_cluster-node-setting-changes.asciidoc 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880
  1. [discrete]
  2. [[breaking_80_cluster_node_setting_changes]]
  3. ==== Cluster and node setting changes
  4. //NOTE: The notable-breaking-changes tagged regions are re-used in the
  5. //Installation and Upgrade Guide
  6. //tag::notable-breaking-changes[]
  7. TIP: {ess-setting-change}
  8. .You can no longer set `xpack.searchable.snapshot.shared_cache.size` on non-frozen nodes. {ess-icon}
  9. [%collapsible]
  10. ====
  11. *Details* +
  12. Setting `xpack.searchable.snapshot.shared_cache.size` on a node
  13. that does not have the `data_frozen` role was deprecated in {es} 7.12.0 and has
  14. been removed in {es} 8.0.0.
  15. *Impact* +
  16. {es} only allocates partially mounted indices to nodes with the `data_frozen`
  17. role. Remove the `xpack.searchable.snapshot.shared_cache.size` setting from nodes that don't have the `data_frozen` role.
  18. ====
  19. .`action.destructive_requires_name` now defaults to `false`. {ess-icon}
  20. [%collapsible]
  21. ====
  22. *Details* +
  23. The default for the `action.destructive_requires_name` setting changes from `false`
  24. to `true` in {es} 8.0.0.
  25. Previously, defaulting to `false` allowed users to use wildcard
  26. patterns to delete, close, or change index blocks on indices.
  27. To prevent the accidental deletion of indices that happen to match a
  28. wildcard pattern, we now default to requiring that destructive
  29. operations explicitly name the indices to be modified.
  30. *Impact* +
  31. To use wildcard patterns for destructive actions, set
  32. `action.destructive_requires_name` to `false` using the
  33. {ref}/cluster-update-settings.html[] cluster settings API].
  34. ====
  35. [[max_clause_count_change]]
  36. .The `indices.query.bool.max_clause_count` setting now limits all query clauses.
  37. [%collapsible]
  38. ====
  39. *Details* +
  40. Previously, the `indices.query.bool.max_clause_count` would apply to the number
  41. of clauses of a single `bool` query. It now applies to the total number of
  42. clauses of the rewritten query. To reduce chances of breaks, its
  43. default value has been bumped from 1024 to 4096.
  44. *Impact* +
  45. Queries with many clauses should be avoided whenever possible.
  46. If you previously bumped this setting to accommodate heavy queries,
  47. you might need to increase it further.
  48. ====
  49. [[ilm-poll-interval-limit]]
  50. .`indices.lifecycle.poll_interval` must be greater than `1s`.
  51. [%collapsible]
  52. ====
  53. *Details* +
  54. Setting `indices.lifecycle.poll_interval` too low can cause
  55. excessive load on a cluster. The poll interval must now be at least `1s` (one second).
  56. *Impact* +
  57. Set `indices.lifecycle.poll_interval` setting to `1s` or
  58. greater in `elasticsearch.yml` or through the
  59. {ref}/cluster-update-settings.html[cluster update settings API].
  60. Setting `indices.lifecycle.poll_interval` to less than `1s` in
  61. `elasticsearch.yml` will result in an error on startup.
  62. {ref}/cluster-update-settings.html[Cluster update settings API] requests that
  63. set `indices.lifecycle.poll_interval` to less than `1s` will return an error.
  64. ====
  65. .The file and native realms are now enabled unless explicitly disabled.
  66. [%collapsible]
  67. ====
  68. *Details* +
  69. The file and native realms are now enabled unless explicitly disabled. If
  70. explicitly disabled, the file and native realms remain disabled at all times.
  71. Previously, the file and native realms had the following implicit behaviors:
  72. * If the file and native realms were not configured, they were implicitly disabled
  73. if any other realm was configured.
  74. * If no other realm was available because realms were either not configured,
  75. not permitted by license, or explicitly disabled, the file and native realms
  76. were enabled, even if explicitly disabled.
  77. *Impact* +
  78. To explicitly disable the file or native realm, set the respective
  79. `file.<realm-name>.enabled` or `native.<realm-name>.enabled` setting to `false`
  80. under the `xpack.security.authc.realms` namespace in `elasticsearch.yml`.
  81. The following configuration example disables the native realm and the file realm.
  82. [source,yaml]
  83. ----
  84. xpack.security.authc.realms:
  85. native.realm1.enabled: false
  86. file.realm2.enabled: false
  87. ...
  88. ----
  89. ====
  90. .The realm `order` setting is now required.
  91. [%collapsible]
  92. ====
  93. *Details* +
  94. The `xpack.security.authc.realms.{type}.{name}.order` setting is now required and must be
  95. specified for each explicitly configured realm. Each value must be unique.
  96. *Impact* +
  97. The cluster will fail to start if the requirements are not met.
  98. For example, the following configuration is invalid:
  99. [source,yaml]
  100. --------------------------------------------------
  101. xpack.security.authc.realms.kerberos.kerb1:
  102. keytab.path: es.keytab
  103. remove_realm_name: false
  104. --------------------------------------------------
  105. And must be configured as:
  106. [source,yaml]
  107. --------------------------------------------------
  108. xpack.security.authc.realms.kerberos.kerb1:
  109. order: 0
  110. keytab.path: es.keytab
  111. remove_realm_name: false
  112. --------------------------------------------------
  113. ====
  114. [[breaking_80_allocation_change_include_relocations_removed]]
  115. .`cluster.routing.allocation.disk.include_relocations` has been removed.
  116. [%collapsible]
  117. ====
  118. *Details* +
  119. {es} now always accounts for the sizes of relocating shards when making
  120. allocation decisions based on the disk usage of the nodes in the cluster. In
  121. earlier versions, you could disable this by setting `cluster.routing.allocation.disk.include_relocations` to `false`.
  122. That could result in poor allocation decisions that could overshoot watermarks and require significant
  123. extra work to correct. The `cluster.routing.allocation.disk.include_relocations` setting has been removed.
  124. *Impact* +
  125. Remove the `cluster.routing.allocation.disk.include_relocations`
  126. setting. Specifying this setting in `elasticsearch.yml` will result in an error
  127. on startup.
  128. ====
  129. .cluster.join.timeout` has been removed.
  130. [%collapsible]
  131. ====
  132. *Details* +
  133. The `cluster.join.timeout` setting has been removed. Join attempts no longer
  134. time out.
  135. *Impact* +
  136. Remove `cluster.join.timeout` from `elasticsearch.yml`.
  137. ====
  138. .`discovery.zen` settings have been removed.
  139. [%collapsible]
  140. ====
  141. *Details* +
  142. All settings under the `discovery.zen` namespace are no longer supported. They existed only only for BWC reasons in 7.x. This includes:
  143. - `discovery.zen.minimum_master_nodes`
  144. - `discovery.zen.no_master_block`
  145. - `discovery.zen.hosts_provider`
  146. - `discovery.zen.publish_timeout`
  147. - `discovery.zen.commit_timeout`
  148. - `discovery.zen.publish_diff.enable`
  149. - `discovery.zen.ping.unicast.concurrent_connects`
  150. - `discovery.zen.ping.unicast.hosts.resolve_timeout`
  151. - `discovery.zen.ping.unicast.hosts`
  152. - `discovery.zen.ping_timeout`
  153. - `discovery.zen.unsafe_rolling_upgrades_enabled`
  154. - `discovery.zen.fd.connect_on_network_disconnect`
  155. - `discovery.zen.fd.ping_interval`
  156. - `discovery.zen.fd.ping_timeout`
  157. - `discovery.zen.fd.ping_retries`
  158. - `discovery.zen.fd.register_connection_listener`
  159. - `discovery.zen.join_retry_attempts`
  160. - `discovery.zen.join_retry_delay`
  161. - `discovery.zen.join_timeout`
  162. - `discovery.zen.max_pings_from_another_master`
  163. - `discovery.zen.send_leave_request`
  164. - `discovery.zen.master_election.wait_for_joins_timeout`
  165. - `discovery.zen.master_election.ignore_non_master_pings`
  166. - `discovery.zen.publish.max_pending_cluster_states`
  167. *Impact* +
  168. Remove the `discovery.zen` settings from `elasticsearch.yml`. Specifying these settings will result in an error on startup.
  169. ====
  170. .`http.content_type.required` has been removed.
  171. [%collapsible]
  172. ====
  173. *Details* +
  174. The `http.content_type.required` setting was deprecated in Elasticsearch 6.0
  175. and has been removed in Elasticsearch 8.0. The setting was introduced in
  176. Elasticsearch 5.3 to prepare users for Elasticsearch 6.0, where content type
  177. auto detection was removed for HTTP requests.
  178. *Impact* +
  179. Remove the `http.content_type.required` setting from `elasticsearch.yml`. Specifying this setting will result in an error on startup.
  180. ====
  181. .`http.tcp_no_delay` has been removed.
  182. [%collapsible]
  183. ====
  184. *Details* +
  185. The `http.tcp_no_delay` setting was deprecated in 7.x and has been removed in 8.0. Use`http.tcp.no_delay` instead.
  186. *Impact* +
  187. Replace the `http.tcp_no_delay` setting with `http.tcp.no_delay`.
  188. Specifying `http.tcp_no_delay` in `elasticsearch.yml` will
  189. result in an error on startup.
