Commit graph

8370 commits

Author SHA1 Message Date
Jason Tedor
cfad8376f4
Clarify remote_cluster_client role (#70186)
This commit addresses two aspects of the description in the docs of
configuring a local node to be a remote cluster client. First, the
documentation was referring to the legacy setting for configuring a
remote cluster client. Secondly, we clarify that additional features,
not only cross-cluster search, have requirements around the usage of the
remote_cluster_client role.

Co-authored-by: Przemysław Witek <przemyslaw.witek@elastic.co>
Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>
2021-03-11 20:28:26 -05:00
Martijn van Groningen
36044ddb11
Support specifying multiple templates names in delete composable index template api (#70094)
Add support to delete composable index templates api to specify multiple template
names separated by a comma.

Change to cleanup template logic for rest tests to remove all composable index templates via a single delete composable index template request. This to optimize the cleanup logic. After each rest test we delete all templates. So deleting templates this via a single api call (and thus single cluster state update) saves a lot of time considering the number of rest tests.

If this pr is accepted then I will do the same change for the delete component template api.

Relates to #69973
2021-03-11 10:52:28 +01:00
Mayya Sharipova
1de0b616eb
Add positive_score_impact to rank_features type (#69994)
rank_features field type misses positive_score_impact parameter
that rank_feature type has. This adds this parameter.

Closes #68619
2021-03-10 14:55:54 -05:00
James Rodewig
75b0917ca1
[DOCS] Fix EQL heading levels (#70255)
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2021-03-10 14:20:22 -05:00
István Zoltán Szabó
a3fdaceeb1
[DOCS] Expands transforms docs with CCS info (#70156)
Co-authored-by: Lisa Cawley <lcawley@elastic.co>
2021-03-10 15:54:31 +01:00
István Zoltán Szabó
59f6280a7b
[DOCS] Changes deprecated syntax to node.role style in datafeed docs. (#70201) 2021-03-10 15:46:01 +01:00
James Rodewig
2883d37443
[DOCS] Add overview for rollup refactor (#70001) 2021-03-10 08:41:27 -05:00
James Rodewig
8d4ef1e38e
[DOCS] Update ingest pipeline xrefs (#70178) 2021-03-10 08:28:19 -05:00
James Rodewig
468c68f6e7
[DOCS] Remove pipeline param from delete API (#70177) 2021-03-10 08:20:17 -05:00
Yang Wang
4c090aeeb4
Improve user check for resource sharing and its documentation (#69844)
The user check when accessing shared resources is improved to be more accurate. 
Also add documentation about how it works and its limitations.
2021-03-10 21:55:50 +11:00
Ioannis Kakavas
2b48bd789a
Add doc reference for client_auth_method (#70124)
Support for additional Client authentication methods was added in
the OIDC realm in #58708. This change adds the `rp.client_auth_method`
and `rp.client_auth_signature_algorithm` settings in the realm settings 
reference doc.
2021-03-10 12:34:01 +02:00
Ioannis Kakavas
060b3aadd6
Remove references to type parameter for realms (#70011)
Type configuration parameter was removed in 7.0. This change cleans
up some sentences where references to it had remained even after
we removed the parameter itself.
2021-03-10 12:01:20 +02:00
Lisa Cawley
2caba7b11f
[DOCS] Edits machine learning settings (#69947)
Co-authored-by: David Roberts <dave.roberts@elastic.co>
2021-03-09 10:59:12 -08:00
Lee Hinman
67f13bb679
Restrict ILM frozen phase to searchable snapshot actions only (#70158)
This commit changes the frozen phase within ILM in the following ways:

- The `searchable_snapshot` action now no longer takes a `storage` parameter. The storage type is
determined by the phase within which it is invoked (shared cache for frozen and full copy for
everything else).
- The frozen phase in ILM now no longer allows *any* actions other than `searchable_snapshot`
- If a frozen phase is provided, it *must* include a `searchable_snapshot` action.

These changes may seem breaking, but since they are intended to go back to 7.12 which has not been
released yet, they are not truly breaking changes.
2021-03-09 11:24:04 -07:00
James Rodewig
71bb0c7714 [DOCS] Reword ingest description 2021-03-09 13:14:23 -05:00
James Rodewig
d68b140679
[DOCS] Clarify supported rollup fields (#70045) 2021-03-09 12:13:58 -05:00
István Zoltán Szabó
c226958947
[DOCS] Expands anomaly detection alert type docs (#70026)
Co-authored-by: Lisa Cawley <lcawley@elastic.co>
Co-authored-by: Dima Arnautov <arnautov.dima@gmail.com>
2021-03-09 12:02:16 +01:00
Lisa Cawley
c537e5f38c
[DOCS] Edits delete trained model alias API (#70119) 2021-03-08 17:08:58 -08:00
Julie Tibshirani
796284a190
Move flattened field to core. (#68780)
This field mapper only lived in its own module so it could be licensed as x-pack
basic. Now it can be moved to core, which matches its status as a core type.
2021-03-08 16:56:16 -08:00
Julie Tibshirani
da668e134a
Correct cross_fields docs on how analyzer groups are combined. (#69936)
When performing a multi_match in cross_fields mode, we group fields based on
their analyzer and create a blended query per group. Our docs claimed that the
group scores were combined through a boolean query, but they are actually
combined through a dismax that incorporates the tiebreaker parameter.

