| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960 | [[backup-cluster-configuration]]=== Back up a cluster's configuration++++<titleabbrev>Back up the cluster configuration</titleabbrev>++++In addition to backing up the data in a cluster, it is important to back up its configuration--especially when the cluster becomes large and difficult toreconstruct.Configuration information resides in<<config-files-location, regular text files>> on every cluster node. Sensitivesetting values such as passwords for the {watcher} notification servers, arespecified inside a binary secure container, the<<secure-settings, elasticsearch.keystore>> file. Some setting values arefile paths to the associated configuration data, such as the ingest geo ipdatabase. All these files are contained inside the `ES_PATH_CONF` directory.NOTE: All changes to configuration files are done by manually editing the filesor using command line utilities, but *not* through APIs. In practice, thesechanges are infrequent after the initial setup.We recommend that you take regular (ideally, daily) backups of your {es} config(`$ES_PATH_CONF`) directory using the file backup software of your choice.TIP: We recommend that you have a configuration management plan for theseconfiguration files. You may wish to check them into version control, orprovision them though your choice of configuration management tool.Some of these files may contain sensitive data such as passwords and TLS keys,therefore you should investigate whether your backup software and/or storagesolution are able to encrypt this data.Some settings in configuration files might be overridden by<<cluster-update-settings,cluster settings>>. You can capture these settings ina *data* backup snapshot by specifying the `include_global_state: true` (default)parameter for the snapshot API. Alternatively, you can extract theseconfiguration values in text format by using the<<cluster-get-settings, get settings API>>:[source,console]--------------------------------------------------GET _cluster/settings?pretty&flat_settings&filter_path=persistent--------------------------------------------------You can store the output of this as a file together with the rest ofconfiguration files.[NOTE]====* Transient settings are not considered for backup.* {es} {security-features} store configuration data such as role definitions andAPI keys inside a dedicate special index. This "system" data,complements the <<secure-settings, security settings>> configuration and shouldbe <<backup-security-index-configuration, backed up as well>>.* Other {stack} components, like Kibana and {ml-cap}, store their configurationdata inside other dedicated indices. From the {es} perspective these are just dataso you can use the regular <<backup-cluster-data, data backup>> process.====
 |