cluster-node-setting-changes.asciidoc 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900
  1. [discrete]
  2. [[breaking_80_cluster_node_setting_changes]]
  3. ==== Cluster and node setting changes
  4. //NOTE: The notable-breaking-changes tagged regions are re-used in the
  5. //Installation and Upgrade Guide
  6. //tag::notable-breaking-changes[]
  7. TIP: {ess-setting-change}
  8. .`action.destructive_requires_name` now defaults to `false`. {ess-icon}
  9. [%collapsible]
  10. ====
  11. *Details* +
  12. The default for the `action.destructive_requires_name` setting changes from `false`
  13. to `true` in {es} 8.0.0.
  14. Previously, defaulting to `false` allowed users to use wildcard
  15. patterns to delete, close, or change index blocks on indices.
  16. To prevent the accidental deletion of indices that happen to match a
  17. wildcard pattern, we now default to requiring that destructive
  18. operations explicitly name the indices to be modified.
  19. *Impact* +
  20. To use wildcard patterns for destructive actions, set
  21. `action.destructive_requires_name` to `false` using the
  22. {ref}/cluster-update-settings.html[] cluster settings API].
  23. ====
  24. .You can no longer set `xpack.searchable.snapshot.shared_cache.size` on non-frozen nodes.
  25. [%collapsible]
  26. ====
  27. *Details* +
  28. You can no longer set
  29. {ref}/searchable-snapshots.html#searchable-snapshots-shared-cache[`xpack.searchable.snapshot.shared_cache.size`]
  30. on a node that doesn't have the `data_frozen` node role. This setting reserves
  31. disk space for the shared cache of partially mounted indices. {es} only
  32. allocates partially mounted indices to nodes with the `data_frozen` role.
  33. *Impact* +
  34. Remove `xpack.searchable.snapshot.shared_cache.size` from `elasticsearch.yml`
  35. for nodes that don't have the `data_frozen` role. Specifying the setting on a
  36. non-frozen node will result in an error on startup.
  37. ====
  38. [[max_clause_count_change]]
  39. .The `indices.query.bool.max_clause_count` setting now limits all query clauses.
  40. [%collapsible]
  41. ====
  42. *Details* +
  43. Previously, the `indices.query.bool.max_clause_count` would apply to the number
  44. of clauses of a single `bool` query. It now applies to the total number of
  45. clauses of the rewritten query. To reduce chances of breaks, its
  46. default value has been bumped from 1024 to 4096.
  47. *Impact* +
  48. Queries with many clauses should be avoided whenever possible.
  49. If you previously bumped this setting to accommodate heavy queries,
  50. you might need to increase it further.
  51. ====
  52. [[ilm-poll-interval-limit]]
  53. .`indices.lifecycle.poll_interval` must be greater than `1s`.
  54. [%collapsible]
  55. ====
  56. *Details* +
  57. Setting `indices.lifecycle.poll_interval` too low can cause
  58. excessive load on a cluster. The poll interval must now be at least `1s` (one second).
  59. *Impact* +
  60. Set `indices.lifecycle.poll_interval` setting to `1s` or
  61. greater in `elasticsearch.yml` or through the
  62. {ref}/cluster-update-settings.html[cluster update settings API].
  63. Setting `indices.lifecycle.poll_interval` to less than `1s` in
  64. `elasticsearch.yml` will result in an error on startup.
  65. {ref}/cluster-update-settings.html[Cluster update settings API] requests that
  66. set `indices.lifecycle.poll_interval` to less than `1s` will return an error.
  67. ====
  68. .The file and native realms are now enabled unless explicitly disabled.
  69. [%collapsible]
  70. ====
  71. *Details* +
  72. The file and native realms are now enabled unless explicitly disabled. If
  73. explicitly disabled, the file and native realms remain disabled at all times.
  74. Previously, the file and native realms had the following implicit behaviors:
  75. * If the file and native realms were not configured, they were implicitly disabled
  76. if any other realm was configured.
  77. * If no other realm was available because realms were either not configured,
  78. not permitted by license, or explicitly disabled, the file and native realms
  79. were enabled, even if explicitly disabled.
  80. *Impact* +
  81. To explicitly disable the file or native realm, set the respective
  82. `file.<realm-name>.enabled` or `native.<realm-name>.enabled` setting to `false`
  83. under the `xpack.security.authc.realms` namespace in `elasticsearch.yml`.
  84. The following configuration example disables the native realm and the file realm.
  85. [source,yaml]
  86. ----
  87. xpack.security.authc.realms:
  88. native.realm1.enabled: false
  89. file.realm2.enabled: false
  90. ...
  91. ----
  92. ====
  93. .The realm `order` setting is now required.