  190. ====
  191. .`network.tcp.connect_timeout` has been removed.
  192. [%collapsible]
  193. ====
  194. *Details* +
  195. The `network.tcp.connect_timeout` setting was deprecated in 7.x and has been removed in 8.0. This setting
  196. was a fallback setting for `transport.connect_timeout`.
  197. *Impact* +
  198. Remove the`network.tcp.connect_timeout` setting.
  199. Use the `transport.connect_timeout` setting to change the default connection
  200. timeout for client connections. Specifying
  201. `network.tcp.connect_timeout` in `elasticsearch.yml` will result in an
  202. error on startup.
  203. ====
  204. .`node.max_local_storage_nodes` has been removed.
  205. [%collapsible]
  206. ====
  207. *Details* +
  208. The `node.max_local_storage_nodes` setting was deprecated in 7.x and
  209. has been removed in 8.0. Nodes should be run on separate data paths
  210. to ensure that each node is consistently assigned to the same data path.
  211. *Impact* +
  212. Remove the `node.max_local_storage_nodes` setting. Specifying this
  213. setting in `elasticsearch.yml` will result in an error on startup.
  214. ====
  215. [[accept-default-password-removed]]
  216. .The `accept_default_password` setting has been removed.
  217. [%collapsible]
  218. ====
  219. *Details* +
  220. The `xpack.security.authc.accept_default_password` setting has not had any affect
  221. since the 6.0 release of {es} and is no longer allowed.
  222. *Impact* +
  223. Remove the `xpack.security.authc.accept_default_password` setting from `elasticsearch.yml`.
  224. Specifying this setting will result in an error on startup.
  225. ====
  226. [[roles-index-cache-removed]]
  227. .The `roles.index.cache.*` settings have been removed.
  228. [%collapsible]
  229. ====
  230. *Details* +
  231. The `xpack.security.authz.store.roles.index.cache.max_size` and
  232. `xpack.security.authz.store.roles.index.cache.ttl` settings have
  233. been removed. These settings have been redundant and deprecated
  234. since the 5.2 release of {es}.
  235. *Impact* +
  236. Remove the `xpack.security.authz.store.roles.index.cache.max_size`
  237. and `xpack.security.authz.store.roles.index.cache.ttl` settings from `elasticsearch.yml` .
  238. Specifying these settings will result in an error on startup.
  239. ====
  240. [[separating-node-and-client-traffic]]
  241. .The `transport.profiles.*.xpack.security.type` setting has been removed.
  242. [%collapsible]
  243. ====
  244. *Details* +
  245. The `transport.profiles.*.xpack.security.type` setting is no longer supported.
  246. The Transport Client has been removed and all client traffic now uses
  247. the HTTP transport. Transport profiles using this setting should be removed.
  248. *Impact* +
  249. Remove the `transport.profiles.*.xpack.security.type` setting from `elasticsearch.yml`.
  250. Specifying this setting in a transport profile will result in an error on startup.
  251. ====
  252. [discrete]
  253. [[saml-realm-nameid-changes]]
  254. .The `nameid_format` SAML realm setting no longer has a default value.
  255. [%collapsible]
  256. ====
  257. *Details* +
  258. In SAML, Identity Providers (IdPs) can either be explicitly configured to
  259. release a `NameID` with a specific format, or configured to attempt to conform
  260. with the requirements of a Service Provider (SP). The SP declares its
  261. requirements in the `NameIDPolicy` element of a SAML Authentication Request.
  262. In {es}, the `nameid_format` SAML realm setting controls the `NameIDPolicy`
  263. value.
  264. Previously, the default value for `nameid_format` was
  265. `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`. This setting created
  266. authentication requests that required the IdP to release `NameID` with a
  267. `transient` format.
  268. The default value has been removed, which means that {es} will create SAML Authentication Requests by default that don't put this requirement on the
  269. IdP. If you want to retain the previous behavior, set `nameid_format` to
  270. `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
  271. *Impact* +
  272. If you currently don't configure `nameid_format` explicitly, it's possible
  273. that your IdP will reject authentication requests from {es} because the requests
  274. do not specify a `NameID` format (and your IdP is configured to expect one).
  275. This mismatch can result in a broken SAML configuration. If you're unsure whether
  276. your IdP is explicitly configured to use a certain `NameID` format and you want to retain current behavior
  277. , try setting `nameid_format` to `urn:oasis:names:tc:SAML:2.0:nameid-format:transient` explicitly.
