cluster-node-setting-changes.asciidoc 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909
  1. [discrete]
  2. [[breaking_80_cluster_node_setting_changes]]
  3. ==== Cluster and node setting changes
  4. //NOTE: The notable-breaking-changes tagged regions are re-used in the
  5. //Installation and Upgrade Guide
  6. //tag::notable-breaking-changes[]
  7. TIP: {ess-setting-change}
  8. .`action.destructive_requires_name` now defaults to `false`. {ess-icon}
  9. [%collapsible]
  10. ====
  11. *Details* +
  12. The default for the `action.destructive_requires_name` setting changes from `false`
  13. to `true` in {es} 8.0.0.
  14. Previously, defaulting to `false` allowed users to use wildcard
  15. patterns to delete, close, or change index blocks on indices.
  16. To prevent the accidental deletion of indices that happen to match a
  17. wildcard pattern, we now default to requiring that destructive
  18. operations explicitly name the indices to be modified.
  19. *Impact* +
  20. To use wildcard patterns for destructive actions, set
  21. `action.destructive_requires_name` to `false` using the
  22. {ref}/cluster-update-settings.html[] cluster settings API].
  23. ====
  24. .You can no longer set `xpack.searchable.snapshot.shared_cache.size` on non-frozen nodes.
  25. [%collapsible]
  26. ====
  27. *Details* +
  28. You can no longer set
  29. {ref}/searchable-snapshots.html#searchable-snapshots-shared-cache[`xpack.searchable.snapshot.shared_cache.size`]
  30. on a node that doesn't have the `data_frozen` node role. This setting reserves
  31. disk space for the shared cache of partially mounted indices. {es} only
  32. allocates partially mounted indices to nodes with the `data_frozen` role.
  33. *Impact* +
  34. Remove `xpack.searchable.snapshot.shared_cache.size` from `elasticsearch.yml`
  35. for nodes that don't have the `data_frozen` role. Specifying the setting on a
  36. non-frozen node will result in an error on startup.
  37. ====
  38. [[max_clause_count_change]]
  39. .The `indices.query.bool.max_clause_count` setting has been deprecated, and no longer has any effect.
  40. [%collapsible]
  41. ====
  42. *Details* +
  43. Elasticsearch will now dynamically set the maximum number of allowed clauses
  44. in a query, using a heuristic based on the size of the search thread pool and
  45. the size of the heap allocated to the JVM. This limit has a minimum value of
  46. 1024 and will in most cases be larger (for example, a node with 30Gb RAM and
  47. 48 CPUs will have a maximum clause count of around 27,000). Larger heaps lead
  48. to higher values, and larger thread pools result in lower values.
  49. *Impact* +
  50. Queries with many clauses should be avoided whenever possible.
  51. If you previously bumped this setting to accommodate heavy queries,
  52. you might need to increase the amount of memory available to Elasticsearch,
  53. or to reduce the size of your search thread pool so that more memory is
  54. available to each concurrent search.
  55. In previous versions of Lucene you could get around this limit by nesting
  56. boolean queries within each other, but the limit is now based on the total
  57. number of leaf queries within the query as a whole and this workaround will
  58. no longer help.
  59. ====
  60. [[ilm-poll-interval-limit]]
  61. .`indices.lifecycle.poll_interval` must be greater than `1s`.
  62. [%collapsible]
  63. ====
  64. *Details* +
  65. Setting `indices.lifecycle.poll_interval` too low can cause
  66. excessive load on a cluster. The poll interval must now be at least `1s` (one second).
  67. *Impact* +
  68. Set `indices.lifecycle.poll_interval` setting to `1s` or
  69. greater in `elasticsearch.yml` or through the
  70. {ref}/cluster-update-settings.html[cluster update settings API].
  71. Setting `indices.lifecycle.poll_interval` to less than `1s` in
  72. `elasticsearch.yml` will result in an error on startup.
  73. {ref}/cluster-update-settings.html[Cluster update settings API] requests that
  74. set `indices.lifecycle.poll_interval` to less than `1s` will return an error.
  75. ====
  76. .The file and native realms are now enabled unless explicitly disabled.
  77. [%collapsible]
  78. ====
  79. *Details* +
  80. The file and native realms are now enabled unless explicitly disabled. If
  81. explicitly disabled, the file and native realms remain disabled at all times.
  82. Previously, the file and native realms had the following implicit behaviors:
  83. * If the file and native realms were not configured, they were implicitly disabled
  84. if any other realm was configured.
  85. * If no other realm was available because realms were either not configured,
  86. not permitted by license, or explicitly disabled, the file and native realms
  87. were enabled, even if explicitly disabled.
  88. *Impact* +
  89. To explicitly disable the file or native realm, set the respective
  90. `file.<realm-name>.enabled` or `native.<realm-name>.enabled` setting to `false`
  91. under the `xpack.security.authc.realms` namespace in `elasticsearch.yml`.