  94. [%collapsible]
  95. ====
  96. *Details* +
  97. The `xpack.security.authc.realms.{type}.{name}.order` setting is now required and must be
  98. specified for each explicitly configured realm. Each value must be unique.
  99. *Impact* +
  100. The cluster will fail to start if the requirements are not met.
  101. For example, the following configuration is invalid:
  102. [source,yaml]
  103. --------------------------------------------------
  104. xpack.security.authc.realms.kerberos.kerb1:
  105. keytab.path: es.keytab
  106. remove_realm_name: false
  107. --------------------------------------------------
  108. And must be configured as:
  109. [source,yaml]
  110. --------------------------------------------------
  111. xpack.security.authc.realms.kerberos.kerb1:
  112. order: 0
  113. keytab.path: es.keytab
  114. remove_realm_name: false
  115. --------------------------------------------------
  116. ====
  117. [[breaking_80_allocation_change_include_relocations_removed]]
  118. .`cluster.routing.allocation.disk.include_relocations` has been removed.
  119. [%collapsible]
  120. ====
  121. *Details* +
  122. {es} now always accounts for the sizes of relocating shards when making
  123. allocation decisions based on the disk usage of the nodes in the cluster. In
  124. earlier versions, you could disable this by setting `cluster.routing.allocation.disk.include_relocations` to `false`.
  125. That could result in poor allocation decisions that could overshoot watermarks and require significant
  126. extra work to correct. The `cluster.routing.allocation.disk.include_relocations` setting has been removed.
  127. *Impact* +
  128. Remove the `cluster.routing.allocation.disk.include_relocations`
  129. setting. Specifying this setting in `elasticsearch.yml` will result in an error
  130. on startup.
  131. ====
  132. .cluster.join.timeout` has been removed.
  133. [%collapsible]
  134. ====
  135. *Details* +
  136. The `cluster.join.timeout` setting has been removed. Join attempts no longer
  137. time out.
  138. *Impact* +
  139. Remove `cluster.join.timeout` from `elasticsearch.yml`.
  140. ====
  141. .`discovery.zen` settings have been removed.
  142. [%collapsible]
  143. ====
  144. *Details* +
  145. All settings under the `discovery.zen` namespace are no longer supported. They existed only only for BWC reasons in 7.x. This includes:
  146. - `discovery.zen.minimum_master_nodes`
  147. - `discovery.zen.no_master_block`
  148. - `discovery.zen.hosts_provider`
  149. - `discovery.zen.publish_timeout`
  150. - `discovery.zen.commit_timeout`
  151. - `discovery.zen.publish_diff.enable`
  152. - `discovery.zen.ping.unicast.concurrent_connects`
  153. - `discovery.zen.ping.unicast.hosts.resolve_timeout`
  154. - `discovery.zen.ping.unicast.hosts`
  155. - `discovery.zen.ping_timeout`
  156. - `discovery.zen.unsafe_rolling_upgrades_enabled`
  157. - `discovery.zen.fd.connect_on_network_disconnect`
  158. - `discovery.zen.fd.ping_interval`
  159. - `discovery.zen.fd.ping_timeout`
  160. - `discovery.zen.fd.ping_retries`
  161. - `discovery.zen.fd.register_connection_listener`
  162. - `discovery.zen.join_retry_attempts`
  163. - `discovery.zen.join_retry_delay`
  164. - `discovery.zen.join_timeout`
  165. - `discovery.zen.max_pings_from_another_master`
  166. - `discovery.zen.send_leave_request`
  167. - `discovery.zen.master_election.wait_for_joins_timeout`
  168. - `discovery.zen.master_election.ignore_non_master_pings`
  169. - `discovery.zen.publish.max_pending_cluster_states`
  170. - `discovery.zen.bwc_ping_timeout`
  171. *Impact* +
  172. Remove the `discovery.zen` settings from `elasticsearch.yml`. Specifying these settings will result in an error on startup.
  173. ====
  174. .`http.content_type.required` has been removed.
  175. [%collapsible]
  176. ====
  177. *Details* +
  178. The `http.content_type.required` setting was deprecated in Elasticsearch 6.0
  179. and has been removed in Elasticsearch 8.0. The setting was introduced in
  180. Elasticsearch 5.3 to prepare users for Elasticsearch 6.0, where content type
  181. auto detection was removed for HTTP requests.
  182. *Impact* +
  183. Remove the `http.content_type.required` setting from `elasticsearch.yml`. Specifying this setting will result in an error on startup.
  184. ====
  185. .`http.tcp_no_delay` has been removed.
  186. [%collapsible]
  187. ====
  188. *Details* +
  189. The `http.tcp_no_delay` setting was deprecated in 7.x and has been removed in 8.0. Use`http.tcp.no_delay` instead.
  190. *Impact* +
  191. Replace the `http.tcp_no_delay` setting with `http.tcp.no_delay`.
  192. Specifying `http.tcp_no_delay` in `elasticsearch.yml` will
  193. result in an error on startup.
  194. ====
  195. .`network.tcp.connect_timeout` has been removed.
  196. [%collapsible]
  197. ====
  198. *Details* +
  199. The `network.tcp.connect_timeout` setting was deprecated in 7.x and has been removed in 8.0. This setting
  200. was a fallback setting for `transport.connect_timeout`.
  201. *Impact* +
  202. Remove the`network.tcp.connect_timeout` setting.
  203. Use the `transport.connect_timeout` setting to change the default connection
  204. timeout for client connections. Specifying
  205. `network.tcp.connect_timeout` in `elasticsearch.yml` will result in an
  206. error on startup.
  207. ====
  208. .`node.max_local_storage_nodes` has been removed.
  209. [%collapsible]
  210. ====
  211. *Details* +
  212. The `node.max_local_storage_nodes` setting was deprecated in 7.x and
  213. has been removed in 8.0. Nodes should be run on separate data paths
  214. to ensure that each node is consistently assigned to the same data path.
  215. *Impact* +
  216. Remove the `node.max_local_storage_nodes` setting. Specifying this
  217. setting in `elasticsearch.yml` will result in an error on startup.
  218. ====
  219. [[accept-default-password-removed]]
  220. .The `accept_default_password` setting has been removed.
  221. [%collapsible]
  222. ====
  223. *Details* +
  224. The `xpack.security.authc.accept_default_password` setting has not had any affect
  225. since the 6.0 release of {es} and is no longer allowed.
  226. *Impact* +
  227. Remove the `xpack.security.authc.accept_default_password` setting from `elasticsearch.yml`.
  228. Specifying this setting will result in an error on startup.
  229. ====
  230. [[roles-index-cache-removed]]
  231. .The `roles.index.cache.*` settings have been removed.
  232. [%collapsible]
  233. ====
  234. *Details* +
  235. The `xpack.security.authz.store.roles.index.cache.max_size` and
  236. `xpack.security.authz.store.roles.index.cache.ttl` settings have
  237. been removed. These settings have been redundant and deprecated
  238. since the 5.2 release of {es}.
  239. *Impact* +
  240. Remove the `xpack.security.authz.store.roles.index.cache.max_size`
  241. and `xpack.security.authz.store.roles.index.cache.ttl` settings from `elasticsearch.yml` .
  242. Specifying these settings will result in an error on startup.
  243. ====
  244. [[separating-node-and-client-traffic]]
  245. .The `transport.profiles.*.xpack.security.type` setting has been removed.
  246. [%collapsible]
  247. ====
  248. *Details* +
  249. The `transport.profiles.*.xpack.security.type` setting is no longer supported.
  250. The Transport Client has been removed and all client traffic now uses
  251. the HTTP transport. Transport profiles using this setting should be removed.
  252. *Impact* +
  253. Remove the `transport.profiles.*.xpack.security.type` setting from `elasticsearch.yml`.
  254. Specifying this setting in a transport profile will result in an error on startup.
  255. ====
  256. [discrete]
  257. [[saml-realm-nameid-changes]]
  258. .The `nameid_format` SAML realm setting no longer has a default value.
  259. [%collapsible]
  260. ====
  261. *Details* +
  262. In SAML, Identity Providers (IdPs) can either be explicitly configured to
  263. release a `NameID` with a specific format, or configured to attempt to conform
  264. with the requirements of a Service Provider (SP). The SP declares its
  265. requirements in the `NameIDPolicy` element of a SAML Authentication Request.
  266. In {es}, the `nameid_format` SAML realm setting controls the `NameIDPolicy`
  267. value.
  268. Previously, the default value for `nameid_format` was
  269. `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`. This setting created
  270. authentication requests that required the IdP to release `NameID` with a
  271. `transient` format.
  272. The default value has been removed, which means that {es} will create SAML Authentication Requests by default that don't put this requirement on the
  273. IdP. If you want to retain the previous behavior, set `nameid_format` to
  274. `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
  275. *Impact* +
  276. If you currently don't configure `nameid_format` explicitly, it's possible
  277. that your IdP will reject authentication requests from {es} because the requests
  278. do not specify a `NameID` format (and your IdP is configured to expect one).
  279. This mismatch can result in a broken SAML configuration. If you're unsure whether
  280. your IdP is explicitly configured to use a certain `NameID` format and you want to retain current behavior
  281. , try setting `nameid_format` to `urn:oasis:names:tc:SAML:2.0:nameid-format:transient` explicitly.
  282. ====
  283. .The `xpack.security.transport.ssl.enabled` setting is now required to configure `xpack.security.transport.ssl` settings.