  278. ====
  279. .The `xpack.security.transport.ssl.enabled` setting is now required to configure `xpack.security.transport.ssl` settings.
  280. [%collapsible]
  281. ====
  282. *Details* +
  283. It is now an error to configure any SSL settings for
  284. `xpack.security.transport.ssl` without also configuring
  285. `xpack.security.transport.ssl.enabled`.
  286. *Impact* +
  287. If using other `xpack.security.transport.ssl` settings, you must explicitly
  288. specify the `xpack.security.transport.ssl.enabled` setting.
  289. If you do not want to enable SSL and are currently using other
  290. `xpack.security.transport.ssl` settings, do one of the following:
  291. * Explicitly specify `xpack.security.transport.ssl.enabled` as `false`
  292. * Discontinue use of other `xpack.security.transport.ssl` settings
  293. If you want to enable SSL, follow the instructions in
  294. {ref}/configuring-tls.html#tls-transport[Encrypting communications between nodes
  295. in a cluster]. As part of this configuration, explicitly specify
  296. `xpack.security.transport.ssl.enabled` as `true`.
  297. For example, the following configuration is invalid:
  298. [source,yaml]
  299. --------------------------------------------------
  300. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  301. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  302. --------------------------------------------------
  303. And must be configured as:
  304. [source,yaml]
  305. --------------------------------------------------
  306. xpack.security.transport.ssl.enabled: true <1>
  307. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  308. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  309. --------------------------------------------------
  310. <1> or `false`.
  311. ====
  312. .The `xpack.security.http.ssl.enabled` setting is now required to configure `xpack.security.http.ssl` settings.
  313. [%collapsible]
  314. ====
  315. *Details* +
  316. It is now an error to configure any SSL settings for
  317. `xpack.security.http.ssl` without also configuring
  318. `xpack.security.http.ssl.enabled`.
  319. *Impact* +
  320. If using other `xpack.security.http.ssl` settings, you must explicitly
  321. specify the `xpack.security.http.ssl.enabled` setting.
  322. If you do not want to enable SSL and are currently using other
  323. `xpack.security.http.ssl` settings, do one of the following:
  324. * Explicitly specify `xpack.security.http.ssl.enabled` as `false`
  325. * Discontinue use of other `xpack.security.http.ssl` settings
  326. If you want to enable SSL, follow the instructions in
  327. {ref}/configuring-tls.html#tls-http[Encrypting HTTP client communications]. As part
  328. of this configuration, explicitly specify `xpack.security.http.ssl.enabled`
  329. as `true`.
  330. For example, the following configuration is invalid:
  331. [source,yaml]
  332. --------------------------------------------------
  333. xpack.security.http.ssl.certificate: elasticsearch.crt
  334. xpack.security.http.ssl.key: elasticsearch.key
  335. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  336. --------------------------------------------------
  337. And must be configured as either:
  338. [source,yaml]
  339. --------------------------------------------------
  340. xpack.security.http.ssl.enabled: true <1>
  341. xpack.security.http.ssl.certificate: elasticsearch.crt
  342. xpack.security.http.ssl.key: elasticsearch.key
  343. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  344. --------------------------------------------------
  345. <1> or `false`.
  346. ====
  347. .A `xpack.security.transport.ssl` certificate and key are now required to enable SSL for the transport interface.
  348. [%collapsible]
  349. ====
  350. *Details* +
  351. It is now an error to enable SSL for the transport interface without also configuring
  352. a certificate and key through use of the `xpack.security.transport.ssl.keystore.path`
  353. setting or the `xpack.security.transport.ssl.certificate` and
  354. `xpack.security.transport.ssl.key` settings.
  355. *Impact* +
  356. If `xpack.security.transport.ssl.enabled` is set to `true`, provide a
  357. certificate and key using the `xpack.security.transport.ssl.keystore.path`
  358. setting or the `xpack.security.transport.ssl.certificate` and
  359. `xpack.security.transport.ssl.key` settings. If a certificate and key is not
  360. provided, {es} will return in an error on startup.
  361. ====
  362. .A `xpack.security.http.ssl` certificate and key are now required to enable SSL for the HTTP server.
  363. [%collapsible]
  364. ====
  365. *Details* +
  366. It is now an error to enable SSL for the HTTP (Rest) server without also configuring
  367. a certificate and key through use of the `xpack.security.http.ssl.keystore.path`
  368. setting or the `xpack.security.http.ssl.certificate` and
  369. `xpack.security.http.ssl.key` settings.
