Commit Graph

183 Commits

Author SHA1 Message Date
David Turner cf97e967a9
More S3-compatible repo deflection (#100754)
Call out explicitly that users need to reproduce issues with the real S3
before reporting them to ES.
2023-10-12 05:41:50 -04:00
Tanguy Leroux 583a787618
[Docs] Link to AWS SDK documentation for requests logging (#100491)
Co-authored-by: David Turner david.turner@elastic.co
2023-10-12 09:48:45 +02:00
David Turner a1caba1521
Add repository backup warning (#99788)
Adds a note about the consequences of trying to back up and restore a
snapshot repository without taking steps to make sure the copy is
consistent.
2023-09-25 17:17:03 +01:00
David Turner 3691312aca
Slightly adjust docs about S3 incompatibilities (#99624)
It's often useful to quote these docs to users encountering problems
with their not-quite-S3-compatible storage system. In practice we don't
need to quote the bits in the middle but we do need the last sentence
about working with the supplier to address incompatibilities. This
commit reorders things so that the most commonly quoted sentences form a
standalone paragraph.
2023-09-18 08:26:03 -04:00
Stef Nestor 61228b888e
[DOC+] ILM Searchable Snapshot migrations require repository "name" to be the same (#99308)
👋 howdy, team! Expanding reference to [internal](https://github.com/elastic/cloud/pull/118105) update, we've just confirmed ILM requires the repository name to be the same among migrating clusters. This is a hard block for Searchable Snapshots which requires un-Searchable-Snapshotting or redoing migration to resolve.
2023-09-08 10:28:30 +02:00
Stef Nestor 9573f6f1f4
[DOC+] snapshot-restore single index example (#99065)
* [DOC+] snapshot-restore single index example

👋🏼 howdy, team! I'd like to append an example to snapshot-restore a single index. Support usually points users to [this page](https://www.elastic.co/guide/en/elasticsearch/reference/master/restore-snapshot-api.html) but then users attempt the `rename_pattern` example (which makes sense!). I'd like to point them to a more literal "close index > restore on that index" example in the future.

* Fix test failure and reword

---------

Co-authored-by: Abdon Pijpelink <abdon.pijpelink@elastic.co>
2023-08-31 16:23:50 +02:00
Peter Dyson ef7b7ccded
[DOCS] mention closed indices are included by default for snapshot (#98766) 2023-08-23 10:41:35 +02:00
David Kilfoyle 174ea9645c
[Docs] Fix links to Cloud snapshot and restore docs (#98228) 2023-08-04 18:01:46 -04:00
David Kilfoyle 4d3069a986
Fix broken links to Cloud snapshot restore info (#98213) 2023-08-04 16:38:27 -04:00
David Turner c7c1dc1914
Add docs on troubleshooting NFS repos (#97601)
Spell out a bit more clearly that ES works through the OS's filesystem
abstraction, giving advice about how to reproduce problems outside of
ES.
2023-07-19 13:55:09 +01:00
debadair 777598d602
[DOCS] Remove redirect pages (#88738)
* [DOCS] Remove manual redirects

* [DOCS] Removed refs to modules-discovery-hosts-providers

* [DOCS] Fixed broken internal refs

* Fixing bad cross links in ES book, and adding redirects.asciidoc[] back into docs/reference/index.asciidoc.

* Update docs/reference/search/point-in-time-api.asciidoc

Co-authored-by: James Rodewig <james.rodewig@elastic.co>

* Update docs/reference/setup/restart-cluster.asciidoc

Co-authored-by: James Rodewig <james.rodewig@elastic.co>

* Update docs/reference/sql/endpoints/translate.asciidoc

Co-authored-by: James Rodewig <james.rodewig@elastic.co>

* Update docs/reference/snapshot-restore/restore-snapshot.asciidoc

Co-authored-by: James Rodewig <james.rodewig@elastic.co>

* Update repository-azure.asciidoc

* Update node-tool.asciidoc

* Update repository-azure.asciidoc

---------

Co-authored-by: amyjtechwriter <61687663+amyjtechwriter@users.noreply.github.com>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
Co-authored-by: Amy Jonsson <amy.jonsson@elastic.co>
Co-authored-by: James Rodewig <james.rodewig@elastic.co>
2023-05-24 12:32:46 +01:00
Daniel Mitterdorfer 3aed3499ff
Bootstrap profiling indices at startup (#95666)
With this commit we bootstrap all indices and related structures that
are required for Elastic Universal Profiling.
2023-05-16 16:56:51 +02:00
Francisco Fernández Castaño da9bb382f5
Add support for custom endpoints in the Azure repository (#94576)
Closes #94537
2023-03-22 11:40:19 +01:00
Stef Nestor 69d3039726
Doc about elasticsearch#78276 (#93873)
👋🏼 Regardless of if we decide to validation enforce #78276, may we please drop a doc note that users should avoid duplicating repositories (particularly bucket / base paths).
2023-02-22 21:08:15 +01:00
Francisco Fernández Castaño da387b430c
Link to the time-units doc in S3 repository docs instead of explaining it in words (#93351) 2023-01-31 11:59:20 +01:00
Francisco Fernández Castaño ed9246f8d4
Amend read_timeout S3 repository setting description (#93136) 2023-01-23 15:34:46 +01:00
Iraklis Psaroudakis 6ff081beef
Clarify searchable snapshot repository reliability (#93023)
To make it clear that repository snapshots should be available and reliable for any mounted searchable snapshots.

Co-authored-by: David Turner <david.turner@elastic.co>
2023-01-19 14:31:01 +02:00
David Turner 82ed1fbcc9
Clarify use of S3 lifecycle policies (#92427)
Clarifies that it doesn't work to transition to Glacier tiers, nor does
it work to use object expiry, and that the consequences can be severe.
2022-12-19 09:04:29 +00:00
amyjtechwriter c0e624b3b1
Removing 'or closed' from ignore_unavalible in line with new default behviour. (#92233) 2022-12-12 09:18:27 +00:00
Andrei Dan 261f184c22
[DOCS] disable the ILM history store on full cluster restore (#88515) 2022-11-23 16:54:54 +00:00
Iraklis Psaroudakis 7bfc672eb4
Tie snapshot speed to node bandwidth settings (#91021)
If the recovery node bandwidth settings exist,
then the default value for max snapshot speed will
be infinite, and the speed will be rate limited
by the recovery rate limit as well.

Fixes #57023
2022-11-15 16:13:09 +02:00
Anthony McGlone 0249d1650f
[DOCS] Update the feature state example in the snapshot and restore docs (#90328) 2022-11-01 10:17:29 +09:00
debadair ef7aaec815
[DOCS] Fixed footnote. Closes #89403 (#90541) 2022-09-29 16:48:02 -07:00
Joe Gallo f262f36564
Add master_timeout to the snapshot delete docs (#90032) 2022-09-14 12:23:46 -04:00
Pooya Salehi 72b2bd90e2
Update running snapshot state value to `STARTED` (#89863)
The get snapshot status API will currently return a value of `STARTED` for the state of a snapshot that is currently running. The documentation says that the `state` value for a running snapshot is `IN_PROGRESS`. This documentation change will align the docs with the actual result of the get snapshot status API.

Co-authored-by: Austin Smith <76973609+asmith-elastic@users.noreply.github.com>
2022-09-08 10:12:44 +02:00
Pooya Salehi 59c1c81262
Fix typo in get-snapshot-status-api doc (#89865) 2022-09-07 15:21:41 +02:00
Seth Michael Larson fffabae10a
Add pagination parameters to API spec and docs for 'snapshot.get' API 2022-07-20 06:35:52 -05:00
Yannick Welsch d666ddca1d
Clarify snapshot docs on archive indices (#88417)
Should remove confusion what to do with old archive indices.
2022-07-11 12:03:18 +02:00
David Turner 58703c3a79
Clarify what to do if repo analysis fails (#88267)
The docs for the repo analysis API don't really say how to react on a
failure. This commit adds a note about this case.
2022-07-05 06:45:23 -04:00
Yannick Welsch 46b386be16
Docs for snapshots as simple archives (#86261)
Adds documentation for the new snapshots as archive feature.

