2016-11-21 04:52:55 -05:00
|
|
|
import org.elasticsearch.gradle.MavenFilteringHack
|
|
|
|
import org.elasticsearch.gradle.test.NodeInfo
|
2017-02-08 11:58:57 -05:00
|
|
|
import org.gradle.plugins.ide.eclipse.model.SourceFolder
|
|
|
|
import org.elasticsearch.gradle.precommit.LicenseHeadersTask
|
|
|
|
import org.elasticsearch.gradle.VersionProperties
|
|
|
|
import com.bettercloud.vault.Vault
|
|
|
|
import com.bettercloud.vault.VaultConfig
|
|
|
|
import com.bettercloud.vault.response.LogicalResponse
|
2017-02-09 10:28:46 -05:00
|
|
|
import com.amazonaws.AmazonServiceException
|
|
|
|
import com.amazonaws.ClientConfiguration
|
|
|
|
import com.amazonaws.auth.AWSCredentials
|
|
|
|
import com.amazonaws.auth.BasicAWSCredentials
|
|
|
|
import com.amazonaws.services.s3.AmazonS3Client
|
|
|
|
import com.amazonaws.services.s3.model.HeadBucketRequest
|
2016-11-21 04:52:55 -05:00
|
|
|
|
2016-09-29 06:03:14 -04:00
|
|
|
import java.nio.charset.StandardCharsets
|
|
|
|
import java.nio.file.Files
|
|
|
|
import java.nio.file.Path
|
|
|
|
import java.nio.file.StandardCopyOption
|
2017-02-08 11:58:57 -05:00
|
|
|
import java.nio.file.attribute.PosixFilePermission
|
|
|
|
import java.nio.file.attribute.PosixFilePermissions
|
2016-07-25 20:09:54 -04:00
|
|
|
|
2016-09-29 06:03:14 -04:00
|
|
|
group 'org.elasticsearch.plugin'
|
|
|
|
|
|
|
|
apply plugin: 'elasticsearch.esplugin'
|
|
|
|
esplugin {
|
|
|
|
name 'x-pack'
|
|
|
|
description 'Elasticsearch Expanded Pack Plugin'
|
|
|
|
classname 'org.elasticsearch.xpack.XPackPlugin'
|
|
|
|
}
|
2016-10-03 19:38:04 -04:00
|
|
|
archivesBaseName = 'x-pack' // for api jar
|
2016-09-29 06:03:14 -04:00
|
|
|
|
2017-02-08 11:58:57 -05:00
|
|
|
buildscript {
|
|
|
|
repositories {
|
|
|
|
mavenCentral()
|
|
|
|
}
|
|
|
|
dependencies {
|
|
|
|
classpath group: 'com.bettercloud', name: 'vault-java-driver', version:"1.1.0"
|
2017-02-09 10:28:46 -05:00
|
|
|
classpath 'com.amazonaws:aws-java-sdk-s3:1.10.33'
|
2017-02-08 11:58:57 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-09 17:08:36 -05:00
|
|
|
Closure setAwsCreds = {
|
2017-02-08 11:58:57 -05:00
|
|
|
// first need to get an authentication token with vault
|
2017-02-09 17:08:36 -05:00
|
|
|
String homePath = System.properties['user.home']
|
|
|
|
File githubToken = file("${homePath}/.elastic/github.token")
|
|
|
|
final String VAULT_URL = 'https://secrets.elastic.co:8200'
|
|
|
|
final String VAULT_ROLE_ID = "8e90dd88-5a8e-9c12-0da9-5439f293ff97"
|
|
|
|
final String VAULT_SECRET_ID = System.env.VAULT_SECRET_ID
|
|
|
|
String authBody = null
|
|
|
|
URL vaultUrl = null
|
|
|
|
if (githubToken.exists()) {
|
|
|
|
try {
|
|
|
|
Set<PosixFilePermission> perms = Files.getPosixFilePermissions(githubToken.toPath())
|
|
|
|
if (perms.equals(PosixFilePermissions.fromString("rw-------")) == false) {
|
|
|
|
throw new GradleException('github.token must have 600 permissions')
|
|
|
|
}
|
|
|
|
} catch (UnsupportedOperationException e) {
|
|
|
|
// Assume this isn't a POSIX file system
|
2017-02-09 09:09:51 -05:00
|
|
|
}
|
2017-02-09 17:08:36 -05:00
|
|
|
vaultUrl = new URL(VAULT_URL + '/v1/auth/github/login')
|
|
|
|
authBody = "{\"token\": \"${githubToken.getText('UTF-8').trim()}\"}"
|
|
|
|
} else if (VAULT_SECRET_ID != null) {
|
|
|
|
vaultUrl = new URL(VAULT_URL + '/v1/auth/approle/login')
|
|
|
|
authBody = "{\"role_id\": \"${VAULT_ROLE_ID}\", \"secret_id\": \"${VAULT_SECRET_ID}\"}"
