| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421 | [role="xpack"][[monitoring-settings]]=== Monitoring settings in {es}++++<titleabbrev>Monitoring settings</titleabbrev>++++// tag::monitoring-deprecation-notice[]deprecated[7.16, "Using the {es} Monitoring plugin to collect and ship monitoring data is deprecated. {metricbeat} is the recommended method for collecting and shipping monitoring data to a monitoring cluster. If you previously configured legacy collection methods, you should migrate to using {metricbeat} collection methods. Refer to <<configuring-metricbeat,Collecting {es} monitoring data with {metricbeat}>>."]// end::monitoring-deprecation-notice[]By default, {es} {monitor-features} are enabled but data collection is disabled.To enable data collection, use the `xpack.monitoring.collection.enabled` setting.Except where noted otherwise, these settings can be dynamically updated on alive cluster with the <<cluster-update-settings,cluster-update-settings>> API.To adjust how monitoring data is displayed in the monitoring UI, configure{kibana-ref}/monitoring-settings-kb.html[`xpack.monitoring` settings] in`kibana.yml`. To control how monitoring data is collected from {ls},configure monitoring settings in `logstash.yml`.For more information, see <<monitor-elasticsearch-cluster>>.[discrete][[general-monitoring-settings]]==== General monitoring settings`xpack.monitoring.enabled`::deprecated:[7.8.0,Basic License features should always be enabled](<<static-cluster-setting,Static>>) This deprecated setting has no effect.[discrete][[monitoring-collection-settings]]==== Monitoring collection settings[[monitoring-settings-description]]// tag::monitoring-settings-description-tag[]The `xpack.monitoring.collection` settings control how data is collected fromyour {es} nodes.// end::monitoring-settings-description-tag[]`xpack.monitoring.collection.enabled`::(<<cluster-update-settings,Dynamic>>)  deprecated:[7.16.0]  Set to `true` to enable the collection ofmonitoring data. When this setting is `false` (default), {es} monitoring data isnot collected and all monitoring data from other sources such as {kib}, Beats,and {ls} is ignored.[[xpack-monitoring-collection-interval]]// tag::monitoring-collection-interval-tag[]`xpack.monitoring.collection.interval` {ess-icon}::deprecated:[6.3.0,"Use `xpack.monitoring.collection.enabled` set to `false` instead."] (<<cluster-update-settings,Dynamic>>) Setting to `-1` to disable data collectionis no longer supported beginning with 7.0.0.+Controls how often data samples are collected. Defaults to `10s`. If youmodify the collection interval, set the `xpack.monitoring.min_interval_seconds`option in `kibana.yml` to the same value.// end::monitoring-collection-interval-tag[]`xpack.monitoring.elasticsearch.collection.enabled`::(<<cluster-update-settings,Dynamic>>)  deprecated:[7.16.0] Controls whether statistics about your{es} cluster should be collected. Defaults to `true`. This is different from `xpack.monitoring.collection.enabled`, which allows you to enable or disable allmonitoring collection. However, this setting simply disables the collection of{es} data while still allowing other data (e.g., {kib}, {ls}, Beats, or APMServer monitoring data) to pass through this cluster.`xpack.monitoring.collection.cluster.stats.timeout`::(<<cluster-update-settings,Dynamic>>)  deprecated:[7.16.0] Timeout for collecting the clusterstatistics, in <<time-units,time units>>. Defaults to `10s`.`xpack.monitoring.collection.node.stats.timeout`::(<<cluster-update-settings,Dynamic>>)  deprecated:[7.16.0] Timeout for collecting the node statistics,in <<time-units,time units>>. Defaults to `10s`.`xpack.monitoring.collection.indices`::(<<cluster-update-settings,Dynamic>>)  deprecated:[7.16.0] Controls which indices the{monitor-features} collect data from. Defaults to all indices. Specify the indexnames as a comma-separated list, for example `test1,test2,test3`. Names caninclude wildcards, for example `test*`. You can explicitly exclude indices byprepending `-`. For example `test*,-test3` will monitor all indexes that startwith `test` except for `test3`. System indices like .security* or .kibana*always start with a `.` and generally should be monitored. Consider adding `.*`to the list of indices ensure monitoring of system indices. For example:`.*,test*,-test3``xpack.monitoring.collection.index.stats.timeout`::(<<cluster-update-settings,Dynamic>>)  deprecated:[7.16.0] Timeout for collecting index statistics,in <<time-units,time units>>. Defaults to `10s`.`xpack.monitoring.collection.index.recovery.active_only`::(<<cluster-update-settings,Dynamic>>)  deprecated:[7.16.0] Controls whether or not all recoveries arecollected. Set to `true` to collect only active recoveries. Defaults to `false`.`xpack.monitoring.collection.index.recovery.timeout`::(<<cluster-update-settings,Dynamic>>)  deprecated:[7.16.0] Timeout for collecting the recoveryinformation, in <<time-units,time units>>. Defaults to `10s`.[[xpack-monitoring-history-duration]]// tag::monitoring-history-duration-tag[]`xpack.monitoring.history.duration` {ess-icon}::(<<cluster-update-settings,Dynamic>>)  deprecated:[7.16.0] Retention duration beyond which theindices created by a monitoring exporter are automatically deleted, in<<time-units,time units>>. Defaults to `7d` (7 days).