  370. *Impact* +
  371. If `xpack.security.http.ssl.enabled` is set to `true`, provide a certificate and
  372. key using the `xpack.security.http.ssl.keystore.path` setting or the
  373. `xpack.security.http.ssl.certificate` and `xpack.security.http.ssl.key`
  374. settings. If certificate and key is not provided, {es} will return in an error
  375. on startup.
  376. ====
  377. .PKCS#11 keystores and trustores cannot be configured in `elasticsearch.yml`
  378. [%collapsible]
  379. ====
  380. *Details* +
  381. The settings `*.ssl.keystore.type` and `*.ssl.truststore.type` no longer accept "PKCS11" as a valid type.
  382. This applies to all SSL settings in Elasticsearch, including
  383. - `xpack.security.http.keystore.type`
  384. - `xpack.security.transport.keystore.type`
  385. - `xpack.security.http.truststore.type`
  386. - `xpack.security.transport.truststore.type`
  387. As well as SSL settings for security realms, watcher and monitoring.
  388. Use of a PKCS#11 keystore or truststore as the JRE's default store is not affected.
  389. *Impact* +
  390. If you have a PKCS#11 keystore configured within your `elasticsearch.yml` file, you must remove that
  391. configuration and switch to a supported keystore type, or configure your PKCS#11 keystore as the
  392. JRE default store.
  393. ====
  394. .The `kibana` user has been replaced by `kibana_system`.
  395. [%collapsible]
  396. ====
  397. *Details* +
  398. The `kibana` user was historically used to authenticate {kib} to {es}.
  399. The name of this user was confusing, and was often mistakenly used to login to {kib}.
  400. This has been renamed to `kibana_system` in order to reduce confusion, and to better
  401. align with other built-in system accounts.
  402. *Impact* +
  403. Replace any use of the `kibana` user with the `kibana_system` user. Specifying
  404. the `kibana` user in `kibana.yml` will result in an error on startup.
  405. If your `kibana.yml` used to contain:
  406. [source,yaml]
  407. --------------------------------------------------
  408. elasticsearch.username: kibana
  409. --------------------------------------------------
  410. then you should update to use the new `kibana_system` user instead:
  411. [source,yaml]
  412. --------------------------------------------------
  413. elasticsearch.username: kibana_system
  414. --------------------------------------------------
  415. IMPORTANT: The new `kibana_system` user does not preserve the previous `kibana`
  416. user password. You must explicitly set a password for the `kibana_system` user.
  417. ====
  418. [[search-remote-settings-removed]]
  419. .The `search.remote.*` settings have been removed.
  420. [%collapsible]
  421. ====
  422. *Details* +
  423. In 6.5 these settings were deprecated in favor of `cluster.remote`. In 7.x we
  424. provided automatic upgrading of these settings to their `cluster.remote`
  425. counterparts. In 8.0.0, these settings have been removed. Elasticsearch will
  426. refuse to start if you have these settings in your configuration or cluster
  427. state.
  428. *Impact* +
  429. Use the replacement `cluster.remote` settings. Discontinue use of the
  430. `search.remote.*` settings. Specifying these settings in `elasticsearch.yml`
  431. will result in an error on startup.
  432. ====
  433. [[remove-pidfile]]
  434. .The `pidfile` setting has been replaced by `node.pidfile`.
  435. [%collapsible]
  436. ====
  437. *Details* +
  438. To ensure that all settings are in a proper namespace, the `pidfile` setting was
  439. previously deprecated in version 7.4.0 of Elasticsearch, and is removed in
  440. version 8.0.0. Instead, use `node.pidfile`.
  441. *Impact* +
  442. Use the `node.pidfile` setting. Discontinue use of the `pidfile` setting.
  443. Specifying the `pidfile` setting in `elasticsearch.yml` will result in an error
  444. on startup.
  445. ====
  446. [[remove-processors]]
  447. .The `processors` setting has been replaced by `node.processors`.
  448. [%collapsible]
  449. ====
  450. *Details* +
  451. To ensure that all settings are in a proper namespace, the `processors` setting
  452. was previously deprecated in version 7.4.0 of Elasticsearch, and is removed in
  453. version 8.0.0. Instead, use `node.processors`.
  454. *Impact* +
  455. Use the `node.processors` setting. Discontinue use of the `processors` setting.
  456. Specifying the `processors` setting in `elasticsearch.yml` will result in an
  457. error on startup.
  458. ====
  459. .The `node.processors` setting can no longer exceed the available number of processors.
  460. [%collapsible]
  461. ====
  462. *Details* +
  463. Previously it was possible to set the number of processors used to set the
  464. default sizes for the thread pools to be more than the number of available
  465. processors. As this leads to more context switches and more threads but without
  466. an increase in the number of physical CPUs on which to schedule these additional
  467. threads, the `node.processors` setting is now bounded by the number of available
  468. processors.
