Commit Graph

61 Commits

Author SHA1 Message Date
David Roberts f06acdc219 [ML] Improve the way ML jobs are allocated to nodes (elastic/x-pack-elasticsearch#2975)
This change modifies the way ML jobs are assigned to nodes to primarily
base the decision on the estimated memory footprint of the jobs. The
memory footprint comes from the model size stats if the job has been
running long enough, otherwise from the model memory limit. In addition,
an allowance for the program code and stack is added.

If insufficient information is available to base the allocation decision on
memory requirements then the decision falls back to using simple job
counts per node.

relates elastic/x-pack-elasticsearch#546

Original commit: elastic/x-pack-elasticsearch@b276aedf2f
2017-11-21 09:51:52 +00:00
Lisa Cawley 712e740761 [DOCS] Added sysgenkey command and watcher encryption settings (elastic/x-pack-elasticsearch#3043)
* [DOCS] Added sysgenkey command and watcher settings

* [DOCS] Added data encryption task for Watcher

* [DOCS] Addressed feedback about watcher encryption

Original commit: elastic/x-pack-elasticsearch@edb1fccbfb
2017-11-20 08:44:43 -08:00
lcawley 7ae8f1cd9b [DOCS] Added sysgenkey command and watcher settings
Original commit: elastic/x-pack-elasticsearch@8e0b2027a6
2017-11-16 15:40:51 -08:00
lcawley 7fe8bf3080 [DOCS] Fixed broken link to Logstash monitoring
Original commit: elastic/x-pack-elasticsearch@1f64dd6637
2017-11-06 22:45:24 -08:00
lcawley e492f3c654 [DOCS] Rename X-Pack settings page
Original commit: elastic/x-pack-elasticsearch@f2101c5974
2017-11-03 12:20:31 -07:00
lcawley 58dd5b748b [DOCS] Single-source X-Pack Settings
Original commit: elastic/x-pack-elasticsearch@9c0f0b0479
2017-11-03 10:36:03 -07:00
Lisa Cawley 9cd40747e9 [DOCS] Add X-Pack license settings (elastic/x-pack-elasticsearch#2833)
Original commit: elastic/x-pack-elasticsearch@6bab830682
2017-11-03 09:27:20 -07:00
Lisa Cawley da3d9dcf69 [DOCS] Added hide_settings to security settings (elastic/x-pack-elasticsearch#2801)
* [DOCS] Added hide_settings to security settings

* [DOCS] Addressed feedback about hide_settings

Original commit: elastic/x-pack-elasticsearch@6a6d394c71
2017-11-01 09:21:11 -07:00
lcawley 615de68711 [DOCS] Added xpack.watcher.history.cleaner_service_enabled
Original commit: elastic/x-pack-elasticsearch@ceead2a1c2
2017-10-25 16:35:20 -07:00
Lisa Cawley c67ec73cb5 [DOCS] Add xpack.ml.max_model_memory_limit (elastic/x-pack-elasticsearch#2787)
* [DOCS] Add xpack.ml.max.model_memory_limit

* [DOCS] Addressed feedback on model limit setting

Original commit: elastic/x-pack-elasticsearch@77a10bfe0e
2017-10-25 09:15:19 -07:00
Lisa Cawley 73e819b0bd [DOCS] Add secure versions of SSL passphrases (elastic/x-pack-elasticsearch#2478)
* [DOCS] Add secure versions of SSL passphrases

* [DOCS] Add secure xpack settings

* [DOCS] Clarify type of keystore

* [DOCS] Added secure settings to security page

* [DOCS] Clarify X-Pack secure settings

* [DOCS] Reformat secure X-Pack settings

Original commit: elastic/x-pack-elasticsearch@efe043fb67
2017-10-24 16:38:37 +01:00
David Roberts 10cc0088e4 [DOCS] Make clearer that xpack.xyz.enabled settings are node settings (elastic/x-pack-elasticsearch#2731)
The discussion in elastic/x-pack-elasticsearch#2697 shows that this was not clear before.

relates elastic/x-pack-elasticsearch#2697

Original commit: elastic/x-pack-elasticsearch@87553faa2c
2017-10-13 09:22:21 +01:00
Tanguy Leroux a3984f7baa [Monitoring] Remove MonitoringSettings (elastic/x-pack-elasticsearch#2596)
Original commit: elastic/x-pack-elasticsearch@28dea7b699
2017-09-26 09:37:59 +02:00
Jay Modi 53d6d945f0 Update documentation to reflect the latest TLS changes and licensing (elastic/x-pack-elasticsearch#2508)
This commit updates to documentation and adds notes about TLS being required to install a
license.

Relates elastic/x-pack-elasticsearch#2463

Original commit: elastic/x-pack-elasticsearch@0d8bfb98ea
2017-09-15 08:44:03 -06:00
Simon Willnauer 2f5aeb6c6f Remove token passphrase setting (elastic/x-pack-elasticsearch#2318)
This change removes `xpack.security.authc.token.passphrase` entirely since from
6.0 onwards we use randomly generated keys by the master there is no need for
this setting anymore. This setting will be deprecated from 6.0 onwards.

Original commit: elastic/x-pack-elasticsearch@37ba90359e
2017-09-12 15:34:41 +02:00
lcawley a979f33252 [DOCS] Added Dev Tools settings
Original commit: elastic/x-pack-elasticsearch@1538d28c21
2017-09-11 16:07:52 -07:00
Lisa Cawley e4a008f9ee [DOCS] Update passphrase security setting (elastic/x-pack-elasticsearch#2431)
Original commit: elastic/x-pack-elasticsearch@8834d64f10
2017-09-06 08:13:59 -07:00
Albert Zaharovits 026729e911 TOKEN_SERVICE_ENABLED_SETTING enabled if HTTP_SSL_ENABLED (elastic/x-pack-elasticsearch#2321)
`authc.token.enabled` is true unless `http.ssl.enabled` is `false` and `http.enabled` is `true`.

* TokenService default enabled if HTTP_ENABLED == false

* Fixed tests that need TokenService explicitly enabled

* [DOC] Default value for `xpack.security.authc.token.enabled`

Original commit: elastic/x-pack-elasticsearch@bd154d16eb
2017-08-23 13:21:30 +03:00
Lisa Cawley 29fc38b0e2 [DOCS] Add xpack.ml.max_open_jobs setting (elastic/x-pack-elasticsearch#2303)
Original commit: elastic/x-pack-elasticsearch@9b82043c34
2017-08-17 12:23:34 -07:00
lcawley e2f7081693 [DOCS] Add abbreviated titles
Original commit: elastic/x-pack-elasticsearch@a4cf8a363f
2017-08-11 10:00:35 -07:00
Lisa Cawley a6a76f8d2a [DOCS] Clarify xpack.security.enabled info (elastic/x-pack-elasticsearch#2166)
Original commit: elastic/x-pack-elasticsearch@140e330973
2017-08-04 08:59:50 -07:00
Lisa Cawley a8fc1255be [DOCS] Update ml.enabled description (elastic/x-pack-elasticsearch#2148)
Original commit: elastic/x-pack-elasticsearch@8a32f0a66f
2017-08-02 10:32:24 -07:00
Jay Modi 7291eb55fe Automatically enable AES 256 bit TLS ciphers when available (elastic/x-pack-elasticsearch#2137)
This commit adds detection of support for AES 256 bit ciphers and enables their use when the JVM
supports them. For OpenJDK, this is often the case without any changes but for the Oracle JVM, the
unlimited policy file needs to be installed. In order to simplify the work a user would need to do
we can detect this support and automatically enable the AES 256 bit versions of the ciphers we
already enable.

Original commit: elastic/x-pack-elasticsearch@5f23b18a1e
2017-08-01 07:36:35 -06:00
Alexander Reelsen 9c937449b4 Docs: Add http timeout configuration parameters
Original commit: elastic/x-pack-elasticsearch@be4de8f8cc
2017-07-31 17:27:10 +02:00
Lisa Cawley d09fc8ceca [DOCS] Add HTTP and local explorer settings (elastic/x-pack-elasticsearch#1961)
* [DOCS] Add HTTP and local explorer settings

* [DOCS] Add cluster_alerts.management.enabled setting

* [DOCS] Clarify cluster_alerts.management.enabled setting

Original commit: elastic/x-pack-elasticsearch@9d2a114543
2017-07-26 10:25:16 -07:00
Tim Vernum 9ab6d3cbc3 [Security] Support PKCSelastic/x-pack-elasticsearch#12 keystores (elastic/x-pack-elasticsearch#2066)
Adds support for reading PKCSelastic/x-pack-elasticsearch#12 files as SSL keystores/truststores.

Original commit: elastic/x-pack-elasticsearch@1855ad6173
2017-07-25 17:31:37 +10:00
Tim Vernum 15f5c5a632 [DOCS] Minor updates to TLS/SSL docs (elastic/x-pack-elasticsearch#2069)
- Fix typo `trustsore` -> `truststore` in several places
- Clarify that enabling TLS requires full restart

Original commit: elastic/x-pack-elasticsearch@0f430a1bea
2017-07-25 13:03:07 +10:00
Jay Modi 6fdad6039f Allow the Active Directory UPN authenticator to work with suffixes (elastic/x-pack-elasticsearch#1958)
The active directory user principal name format typically takes the form user@domain, which is what
the current implementation expects. However, active directory also allows the definition of other
suffixes that are not actual domains. A user can still authenticate using this user principal name
but the behavior of our realm would cause it to fail as it parsed the suffix as a domain and used it
as the search base for the user. Instead, we should use the default user search base and only look
for entries that have this exact user principal name. In a scenario where a realm is configured for
multiple domains in the same forest, the search base should be the base for the entire forest.

relates elastic/x-pack-elasticsearch#1744

Original commit: elastic/x-pack-elasticsearch@de00c4817e
2017-07-13 10:08:22 -06:00
Tim Vernum a36121a725 [DOCS] [Security] Templates do not use bind_dn (elastic/x-pack-elasticsearch#1979)
Document that user_dn_template mode for LDAP authentication does not support bind_dn

Original commit: elastic/x-pack-elasticsearch@eef72615a8
2017-07-13 14:23:23 +10:00
Jay Modi e686d8a3bf Add active directory bind user and user lookup support (elastic/x-pack-elasticsearch#1956)
This commit adds support for a bind user when using the active directory realm. The addition of a
bind user also enables support for the user lookup mechanism, which is necessary to support the run
as functionality that we provide.

relates elastic/x-pack-elasticsearch#179

Original commit: elastic/x-pack-elasticsearch@40b07b3422
2017-07-12 14:01:39 -06:00
Jay Modi 03ed2bbbd0 Add setting for the LDAP user search filter and deprecate user attribute (elastic/x-pack-elasticsearch#1959)
This commit adds a setting to allow changing the user search filter. Previously the filter was a
simple equality filter that mapped a given attribute to the value of the username. The default
behavior remains the same with this change but provides additional flexibility to users to who may
need more advanced LDAP searches. The user attribute setting has been deprecated due to the overlap
with the new filter setting.

relates elastic/x-pack-elasticsearch#1861

Original commit: elastic/x-pack-elasticsearch@e9d797e81c
2017-07-11 09:27:24 -06:00
Tim Vernum c5012ac6e8 [DOC] Miscellaneous security doc updates (elastic/x-pack-elasticsearch#1908)
- Document refresh interval for role mapping files
- Fix obsolete shield reference in transport profile example 
- Clarify that AD & PKI don't support run_as
- Fix logstash conf examples
- Clarify interaction of SSL settings and PKI realm settings
- Document PKI DN format, and recommend use of pki_dn metadata
- Provide more details about action.auto_create_index during setup

Original commit: elastic/x-pack-elasticsearch@49ddb12a7e
2017-07-07 13:33:35 +10:00
Tim Brooks c773115c39 Remove doc reference disabling-default-password
This section has been removed from setting-up-authentication. This
commit removes a reference to this section that no longer exists.