This commit updates the docs and adds a test verifying the behavior.
2021-03-08 14:56:17 -08:00
James Rodewig
5bf7a0a995 [DOCS] Add fields param xref 2021-03-08 16:40:11 -05:00
Lee Hinman
5df763fc66
Reject creating ILM policies with phase timings are not >= previous phase (#70089)
It can be confusing to configure policies with phase timings that get smaller, because phase timings
are absolute. To make things a little clearer, this commit now rejects policies where a configured
min_age is less than a previous phase's min_age.

This validation is added only to the PutLifecycleAction.Request instead of the
TimeseriesLifecycleType class because we cannot do this validation every time a lifecycle is
created or else we will block cluster state from being recoverable for existing clusters that may
have invalid policies.

Resolves #70032
2021-03-08 12:40:20 -07:00
James Rodewig
53574d2778
[DOCS] Reformat adjacency matrix agg reference (#70034) 2021-03-08 12:33:46 -05:00
James Rodewig
f1e911d13d
[DOCS] Add guidance for mapping unstructured content (#69079) 2021-03-08 12:31:42 -05:00
David Turner
3aa8ded328
Snapshot process details docs improvements (#70012)
- adds a bit more overview on the process, including noting that it
works in terms of files

- notes that the snapshot is a point-in-time view of each shard, and not
necessarily exactly at the start of the snapshot process

- documents the `snapshot.max_concurrent_operations` setting

Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>
2021-03-08 14:42:06 +00:00
James Rodewig
79828761bc
[DOCS] Fix prefix_length data type (#70075) 2021-03-08 09:19:00 -05:00
Mayya Sharipova
aab3f3021a
Remove size of dense_vector (#70024)
Remove not completely correct statement about the size of dense_vectors

We do store a dense_vector as binary doc value  with size `4*dims+4`.
But this is size before compression. As compressed size depends on
data itself, it is better to remove completely any statement
about the size.
2021-03-08 07:49:06 -05:00
Francisco Fernández Castaño
ae5308c638
Add support for range reads and retries to URL repositories (#69521) 2021-03-08 13:14:12 +01:00
Luca Cavanna
ffe61fb097
Move runtime fields stats to server (#69487)
Runtime fields usage is currently reported as part of the xpack feature usage API. Now that runtime fields are part of server, their corresponding stats can be moved to be part of the ordinary mapping stats exposed by the cluster stats API.
2021-03-08 12:38:20 +01:00
István Zoltán Szabó
8a7aced8e8
[DOCS] Adds beta tag to anomaly detection alert docs. (#70013) 2021-03-08 10:46:24 +01:00
Joe Gallo
f93242a5f9
Switch built-in policies to max_primary_shard_size (#69995) 2021-03-04 17:00:45 -05:00
István Zoltán Szabó
2ccc81081f
[DOCS] Adds hyperparameters option to the include setting of GET trained models API. (#69959) 2021-03-04 16:43:06 +01:00
István Zoltán Szabó
300031b247
[DOCS] Removes beta from latest Transform docs. (#69964) 2021-03-04 16:36:47 +01:00
James Rodewig
e432934e82
[DOCS] Document PIT security for aliases (#69572) 2021-03-04 08:42:42 -05:00
Lee Hinman
25c0ad154e
Fix docs/reference/cat.asciidoc to use consistent order (#69938)
This test was sorting by store.size, but these indices could end up with the same store size and
then the sorting would occasionally be wrong for the test.