  92. The following configuration example disables the native realm and the file realm.
  93. [source,yaml]
  94. ----
  95. xpack.security.authc.realms:
  96. native.realm1.enabled: false
  97. file.realm2.enabled: false
  98. ...
  99. ----
  100. ====
  101. .The realm `order` setting is now required.
  102. [%collapsible]
  103. ====
  104. *Details* +
  105. The `xpack.security.authc.realms.{type}.{name}.order` setting is now required and must be
  106. specified for each explicitly configured realm. Each value must be unique.
  107. *Impact* +
  108. The cluster will fail to start if the requirements are not met.
  109. For example, the following configuration is invalid:
  110. [source,yaml]
  111. --------------------------------------------------
  112. xpack.security.authc.realms.kerberos.kerb1:
  113. keytab.path: es.keytab
  114. remove_realm_name: false
  115. --------------------------------------------------
  116. And must be configured as:
  117. [source,yaml]
  118. --------------------------------------------------
  119. xpack.security.authc.realms.kerberos.kerb1:
  120. order: 0
  121. keytab.path: es.keytab
  122. remove_realm_name: false
  123. --------------------------------------------------
  124. ====
  125. [[breaking_80_allocation_change_include_relocations_removed]]
  126. .`cluster.routing.allocation.disk.include_relocations` has been removed.
  127. [%collapsible]
  128. ====
  129. *Details* +
  130. {es} now always accounts for the sizes of relocating shards when making
  131. allocation decisions based on the disk usage of the nodes in the cluster. In
  132. earlier versions, you could disable this by setting `cluster.routing.allocation.disk.include_relocations` to `false`.
  133. That could result in poor allocation decisions that could overshoot watermarks and require significant
  134. extra work to correct. The `cluster.routing.allocation.disk.include_relocations` setting has been removed.
  135. *Impact* +
  136. Remove the `cluster.routing.allocation.disk.include_relocations`
  137. setting. Specifying this setting in `elasticsearch.yml` will result in an error
  138. on startup.
  139. ====
  140. .`cluster.join.timeout` has been removed.
  141. [%collapsible]
  142. ====
  143. *Details* +
  144. The `cluster.join.timeout` setting has been removed. Join attempts no longer
  145. time out.
  146. *Impact* +
  147. Remove `cluster.join.timeout` from `elasticsearch.yml`.
  148. ====
  149. .`discovery.zen` settings have been removed.
  150. [%collapsible]
  151. ====
  152. *Details* +
  153. All settings under the `discovery.zen` namespace are no longer supported. They existed only only for BWC reasons in 7.x. This includes:
  154. - `discovery.zen.minimum_master_nodes`
  155. - `discovery.zen.no_master_block`
  156. - `discovery.zen.hosts_provider`
  157. - `discovery.zen.publish_timeout`
  158. - `discovery.zen.commit_timeout`
  159. - `discovery.zen.publish_diff.enable`
  160. - `discovery.zen.ping.unicast.concurrent_connects`
  161. - `discovery.zen.ping.unicast.hosts.resolve_timeout`
  162. - `discovery.zen.ping.unicast.hosts`
  163. - `discovery.zen.ping_timeout`
  164. - `discovery.zen.unsafe_rolling_upgrades_enabled`
  165. - `discovery.zen.fd.connect_on_network_disconnect`
  166. - `discovery.zen.fd.ping_interval`
  167. - `discovery.zen.fd.ping_timeout`
  168. - `discovery.zen.fd.ping_retries`
  169. - `discovery.zen.fd.register_connection_listener`
  170. - `discovery.zen.join_retry_attempts`
  171. - `discovery.zen.join_retry_delay`
  172. - `discovery.zen.join_timeout`
  173. - `discovery.zen.max_pings_from_another_master`
  174. - `discovery.zen.send_leave_request`
  175. - `discovery.zen.master_election.wait_for_joins_timeout`
  176. - `discovery.zen.master_election.ignore_non_master_pings`
  177. - `discovery.zen.publish.max_pending_cluster_states`
  178. - `discovery.zen.bwc_ping_timeout`
  179. *Impact* +
  180. Remove the `discovery.zen` settings from `elasticsearch.yml`. Specifying these settings will result in an error on startup.
  181. ====
  182. .`http.content_type.required` has been removed.
  183. [%collapsible]
  184. ====
  185. *Details* +
  186. The `http.content_type.required` setting was deprecated in Elasticsearch 6.0
  187. and has been removed in Elasticsearch 8.0. The setting was introduced in
  188. Elasticsearch 5.3 to prepare users for Elasticsearch 6.0, where content type
  189. auto detection was removed for HTTP requests.
