remote-clusters-settings.asciidoc 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. [[remote-clusters-settings]]
  2. === Remote cluster settings
  3. The following settings apply to both <<sniff-mode,sniff mode>> and
  4. <<proxy-mode,proxy mode>>. Settings that are specific to sniff mode and proxy
  5. mode are described separately.
  6. `cluster.remote.<cluster_alias>.mode`::
  7. The mode used for a remote cluster connection. The only supported modes are
  8. `sniff` and `proxy`.
  9. `cluster.remote.initial_connect_timeout`::
  10. The time to wait for remote connections to be established when the node
  11. starts. The default is `30s`.
  12. `remote_cluster_client` <<node-roles,role>>::
  13. By default, any node in the cluster can act as a cross-cluster client and
  14. connect to remote clusters. To prevent a node from connecting to remote
  15. clusters, specify the <<node-roles,node.roles>> setting in `elasticsearch.yml`
  16. and exclude `remote_cluster_client` from the listed roles. Search requests
  17. targeting remote clusters must be sent to a node that is allowed to act as a
  18. cross-cluster client. Other features such as {ml} <<general-ml-settings,data
  19. feeds>>, <<general-transform-settings,transforms>>, and
  20. <<ccr-getting-started-tutorial,{ccr}>> require the `remote_cluster_client` role.
  21. `cluster.remote.<cluster_alias>.skip_unavailable`::
  22. Per cluster boolean setting that allows to skip specific clusters when no
  23. nodes belonging to them are available and they are the target of a remote
  24. cluster request.
  25. IMPORTANT: In Elasticsearch 8.15, the default value for `skip_unavailable` was
  26. changed from `false` to `true`. Before Elasticsearch 8.15, if you want a cluster
  27. to be treated as optional for a {ccs}, then you need to set that configuration.
  28. From Elasticsearch 8.15 forward, you need to set the configuration in order to
  29. make a cluster required for the {ccs}. Once you upgrade the local ("querying")
  30. cluster search coordinator node (the node you send CCS requests to) to 8.15 or later,
  31. any remote clusters that do not have an explicit setting for `skip_unavailable` will
  32. immediately change over to using the new default of true. This is true regardless of
  33. whether you have upgraded the remote clusters to 8.15, as the `skip_unavailable`
  34. search behavior is entirely determined by the setting on the local cluster where
  35. you configure the remotes.
  36. `cluster.remote.<cluster_alias>.transport.ping_schedule`::
  37. Sets the time interval between regular application-level ping messages that
  38. are sent to try and keep remote cluster connections alive. If set to `-1`,
  39. application-level ping messages to this remote cluster are not sent. If
  40. unset, application-level ping messages are sent according to the global
  41. `transport.ping_schedule` setting, which defaults to `-1` meaning that pings
  42. are not sent. It is preferable to correctly configure TCP keep-alives instead
  43. of configuring a `ping_schedule`, because TCP keep-alives are handled by the
  44. operating system and not by {es}. By default {es} enables TCP keep-alives on
  45. remote cluster connections. Remote cluster connections are transport
  46. connections so the `transport.tcp.*` <<transport-settings,advanced settings>>
  47. regarding TCP keep-alives apply to them.
  48. `cluster.remote.<cluster_alias>.transport.compress`::
  49. Per-cluster setting that enables you to configure compression for requests to
  50. a specific remote cluster. The handling cluster will automatically compress
  51. responses to compressed requests. The setting options are `true`,
  52. `indexing_data`, and `false`. If unset, defaults to the behaviour specified
  53. by the node-wide `transport.compress` setting. See the
  54. <<transport-settings-compress,documentation for the `transport.compress`
  55. setting>> for further information.
  56. `cluster.remote.<cluster_alias>.transport.compression_scheme`::
  57. Per-cluster setting that enables you to configure the compression scheme for
  58. requests to a specific cluster if those requests are selected to be
  59. compressed by to the `cluster.remote.<cluster_alias>.transport.compress`
  60. setting. The handling cluster will automatically use the same compression
  61. scheme for responses as for the corresponding requests. The setting options
  62. are `deflate` and `lz4`. If unset, defaults to the behaviour specified by the
  63. node-wide `transport.compression_scheme` setting. See the
  64. <<transport-settings-compression-scheme,documentation for the
  65. `transport.compression_scheme` setting>> for further information.
  66. [[remote-cluster-credentials-setting]]
  67. `cluster.remote.<cluster_alias>.credentials`::
  68. (<<secure-settings,Secure>>, <<reloadable-secure-settings,Reloadable>>)
  69. Per-cluster setting for configuring <<remote-clusters-api-key,remote clusters
  70. with the API Key based model>>. This setting takes the encoded value of a
  71. <<security-api-create-cross-cluster-api-key,cross-cluster API key>> and must
  72. be set in the <<secure-settings,{es} keystore>> on each node in the cluster.
  73. The presence (or not) of this setting determines which model a remote cluster
  74. uses. If present, the remote cluster uses the API key based model. Otherwise,
  75. it uses the certificate based model. If the setting is added, removed, or
  76. updated in the <<secure-settings,{es} keystore>> and reloaded via the
  77. <<cluster-nodes-reload-secure-settings>> API, the cluster will automatically
  78. rebuild its connection to the remote.
  79. [[remote-cluster-sniff-settings]]
  80. ==== Sniff mode remote cluster settings
  81. `cluster.remote.<cluster_alias>.seeds`::
  82. The list of seed nodes used to sniff the remote cluster state.
  83. `cluster.remote.<cluster_alias>.node_connections`::
  84. The number of gateway nodes to connect to for this remote cluster. The default
  85. is `3`.
  86. [[cluster-remote-node-attr]]
  87. `cluster.remote.node.attr`::
  88. A node attribute to filter out nodes that are eligible as a gateway node in
  89. the remote cluster. For instance a node can have a node attribute
  90. `node.attr.gateway: true` such that only nodes with this attribute will be
  91. connected to if `cluster.remote.node.attr` is set to `gateway`.
  92. [[remote-cluster-proxy-settings]]
  93. ==== Proxy mode remote cluster settings
  94. `cluster.remote.<cluster_alias>.proxy_address`::
  95. The address used for all remote connections.
  96. `cluster.remote.<cluster_alias>.proxy_socket_connections`::
  97. The number of socket connections to open per remote cluster. The default is
  98. `18`.
  99. [role="xpack"]
  100. `cluster.remote.<cluster_alias>.server_name`::
  101. An optional hostname string which is sent in the `server_name` field of
  102. the TLS Server Name Indication extension if
  103. <<encrypt-internode-communication,TLS is enabled>>. The TLS transport will fail to open
  104. remote connections if this field is not a valid hostname as defined by the
  105. TLS SNI specification.