Resolves #51619
2021-03-03 16:41:16 -07:00
Lisa Cawley
8c0439f803
[DOCS] Add operator privileges to ML settings (#69766) 2021-03-03 08:20:39 -08:00
Christoph Büscher
6011d99b14
[DOCS] Improve tip about updating search_analyzer (#69621)
The tip about updating a `search_analyzer` currently does not mention that most
of the time (when the current analyzer is not "default"), user need to repeat
the currently set "analyzer" parameter in the field definition. Adding this as a
short note.
2021-03-03 16:31:29 +01:00
Nik Everett
fe457f156d
Docs: Call out that you can't update analyzer (#69889)
You can't update the `analyzer` parameter in the PUT mappings API even if
the index is closed. This adds a TIP to call that out. And adds a TIP
for `search_quote_analyzer` which you *can* update.
2021-03-03 10:28:55 -05:00
Joe Gallo
1e8b5fa7c2
Remove the _ml/find-file-structure docs (#69823) 2021-03-03 09:49:28 -05:00
James Rodewig
67288a1e4d [DOCS] Fix gap policy xref 2021-03-03 09:31:02 -05:00
Mike Barretta
d6047a966f
[DOCS] Fix typo (#69838) 2021-03-03 09:16:39 -05:00
James Rodewig
630604bd45
[DOCS] Fix case sensitivity for elision token filter (#69873) 2021-03-03 09:09:05 -05:00
James Rodewig
d6492c6392 [DOCS] Reword terms rollup config 2021-03-02 16:08:51 -05:00
James Rodewig
e21cab640f
[DOCS] Reformat avg bucket agg reference (#69751) 2021-03-02 13:44:43 -05:00
Gordon Brown
ce8a0c0cea
Change Get Snapshottable Features endpoint to _features (#69755)
The endpoint `_snapshottable_features` is long and implies incorrect
things about this API - it is used not just for snapshots, but also for
the upcoming reset API. Following discussions on the team, this commit
changes the endpoint to `_features` and removes the connection between
this API and snapshots, as snapshots are not the only use for the output
of this API.
2021-03-02 11:30:02 -07:00
Nik Everett
ea131e5f5a
Docs: Switch terms agg scripting to runtime fields (#69628)
We expect runtime fields to perform a little better than our "native"
aggregation script so we should point folks to them instead of the
"native" aggregation script.
2021-03-02 11:27:21 -05:00
Andrei Stefan
bf1b7a36b5
SQL: Adapt the limitations page to the new "fields" API usage (#69616)
Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>
2021-03-02 17:19:32 +02:00
Lisa Cawley
4c39136837
[DOCS] Fix link in machine learning nightly maintenance setting (#69760) 2021-03-01 17:14:21 -08:00
James Rodewig
3c70b0e3d0
[DOCS] Add xref for runtime fields (#69738) 2021-03-01 16:14:23 -05:00
Lyudmila Fokina
ee66d6f11f
Support audit ignore policy by actions (#67477)
* Support audit ignore policy by index privileges

Adding new audit ignore policy - privileges
For example, following policy will filter out all events, which actions
minimal required privilege is either "read" or "delete":

xpack.security.audit.logfile.events.ignore_filters:
  example:
    privileges: ["read", "delete"]

Resolve: #60877
Related: #10836
Related: #37148

* Support audit ignore policy by index privileges

Adding new audit ignore policy - privileges
For example, following policy will filter out all events, which actions
required privilege is either "read" or "delete":

xpack.security.audit.logfile.events.ignore_filters:
  example:
    privileges: ["read", "delete"]

Resolve: #60877
Related: #10836
Related: #37148

* To avoid ambiguity (as cluster and index policies may have the same
name) changing implementation to have to separate policies for
`index_privileges` and `cluster_privileges`.
If both are set for the same policy, throw the IllegalArgumentException.

* To avoid ambiguity (as cluster and index policies may have the same
name) changing implementation to have to separate policies for
`index_privileges` and `cluster_privileges`.
If both are set for the same policy, throw the IllegalArgumentException.

* Fixing Api key related privilege check which expects request and
authentication by introducing overloaded
version of findPrivilegesThatGrant
just checking if privileges which can grant the action regardless of the
 request and authentication context.

* Fixing a test; adding a caching mechanism to avoid calling
findPrivilegesThatGrant each
 time.

* Support audit ignore policy by index privileges

Addressing review feedback

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Support audit ignore policy by index privileges

Addressing review comments + changing approach:
- use permission check instead of simple "checkIfGrants"
- adding more testing

* Revert "Support audit ignore policy by index privileges"

This reverts commit 152821e7

* Revert "Support audit ignore policy by index privileges"

This reverts commit 79649e9a

* Revert "Support audit ignore policy by index privileges"

This reverts commit 96d22a42

* Revert "Support audit ignore policy by index privileges"

This reverts commit 67574b2f

* Revert "Support audit ignore policy by index privileges"

This reverts commit 35573c8b

* Revert "Fixing a test; adding a caching mechanism to avoid calling findPrivilegesThatGrant each  time."

This reverts commit 7faa52f3

* Revert "Fixing Api key related privilege check which expects request and authentication by introducing overloaded version of findPrivilegesThatGrant just checking if privileges which can grant the action regardless of the  request and authentication context."

This reverts commit 72b9aefe

* Revert "To avoid ambiguity (as cluster and index policies may have the same name) changing implementation to have to separate policies for `index_privileges` and `cluster_privileges`. If both are set for the same policy, throw the IllegalArgumentException."

This reverts commit 7dd8fe7d

* Revert "To avoid ambiguity (as cluster and index policies may have the same name) changing implementation to have to separate policies for `index_privileges` and `cluster_privileges`. If both are set for the same policy, throw the IllegalArgumentException."

This reverts commit cb5bc09c

* Revert "Support audit ignore policy by index privileges"

This reverts commit a918da10

* Support audit ignore policy by actions

Getting back to action filtering

* Support audit ignore policy by actions

Cleaning up some tests

* Support audit ignore policy by actions

Cleaning up some tests

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2021-03-01 18:44:57 +01:00