Relates #81210
2022-05-30 13:23:53 +02:00
David Turner c4532504be
Small additions to the register-repo docs (#86122)
1. Adds a note that you can restore older snapshots (to recover from a
failed upgrade) even after newer snapshots were taken.

2. Copies the note about incompatible S3 repo implementations to the top
level to avoid misunderstandings.
2022-05-09 07:37:20 +01:00
Armin Braun b323e8e1db
Add parameter to exclude indices in a snapshot from response (#86269)
Adds a parameter `index_names` to the get snapshots API so that users may exclude the potentially very long index name lists when listing out snapshots.

closes #82937
2022-04-29 15:04:43 +02:00
David Turner 4ba9ce7a7c
Relax docs about using new repos across major versions (#85740)
Today the docs say that new major versions need new snapshot
repositories or else corruption may occur. This isn't true, we support
using the same repository across upgrades.
2022-04-07 17:28:18 +01:00
Gordon Brown f85744de12
Re-add content from removed Security-specific snapshot pages (#85084)
This commit adds back some notes which were lost when we consolidated
the snapshot/restore documentation into a single location.

The notes in question are that:
1) If a Snapshot repository contains Security's feature state, then
   that repository contains security-sensitive information. This may
   be obvious to some, but is good to state explicitly.
2) Some files, such as the keystore and TLS keys, are not included in
   snapshots and are important to back up via other means.
2022-03-22 16:44:43 -06:00
David Turner 76b05bfd8e
Note that S3 compat includes performance (#84798)
Today the note in the docs about S3-compatible repositories notes that
the repo must behave correctly, but it's also important that it has the
same performance profile. This commit extends the docs to include this
info.
2022-03-09 12:28:17 +00:00
Gordon Brown 7d094c3e5a
Correct documentation regarding how to restore no `feature_states` (#83814)
This commit corrects the snapshot creation and restoration docs to
describe the usage of `"none"` to restore no feature states. Previously,
they incorrectly stated that using an empty array would accomplish this,
but specifying an empty array results in the default behavior (rather
than preventing feature state snapshot/restoration).
2022-02-16 20:04:00 -05:00
James Rodewig e8b34c720d
[DOCS] Re-add HTTP proxy setings from #82737 (#84001)
Re-adds HTTP proxy settings for the GCS repository type. These settings
were added with https://github.com/elastic/elasticsearch/pull/82737.

The docs were accidentally removed as part of
https://github.com/elastic/elasticsearch/pull/82996.
2022-02-15 18:20:22 -05:00
Tobias Stadler e3deacf547
[DOCS] Fix typos (#83895) 2022-02-15 12:42:17 -05:00
James Rodewig 6522e6eea2
[DOCS] Update multi-target syntax refs (#83703) 2022-02-09 13:00:07 -05:00
James Rodewig fe2990829a
Update setting deprecation messages to remove major release references (#83528)
Updates our setting deprecation messages to avoid references to future major releases.
2022-02-04 13:53:20 -05:00
Dan Roscigno 302ce75a88
Add note about base_path and ECE to the snapshot repository docs (#83526)
Elastic Cloud Enterprise (ECE) shares snapshot repositories across multiple deployments. As a result, the `base_path` is generated by ECE, and the `base_path` setting is not allowed.  This PR adds a note to the S3, Azure, and GCS snapshot repository docs.
2022-02-04 11:34:48 -05:00
James Rodewig 88be4ed950
[DOCS] Fix get snapshot status API parameters (#81818)
* Documents `GET _snapshot/_status` and `GET _snapshot/<repository>/_status`.
* Notes the `<repository>` and `<snasphot>` parameters are optional.
* Removes erroneous mention of the `<snapshot>` parameter supporting the `_current` value.

Closes #81600

Relates to #80931
2022-02-03 10:55:23 -05:00
Joe Gallo 0935485684
Fix get-snapshot-api :docs:integTest (#83273) 2022-01-28 12:24:01 -05:00
James Rodewig cb6265f9bd
[DOCS] Move snapshot repo types to separate pages (#82826)
With https://github.com/elastic/elasticsearch/pull/81870, the Azure, GCS, and S3 repository types have separate, dedicated pages in the Elasticsearch guide. For consistency, this PR creates separate pages for the shared file system, read-only URL, and source-only repository types.

Related changes:

- Adds redirects to the plugins docs
- Fixes a few breaking changes that refer to the Azure, GCS, and S3 repositories as plugins.

Co-authored-by: Adam Locke <adam.locke@elastic.co>
2022-01-26 17:13:39 -05:00
David Turner 9633883c64
Add note on truststore for S3-compatible repos (#82669)
Today we note that the `repository-s3` plugin uses the JVM-wide
truststore in the docs for the `protocol` client setting, but it turns
out that this is easy to overlook since most installations will not need
to change the `protocol`. This commit adds the same detail to the
section on S3-compatible repositories where it is more likely to be
found.
2022-01-26 11:16:43 +00:00
James Rodewig 6b841325f1
[DOCS] Fix headings for Azure, GCS, and S3 snapshot repo pages (#82996)
Updates the headings to use sentence case.
2022-01-24 17:14:55 -05:00
James Rodewig cbeb2c2ce1
[DOCS] Fix typo (#82988) 2022-01-24 15:50:07 -05:00
Artem Prigoda 1ddaf253d5
Add support for HTTP Proxies for the GCS repository (#82737)
* Add support for HTTP Proxies for the GCS repository

The change adds 3 new client properties for the GCS repository:

* gcs.client.default.proxy.type
* gcs.client.default.proxy.host
* gcs.client.default.proxy.port

They allow to configure a [java.net.Proxy](https://docs.oracle.com/en/java/javase/17/docs/api/java.base/java/net/Proxy.html)
for the GCS SDK to use when communicating with the GCS API.

Resolves #82444
2022-01-20 15:46:59 +01:00
Artem Prigoda e47b7a63f4
[s3-repository] Support IAM roles for Kubernetes service accounts (#81255)
There have been many requests to support repository-s3 authentication via IAM roles in Kubernetes service accounts.

The AWS SDK is supposed to support them out of the box with the aws-java-sdk-sts library. Unfortunately, we can't use WebIdentityTokenCredentialsProvider from the SDK. It reads the token from AWS_WEB_IDENTITY_TOKEN_FILE environment variable which is usually mounted to /var/run/secrets/eks.amazonaws.com/serviceaccount/token and the S3 repository doesn't have the read permission to read it. We don't want to hard-code a file permission for the repository, because the location of AWS_WEB_IDENTITY_TOKEN_FILE can change at any time in the future and we would also generally prefer to restrict the ability of plugins to access things outside of their config directory.

To overcome this limitation, this change adds a custom WebIdentityCredentials provider that reads the service account from a symlink to AWS_WEB_IDENTITY_TOKEN_FILE created in the repository's config directory. We expect the end user to create the symlink to indicate that they want to use service accounts for authentification.

Service accounts are checked and exchanged for session tokens by the AWS STS. To test the authentification flow, this change adds a test fixture which mocks the assume-role-with-web-identity call to the service and returns a response with test credentials.

Fixes #52625
2022-01-19 14:03:11 +01:00
Ievgen Degtiarenko e7d89910c2
validate snapshot has global state before restoring it (#82037)
It is possible to restore from a snapshot with a global
state even if it does not have one. This pr adds validation
to prevent this from happening.
2022-01-17 15:33:19 +01:00