  469. *Impact* +
  470. If specified, ensure the value of `node.processors` setting does not exceed the
  471. number of available processors. Setting the `node.processors` value greater than
  472. the number of available processors in `elasticsearch.yml` will result in an
  473. error on startup.
  474. ====
  475. .The `cluster.remote.connect` setting has been removed.
  476. [%collapsible]
  477. ====
  478. *Details* +
  479. In Elasticsearch 7.7.0, the setting `cluster.remote.connect` was deprecated in
  480. favor of setting `node.remote_cluster_client`. In Elasticsearch 8.0.0, the
  481. setting `cluster.remote.connect` is removed.
  482. *Impact* +
  483. Use the `node.remote_cluster_client` setting. Discontinue use of the
  484. `cluster.remote.connect` setting. Specifying the `cluster.remote.connect`
  485. setting in `elasticsearch.yml` will result in an error on startup.
  486. ====
  487. .The `node.local_storage` setting has been removed.
  488. [%collapsible]
  489. ====
  490. *Details* +
  491. In Elasticsearch 7.8.0, the setting `node.local_storage` was deprecated and
  492. beginning in Elasticsearch 8.0.0 all nodes will require local storage. Therefore,
  493. the `node.local_storage` setting has been removed.
  494. *Impact* +
  495. Discontinue use of the `node.local_storage` setting. Specifying this setting in
  496. `elasticsearch.yml` will result in an error on startup.
  497. ====
  498. .The `auth.password` setting for HTTP monitoring has been removed.
  499. [%collapsible]
  500. ====
  501. *Details* +
  502. In Elasticsearch 7.7.0, the setting `xpack.monitoring.exporters.<exporterName>.auth.password`
  503. was deprecated in favor of setting `xpack.monitoring.exporters.<exporterName>.auth.secure_password`.
  504. In Elasticsearch 8.0.0, the setting `xpack.monitoring.exporters.<exporterName>.auth.password` is
  505. removed.
  506. *Impact* +
  507. Use the `xpack.monitoring.exporters.<exporterName>.auth.secure_password`
  508. setting. Discontinue use of the
  509. `xpack.monitoring.exporters.<exporterName>.auth.password` setting. Specifying
  510. the `xpack.monitoring.exporters.<exporterName>.auth.password` setting in
  511. `elasticsearch.yml` will result in an error on startup.
  512. ====
  513. .Settings used to disable basic license features have been removed.
  514. [%collapsible]
  515. ====
  516. *Details* +
  517. The following settings were deprecated in {es} 7.8.0 and have been removed
  518. in {es} 8.0.0:
  519. * `xpack.enrich.enabled`
  520. * `xpack.flattened.enabled`
  521. * `xpack.ilm.enabled`
  522. * `xpack.monitoring.enabled`
  523. * `xpack.rollup.enabled`
  524. * `xpack.slm.enabled`
  525. * `xpack.sql.enabled`
  526. * `xpack.transform.enabled`
  527. * `xpack.vectors.enabled`
  528. These basic license features are now always enabled.
  529. If you have disabled ILM so that you can use another tool to manage Watcher
  530. indices, the newly introduced `xpack.watcher.use_ilm_index_management` setting
  531. may be set to false.
  532. *Impact* +
  533. Discontinue use of the removed settings. Specifying these settings in
  534. `elasticsearch.yml` will result in an error on startup.
  535. ====
  536. .Settings used to defer cluster recovery pending a certain number of master nodes have been removed.
  537. [%collapsible]
  538. ====
  539. *Details* +
  540. The following cluster settings have been removed:
  541. * `gateway.expected_nodes`
  542. * `gateway.expected_master_nodes`
  543. * `gateway.recover_after_nodes`
  544. * `gateway.recover_after_master_nodes`
  545. It is safe to recover the cluster as soon as a majority of master-eligible
  546. nodes have joined so there is no benefit in waiting for any additional
  547. master-eligible nodes to start.
  548. *Impact* +
  549. Discontinue use of the removed settings. If needed, use
  550. `gateway.expected_data_nodes` or `gateway.recover_after_data_nodes` to defer
  551. cluster recovery pending a certain number of data nodes.
  552. ====
  553. .Legacy role settings have been removed.
  554. [%collapsible]
  555. ====
  556. *Details* +
  557. The legacy role settings:
  558. * `node.data`
  559. * `node.ingest`
  560. * `node.master`
  561. * `node.ml`
  562. * `node.remote_cluster_client`
  563. * `node.transform`
  564. * `node.voting_only`
  565. have been removed. Instead, use the `node.roles` setting. If you were previously
  566. using the legacy role settings on a 7.13 or later cluster, you will have a
  567. deprecation log message on each of your nodes indicating the exact replacement
  568. value for `node.roles`.