Original commit: elastic/x-pack-elasticsearch@43aa0077f9
2017-06-29 16:01:44 -05:00
Lisa Cawley f2e20f86e4 [DOCS] Fix X-Pack settings for Elasticsearch (elastic/x-pack-elasticsearch#1863)
Original commit: elastic/x-pack-elasticsearch@8469db2909
2017-06-27 09:14:35 -07:00
lcawley 84ec242636 [DOCS] Fixed typo in X-Pack settings
Original commit: elastic/x-pack-elasticsearch@3c9f548b75
2017-06-27 07:53:47 -07:00
Deb Adair b933214dcd [DOCS] Adding shared x-pack-settings file.
Original commit: elastic/x-pack-elasticsearch@2b74fab772
2017-06-26 21:09:55 -07:00
Deb Adair fbcdd262b7 [DOCS] Fixed x-ref to security settings.
Original commit: elastic/x-pack-elasticsearch@4a77a45f00
2017-06-26 17:23:20 -07:00
Deb Adair 26dc6187fc [DOCS] Fixed cross doc links.
Original commit: elastic/x-pack-elasticsearch@c7b37c858a
2017-06-26 16:05:12 -07:00
Deb Adair ea9ce967ca [DOCS] Fixed broken links.
Original commit: elastic/x-pack-elasticsearch@7ddf574e38
2017-06-26 12:54:59 -07:00
Deb Adair 0cf3d935eb [DOCS] Fixed xrefs to X-Pack content.
Original commit: elastic/x-pack-elasticsearch@c9ed85e910
2017-06-26 10:35:25 -07:00
Deb Adair cf096a0cac [DOCS] Fixed x-refs to Watcher content in X-Pack ref.
Original commit: elastic/x-pack-elasticsearch@fdb63d0809
2017-06-26 10:06:13 -07:00
Deb Adair 806b0bc710 [DOCS] Removed UI and Logstash settings & updated links to that info.
Original commit: elastic/x-pack-elasticsearch@2434e503dd
2017-06-26 09:04:56 -07:00
Deb Adair f9f47d047d [DOCS] Wrapping up distribution of X-Pack settings reference info.
Original commit: elastic/x-pack-elasticsearch@0fd5d0d4d4
2017-06-26 09:04:56 -07:00
lcawley fc2f68609d [DOCS] Update links to X-Pack settings
Original commit: elastic/x-pack-elasticsearch@365c911cb1
2017-06-22 09:12:02 -07:00
Jay Modi 940722d5fe Document settings for the token service (elastic/x-pack-elasticsearch#1381)
relates elastic/x-pack-elasticsearch#1345

Original commit: elastic/x-pack-elasticsearch@87234ad866
2017-06-22 08:45:14 -06:00
Lisa Cawley 5dfccb0d64 [DOCS] Drafted graph explore API page (elastic/x-pack-elasticsearch#1802)
* [DOCS] Drafted graph explore API page

* [DOCS] Remove Graph from X-Pack settings

Original commit: elastic/x-pack-elasticsearch@be59018bc7
2017-06-21 15:51:01 -07:00
Lisa Cawley 1b3b7f2944 [DOCS] Update links in X-Pack Reference for Reporting info (elastic/x-pack-elasticsearch#1584)
* [DOCS] Update links to Reporting docs

* [DOCS] Fix incomplete link

Original commit: elastic/x-pack-elasticsearch@c3ccafb191
2017-06-20 15:38:27 -07:00
Lisa Cawley 551f2f6ac2 [DOCS] Create X-Pack installation and introduction for Elasticsearch Ref (elastic/x-pack-elasticsearch#1698)
* [DOCS] Create X-Pack installation and introduction for Elasticsearch Reference

* [DOCS] Address feedback in X-Pack install and intro info

* [DOCS] Add X-Pack setup pages

* [DOCS] Add ML settings to Elasticsearch

* [DOCS] Add table for X-Pack settings

* [DOCS]Add logstash settings

Original commit: elastic/x-pack-elasticsearch@65786cff78
2017-06-19 18:01:52 -07:00
Tim Vernum fe37109c3f [DOCS] [Security] Documentation for Role Mapping API (elastic/x-pack-elasticsearch#1474)
Includes:
- Extensive changes to "mapping roles" section
- New section for role mapping API
- Updates to LDAP/AD/PKI realms to refer to API based role mapping 
- Updates to LDAP/AD realms: `unmapped_groups_as_roles` only looks at file-based mappings 
- Updates to LDAP/AD realms: new setting for "metadata"

Original commit: elastic/x-pack-elasticsearch@6349f665f5
2017-06-06 14:12:31 +10:00
Lisa Cawley 17d75acb7a [DOCS] Clarify ML node settings re transport requests (elastic/x-pack-elasticsearch#1641)
* [DOCS] Clarify ML node settings re transport requests

* [DOCS] Clarify xpack.ml.enabled based on feedback

Original commit: elastic/x-pack-elasticsearch@3102d1e3f3
2017-06-05 13:02:12 -07:00