  190. *Impact* +
  191. Remove the `http.content_type.required` setting from `elasticsearch.yml`. Specifying this setting will result in an error on startup.
  192. ====
  193. .`http.tcp_no_delay` has been removed.
  194. [%collapsible]
  195. ====
  196. *Details* +
  197. The `http.tcp_no_delay` setting was deprecated in 7.x and has been removed in 8.0. Use`http.tcp.no_delay` instead.
  198. *Impact* +
  199. Replace the `http.tcp_no_delay` setting with `http.tcp.no_delay`.
  200. Specifying `http.tcp_no_delay` in `elasticsearch.yml` will
  201. result in an error on startup.
  202. ====
  203. .`network.tcp.connect_timeout` has been removed.
  204. [%collapsible]
  205. ====
  206. *Details* +
  207. The `network.tcp.connect_timeout` setting was deprecated in 7.x and has been removed in 8.0. This setting
  208. was a fallback setting for `transport.connect_timeout`.
  209. *Impact* +
  210. Remove the`network.tcp.connect_timeout` setting.
  211. Use the `transport.connect_timeout` setting to change the default connection
  212. timeout for client connections. Specifying
  213. `network.tcp.connect_timeout` in `elasticsearch.yml` will result in an
  214. error on startup.
  215. ====
  216. .`node.max_local_storage_nodes` has been removed.
  217. [%collapsible]
  218. ====
  219. *Details* +
  220. The `node.max_local_storage_nodes` setting was deprecated in 7.x and
  221. has been removed in 8.0. Nodes should be run on separate data paths
  222. to ensure that each node is consistently assigned to the same data path.
  223. *Impact* +
  224. Remove the `node.max_local_storage_nodes` setting. Specifying this
  225. setting in `elasticsearch.yml` will result in an error on startup.
  226. ====
  227. [[accept-default-password-removed]]
  228. .The `accept_default_password` setting has been removed.
  229. [%collapsible]
  230. ====
  231. *Details* +
  232. The `xpack.security.authc.accept_default_password` setting has not had any affect
  233. since the 6.0 release of {es} and is no longer allowed.
  234. *Impact* +
  235. Remove the `xpack.security.authc.accept_default_password` setting from `elasticsearch.yml`.
  236. Specifying this setting will result in an error on startup.
  237. ====
  238. [[roles-index-cache-removed]]
  239. .The `roles.index.cache.*` settings have been removed.
  240. [%collapsible]
  241. ====
  242. *Details* +
  243. The `xpack.security.authz.store.roles.index.cache.max_size` and
  244. `xpack.security.authz.store.roles.index.cache.ttl` settings have
  245. been removed. These settings have been redundant and deprecated
  246. since the 5.2 release of {es}.
  247. *Impact* +
  248. Remove the `xpack.security.authz.store.roles.index.cache.max_size`
  249. and `xpack.security.authz.store.roles.index.cache.ttl` settings from `elasticsearch.yml` .
  250. Specifying these settings will result in an error on startup.
  251. ====
  252. [[separating-node-and-client-traffic]]
  253. .The `transport.profiles.*.xpack.security.type` setting has been removed.
  254. [%collapsible]
  255. ====
  256. *Details* +
  257. The `transport.profiles.*.xpack.security.type` setting is no longer supported.
  258. The Transport Client has been removed and all client traffic now uses
  259. the HTTP transport. Transport profiles using this setting should be removed.
  260. *Impact* +
  261. Remove the `transport.profiles.*.xpack.security.type` setting from `elasticsearch.yml`.
  262. Specifying this setting in a transport profile will result in an error on startup.
  263. ====
  264. [discrete]
  265. [[saml-realm-nameid-changes]]
  266. .The `nameid_format` SAML realm setting no longer has a default value.
  267. [%collapsible]
  268. ====
  269. *Details* +
  270. In SAML, Identity Providers (IdPs) can either be explicitly configured to
  271. release a `NameID` with a specific format, or configured to attempt to conform
  272. with the requirements of a Service Provider (SP). The SP declares its
  273. requirements in the `NameIDPolicy` element of a SAML Authentication Request.
  274. In {es}, the `nameid_format` SAML realm setting controls the `NameIDPolicy`
  275. value.
  276. Previously, the default value for `nameid_format` was
  277. `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`. This setting created
  278. authentication requests that required the IdP to release `NameID` with a
  279. `transient` format.
  280. The default value has been removed, which means that {es} will create SAML Authentication Requests by default that don't put this requirement on the
  281. IdP. If you want to retain the previous behavior, set `nameid_format` to
  282. `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
  283. *Impact* +
  284. If you currently don't configure `nameid_format` explicitly, it's possible
  285. that your IdP will reject authentication requests from {es} because the requests
  286. do not specify a `NameID` format (and your IdP is configured to expect one).
