-
Notifications
You must be signed in to change notification settings - Fork 25.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
.security with status yellow when cluster.routing.allocation.same_shard.host enabled #29933
Comments
Original comment by @abeyad: I don't follow - this is expected behavior. If you set Does that make sense? |
Original comment by @tvernum: I think the issue (which we might not consider to be a problem) is that the security template sets
So (I assume, without having actually verified it myself) there's an inherent incompatibility between x-pack security and If you are running multiple nodes on the same host, and want to set I think the issue if there is one, is that |
Original comment by @jaymode: I think this ties into whether or not we should use auto expand replicas for the security index (another issue open about that). |
Original comment by @robin13: There's a lot of people having multiple nodes on one machine: all of them should be using allocation awareness to avoid primary/replica on the same machine ( |
Pinging @elastic/es-distributed |
The root cause for this is a well-known issue: auto-expand-replicas and shard allocation settings such as filtering, awareness and @jaymode We discussed this during FixitFriday and wondered if we need to solve the larger issue (linked above) or whether we could just not auto-expand the |
@ywelsch I think we should just go ahead with 0-1, especially since it can be updated by the user if necessary. |
OK, thanks @jaymode |
This change removes the use 0-all for auto expand replicas for the security index. The use of 0-all causes some unexpected behavior with certain allocation settings. This change allows us to avoid these with a default install. If necessary, the number of replicas can be tuned by the user. Closes elastic#29933 Closes elastic#29712
This change removes the use of 0-all for auto expand replicas for the security index. The use of 0-all causes some unexpected behavior with certain allocation settings. This change allows us to avoid these with a default install. If necessary, the number of replicas can be tuned by the user. Closes #29933 Closes #29712
This change removes the use of 0-all for auto expand replicas for the security index. The use of 0-all causes some unexpected behavior with certain allocation settings. This change allows us to avoid these with a default install. If necessary, the number of replicas can be tuned by the user. Closes #29933 Closes #29712
Original comment by @MarxDimitri:
Enabling cluster.routing.allocation.same_shard.host on deployments with multiple nodes on a single host puts .security to yellow. Tested with the version 5.3.
The text was updated successfully, but these errors were encountered: