status
stringclasses
1 value
repo_name
stringclasses
13 values
repo_url
stringclasses
13 values
issue_id
int64
1
104k
updated_files
stringlengths
11
1.76k
title
stringlengths
4
369
body
stringlengths
0
254k
issue_url
stringlengths
38
55
pull_url
stringlengths
38
53
before_fix_sha
stringlengths
40
40
after_fix_sha
stringlengths
40
40
report_datetime
unknown
language
stringclasses
5 values
commit_datetime
unknown
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
82,170
["docs/reference/data-management/migrate-index-allocation-filters.asciidoc", "docs/reference/ilm/apis/migrate-to-data-tiers.asciidoc", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/cluster/action/MigrateToDataTiersResponse.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/cluster/action/MigrateToDataTiersResponseTests.java", "x-pack/plugin/ilm/qa/multi-node/src/javaRestTest/java/org/elasticsearch/xpack/MigrateToDataTiersIT.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingService.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/action/TransportMigrateToDataTiersAction.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingServiceTests.java"]
Migrate to data tiers routing API updates all templates in a system to not use custom attribute routing
Currently, the migrate to data tiers routing [API](https://www.elastic.co/guide/en/elasticsearch/reference/7.16/ilm-migrate-to-data-tiers.html) only deletes a legacy template (if one is specified). It doesn't inspect the index templates in the system. However there might still be the case that templates relying on node attributes are installed in the system via a restore of an old snapshot or accidentally. This would conflict with a system that is already using data tiers. This proposes that the migrate to data tiers API iterates over all the legacy tempates, composable templates, and component templates and removes the occurrences of the `include`, `required`, and `excludes` routing configuration for the configurated node attribute. eg. the following template ``` "test_timplate": { "order": 0, "index_patterns": [ "*" ], "settings": { "index": { "routing": { "allocation": { "require": { "data": "hot" } } }, "lifecycle": { "name" : "the_index_lifecycle_policy" } } }, "mappings": {}, "aliases": {} } ``` would be updated to ``` "test_timplate": { "order": 0, "index_patterns": [ "*" ], "settings": { "index": { "lifecycle": { "name" : "the_index_lifecycle_policy" } } }, "mappings": {}, "aliases": {} } ```
https://github.com/elastic/elasticsearch/issues/82170
https://github.com/elastic/elasticsearch/pull/82472
1f90840ba0c58d0d1dd8e2265906eeac7a309eb2
3087f164f7abf44ec405184550b7150a8c7bbc2d
"2021-12-31T15:16:20Z"
java
"2022-01-13T10:45:10Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
82,169
["docs/reference/ilm/apis/migrate-to-data-tiers.asciidoc", "x-pack/plugin/ilm/qa/multi-node/src/javaRestTest/java/org/elasticsearch/xpack/MigrateToDataTiersIT.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingService.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/action/TransportMigrateToDataTiersAction.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingServiceTests.java"]
Migrate to data tiers routing dry run should not require ILM to be stopped
The migrate to data tiers routing [API](https://www.elastic.co/guide/en/elasticsearch/reference/7.16/ilm-migrate-to-data-tiers.html) has a `dry_run` option that is very useful in scoping what would the API change. Currently running the API with `dry_run=true` requires ILM to be stopped (just as a "live run" of the API). We should change this so the `dry_run` of the API is not expensive in terms of operations in order to be able to call the "live run" of the API only if the `dry_run` returns any entities that would be migrated.
https://github.com/elastic/elasticsearch/issues/82169
https://github.com/elastic/elasticsearch/pull/82226
d84b875698306877cdf1a3da0a89ffe2ef5413d0
f18c9c503ee9d8fd1f0da1ad1cd7eba510b75e35
"2021-12-31T14:23:05Z"
java
"2022-01-05T13:40:27Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
82,151
["rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/cat.allocation/10_basic.yml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/cat.indices/10_basic.yml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/cat.indices/20_hidden.yml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/cat.shards/10_basic.yml"]
YAML test failure "cat.shards/10_basic/Test cat shards output"
**Build scan**: https://gradle-enterprise.elastic.co/s/cvatdzy4g77wu **Repro line**: `./gradlew ':rest-api-spec:yamlRestTest' --tests "org.elasticsearch.test.rest.ClientYamlTestSuiteIT" -Dtests.method="test {yaml=cat.shards/10_basic/Test cat shards output}" -Dtests.seed=1751BA43AF68208E -Dtests.locale=ar-IQ -Dtests.timezone=Asia/Chita -Druntime.java=17` **Reproduces locally?**: no **Applicable branches**: master **Failure history**: https://gradle-enterprise.elastic.co/scans/tests?search.relativeStartTime=P7D&search.timeZoneId=America/Chicago&tests.container=org.elasticsearch.test.rest.ClientYamlTestSuiteIT&tests.sortField=FAILED&tests.test=test%20%7Byaml%3Dcat.shards/10_basic/Test%20cat%20shards%20output%7D&tests.unstableOnly=true **Failure excerpt**: ``` Exception java.lang.AssertionError: Failure at [cat.shards/10_basic:95]: field [$body] was expected to match the provided regex but didn't Expected: ^$ but: was ".tasks 0 p STARTED 127.0.0.1 yamlRestTest-0\n" at __randomizedtesting.SeedInfo.seed([1751BA43AF68208E:9F05859901944D76]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) ••• Caused by: java.lang.AssertionError: field [$body] was expected to match the provided regex but didn't Expected: ^$ but: was ".tasks 0 p STARTED 127.0.0.1 yamlRestTest-0\n" at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) ••• at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:64) at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) ••• Output View rawDownload raw [2021-12-31T01:00:42,291][INFO ][o.e.t.r.ClientYamlTestSuiteIT] [test] [yaml=cat.shards/10_basic/Test cat shards output] before test [2021-12-31T01:00:42,317][INFO ][o.e.t.r.ClientYamlTestSuiteIT] [test] Stash dump on test failure [{ "stash" : { "body" : ".tasks 0 p STARTED 127.0.0.1 yamlRestTest-0 " } }] ```
https://github.com/elastic/elasticsearch/issues/82151
https://github.com/elastic/elasticsearch/pull/84539
8a1632235daa140f3904cfe46f8215537c75ded3
c4b1f18f32aa337253664d1295bc1b59233b3d44
"2021-12-30T16:25:15Z"
java
"2022-03-24T19:08:51Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
82,107
["server/src/test/java/org/elasticsearch/common/logging/LoggersTests.java"]
LoggersTests incompatible with tests.iters
**Repro line**: ``` ./gradlew ':server:test' --tests "org.elasticsearch.common.logging.LoggersTests" -Dtests.iters=2 ``` **Reproduces locally?**: yes **Applicable branches**: master, more?
https://github.com/elastic/elasticsearch/issues/82107
https://github.com/elastic/elasticsearch/pull/85092
30bb7db9eba7b1f454e8e70f5b96f7be54220190
aff8fe3f892038247b6c7afd03b61e2ddd797a13
"2021-12-28T18:03:33Z"
java
"2022-03-21T10:10:04Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
82,065
["x-pack/plugin/ilm/src/internalClusterTest/java/org/elasticsearch/xpack/ilm/IndexLifecycleInitialisationTests.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/action/TransportPutLifecycleAction.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/ilm/action/TransportPutLifecycleActionTests.java"]
Updating unchanged ILM policies is not idempotent.