  287. This mismatch can result in a broken SAML configuration. If you're unsure whether
  288. your IdP is explicitly configured to use a certain `NameID` format and you want to retain current behavior
  289. , try setting `nameid_format` to `urn:oasis:names:tc:SAML:2.0:nameid-format:transient` explicitly.
  290. ====
  291. .The `xpack.security.transport.ssl.enabled` setting is now required to configure `xpack.security.transport.ssl` settings.
  292. [%collapsible]
  293. ====
  294. *Details* +
  295. It is now an error to configure any SSL settings for
  296. `xpack.security.transport.ssl` without also configuring
  297. `xpack.security.transport.ssl.enabled`.
  298. *Impact* +
  299. If using other `xpack.security.transport.ssl` settings, you must explicitly
  300. specify the `xpack.security.transport.ssl.enabled` setting.
  301. If you do not want to enable SSL and are currently using other
  302. `xpack.security.transport.ssl` settings, do one of the following:
  303. * Explicitly specify `xpack.security.transport.ssl.enabled` as `false`
  304. * Discontinue use of other `xpack.security.transport.ssl` settings
  305. If you want to enable SSL, follow the instructions in
  306. {ref}/configuring-tls.html#tls-transport[Encrypting communications between nodes
  307. in a cluster]. As part of this configuration, explicitly specify
  308. `xpack.security.transport.ssl.enabled` as `true`.
  309. For example, the following configuration is invalid:
  310. [source,yaml]
  311. --------------------------------------------------
  312. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  313. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  314. --------------------------------------------------
  315. And must be configured as:
  316. [source,yaml]
  317. --------------------------------------------------
  318. xpack.security.transport.ssl.enabled: true <1>
  319. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  320. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  321. --------------------------------------------------
  322. <1> or `false`.
  323. ====
  324. .The `xpack.security.http.ssl.enabled` setting is now required to configure `xpack.security.http.ssl` settings.
  325. [%collapsible]
  326. ====
  327. *Details* +
  328. It is now an error to configure any SSL settings for
  329. `xpack.security.http.ssl` without also configuring
  330. `xpack.security.http.ssl.enabled`.
  331. *Impact* +
  332. If using other `xpack.security.http.ssl` settings, you must explicitly
  333. specify the `xpack.security.http.ssl.enabled` setting.
  334. If you do not want to enable SSL and are currently using other
  335. `xpack.security.http.ssl` settings, do one of the following:
  336. * Explicitly specify `xpack.security.http.ssl.enabled` as `false`
  337. * Discontinue use of other `xpack.security.http.ssl` settings
  338. If you want to enable SSL, follow the instructions in
  339. {ref}/configuring-tls.html#tls-http[Encrypting HTTP client communications]. As part
  340. of this configuration, explicitly specify `xpack.security.http.ssl.enabled`
  341. as `true`.
  342. For example, the following configuration is invalid:
  343. [source,yaml]
  344. --------------------------------------------------
  345. xpack.security.http.ssl.certificate: elasticsearch.crt
  346. xpack.security.http.ssl.key: elasticsearch.key
  347. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  348. --------------------------------------------------
  349. And must be configured as either:
  350. [source,yaml]
  351. --------------------------------------------------
  352. xpack.security.http.ssl.enabled: true <1>
  353. xpack.security.http.ssl.certificate: elasticsearch.crt
  354. xpack.security.http.ssl.key: elasticsearch.key
  355. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  356. --------------------------------------------------
  357. <1> or `false`.
  358. ====
  359. .A `xpack.security.transport.ssl` certificate and key are now required to enable SSL for the transport interface.
  360. [%collapsible]
  361. ====
  362. *Details* +
  363. It is now an error to enable SSL for the transport interface without also configuring
  364. a certificate and key through use of the `xpack.security.transport.ssl.keystore.path`
  365. setting or the `xpack.security.transport.ssl.certificate` and
  366. `xpack.security.transport.ssl.key` settings.
  367. *Impact* +
  368. If `xpack.security.transport.ssl.enabled` is set to `true`, provide a
  369. certificate and key using the `xpack.security.transport.ssl.keystore.path`
  370. setting or the `xpack.security.transport.ssl.certificate` and
  371. `xpack.security.transport.ssl.key` settings. If a certificate and key is not
  372. provided, {es} will return in an error on startup.
  373. ====
  374. .A `xpack.security.http.ssl` certificate and key are now required to enable SSL for the HTTP server.
  375. [%collapsible]
  376. ====
  377. *Details* +
  378. It is now an error to enable SSL for the HTTP (Rest) server without also configuring
  379. a certificate and key through use of the `xpack.security.http.ssl.keystore.path`
  380. setting or the `xpack.security.http.ssl.certificate` and
  381. `xpack.security.http.ssl.key` settings.