  284. [%collapsible]
  285. ====
  286. *Details* +
  287. It is now an error to configure any SSL settings for
  288. `xpack.security.transport.ssl` without also configuring
  289. `xpack.security.transport.ssl.enabled`.
  290. *Impact* +
  291. If using other `xpack.security.transport.ssl` settings, you must explicitly
  292. specify the `xpack.security.transport.ssl.enabled` setting.
  293. If you do not want to enable SSL and are currently using other
  294. `xpack.security.transport.ssl` settings, do one of the following:
  295. * Explicitly specify `xpack.security.transport.ssl.enabled` as `false`
  296. * Discontinue use of other `xpack.security.transport.ssl` settings
  297. If you want to enable SSL, follow the instructions in
  298. {ref}/configuring-tls.html#tls-transport[Encrypting communications between nodes
  299. in a cluster]. As part of this configuration, explicitly specify
  300. `xpack.security.transport.ssl.enabled` as `true`.
  301. For example, the following configuration is invalid:
  302. [source,yaml]
  303. --------------------------------------------------
  304. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  305. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  306. --------------------------------------------------
  307. And must be configured as:
  308. [source,yaml]
  309. --------------------------------------------------
  310. xpack.security.transport.ssl.enabled: true <1>
  311. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  312. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  313. --------------------------------------------------
  314. <1> or `false`.
  315. ====
  316. .The `xpack.security.http.ssl.enabled` setting is now required to configure `xpack.security.http.ssl` settings.
  317. [%collapsible]
  318. ====
  319. *Details* +
  320. It is now an error to configure any SSL settings for
  321. `xpack.security.http.ssl` without also configuring
  322. `xpack.security.http.ssl.enabled`.
  323. *Impact* +
  324. If using other `xpack.security.http.ssl` settings, you must explicitly
  325. specify the `xpack.security.http.ssl.enabled` setting.
  326. If you do not want to enable SSL and are currently using other
  327. `xpack.security.http.ssl` settings, do one of the following:
  328. * Explicitly specify `xpack.security.http.ssl.enabled` as `false`
  329. * Discontinue use of other `xpack.security.http.ssl` settings
  330. If you want to enable SSL, follow the instructions in
  331. {ref}/configuring-tls.html#tls-http[Encrypting HTTP client communications]. As part
  332. of this configuration, explicitly specify `xpack.security.http.ssl.enabled`
  333. as `true`.
  334. For example, the following configuration is invalid:
  335. [source,yaml]
  336. --------------------------------------------------
  337. xpack.security.http.ssl.certificate: elasticsearch.crt
  338. xpack.security.http.ssl.key: elasticsearch.key
  339. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  340. --------------------------------------------------
  341. And must be configured as either:
  342. [source,yaml]
  343. --------------------------------------------------
  344. xpack.security.http.ssl.enabled: true <1>
  345. xpack.security.http.ssl.certificate: elasticsearch.crt
  346. xpack.security.http.ssl.key: elasticsearch.key
  347. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  348. --------------------------------------------------
  349. <1> or `false`.
  350. ====
  351. .A `xpack.security.transport.ssl` certificate and key are now required to enable SSL for the transport interface.
  352. [%collapsible]
  353. ====
  354. *Details* +
  355. It is now an error to enable SSL for the transport interface without also configuring
  356. a certificate and key through use of the `xpack.security.transport.ssl.keystore.path`
  357. setting or the `xpack.security.transport.ssl.certificate` and
  358. `xpack.security.transport.ssl.key` settings.
  359. *Impact* +
  360. If `xpack.security.transport.ssl.enabled` is set to `true`, provide a
  361. certificate and key using the `xpack.security.transport.ssl.keystore.path`
  362. setting or the `xpack.security.transport.ssl.certificate` and
  363. `xpack.security.transport.ssl.key` settings. If a certificate and key is not
  364. provided, {es} will return in an error on startup.
  365. ====
  366. .A `xpack.security.http.ssl` certificate and key are now required to enable SSL for the HTTP server.
  367. [%collapsible]
  368. ====
  369. *Details* +
  370. It is now an error to enable SSL for the HTTP (Rest) server without also configuring
  371. a certificate and key through use of the `xpack.security.http.ssl.keystore.path`
  372. setting or the `xpack.security.http.ssl.certificate` and
  373. `xpack.security.http.ssl.key` settings.
  374. *Impact* +
  375. If `xpack.security.http.ssl.enabled` is set to `true`, provide a certificate and
  376. key using the `xpack.security.http.ssl.keystore.path` setting or the
  377. `xpack.security.http.ssl.certificate` and `xpack.security.http.ssl.key`
  378. settings. If certificate and key is not provided, {es} will return in an error
  379. on startup.
