浏览代码

Update docs to reflect new validation in reload_secure_settings api (#103550)

Johannes Fredén 1 年之前
父节点
当前提交
52eba9c8ca
共有 1 个文件被更改,包括 11 次插入11 次删除
  1. 11 11
      docs/reference/setup/secure-settings.asciidoc

+ 11 - 11
docs/reference/setup/secure-settings.asciidoc

@@ -6,11 +6,11 @@ their values is not sufficient. For this use case, {es} provides a
 keystore and the <<elasticsearch-keystore,`elasticsearch-keystore` tool>> to
 manage the settings in the keystore.
 
-IMPORTANT: Only some settings are designed to be read from the keystore. However,
-the keystore has no validation to block unsupported settings. Adding unsupported
-settings to the keystore causes {es} to fail to start. To see whether a setting
-is supported in the keystore, look for a "Secure" qualifier in the setting
-reference.
+IMPORTANT: Only some settings are designed to be read from the keystore.
+Adding unsupported settings to the keystore causes the validation in the
+`_nodes/reload_secure_settings` API to fail and if not addressed, will
+cause {es} to fail to start. To see whether a setting is supported in the
+keystore, look for a "Secure" qualifier in the setting reference.
 
 All the modifications to the keystore take effect only after restarting {es}.
 
@@ -42,12 +42,12 @@ POST _nodes/reload_secure_settings
 
 <1> The password that the {es} keystore is encrypted with.
 
-This API decrypts and re-reads the entire keystore, on every cluster node,
-but only the *reloadable* secure settings are applied. Changes to other
-settings do not go into effect until the next restart. Once the call returns,
-the reload has been completed, meaning that all internal data structures
-dependent on these settings have been changed. Everything should look as if the
-settings had the new value from the start.
+This API decrypts, re-reads the entire keystore and validates all settings on
+every cluster node, but only the *reloadable* secure settings are applied.
+Changes to other settings do not go into effect until the next restart. Once
+the call returns, the reload has been completed, meaning that all internal data
+structures dependent on these settings have been changed. Everything should
+look as if the settings had the new value from the start.
 
 When changing multiple *reloadable* secure settings, modify all of them on each
 cluster node, then issue a <<cluster-nodes-reload-secure-settings, `reload_secure_settings`>>