|
|
|
|
} else {
|
2017-02-08 11:58:57 -05:00
|
|
|
throw new GradleException('Missing ~/.elastic/github.token file or VAULT_SECRET_ID environment variable, needed to authenticate with vault for secrets')
|
2017-02-09 17:08:36 -05:00
|
|
|
}
|
|
|
|
HttpURLConnection vaultConn = (HttpURLConnection) vaultUrl.openConnection()
|
|
|
|
vaultConn.setRequestProperty('Content-Type', 'application/json')
|
|
|
|
vaultConn.setRequestMethod('PUT')
|
|
|
|
vaultConn.setDoOutput(true)
|
|
|
|
vaultConn.outputStream.withWriter('UTF-8') { writer ->
|
2017-02-08 11:58:57 -05:00
|
|
|
writer.write(authBody)
|
2017-02-09 17:08:36 -05:00
|
|
|
}
|
|
|
|
vaultConn.connect()
|
|
|
|
Object authResponse = new groovy.json.JsonSlurper().parseText(vaultConn.content.text)
|
|
|
|
VaultConfig config = new VaultConfig(VAULT_URL, authResponse.auth.client_token)
|
|
|
|
Vault vault = new Vault(config)
|
|
|
|
LogicalResponse secret = vault.logical().read("aws-dev/creds/prelertartifacts")
|
|
|
|
project.ext.mlAwsAccessKey = secret.data.get('access_key')
|
|
|
|
project.ext.mlAwsSecretKey = secret.data.get('secret_key')
|
|
|
|
// Retrying 10 times to give AWS a chance to propagate the credentials
|
|
|
|
int retries = 60
|
|
|
|
while (retries > 0) {
|
|
|
|
AWSCredentials creds = new BasicAWSCredentials(project.mlAwsAccessKey, project.mlAwsSecretKey)
|
|
|
|
|
|
|
|
ClientConfiguration clientConfiguration = new ClientConfiguration()
|
|
|
|
// the response metadata cache is only there for diagnostics purposes,
|
|
|
|
// but can force objects from every response to the old generation.
|
|
|
|
clientConfiguration.setResponseMetadataCacheSize(0)
|
|
|
|
|
|
|
|
AmazonS3Client client = new AmazonS3Client(creds, clientConfiguration)
|
|
|
|
try {
|
|
|
|
client.headBucket(new HeadBucketRequest('prelert-artifacts'))
|
|
|
|
break;
|
|
|
|
} catch (AmazonServiceException e) {
|
|
|
|
if (e.getStatusCode() != 403 || retries == 0) {
|
|
|
|
throw new GradleException('Could not access ml-cpp artifacts. Timed out after 60 attempts', e)
|
|
|
|
}
|
2017-02-09 10:28:46 -05:00
|
|
|
}
|
2017-02-09 17:08:36 -05:00
|
|
|
sleep(500)
|
|
|
|
retries--
|
2017-02-09 10:28:46 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-09 17:08:36 -05:00
|
|
|
gradle.taskGraph.whenReady { taskGraph ->
|
|
|
|
// Vault auth to get keys for access to cpp artifacts
|
2017-02-09 10:28:46 -05:00
|
|
|
|
2017-02-09 17:08:36 -05:00
|
|
|
if (taskGraph.hasTask(bundlePlugin)) {
|
|
|
|
if (project.hasProperty("mlAwsAccessKey") == false && project.hasProperty("mlAwsSecretKey") == false) {
|
|
|
|
setAwsCreds()
|
|
|
|
}
|
2017-02-08 11:58:57 -05:00
|
|
|
|
2017-02-09 17:08:36 -05:00
|
|
|
repositories {
|
|
|
|
maven {
|
|
|
|
url "s3://prelert-artifacts/maven"
|
|
|
|
credentials(AwsCredentials) {
|
|
|
|
accessKey "${project.mlAwsAccessKey}"
|
|
|
|
secretKey "${project.mlAwsSecretKey}"
|
|
|
|
}
|
2017-02-08 11:58:57 -05:00
|
|
|
}
|
2017-02-09 17:08:36 -05:00
|
|
|
}
|
|
|
|
// For some unknown reason, this from statement triggers
|
|
|
|
// a resolve of the nativeBundle configuration. It should
|
|
|
|
// be delayed until the bundlePlugin task is executed, but
|
|
|
|
// it is not. So for now, we add the extra files to bundlePlugin
|
|
|
|
// here right after configuring the prelert maven, which
|
|
|
|
// will only happen when bundlePlugin will be run anyways.