  380. ====
  381. .PKCS#11 keystores and trustores cannot be configured in `elasticsearch.yml`
  382. [%collapsible]
  383. ====
  384. *Details* +
  385. The settings `*.ssl.keystore.type` and `*.ssl.truststore.type` no longer accept "PKCS11" as a valid type.
  386. This applies to all SSL settings in Elasticsearch, including
  387. - `xpack.security.http.keystore.type`
  388. - `xpack.security.transport.keystore.type`
  389. - `xpack.security.http.truststore.type`
  390. - `xpack.security.transport.truststore.type`
  391. As well as SSL settings for security realms, watcher and monitoring.
  392. Use of a PKCS#11 keystore or truststore as the JRE's default store is not affected.
  393. *Impact* +
  394. If you have a PKCS#11 keystore configured within your `elasticsearch.yml` file, you must remove that
  395. configuration and switch to a supported keystore type, or configure your PKCS#11 keystore as the
  396. JRE default store.
  397. ====
  398. .The `kibana` user has been replaced by `kibana_system`.
  399. [%collapsible]
  400. ====
  401. *Details* +
  402. The `kibana` user was historically used to authenticate {kib} to {es}.
  403. The name of this user was confusing, and was often mistakenly used to login to {kib}.
  404. This has been renamed to `kibana_system` in order to reduce confusion, and to better
  405. align with other built-in system accounts.
  406. *Impact* +
  407. Replace any use of the `kibana` user with the `kibana_system` user. Specifying
  408. the `kibana` user in `kibana.yml` will result in an error on startup.
  409. If your `kibana.yml` used to contain:
  410. [source,yaml]
  411. --------------------------------------------------
  412. elasticsearch.username: kibana
  413. --------------------------------------------------
  414. then you should update to use the new `kibana_system` user instead:
  415. [source,yaml]
  416. --------------------------------------------------
  417. elasticsearch.username: kibana_system
  418. --------------------------------------------------
  419. IMPORTANT: The new `kibana_system` user does not preserve the previous `kibana`
  420. user password. You must explicitly set a password for the `kibana_system` user.
  421. ====
  422. [[search-remote-settings-removed]]
  423. .The `search.remote.*` settings have been removed.
  424. [%collapsible]
  425. ====
  426. *Details* +
  427. In 6.5 these settings were deprecated in favor of `cluster.remote`. In 7.x we
  428. provided automatic upgrading of these settings to their `cluster.remote`
  429. counterparts. In 8.0.0, these settings have been removed. Elasticsearch will
  430. refuse to start if you have these settings in your configuration or cluster
  431. state.
  432. *Impact* +
  433. Use the replacement `cluster.remote` settings. Discontinue use of the
  434. `search.remote.*` settings. Specifying these settings in `elasticsearch.yml`
  435. will result in an error on startup.
  436. ====
  437. [[remove-pidfile]]
  438. .The `pidfile` setting has been replaced by `node.pidfile`.
  439. [%collapsible]
  440. ====
  441. *Details* +
  442. To ensure that all settings are in a proper namespace, the `pidfile` setting was
  443. previously deprecated in version 7.4.0 of Elasticsearch, and is removed in
  444. version 8.0.0. Instead, use `node.pidfile`.
  445. *Impact* +
  446. Use the `node.pidfile` setting. Discontinue use of the `pidfile` setting.
  447. Specifying the `pidfile` setting in `elasticsearch.yml` will result in an error
  448. on startup.
  449. ====
  450. [[remove-processors]]
  451. .The `processors` setting has been replaced by `node.processors`.
  452. [%collapsible]
  453. ====
  454. *Details* +
  455. To ensure that all settings are in a proper namespace, the `processors` setting
  456. was previously deprecated in version 7.4.0 of Elasticsearch, and is removed in
  457. version 8.0.0. Instead, use `node.processors`.
  458. *Impact* +
  459. Use the `node.processors` setting. Discontinue use of the `processors` setting.
  460. Specifying the `processors` setting in `elasticsearch.yml` will result in an
  461. error on startup.
  462. ====
  463. .The `node.processors` setting can no longer exceed the available number of processors.
  464. [%collapsible]
  465. ====
  466. *Details* +
  467. Previously it was possible to set the number of processors used to set the
  468. default sizes for the thread pools to be more than the number of available
  469. processors. As this leads to more context switches and more threads but without
  470. an increase in the number of physical CPUs on which to schedule these additional
  471. threads, the `node.processors` setting is now bounded by the number of available
  472. processors.
  473. *Impact* +
  474. If specified, ensure the value of `node.processors` setting does not exceed the
  475. number of available processors. Setting the `node.processors` value greater than
  476. the number of available processors in `elasticsearch.yml` will result in an
  477. error on startup.