  382. *Impact* +
  383. If `xpack.security.http.ssl.enabled` is set to `true`, provide a certificate and
  384. key using the `xpack.security.http.ssl.keystore.path` setting or the
  385. `xpack.security.http.ssl.certificate` and `xpack.security.http.ssl.key`
  386. settings. If certificate and key is not provided, {es} will return in an error
  387. on startup.
  388. ====
  389. .PKCS#11 keystores and trustores cannot be configured in `elasticsearch.yml`
  390. [%collapsible]
  391. ====
  392. *Details* +
  393. The settings `*.ssl.keystore.type` and `*.ssl.truststore.type` no longer accept "PKCS11" as a valid type.
  394. This applies to all SSL settings in Elasticsearch, including
  395. - `xpack.security.http.keystore.type`
  396. - `xpack.security.transport.keystore.type`
  397. - `xpack.security.http.truststore.type`
  398. - `xpack.security.transport.truststore.type`
  399. As well as SSL settings for security realms, watcher and monitoring.
  400. Use of a PKCS#11 keystore or truststore as the JRE's default store is not affected.
  401. *Impact* +
  402. If you have a PKCS#11 keystore configured within your `elasticsearch.yml` file, you must remove that
  403. configuration and switch to a supported keystore type, or configure your PKCS#11 keystore as the
  404. JRE default store.
  405. ====
  406. .The `kibana` user has been replaced by `kibana_system`.
  407. [%collapsible]
  408. ====
  409. *Details* +
  410. The `kibana` user was historically used to authenticate {kib} to {es}.
  411. The name of this user was confusing, and was often mistakenly used to login to {kib}.
  412. This has been renamed to `kibana_system` in order to reduce confusion, and to better
  413. align with other built-in system accounts.
  414. *Impact* +
  415. Replace any use of the `kibana` user with the `kibana_system` user. Specifying
  416. the `kibana` user in `kibana.yml` will result in an error on startup.
  417. If your `kibana.yml` used to contain:
  418. [source,yaml]
  419. --------------------------------------------------
  420. elasticsearch.username: kibana
  421. --------------------------------------------------
  422. then you should update to use the new `kibana_system` user instead:
  423. [source,yaml]
  424. --------------------------------------------------
  425. elasticsearch.username: kibana_system
  426. --------------------------------------------------
  427. IMPORTANT: The new `kibana_system` user does not preserve the previous `kibana`
  428. user password. You must explicitly set a password for the `kibana_system` user.
  429. ====
  430. [[search-remote-settings-removed]]
  431. .The `search.remote.*` settings have been removed.
  432. [%collapsible]
  433. ====
  434. *Details* +
  435. In 6.5 these settings were deprecated in favor of `cluster.remote`. In 7.x we
  436. provided automatic upgrading of these settings to their `cluster.remote`
  437. counterparts. In 8.0.0, these settings have been removed. Elasticsearch will
  438. refuse to start if you have these settings in your configuration or cluster
  439. state.
  440. *Impact* +
  441. Use the replacement `cluster.remote` settings. Discontinue use of the
  442. `search.remote.*` settings. Specifying these settings in `elasticsearch.yml`
  443. will result in an error on startup.
  444. ====
  445. [[remove-pidfile]]
  446. .The `pidfile` setting has been replaced by `node.pidfile`.
  447. [%collapsible]
  448. ====
  449. *Details* +
  450. To ensure that all settings are in a proper namespace, the `pidfile` setting was
  451. previously deprecated in version 7.4.0 of Elasticsearch, and is removed in
  452. version 8.0.0. Instead, use `node.pidfile`.
  453. *Impact* +
  454. Use the `node.pidfile` setting. Discontinue use of the `pidfile` setting.
  455. Specifying the `pidfile` setting in `elasticsearch.yml` will result in an error
  456. on startup.
  457. ====
  458. [[remove-processors]]
  459. .The `processors` setting has been replaced by `node.processors`.
  460. [%collapsible]
  461. ====
  462. *Details* +
  463. To ensure that all settings are in a proper namespace, the `processors` setting
  464. was previously deprecated in version 7.4.0 of Elasticsearch, and is removed in
  465. version 8.0.0. Instead, use `node.processors`.
  466. *Impact* +
  467. Use the `node.processors` setting. Discontinue use of the `processors` setting.
  468. Specifying the `processors` setting in `elasticsearch.yml` will result in an
  469. error on startup.
  470. ====
  471. .The `node.processors` setting can no longer exceed the available number of processors.
  472. [%collapsible]
  473. ====
  474. *Details* +
  475. Previously it was possible to set the number of processors used to set the
  476. default sizes for the thread pools to be more than the number of available
  477. processors. As this leads to more context switches and more threads but without
  478. an increase in the number of physical CPUs on which to schedule these additional
  479. threads, the `node.processors` setting is now bounded by the number of available
  480. processors.