  569. *Impact* +
  570. Discontinue use of the removed settings. Specifying these settings in
  571. `elasticsearch.yml` will result in an error on startup.
  572. ====
  573. [[system-call-filter-setting]]
  574. .The system call filter setting has been removed.
  575. [%collapsible]
  576. ====
  577. *Details* +
  578. Elasticsearch uses system call filters to remove its ability to fork another
  579. process. This is useful to mitigate remote code exploits. These system call
  580. filters are enabled by default, and were previously controlled via the setting
  581. `bootstrap.system_call_filter`. Starting in Elasticsearch 8.0, system call
  582. filters will be required. As such, the setting `bootstrap.system_call_filter`
  583. was deprecated in Elasticsearch 7.13.0, and is removed as of Elasticsearch
  584. 8.0.0.
  585. *Impact* +
  586. Discontinue use of the removed setting. Specifying this setting in Elasticsearch
  587. configuration will result in an error on startup.
  588. ====
  589. [[tier-filter-setting]]
  590. .Tier filtering settings have been removed.
  591. [%collapsible]
  592. ====
  593. *Details* +
  594. The cluster and index level settings ending in `._tier` used for filtering the allocation of a shard
  595. to a particular set of nodes have been removed. Instead, the
  596. {ref}/data-tier-shard-filtering.html#tier-preference-allocation-filter[tier
  597. preference setting], `index.routing.allocation.include._tier_preference` should
  598. be used. The removed settings are:
  599. Cluster level settings:
  600. - `cluster.routing.allocation.include._tier`
  601. - `cluster.routing.allocation.exclude._tier`
  602. - `cluster.routing.allocation.require._tier`
  603. Index settings:
  604. - `index.routing.allocation.include._tier`
  605. - `index.routing.allocation.exclude._tier`
  606. - `index.routing.allocation.require._tier`
  607. *Impact* +
  608. Discontinue use of the removed settings. Specifying any of these cluster settings in Elasticsearch
  609. configuration will result in an error on startup. Any indices using these settings will have the
  610. settings archived (and they will have no effect) when the index metadata is loaded.
  611. ====
  612. [[shared-data-path-setting]]
  613. .Shared data path and per index data path settings are deprecated.
  614. [%collapsible]
  615. ====
  616. *Details* +
  617. Elasticsearch uses the shared data path as the base path of per index data
  618. paths. This feature was previously used with shared replicas. Starting in
  619. 7.13.0, these settings are deprecated. Starting in 8.0 only existing
  620. indices created in 7.x will be capable of using the shared data path and
  621. per index data path settings.
  622. *Impact* +
  623. Discontinue use of the deprecated settings.
  624. ====
  625. [[single-data-node-watermark-setting]]
  626. .The single data node watermark setting is deprecated and now only accepts `true`.
  627. [%collapsible]
  628. ====
  629. *Details* +
  630. In 7.14, setting `cluster.routing.allocation.disk.watermark.enable_for_single_data_node`
  631. to false was deprecated. Starting in 8.0, the only legal value will be
  632. true. In a future release, the setting will be removed completely, with same
  633. behavior as if the setting was `true`.
  634. If the old behavior is desired for a single data node cluster, disk based
  635. allocation can be disabled by setting
  636. `cluster.routing.allocation.disk.threshold_enabled: false`
  637. *Impact* +
  638. Discontinue use of the deprecated setting.
  639. ====
  640. [[auto-import-dangling-indices-removed]]
  641. .The `gateway.auto_import_dangling_indices` setting has been removed.
  642. [%collapsible]
  643. ====
  644. *Details* +
  645. The `gateway.auto_import_dangling_indices` cluster setting has been removed.
  646. Previously, you could use this setting to automatically import
  647. {ref}/modules-gateway.html#dangling-indices[dangling indices]. However,
  648. automatically importing dangling indices is unsafe. Use the
  649. {ref}/indices.html#dangling-indices-api[dangling indices APIs] to manage and
  650. import dangling indices instead.
  651. *Impact* +
  652. Discontinue use of the removed setting. Specifying the setting in
  653. `elasticsearch.yml` will result in an error on startup.
  654. ====
  655. .The `listener` thread pool has been removed.
  656. [%collapsible]
  657. ====
  658. *Details* +
  659. Previously, the transport client used the thread pool to ensure listeners aren't
  660. called back on network threads. The transport client has been removed
  661. in 8.0, and the thread pool is no longer needed.
  662. *Impact* +
  663. Remove `listener` thread pool settings from `elasticsearch.yml` for any nodes.
  664. Specifying `listener` thread pool settings in `elasticsearch.yml` will result in
  665. an error on startup.
  666. ====
  667. .The `fixed_auto_queue_size` thread pool type has been removed.
  668. [%collapsible]
  669. ====
  670. *Details* +
  671. The `fixed_auto_queue_size` thread pool type, previously marked as an
  672. experimental feature, was deprecated in 7.x and has been removed in 8.0.
  673. The `search` and `search_throttled` thread pools have the `fixed` type now.
  674. *Impact* +
  675. No action needed.
  676. ====
  677. .Several `transport` settings have been replaced.
  678. [%collapsible]
  679. ====
  680. *Details* +
  681. The following settings have been deprecated in 7.x and removed in 8.0. Each setting has a replacement
  682. setting that was introduced in 6.7.
  683. - `transport.tcp.port` replaced by `transport.port`
  684. - `transport.tcp.compress` replaced by `transport.compress`
  685. - `transport.tcp.connect_timeout` replaced by `transport.connect_timeout`
  686. - `transport.tcp_no_delay` replaced by `transport.tcp.no_delay`
  687. - `transport.profiles.profile_name.tcp_no_delay` replaced by `transport.profiles.profile_name.tcp.no_delay`
  688. - `transport.profiles.profile_name.tcp_keep_alive` replaced by `transport.profiles.profile_name.tcp.keep_alive`
  689. - `transport.profiles.profile_name.reuse_address` replaced by `transport.profiles.profile_name.tcp.reuse_address`
  690. - `transport.profiles.profile_name.send_buffer_size` replaced by `transport.profiles.profile_name.tcp.send_buffer_size`
  691. - `transport.profiles.profile_name.receive_buffer_size` replaced by `transport.profiles.profile_name.tcp.receive_buffer_size`
  692. *Impact* +
  693. Use the replacement settings. Discontinue use of the removed settings.
  694. Specifying the removed settings in `elasticsearch.yml` will result in an error
  695. on startup.
  696. ====
  697. .Selective transport compression has been enabled by default.
  698. [%collapsible]
  699. ====
  700. *Details* +
  701. Prior to 8.0, transport compression was disabled by default. Starting in 8.0,
  702. `transport.compress` defaults to `indexing_data`. This configuration means that
  703. the propagation of raw indexing data will be compressed between nodes.
  704. *Impact* +
  705. Inter-node transit will get reduced along the indexing path. In some scenarios,
  706. CPU usage could increase.
  707. ====
  708. .Transport compression defaults to lz4.
  709. [%collapsible]
  710. ====
  711. *Details* +
  712. Prior to 8.0, the `transport.compression_scheme` setting defaulted to `deflate`. Starting in
  713. 8.0, `transport.compress_scheme` defaults to `lz4`.
  714. Prior to 8.0, the `cluster.remote.<cluster_alias>.transport.compression_scheme`
  715. setting defaulted to `deflate` when `cluster.remote.<cluster_alias>.transport.compress`
  716. was explicitly configured. Starting in 8.0,
  717. `cluster.remote.<cluster_alias>.transport.compression_scheme` will fallback to
  718. `transport.compression_scheme` by default.
  719. *Impact* +
  720. This configuration means that transport compression will produce somewhat lower
  721. compression ratios in exchange for lower CPU load.
  722. ====
  723. //end::notable-breaking-changes[]
  724. // This change is not notable because it should not have any impact on upgrades
  725. // However we document it here out of an abundance of caution
  726. [[fips-default-hash-changed]]
  727. .When FIPS mode is enabled the default password hash is now PBKDF2_STRETCH
  728. [%collapsible]
  729. ====
  730. *Details* +
  731. If `xpack.security.fips_mode.enabled` is true (see <<fips-140-compliance>>),
  732. the value of `xpack.security.authc.password_hashing.algorithm` now defaults to
  733. `pbkdf2_stretch`.
  734. In earlier versions this setting would always default to `bcrypt` and a runtime
  735. check would prevent a node from starting unless the value was explicitly set to
  736. a "pbkdf2" variant.
  737. There is no change for clusters that do not enable FIPS 140 mode.
  738. *Impact* +
  739. This change should not have any impact on upgraded nodes.
  740. Any node with an explicitly configured value for the password hashing algorithm
  741. will continue to use that configured value.
  742. Any node that did not have an explicitly configured password hashing algorithm in
  743. {es} 6.x or {es} 7.x would have failed to start.
  744. ====