  478. ====
  479. .The `cluster.remote.connect` setting has been removed.
  480. [%collapsible]
  481. ====
  482. *Details* +
  483. In Elasticsearch 7.7.0, the setting `cluster.remote.connect` was deprecated in
  484. favor of setting `node.remote_cluster_client`. In Elasticsearch 8.0.0, the
  485. setting `cluster.remote.connect` is removed.
  486. *Impact* +
  487. Use the `node.remote_cluster_client` setting. Discontinue use of the
  488. `cluster.remote.connect` setting. Specifying the `cluster.remote.connect`
  489. setting in `elasticsearch.yml` will result in an error on startup.
  490. ====
  491. .The `node.local_storage` setting has been removed.
  492. [%collapsible]
  493. ====
  494. *Details* +
  495. In Elasticsearch 7.8.0, the setting `node.local_storage` was deprecated and
  496. beginning in Elasticsearch 8.0.0 all nodes will require local storage. Therefore,
  497. the `node.local_storage` setting has been removed.
  498. *Impact* +
  499. Discontinue use of the `node.local_storage` setting. Specifying this setting in
  500. `elasticsearch.yml` will result in an error on startup.
  501. ====
  502. .The `auth.password` setting for HTTP monitoring has been removed.
  503. [%collapsible]
  504. ====
  505. *Details* +
  506. In Elasticsearch 7.7.0, the setting `xpack.monitoring.exporters.<exporterName>.auth.password`
  507. was deprecated in favor of setting `xpack.monitoring.exporters.<exporterName>.auth.secure_password`.
  508. In Elasticsearch 8.0.0, the setting `xpack.monitoring.exporters.<exporterName>.auth.password` is
  509. removed.
  510. *Impact* +
  511. Use the `xpack.monitoring.exporters.<exporterName>.auth.secure_password`
  512. setting. Discontinue use of the
  513. `xpack.monitoring.exporters.<exporterName>.auth.password` setting. Specifying
  514. the `xpack.monitoring.exporters.<exporterName>.auth.password` setting in
  515. `elasticsearch.yml` will result in an error on startup.
  516. ====
  517. .Settings used to disable basic license features have been removed.
  518. [%collapsible]
  519. ====
  520. *Details* +
  521. The following settings were deprecated in {es} 7.8.0 and have been removed
  522. in {es} 8.0.0:
  523. * `xpack.enrich.enabled`
  524. * `xpack.flattened.enabled`
  525. * `xpack.ilm.enabled`
  526. * `xpack.monitoring.enabled`
  527. * `xpack.rollup.enabled`
  528. * `xpack.slm.enabled`
  529. * `xpack.sql.enabled`
  530. * `xpack.transform.enabled`
  531. * `xpack.vectors.enabled`
  532. These basic license features are now always enabled.
  533. If you have disabled ILM so that you can use another tool to manage Watcher
  534. indices, the newly introduced `xpack.watcher.use_ilm_index_management` setting
  535. may be set to false.
  536. *Impact* +
  537. Discontinue use of the removed settings. Specifying these settings in
  538. `elasticsearch.yml` will result in an error on startup.
  539. ====
  540. .Settings used to defer cluster recovery pending a certain number of master nodes have been removed.
  541. [%collapsible]
  542. ====
  543. *Details* +
  544. The following cluster settings have been removed:
  545. * `gateway.expected_nodes`
  546. * `gateway.expected_master_nodes`
  547. * `gateway.recover_after_nodes`
  548. * `gateway.recover_after_master_nodes`
  549. It is safe to recover the cluster as soon as a majority of master-eligible
  550. nodes have joined so there is no benefit in waiting for any additional
  551. master-eligible nodes to start.
  552. *Impact* +
  553. Discontinue use of the removed settings. If needed, use
  554. `gateway.expected_data_nodes` or `gateway.recover_after_data_nodes` to defer
  555. cluster recovery pending a certain number of data nodes.
  556. ====
  557. .Legacy role settings have been removed.
  558. [%collapsible]
  559. ====
  560. *Details* +
  561. The legacy role settings:
  562. * `node.data`
  563. * `node.ingest`
  564. * `node.master`
  565. * `node.ml`
  566. * `node.remote_cluster_client`
  567. * `node.transform`
  568. * `node.voting_only`
  569. have been removed. Instead, use the `node.roles` setting. If you were previously
  570. using the legacy role settings on a 7.13 or later cluster, you will have a
  571. deprecation log message on each of your nodes indicating the exact replacement
  572. value for `node.roles`.
  573. *Impact* +
  574. Discontinue use of the removed settings. Specifying these settings in
  575. `elasticsearch.yml` will result in an error on startup.
  576. ====
  577. [[system-call-filter-setting]]
  578. .The system call filter setting has been removed.
  579. [%collapsible]
  580. ====
  581. *Details* +
  582. Elasticsearch uses system call filters to remove its ability to fork another
  583. process. This is useful to mitigate remote code exploits. These system call
  584. filters are enabled by default, and were previously controlled via the setting
  585. `bootstrap.system_call_filter`. Starting in Elasticsearch 8.0, system call
  586. filters will be required. As such, the setting `bootstrap.system_call_filter`
  587. was deprecated in Elasticsearch 7.13.0, and is removed as of Elasticsearch
  588. 8.0.0.
  589. *Impact* +
  590. Discontinue use of the removed setting. Specifying this setting in Elasticsearch
  591. configuration will result in an error on startup.
  592. ====
  593. [[tier-filter-setting]]
  594. .Tier filtering settings have been removed.
  595. [%collapsible]
  596. ====
  597. *Details* +
  598. The cluster and index level settings ending in `._tier` used for filtering the allocation of a shard
  599. to a particular set of nodes have been removed. Instead, the
  600. {ref}/data-tier-shard-filtering.html#tier-preference-allocation-filter[tier
  601. preference setting], `index.routing.allocation.include._tier_preference` should
  602. be used. The removed settings are:
  603. Cluster level settings:
  604. - `cluster.routing.allocation.include._tier`
  605. - `cluster.routing.allocation.exclude._tier`
  606. - `cluster.routing.allocation.require._tier`
  607. Index settings:
  608. - `index.routing.allocation.include._tier`
  609. - `index.routing.allocation.exclude._tier`
  610. - `index.routing.allocation.require._tier`
  611. *Impact* +
  612. Discontinue use of the removed settings. Specifying any of these cluster settings in Elasticsearch
  613. configuration will result in an error on startup. Any indices using these settings will have the
  614. settings archived (and they will have no effect) when the index metadata is loaded.
  615. ====
  616. [[shared-data-path-setting]]
  617. .Shared data path and per index data path settings are deprecated.
  618. [%collapsible]
  619. ====
  620. *Details* +
  621. Elasticsearch uses the shared data path as the base path of per index data
  622. paths. This feature was previously used with shared replicas. Starting in
  623. 7.13.0, these settings are deprecated. Starting in 8.0 only existing
  624. indices created in 7.x will be capable of using the shared data path and
  625. per index data path settings.
  626. *Impact* +
  627. Discontinue use of the deprecated settings.
  628. ====
  629. [[single-data-node-watermark-setting]]
  630. .The single data node watermark setting is deprecated and now only accepts `true`.
  631. [%collapsible]
  632. ====
  633. *Details* +
  634. In 7.14, setting `cluster.routing.allocation.disk.watermark.enable_for_single_data_node`
  635. to false was deprecated. Starting in 8.0, the only legal value will be
  636. true. In a future release, the setting will be removed completely, with same
  637. behavior as if the setting was `true`.
  638. If the old behavior is desired for a single data node cluster, disk based
  639. allocation can be disabled by setting
  640. `cluster.routing.allocation.disk.threshold_enabled: false`
  641. *Impact* +
  642. Discontinue use of the deprecated setting.
  643. ====
  644. [[auto-import-dangling-indices-removed]]
  645. .The `gateway.auto_import_dangling_indices` setting has been removed.
  646. [%collapsible]
  647. ====
  648. *Details* +
  649. The `gateway.auto_import_dangling_indices` cluster setting has been removed.
  650. Previously, you could use this setting to automatically import
  651. {ref}/modules-gateway.html#dangling-indices[dangling indices]. However,
  652. automatically importing dangling indices is unsafe. Use the
  653. {ref}/indices.html#dangling-indices-api[dangling indices APIs] to manage and
  654. import dangling indices instead.
  655. *Impact* +
  656. Discontinue use of the removed setting. Specifying the setting in
  657. `elasticsearch.yml` will result in an error on startup.
  658. ====
  659. .The `listener` thread pool has been removed.
  660. [%collapsible]
  661. ====
  662. *Details* +
  663. Previously, the transport client used the thread pool to ensure listeners aren't
  664. called back on network threads. The transport client has been removed
  665. in 8.0, and the thread pool is no longer needed.
  666. *Impact* +
  667. Remove `listener` thread pool settings from `elasticsearch.yml` for any nodes.
  668. Specifying `listener` thread pool settings in `elasticsearch.yml` will result in
  669. an error on startup.
  670. ====
  671. .The `fixed_auto_queue_size` thread pool type has been removed.
  672. [%collapsible]
  673. ====
  674. *Details* +
  675. The `fixed_auto_queue_size` thread pool type, previously marked as an
  676. experimental feature, was deprecated in 7.x and has been removed in 8.0.
