules (#81870)
Closes #81652.

Convert the `repository-azure`, `repository-gcs` and `repository-s3`
plugins into modules, so that they are always included in the
Elasticsearch distribution. Also change plugin installation, removal
and syncing so that attempting to add or remove these plugins still
succeeds but is now a no-op.
2022-01-10 10:45:42 +00:00
David Turner
30bda56f9a
Readonly repos don't cache (#81674)
We say to mark repos as readonly to prevent corruption, but there's
other ways to prevent corruption that people sometimes use instead (e.g.
denying writes at the filesystem/bucket level). It's reasonable to think
that the readonly flag is redundant in that situation but it's not: they
should still mark the repo as readonly tho to bypass the cache and
re-read its contents on each access. This commit adds docs to that
effect.

Co-authored-by: James Rodewig <james.rodewig@elastic.co>
2021-12-13 18:36:26 +00:00
James Rodewig
1519bb6ecb
[DOCS] Update snapshot defaults for system indices (#81226)
Updates the snapshot and restore docs for https://github.com/elastic/elasticsearch/pull/79670.

Closes https://github.com/elastic/elasticsearch/issues/81183
2021-12-08 10:15:14 -05:00
David Turner
9955b49fab
Add explicit warning not to touch repository contents (#81295)
Manipulating the contents of a snapshot repository is a very bad idea,
but it turns out we don't call this out in the docs anywhere. This
commit adds a warning about this.
2021-12-06 13:22:01 +00:00
James Rodewig
4d19702221
[DOCS] Update xrefs for snapshot restore docs (#81023)
Changes:

* Removes a leading slash from the restore snapshot API's prerequisites.
* Updates several xrefs that point to redirected pages.
2021-11-29 11:52:02 -05:00
Adam Locke
247d124666
[DOCS] Update ES quick start for security ON by default (#80735)
* [DOCS] Update ES quick start for security ON by default

* Remove code.asciidoc, which is part of the overall doc build now

* Update node names for cleanup

* Add note with links to tools

* Add --net elastic network

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2021-11-17 17:48:07 -05:00