+--This setting has a minimum value of `1d` (1 day) to ensure that something isbeing monitored and it cannot be disabled.IMPORTANT: This setting currently impacts only `local`-type exporters. Indicescreated using the `http` exporter are not deleted automatically.--// end::monitoring-history-duration-tag[]`xpack.monitoring.exporters`::(<<static-cluster-setting,Static>>) Configures where the agent stores monitoringdata. By default, the agent uses a local exporter that indexes monitoring dataon the cluster where it is installed. Use an HTTP exporter to send data to aseparate monitoring cluster. For more information, see<<local-exporter-settings,Local exporter settings>>,<<http-exporter-settings,HTTP exporter settings>>, and <<how-monitoring-works>>.[discrete][[local-exporter-settings]]==== Local exporter settingsThe `local` exporter is the default exporter used by {monitor-features}. As thename is meant to imply, it exports data to the _local_ cluster, which means thatthere is not much needed to be configured.If you do not supply _any_ exporters, then the {monitor-features} automaticallycreate one for you. If any exporter is provided, then no default is added.[source,yaml]----------------------------------xpack.monitoring.exporters.my_local:  type: local----------------------------------`type`:: deprecated:[7.16.0] The value for a Local exporter must always be `local` and it is required.`use_ingest`::Whether to supply a placeholder pipeline to the cluster and a pipeline processorwith every bulk request. The default value is `true`. If disabled, then it meansthat it will not use pipelines, which means that a future release cannotautomatically upgrade bulk requests to future-proof them.`cluster_alerts.management.enabled`:: deprecated:[7.16.0] Whether to create cluster alerts for this cluster. The default value is `true`.To use this feature, {watcher} must be enabled. If you have a basic license,cluster alerts are not displayed.`wait_master.timeout`:: deprecated:[7.16.0] Time to wait for the master node to setup `local` exporter for monitoring, in<<time-units,time units>>. After that wait period, the non-master nodes warn theuser for possible missing configuration. Defaults to `30s`.[discrete][[http-exporter-settings]]==== HTTP exporter settingsThe following lists settings that can be supplied with the `http` exporter.All settings are shown as what follows the name you select for your exporter:[source,yaml]----------------------------------xpack.monitoring.exporters.my_remote:  type: http  host: ["host:port", ...]----------------------------------`type`:: deprecated:[7.16.0] The value for an HTTP exporter must always be `http` and it is required.`host`:: deprecated:[7.16.0] Host supports multiple formats, both as an array or as a single value. Supportedformats include `hostname`, `hostname:port`,`http://hostname` `http://hostname:port`, `https://hostname`, and`https://hostname:port`. Hosts cannot be assumed. The default scheme is always`http` and the default port is always `9200` if not supplied as part of the`host` string.+[source,yaml]----------------------------------xpack.monitoring.exporters:  example1:    type: http    host: "10.1.2.3"  example2:    type: http    host: ["http://10.1.2.4"]  example3:    type: http    host: ["10.1.2.5", "10.1.2.6"]  example4:    type: http    host: ["https://10.1.2.3:9200"]----------------------------------`auth.username`:: deprecated:[7.16.0] The username is required if `auth.secure_password` is supplied.`auth.secure_password`::(<<secure-settings,Secure>>, <<reloadable-secure-settings,reloadable>>)  deprecated:[7.16.0] Thepassword for the `auth.username`.`connection.timeout`:: deprecated:[7.16.0] Amount of time that the HTTP connection is supposed to wait for a socket to openfor the request, in <<time-units,time units>>. The default value is `6s`.`connection.read_timeout`:: deprecated:[7.16.0] Amount of time that the HTTP connection is supposed to wait for a socket tosend back a response, in <<time-units,time units>>. The default value is`10 * connection.timeout` (`60s` if neither are set).`ssl`:: deprecated:[7.16.0] Each HTTP exporter can define its own TLS / SSL settings or inherit them. See<<ssl-monitoring-settings>>.`proxy.base_path`:: deprecated:[7.16.0] The base path to prefix any outgoing request, such as `/base/path` (e.g., bulkrequests would then be sent as `/base/path/_bulk`). There is no default value.`headers`:: deprecated:[7.16.0] Optional headers that are added to every request, which can assist with routingrequests through proxies.+[source,yaml]----------------------------------xpack.monitoring.exporters.my_remote:  headers:    X-My-Array: [abc, def, xyz]    X-My-Header: abc123----------------------------------+Array-based headers are sent `n` times where `n` is the size of the array.`Content-Type` and `Content-Length` cannot be set. Any headers created by themonitoring agent will override anything defined here.`index.name.time_format`:: deprecated:[7.16.0] A mechanism for changing the default date suffix for daily monitoring indices.The default format is `yyyy.MM.dd`. For example, `.monitoring-es-7-2021.08.26`.`use_ingest`::Whether to supply a placeholder pipeline to the monitoring cluster and apipeline processor with every bulk request. The default value is `true`. Ifdisabled, then it means that it will not use pipelines, which means that afuture release cannot automatically upgrade bulk requests to future-proof them.