  481. *Impact* +
  482. If specified, ensure the value of `node.processors` setting does not exceed the
  483. number of available processors. Setting the `node.processors` value greater than
  484. the number of available processors in `elasticsearch.yml` will result in an
  485. error on startup.
  486. ====
  487. .The `cluster.remote.connect` setting has been removed.
  488. [%collapsible]
  489. ====
  490. *Details* +
  491. In Elasticsearch 7.7.0, the setting `cluster.remote.connect` was deprecated in
  492. favor of setting `node.remote_cluster_client`. In Elasticsearch 8.0.0, the
  493. setting `cluster.remote.connect` is removed.
  494. *Impact* +
  495. Use the `node.remote_cluster_client` setting. Discontinue use of the
  496. `cluster.remote.connect` setting. Specifying the `cluster.remote.connect`
  497. setting in `elasticsearch.yml` will result in an error on startup.
  498. ====
  499. .The `node.local_storage` setting has been removed.
  500. [%collapsible]
  501. ====
  502. *Details* +
  503. In Elasticsearch 7.8.0, the setting `node.local_storage` was deprecated and
  504. beginning in Elasticsearch 8.0.0 all nodes will require local storage. Therefore,
  505. the `node.local_storage` setting has been removed.
  506. *Impact* +
  507. Discontinue use of the `node.local_storage` setting. Specifying this setting in
  508. `elasticsearch.yml` will result in an error on startup.
  509. ====
  510. .The `auth.password` setting for HTTP monitoring has been removed.
  511. [%collapsible]
  512. ====
  513. *Details* +
  514. In Elasticsearch 7.7.0, the setting `xpack.monitoring.exporters.<exporterName>.auth.password`
  515. was deprecated in favor of setting `xpack.monitoring.exporters.<exporterName>.auth.secure_password`.
  516. In Elasticsearch 8.0.0, the setting `xpack.monitoring.exporters.<exporterName>.auth.password` is
  517. removed.
  518. *Impact* +
  519. Use the `xpack.monitoring.exporters.<exporterName>.auth.secure_password`
  520. setting. Discontinue use of the
  521. `xpack.monitoring.exporters.<exporterName>.auth.password` setting. Specifying
  522. the `xpack.monitoring.exporters.<exporterName>.auth.password` setting in
  523. `elasticsearch.yml` will result in an error on startup.
  524. ====
  525. .Settings used to disable basic license features have been removed.
  526. [%collapsible]
  527. ====
  528. *Details* +
  529. The following settings were deprecated in {es} 7.8.0 and have been removed
  530. in {es} 8.0.0:
  531. * `xpack.enrich.enabled`
  532. * `xpack.flattened.enabled`
  533. * `xpack.ilm.enabled`
  534. * `xpack.monitoring.enabled`
  535. * `xpack.rollup.enabled`
  536. * `xpack.slm.enabled`
  537. * `xpack.sql.enabled`
  538. * `xpack.transform.enabled`
  539. * `xpack.vectors.enabled`
  540. These basic license features are now always enabled.
  541. If you have disabled ILM so that you can use another tool to manage Watcher
  542. indices, the newly introduced `xpack.watcher.use_ilm_index_management` setting
  543. may be set to false.
  544. *Impact* +
  545. Discontinue use of the removed settings. Specifying these settings in
  546. `elasticsearch.yml` will result in an error on startup.
  547. ====
  548. .Settings used to defer cluster recovery pending a certain number of master nodes have been removed.
  549. [%collapsible]
  550. ====
  551. *Details* +
  552. The following cluster settings have been removed:
  553. * `gateway.expected_nodes`
  554. * `gateway.expected_master_nodes`
  555. * `gateway.recover_after_nodes`
  556. * `gateway.recover_after_master_nodes`
  557. It is safe to recover the cluster as soon as a majority of master-eligible
  558. nodes have joined so there is no benefit in waiting for any additional
  559. master-eligible nodes to start.
  560. *Impact* +
  561. Discontinue use of the removed settings. If needed, use
  562. `gateway.expected_data_nodes` or `gateway.recover_after_data_nodes` to defer
  563. cluster recovery pending a certain number of data nodes.
  564. ====
  565. .Legacy role settings have been removed.
  566. [%collapsible]
  567. ====
  568. *Details* +
  569. The legacy role settings:
  570. * `node.data`
  571. * `node.ingest`
  572. * `node.master`
  573. * `node.ml`
  574. * `node.remote_cluster_client`
  575. * `node.transform`
  576. * `node.voting_only`
  577. have been removed. Instead, use the `node.roles` setting. If you were previously
  578. using the legacy role settings on a 7.13 or later cluster, you will have a
  579. deprecation log message on each of your nodes indicating the exact replacement
  580. value for `node.roles`.
  581. *Impact* +
  582. Discontinue use of the removed settings. Specifying these settings in
  583. `elasticsearch.yml` will result in an error on startup.
  584. ====
  585. [[system-call-filter-setting]]
  586. .The system call filter setting has been removed.
  587. [%collapsible]
  588. ====
  589. *Details* +
  590. Elasticsearch uses system call filters to remove its ability to fork another
  591. process. This is useful to mitigate remote code exploits. These system call
  592. filters are enabled by default, and were previously controlled via the setting
  593. `bootstrap.system_call_filter`. Starting in Elasticsearch 8.0, system call
  594. filters will be required. As such, the setting `bootstrap.system_call_filter`
  595. was deprecated in Elasticsearch 7.13.0, and is removed as of Elasticsearch
  596. 8.0.0.
  597. *Impact* +
  598. Discontinue use of the removed setting. Specifying this setting in Elasticsearch
  599. configuration will result in an error on startup.
  600. ====
  601. [[tier-filter-setting]]
  602. .Tier filtering settings have been removed.
  603. [%collapsible]
  604. ====
  605. *Details* +
  606. The cluster and index level settings ending in `._tier` used for filtering the allocation of a shard
  607. to a particular set of nodes have been removed. Instead, the
  608. {ref}/data-tier-shard-filtering.html#tier-preference-allocation-filter[tier
  609. preference setting], `index.routing.allocation.include._tier_preference` should
  610. be used. The removed settings are:
  611. Cluster level settings:
  612. - `cluster.routing.allocation.include._tier`
  613. - `cluster.routing.allocation.exclude._tier`
  614. - `cluster.routing.allocation.require._tier`
  615. Index settings:
  616. - `index.routing.allocation.include._tier`
  617. - `index.routing.allocation.exclude._tier`
  618. - `index.routing.allocation.require._tier`
  619. *Impact* +
  620. Discontinue use of the removed settings. Specifying any of these cluster settings in Elasticsearch
  621. configuration will result in an error on startup. Any indices using these settings will have the
  622. settings archived (and they will have no effect) when the index metadata is loaded.
  623. ====
  624. [[shared-data-path-setting]]
  625. .Shared data path and per index data path settings are deprecated.
  626. [%collapsible]
  627. ====
  628. *Details* +
  629. Elasticsearch uses the shared data path as the base path of per index data
  630. paths. This feature was previously used with shared replicas. Starting in
  631. 7.13.0, these settings are deprecated. Starting in 8.0 only existing
  632. indices created in 7.x will be capable of using the shared data path and
  633. per index data path settings.
  634. *Impact* +
  635. Discontinue use of the deprecated settings.
  636. ====
  637. [[single-data-node-watermark-setting]]
  638. .The single data node watermark setting is deprecated and now only accepts `true`.
  639. [%collapsible]
  640. ====
  641. *Details* +
  642. In 7.14, setting `cluster.routing.allocation.disk.watermark.enable_for_single_data_node`
  643. to false was deprecated. Starting in 8.0, the only legal value will be
  644. true. In a future release, the setting will be removed completely, with same
  645. behavior as if the setting was `true`.
  646. If the old behavior is desired for a single data node cluster, disk based
  647. allocation can be disabled by setting
  648. `cluster.routing.allocation.disk.threshold_enabled: false`
  649. *Impact* +
  650. Discontinue use of the deprecated setting.
  651. ====
  652. [[auto-import-dangling-indices-removed]]
  653. .The `gateway.auto_import_dangling_indices` setting has been removed.
  654. [%collapsible]
  655. ====
  656. *Details* +
  657. The `gateway.auto_import_dangling_indices` cluster setting has been removed.
  658. Previously, you could use this setting to automatically import
  659. {ref}/modules-gateway.html#dangling-indices[dangling indices]. However,
  660. automatically importing dangling indices is unsafe. Use the
  661. {ref}/indices.html#dangling-indices-api[dangling indices APIs] to manage and
  662. import dangling indices instead.
  663. *Impact* +
  664. Discontinue use of the removed setting. Specifying the setting in
  665. `elasticsearch.yml` will result in an error on startup.
  666. ====
  667. .The `listener` thread pool has been removed.
  668. [%collapsible]
  669. ====
  670. *Details* +
  671. Previously, the transport client used the thread pool to ensure listeners aren't
  672. called back on network threads. The transport client has been removed
  673. in 8.0, and the thread pool is no longer needed.
  674. *Impact* +
  675. Remove `listener` thread pool settings from `elasticsearch.yml` for any nodes.
  676. Specifying `listener` thread pool settings in `elasticsearch.yml` will result in
  677. an error on startup.
  678. ====
  679. .The `fixed_auto_queue_size` thread pool type has been removed.
  680. [%collapsible]
  681. ====
  682. *Details* +
  683. The `fixed_auto_queue_size` thread pool type, previously marked as an
  684. experimental feature, was deprecated in 7.x and has been removed in 8.0.