|
|
|
|
project.bundlePlugin.from {
|
|
|
|
zipTree(configurations.nativeBundle.singleFile)
|
|
|
|
}
|
2017-02-08 11:58:57 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-29 06:03:14 -04:00
|
|
|
// TODO: fix this! https://github.com/elastic/x-plugins/issues/1066
|
|
|
|
ext.compactProfile = 'full'
|
|
|
|
|
|
|
|
dependencyLicenses.enabled = false
|
|
|
|
|
|
|
|
licenseHeaders {
|
|
|
|
approvedLicenses << 'BCrypt (BSD-like)'
|
|
|
|
additionalLicense 'BCRYP', 'BCrypt (BSD-like)', 'Copyright (c) 2006 Damien Miller <djm@mindrot.org>'
|
|
|
|
}
|
|
|
|
|
2017-02-08 11:58:57 -05:00
|
|
|
configurations {
|
|
|
|
nativeBundle
|
|
|
|
}
|
|
|
|
|
|
|
|
if (findProject(':machine-learning-cpp') != null) {
|
|
|
|
configurations.nativeBundle {
|
|
|
|
resolutionStrategy.dependencySubstitution {
|
|
|
|
substitute module("org.elasticsearch.ml:ml-cpp") with project(":machine-learning-cpp")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
bundlePlugin.dependsOn ':machine-learning-cpp:buildUberZip'
|
|
|
|
}
|
|
|
|
|
2016-09-29 06:03:14 -04:00
|
|
|
dependencies {
|
|
|
|
// security deps
|
|
|
|
compile project(path: ':modules:transport-netty4', configuration: 'runtime')
|
2016-10-20 06:37:30 -04:00
|
|
|
compile 'com.unboundid:unboundid-ldapsdk:3.2.0'
|
2016-09-29 06:03:14 -04:00
|
|
|
compile 'org.bouncycastle:bcprov-jdk15on:1.55'
|
|
|
|
compile 'org.bouncycastle:bcpkix-jdk15on:1.55'
|
|
|
|
testCompile 'com.google.jimfs:jimfs:1.1'
|
|
|
|
|
|
|
|
// watcher deps
|
|
|
|
compile 'com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer:r239'
|
|
|
|
compile 'com.google.guava:guava:16.0.1' // needed by watcher for the html sanitizer and security tests for jimfs
|
|
|
|
compile 'com.sun.mail:javax.mail:1.5.3'
|
|
|
|
// HACK: java 9 removed javax.activation from the default modules, so instead of trying to add modules, which would have
|
|
|
|
// to be conditionalized for java 8/9, we pull in the classes directly
|
|
|
|
compile 'javax.activation:activation:1.1'
|
|
|
|
|
|
|
|
testCompile 'org.subethamail:subethasmtp:3.1.7'
|
|
|
|
// needed for subethasmtp, has @GuardedBy annotation
|
|
|
|
testCompile 'com.google.code.findbugs:jsr305:3.0.1'
|
|
|
|
|
|
|
|
// monitoring deps
|
|
|
|
compile "org.elasticsearch.client:rest:${version}"
|
|
|
|
compile "org.elasticsearch.client:sniffer:${version}"
|
|
|
|
|
2017-02-08 11:58:57 -05:00
|
|
|
// ml deps
|
2017-02-09 17:08:36 -05:00
|
|
|
compile 'net.sf.supercsv:super-csv:2.4.0'
|
|
|
|
nativeBundle "org.elasticsearch.ml:ml-cpp:${project.version}@zip"
|
|
|
|
testCompile 'org.ini4j:ini4j:0.5.2'
|
2017-02-08 11:58:57 -05:00
|
|
|
|
2016-09-29 06:03:14 -04:00
|
|
|
// common test deps
|
|
|
|
testCompile 'org.elasticsearch:securemock:1.2'
|
2017-01-05 12:29:31 -05:00
|
|
|
testCompile "org.elasticsearch:mocksocket:${versions.mocksocket}"
|
2016-09-29 06:03:14 -04:00
|
|
|
testCompile 'org.slf4j:slf4j-log4j12:1.6.2'
|
|
|
|
testCompile 'org.slf4j:slf4j-api:1.6.2'
|
|
|
|
}
|
|
|
|
|
|
|
|
// make LicenseSigner available for testing signed licenses
|
|
|
|
sourceSets.test.java {
|
|
|
|
srcDir '../license-tools/src/main/java'
|
|
|
|
}
|
|
|
|
|
|
|
|
compileJava.options.compilerArgs << "-Xlint:-deprecation,-rawtypes,-serial,-try,-unchecked"
|
|
|
|
compileTestJava.options.compilerArgs << "-Xlint:-deprecation,-rawtypes,-serial,-try,-unchecked"
|
|
|
|
|
|
|
|
ext.expansions = [
|
|
|
|
'project.version': version,
|
|
|
|
]
|
|
|
|
|
|
|
|
processResources {
|
|
|
|
from(sourceSets.main.resources.srcDirs) {
|
|
|
|
exclude '**/public.key'
|
|
|
|
inputs.properties(expansions)
|
|
|
|
MavenFilteringHack.filter(it, expansions)
|
|
|
|
}
|
|
|
|
boolean snapshot = "true".equals(System.getProperty("build.snapshot", "true"))
|
|
|
|
if (snapshot) {
|
2016-10-01 03:46:43 -04:00
|
|
|
from 'keys/dev/public.key'
|
2016-09-29 06:03:14 -04:00
|
|
|
} else {
|
2016-10-01 03:46:43 -04:00
|
|
|
from 'keys/prod/public.key'
|
2016-02-03 11:21:55 -05:00
|
|
|
}
|
2016-09-29 06:03:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
forbiddenPatterns {
|
|
|
|
exclude '**/*.key'
|
|
|
|
exclude '**/*.p12'
|
|
|
|
exclude '**/*.der'
|
|
|
|
exclude '**/*.zip'
|
|
|
|
}
|
2016-07-25 20:09:54 -04:00
|
|
|
|
2016-09-29 06:03:14 -04:00
|
|
|
// TODO: standardize packaging config for plugins
|
|
|
|
bundlePlugin {
|
2017-02-10 14:02:42 -05:00
|
|
|
from(parent.projectDir) {
|
2016-09-29 06:03:14 -04:00
|
|
|
include 'LICENSE.txt'
|
|
|
|
}
|
|
|
|
from(projectDir) {
|
|
|
|
include 'NOTICE.txt'
|
|
|
|
}
|
|
|
|
from('bin/x-pack') {
|
|
|
|
into 'bin'
|
|
|
|
}
|
2016-10-01 03:46:43 -04:00
|
|
|
from('config/x-pack') {
|
2016-09-29 06:03:14 -04:00
|
|
|
into 'config'
|
|
|
|
}
|
2016-02-03 11:21:55 -05:00
|
|
|
}
|
2016-09-29 06:03:14 -04:00
|
|
|
|
|
|
|
// add api jar for extension authors to compile against
|
|
|
|
// note this is just the normal x-pack jar for now, with a different name
|
|
|
|
project.afterEvaluate {
|
|
|
|
task apiJar {
|
|
|
|
dependsOn('generatePomFileForApijarPublication', project.jar)
|
|
|
|
doFirst {
|
|
|
|
Path jarFile = project.jar.outputs.files.singleFile.toPath()
|
|
|
|
String apiFileName = jarFile.fileName.toString().replace(project.version, "api-${project.version}")
|
|
|
|
Files.copy(jarFile, jarFile.resolveSibling(apiFileName), StandardCopyOption.REPLACE_EXISTING)
|
|
|
|
|
2016-10-03 22:25:44 -04:00
|
|
|
String pomFileName = jarFile.fileName.toString().replace('.jar', '.pom')
|
2016-09-29 06:03:14 -04:00
|
|
|
String apiPomFileName = apiFileName.replace('.jar', '.pom')
|
|
|
|
Files.copy(jarFile.resolveSibling(pomFileName), jarFile.resolveSibling(apiPomFileName),
|
|
|
|
StandardCopyOption.REPLACE_EXISTING)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
assemble.dependsOn(apiJar)
|
|
|
|
project.publishing {
|
|
|
|
publications {
|
|
|
|
apijar(MavenPublication) {
|
|
|
|
from project.components.java
|
2016-10-01 03:46:43 -04:00
|
|
|
artifactId = 'x-pack-api'
|
2016-09-29 06:03:14 -04:00
|
|
|
pom.withXml { XmlProvider xml ->
|
|
|
|
Node root = xml.asNode()
|
|
|
|
root.appendNode('name', project.pluginProperties.extension.name)
|
|
|
|
root.appendNode('description', project.pluginProperties.extension.description)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
integTest {
|
|
|
|
// TODO: fix this rest test to not depend on a hardcoded port!
|
|
|
|
systemProperty 'tests.rest.blacklist', 'getting_started/10_monitor_cluster_health/*,bulk/10_basic/*'
|
|
|
|
cluster {
|
2017-02-08 11:58:57 -05:00
|
|
|
setting 'xpack.ml.enabled', 'true'
|
2016-09-29 06:03:14 -04:00
|
|
|
setting 'xpack.monitoring.collection.interval', '3s'
|
|
|
|
waitCondition = { NodeInfo node, AntBuilder ant ->
|
|
|
|
File tmpFile = new File(node.cwd, 'wait.success')
|
|
|
|
for (int i = 0; i < 10; i++) {
|
|
|
|
// we use custom wait logic here as the elastic user is not available immediately and ant.get will fail when a 401 is returned
|
|
|
|
HttpURLConnection httpURLConnection = null;
|
|
|
|
try {
|
|
|
|
httpURLConnection = (HttpURLConnection) new URL("http://${node.httpUri()}/_cluster/health?wait_for_nodes=${numNodes}").openConnection();
|
|
|
|
httpURLConnection.setRequestProperty("Authorization", "Basic " +
|
|
|
|
Base64.getEncoder().encodeToString("elastic:changeme".getBytes(StandardCharsets.UTF_8)));
|
|
|
|
httpURLConnection.setRequestMethod("GET");
|
|
|
|
httpURLConnection.connect();
|
|
|
|
if (httpURLConnection.getResponseCode() == 200) {
|
|
|
|
tmpFile.withWriter StandardCharsets.UTF_8.name(), {
|
|
|
|
it.write(httpURLConnection.getInputStream().getText(StandardCharsets.UTF_8.name()))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} catch (Exception e) {
|
|
|
|
if (i == 9) {
|
|
|
|
logger.error("final attempt of calling cluster health failed", e)
|
|
|
|
} else {
|
|
|
|
logger.debug("failed to call cluster health", e)
|
|
|
|
}
|
|
|
|
} finally {
|
|
|
|
if (httpURLConnection != null) {
|
|
|
|
httpURLConnection.disconnect();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// did not start, so wait a bit before trying again
|
|
|
|
Thread.sleep(500L);
|
|
|
|
}
|
|
|
|
return tmpFile.exists()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: don't publish test artifacts just to run messy tests, fix the tests!
|
|
|
|
// https://github.com/elastic/x-plugins/issues/724
|
|
|
|
configurations {
|
|
|
|
testArtifacts.extendsFrom testRuntime
|
|
|
|
}
|
|
|
|
task testJar(type: Jar) {
|
|
|
|
classifier "test"
|
|
|
|
from sourceSets.test.output
|
|
|
|
}
|
|
|
|
artifacts {
|
|
|
|
// normal es plugins do not publish the jar but we need to since users need it for Transport Clients and extensions
|
|
|
|
archives jar
|
|
|
|
testArtifacts testJar
|
|
|
|
}
|
|
|
|
|
|
|
|
// classes are missing, e.g. com.ibm.icu.lang.UCharacter
|
|
|
|
thirdPartyAudit.excludes = [
|
|
|
|
// uses internal java api: sun.misc.Unsafe
|
|
|
|
'com.google.common.cache.Striped64',
|
|
|
|
'com.google.common.cache.Striped64$1',
|
|
|
|
'com.google.common.cache.Striped64$Cell',
|
|
|
|
'com.google.common.primitives.UnsignedBytes$LexicographicalComparatorHolder$UnsafeComparator',
|
|
|
|
'com.google.common.primitives.UnsignedBytes$LexicographicalComparatorHolder$UnsafeComparator$1',
|
|
|
|
|
|
|
|
// pulled in as external dependency to work on java 9
|
|
|
|
'com.sun.activation.registries.LineTokenizer',
|
|
|
|
'com.sun.activation.registries.LogSupport',
|
|
|
|
'com.sun.activation.registries.MailcapFile',
|
|
|
|
'com.sun.activation.registries.MailcapParseException',
|
|
|
|
'com.sun.activation.registries.MailcapTokenizer',
|
|
|
|
'com.sun.activation.registries.MimeTypeEntry',
|
|
|
|
'com.sun.activation.registries.MimeTypeFile',
|
|
|
|
'javax.activation.ActivationDataFlavor',
|
|
|
|
'javax.activation.CommandInfo',
|
|
|
|
'javax.activation.CommandMap',
|
|
|
|
'javax.activation.CommandObject',
|
|
|
|
'javax.activation.DataContentHandler',
|
|
|
|
'javax.activation.DataContentHandlerFactory',
|
|
|
|
'javax.activation.DataHandler$1',
|
|
|
|
'javax.activation.DataHandler',
|
|
|
|
'javax.activation.DataHandlerDataSource',
|
|
|
|
'javax.activation.DataSource',
|
|
|
|
'javax.activation.DataSourceDataContentHandler',
|
|
|
|
'javax.activation.FileDataSource',
|
|
|
|
'javax.activation.FileTypeMap',
|
|
|
|
'javax.activation.MailcapCommandMap',
|
|
|
|
'javax.activation.MimeType',
|
|
|
|
'javax.activation.MimeTypeParameterList',
|
|
|
|
'javax.activation.MimeTypeParseException',
|
|
|
|
'javax.activation.MimetypesFileTypeMap',
|
|
|
|
'javax.activation.ObjectDataContentHandler',
|
|
|
|
'javax.activation.SecuritySupport$1',
|
|
|
|
'javax.activation.SecuritySupport$2',
|
|
|
|
'javax.activation.SecuritySupport$3',
|
|
|
|
'javax.activation.SecuritySupport$4',
|
|
|
|
'javax.activation.SecuritySupport$5',
|
|
|
|
'javax.activation.SecuritySupport',
|
|
|
|
'javax.activation.URLDataSource',
|
|
|
|
'javax.activation.UnsupportedDataTypeException'
|
|
|
|
]
|
2016-11-21 04:52:55 -05:00
|
|
|
|
2017-01-05 11:45:17 -05:00
|
|
|
run {
|
2017-02-08 11:58:57 -05:00
|
|
|
setting 'xpack.ml.enabled', 'true'
|
2017-01-05 11:45:17 -05:00
|
|
|
setting 'xpack.graph.enabled', 'true'
|
|
|
|
setting 'xpack.security.enabled', 'true'
|
|
|
|
setting 'xpack.monitoring.enabled', 'true'
|
|
|
|
setting 'xpack.watcher.enabled', 'true'
|
|
|
|
}
|