`cluster_alerts.management.enabled`:: deprecated:[7.16.0] Whether to create cluster alerts for this cluster. The default value is `true`.To use this feature, {watcher} must be enabled. If you have a basic license,cluster alerts are not displayed.`cluster_alerts.management.blacklist`:: deprecated:[7.16.0] Prevents the creation of specific cluster alerts. It also removes any applicablewatches that already exist in the current cluster.+--You can add any of the following watch identifiers to the list of blocked alerts:* `elasticsearch_cluster_status`* `elasticsearch_version_mismatch`* `elasticsearch_nodes`* `kibana_version_mismatch`* `logstash_version_mismatch`* `xpack_license_expiration`For example: `["elasticsearch_version_mismatch","xpack_license_expiration"]`.--[[ssl-monitoring-settings]]:ssl-prefix:             xpack.monitoring.exporters.$NAME:component:              {monitoring}:verifies::server!::ssl-context:            monitoring==== {component} TLS/SSL settingsYou can configure the following TLS/SSL settings.+{ssl-prefix}.ssl.supported_protocols+::(<<static-cluster-setting,Static>>)  deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-supported-protocols]ifdef::verifies[]+{ssl-prefix}.ssl.verification_mode+::(<<static-cluster-setting,Static>>)  deprecated:[7.16.0] Controls the verification of certificates.include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-verification-mode-values]endif::verifies[]+{ssl-prefix}.ssl.cipher_suites+::(<<static-cluster-setting,Static>>)  deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-cipher-suites-values][#{ssl-context}-tls-ssl-key-trusted-certificate-settings]===== {component} TLS/SSL key and trusted certificate settingsThe following settings are used to specify a private key, certificate, and thetrusted certificates that should be used when communicating over an SSL/TLS connection.ifndef::server[]A private key and certificate are optional and would be used if the server requires client authentication for PKIauthentication.endif::server[]===== PEM encoded filesWhen using PEM encoded files, use the following settings:+{ssl-prefix}.ssl.key+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0]include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-key-pem]+{ssl-prefix}.ssl.key_passphrase+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-key-passphrase]+{ssl-prefix}.ssl.secure_key_passphrase+::(<<secure-settings,Secure>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-secure-key-passphrase]+{ssl-prefix}.ssl.certificate+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-certificate]+{ssl-prefix}.ssl.certificate_authorities+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-certificate-authorities]===== Java keystore filesWhen using Java keystore files (JKS), which contain the private key, certificateand certificates that should be trusted, use the following settings:+{ssl-prefix}.ssl.keystore.path+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-path]+{ssl-prefix}.ssl.keystore.password+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-password]+{ssl-prefix}.ssl.keystore.secure_password+::(<<secure-settings,Secure>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-secure-password]+{ssl-prefix}.ssl.keystore.key_password+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-key-password]+{ssl-prefix}.ssl.keystore.secure_key_password+::(<<secure-settings,Secure>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-secure-key-password]+{ssl-prefix}.ssl.truststore.path+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-truststore-path]+{ssl-prefix}.ssl.truststore.password+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-truststore-password]+{ssl-prefix}.ssl.truststore.secure_password+::(<<secure-settings,Secure>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-truststore-secure-password][#{ssl-context}-pkcs12-files]===== PKCS#12 files{es} can be configured to use PKCS#12 container files (`.p12` or `.pfx` files)that contain the private key, certificate and certificates that should be trusted.PKCS#12 files are configured in the same way as Java keystore files:+{ssl-prefix}.ssl.keystore.path+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-path]+{ssl-prefix}.ssl.keystore.type+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-type-pkcs12]+{ssl-prefix}.ssl.keystore.password+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-password]+{ssl-prefix}.ssl.keystore.secure_password+::(<<secure-settings,Secure>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-secure-password]+{ssl-prefix}.ssl.keystore.key_password+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-key-password]+{ssl-prefix}.ssl.keystore.secure_key_password+::(<<secure-settings,Secure>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-keystore-secure-key-password]+{ssl-prefix}.ssl.truststore.path+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-truststore-path]+{ssl-prefix}.ssl.truststore.type+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] Set this to `PKCS12` to indicate that the truststore is a PKCS#12 file.//TBD:Should this use the ssl-truststore-type definition and default values?+{ssl-prefix}.ssl.truststore.password+::(<<static-cluster-setting,Static>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-truststore-password]+{ssl-prefix}.ssl.truststore.secure_password+::(<<secure-settings,Secure>>) deprecated:[7.16.0] include::{es-repo-dir}/settings/common-defs.asciidoc[tag=ssl-truststore-secure-password]
 |