  677. The `search` and `search_throttled` thread pools have the `fixed` type now.
  678. *Impact* +
  679. No action needed.
  680. ====
  681. .Several `transport` settings have been replaced.
  682. [%collapsible]
  683. ====
  684. *Details* +
  685. The following settings have been deprecated in 7.x and removed in 8.0. Each setting has a replacement
  686. setting that was introduced in 6.7.
  687. - `transport.tcp.port` replaced by `transport.port`
  688. - `transport.tcp.compress` replaced by `transport.compress`
  689. - `transport.tcp.connect_timeout` replaced by `transport.connect_timeout`
  690. - `transport.tcp_no_delay` replaced by `transport.tcp.no_delay`
  691. - `transport.profiles.profile_name.tcp_no_delay` replaced by `transport.profiles.profile_name.tcp.no_delay`
  692. - `transport.profiles.profile_name.tcp_keep_alive` replaced by `transport.profiles.profile_name.tcp.keep_alive`
  693. - `transport.profiles.profile_name.reuse_address` replaced by `transport.profiles.profile_name.tcp.reuse_address`
  694. - `transport.profiles.profile_name.send_buffer_size` replaced by `transport.profiles.profile_name.tcp.send_buffer_size`
  695. - `transport.profiles.profile_name.receive_buffer_size` replaced by `transport.profiles.profile_name.tcp.receive_buffer_size`
  696. *Impact* +
  697. Use the replacement settings. Discontinue use of the removed settings.
  698. Specifying the removed settings in `elasticsearch.yml` will result in an error
  699. on startup.
  700. ====
  701. .Selective transport compression has been enabled by default.
  702. [%collapsible]
  703. ====
  704. *Details* +
  705. Prior to 8.0, transport compression was disabled by default. Starting in 8.0,
  706. `transport.compress` defaults to `indexing_data`. This configuration means that
  707. the propagation of raw indexing data will be compressed between nodes.
  708. *Impact* +
  709. Inter-node transit will get reduced along the indexing path. In some scenarios,
  710. CPU usage could increase.
  711. ====
  712. .Transport compression defaults to lz4.
  713. [%collapsible]
  714. ====
  715. *Details* +
  716. Prior to 8.0, the `transport.compression_scheme` setting defaulted to `deflate`. Starting in
  717. 8.0, `transport.compress_scheme` defaults to `lz4`.
  718. Prior to 8.0, the `cluster.remote.<cluster_alias>.transport.compression_scheme`
  719. setting defaulted to `deflate` when `cluster.remote.<cluster_alias>.transport.compress`
  720. was explicitly configured. Starting in 8.0,
  721. `cluster.remote.<cluster_alias>.transport.compression_scheme` will fallback to
  722. `transport.compression_scheme` by default.
  723. *Impact* +
  724. This configuration means that transport compression will produce somewhat lower
  725. compression ratios in exchange for lower CPU load.
  726. ====
  727. .The `repositories.fs.compress` node-level setting has been removed.
  728. [%collapsible]
  729. ====
  730. *Details* +
  731. For shared file system repositories (`"type": "fs"`), the node level setting `repositories.fs.compress` could
  732. previously be used to enable compression for all shared file system repositories where `compress` was not specified.
  733. The `repositories.fs.compress` setting has been removed.
  734. *Impact* +
  735. Use the repository specific `compress` setting to enable compression. See
  736. {ref}/snapshots-register-repository.html[Register a snapshot repository] for
  737. information on the `compress` setting.
  738. Discontinue use of the `repositories.fs.compress` node-level setting.
  739. ====
  740. //end::notable-breaking-changes[]
  741. // This change is not notable because it should not have any impact on upgrades
  742. // However we document it here out of an abundance of caution
  743. [[fips-default-hash-changed]]
  744. .When FIPS mode is enabled the default password hash is now PBKDF2_STRETCH
  745. [%collapsible]
  746. ====
  747. *Details* +
  748. If `xpack.security.fips_mode.enabled` is true (see <<fips-140-compliance>>),
  749. the value of `xpack.security.authc.password_hashing.algorithm` now defaults to
  750. `pbkdf2_stretch`.
  751. In earlier versions this setting would always default to `bcrypt` and a runtime
  752. check would prevent a node from starting unless the value was explicitly set to
  753. a "pbkdf2" variant.
  754. There is no change for clusters that do not enable FIPS 140 mode.
  755. *Impact* +
  756. This change should not have any impact on upgraded nodes.
  757. Any node with an explicitly configured value for the password hashing algorithm
  758. will continue to use that configured value.
  759. Any node that did not have an explicitly configured password hashing algorithm in
  760. {es} 6.x or {es} 7.x would have failed to start.
  761. ====