  685. The `search` and `search_throttled` thread pools have the `fixed` type now.
  686. *Impact* +
  687. No action needed.
  688. ====
  689. .Several `transport` settings have been replaced.
  690. [%collapsible]
  691. ====
  692. *Details* +
  693. The following settings have been deprecated in 7.x and removed in 8.0. Each setting has a replacement
  694. setting that was introduced in 6.7.
  695. - `transport.tcp.port` replaced by `transport.port`
  696. - `transport.tcp.compress` replaced by `transport.compress`
  697. - `transport.tcp.connect_timeout` replaced by `transport.connect_timeout`
  698. - `transport.tcp_no_delay` replaced by `transport.tcp.no_delay`
  699. - `transport.profiles.profile_name.tcp_no_delay` replaced by `transport.profiles.profile_name.tcp.no_delay`
  700. - `transport.profiles.profile_name.tcp_keep_alive` replaced by `transport.profiles.profile_name.tcp.keep_alive`
  701. - `transport.profiles.profile_name.reuse_address` replaced by `transport.profiles.profile_name.tcp.reuse_address`
  702. - `transport.profiles.profile_name.send_buffer_size` replaced by `transport.profiles.profile_name.tcp.send_buffer_size`
  703. - `transport.profiles.profile_name.receive_buffer_size` replaced by `transport.profiles.profile_name.tcp.receive_buffer_size`
  704. *Impact* +
  705. Use the replacement settings. Discontinue use of the removed settings.
  706. Specifying the removed settings in `elasticsearch.yml` will result in an error
  707. on startup.
  708. ====
  709. .Selective transport compression has been enabled by default.
  710. [%collapsible]
  711. ====
  712. *Details* +
  713. Prior to 8.0, transport compression was disabled by default. Starting in 8.0,
  714. `transport.compress` defaults to `indexing_data`. This configuration means that
  715. the propagation of raw indexing data will be compressed between nodes.
  716. *Impact* +
  717. Inter-node transit will get reduced along the indexing path. In some scenarios,
  718. CPU usage could increase.
  719. ====
  720. .Transport compression defaults to lz4.
  721. [%collapsible]
  722. ====
  723. *Details* +
  724. Prior to 8.0, the `transport.compression_scheme` setting defaulted to `deflate`. Starting in
  725. 8.0, `transport.compress_scheme` defaults to `lz4`.
  726. Prior to 8.0, the `cluster.remote.<cluster_alias>.transport.compression_scheme`
  727. setting defaulted to `deflate` when `cluster.remote.<cluster_alias>.transport.compress`
  728. was explicitly configured. Starting in 8.0,
  729. `cluster.remote.<cluster_alias>.transport.compression_scheme` will fallback to
  730. `transport.compression_scheme` by default.
  731. *Impact* +
  732. This configuration means that transport compression will produce somewhat lower
  733. compression ratios in exchange for lower CPU load.
  734. ====
  735. .The `repositories.fs.compress` node-level setting has been removed.
  736. [%collapsible]
  737. ====
  738. *Details* +
  739. For shared file system repositories (`"type": "fs"`), the node level setting `repositories.fs.compress` could
  740. previously be used to enable compression for all shared file system repositories where `compress` was not specified.
  741. The `repositories.fs.compress` setting has been removed.
  742. *Impact* +
  743. Use the repository specific `compress` setting to enable compression. See
  744. {ref}/snapshots-register-repository.html[Register a snapshot repository] for
  745. information on the `compress` setting.
  746. Discontinue use of the `repositories.fs.compress` node-level setting.
  747. ====
  748. //end::notable-breaking-changes[]
  749. // This change is not notable because it should not have any impact on upgrades
  750. // However we document it here out of an abundance of caution
  751. [[fips-default-hash-changed]]
  752. .When FIPS mode is enabled the default password hash is now PBKDF2_STRETCH
  753. [%collapsible]
  754. ====
  755. *Details* +
  756. If `xpack.security.fips_mode.enabled` is true (see <<fips-140-compliance>>),
  757. the value of `xpack.security.authc.password_hashing.algorithm` now defaults to
  758. `pbkdf2_stretch`.
  759. In earlier versions this setting would always default to `bcrypt` and a runtime
  760. check would prevent a node from starting unless the value was explicitly set to
  761. a "pbkdf2" variant.
  762. There is no change for clusters that do not enable FIPS 140 mode.
  763. *Impact* +
  764. This change should not have any impact on upgraded nodes.
  765. Any node with an explicitly configured value for the password hashing algorithm
  766. will continue to use that configured value.
  767. Any node that did not have an explicitly configured password hashing algorithm in
  768. {es} 6.x or {es} 7.x would have failed to start.
  769. ====