**Elasticsearch version** (`bin/elasticsearch --version`): docker.elastic.co/elasticsearch/elasticsearch:7.16.2-amd64 **Plugins installed**: Whatever the docker container ships **JVM version** (`java -version`): Whatever the docker container ships **OS version** (`uname -a` if on a Unix-like system): Whatever the docker container ships **Description of the problem including expected versus actual behavior**: Updating an ILM policy always increases the version of the stored policy. @DaveCTurner suggested to open an issue here. I did not check if other operations (updating index templates and mappings) are idempotent or not. **Steps to reproduce**: 1. `docker run --rm -it -p 9200:9200 -e "discovery.type=single-node" -e "logger.org.elasticsearch=DEBUG" docker.elastic.co/elasticsearch/elasticsearch:7.16.2-amd64` 2. Execute: ``` curl -XPUT "http://localhost:9200/_ilm/policy/my_policy" -H 'Content-Type: application/json' -d'{ "policy" : { "phases" : { "warm" : { "min_age" : "10d", "actions" : { "forcemerge" : { "max_num_segments" : 1 } } }, "delete" : { "min_age" : "30d", "actions" : { "delete" : { "delete_searchable_snapshot" : true } } } } }}' ``` multiple times 3. Check the ILM version: `curl http://localhost:9200/_ilm/policy/my_policy` 4. The returned version is greater than 1 even though nothing changed **Provide logs (if relevant)**: ``` {"type": "server", "timestamp": "2021-12-23T13:49:21,187Z", "level": "DEBUG", "component": "o.e.c.s.MasterService", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "executing cluster state update for [put-lifecycle-my_policy]", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" } {"type": "server", "timestamp": "2021-12-23T13:49:21,188Z", "level": "INFO", "component": "o.e.x.i.a.TransportPutLifecycleAction", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "updating index lifecycle policy [my_policy]", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" } {"type": "server", "timestamp": "2021-12-23T13:49:21,189Z", "level": "DEBUG", "component": "o.e.x.c.i.PhaseCacheManagement", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "policy [my_policy] is unchanged and no phase definition refresh is needed", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" } {"type": "server", "timestamp": "2021-12-23T13:49:21,189Z", "level": "DEBUG", "component": "o.e.c.s.MasterService", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "took [1ms] to compute cluster state update for [put-lifecycle-my_policy]", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" } {"type": "server", "timestamp": "2021-12-23T13:49:21,189Z", "level": "DEBUG", "component": "o.e.c.s.MasterService", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "cluster state updated, version [65], source [put-lifecycle-my_policy]", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" } ```
https://github.com/elastic/elasticsearch/issues/82065
https://github.com/elastic/elasticsearch/pull/82240
c937a099af86708aa91f9536426e684dc7b95749
c8afd3adbcd653b862aa216e913b9511e97dba6a
"2021-12-23T13:53:57Z"
java
"2022-01-05T23:34:29Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
82,059
["server/src/main/java/org/elasticsearch/indices/cluster/IndicesClusterStateService.java"]
[CI] BasicDistributedJobsIT testFailOverBasics_withDataFeeder failing
**Build scan:** https://gradle-enterprise.elastic.co/s/ahbd2x6onqf7o/tests/:x-pack:plugin:ml:internalClusterTest/org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT/testFailOverBasics_withDataFeeder **Reproduction line:** `./gradlew ':x-pack:plugin:ml:internalClusterTest' --tests "org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT.testFailOverBasics_withDataFeeder" -Dtests.seed=9E164F100A38775F -Dtests.locale=ar-KW -Dtests.timezone=US/Michigan -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** Didn't try **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT&tests.test=testFailOverBasics_withDataFeeder **Failure excerpt:** ``` java.lang.AssertionError: unexpected at org.elasticsearch.test.InternalTestCluster.removeExclusions(InternalTestCluster.java:1903) at org.elasticsearch.test.InternalTestCluster.stopNodesAndClients(InternalTestCluster.java:1775) at org.elasticsearch.test.InternalTestCluster.stopNodesAndClient(InternalTestCluster.java:1762) at org.elasticsearch.test.InternalTestCluster.stopRandomDataNode(InternalTestCluster.java:1634) at org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT.testFailOverBasics_withDataFeeder(BasicDistributedJobsIT.java:142) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) Caused by: java.util.concurrent.ExecutionException: org.elasticsearch.ElasticsearchTimeoutException: timed out waiting for removal of nodes; if nodes should not be removed, set waitForRemoval to false. [{node_t0}{IOp-GFUyRKOWJXN2jJ4Gpw}] at org.elasticsearch.common.util.concurrent.BaseFuture$Sync.getValue(BaseFuture.java:257) at org.elasticsearch.common.util.concurrent.BaseFuture$Sync.get(BaseFuture.java:244) at org.elasticsearch.common.util.concurrent.BaseFuture.get(BaseFuture.java:75) at org.elasticsearch.test.InternalTestCluster.removeExclusions(InternalTestCluster.java:1901) at org.elasticsearch.test.InternalTestCluster.stopNodesAndClients(InternalTestCluster.java:1775) at org.elasticsearch.test.InternalTestCluster.stopNodesAndClient(InternalTestCluster.java:1762) at org.elasticsearch.test.InternalTestCluster.stopRandomDataNode(InternalTestCluster.java:1634) at org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT.testFailOverBasics_withDataFeeder(BasicDistributedJobsIT.java:142) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) Caused by: org.elasticsearch.ElasticsearchTimeoutException: timed out waiting for removal of nodes; if nodes should not be removed, set waitForRemoval to false. [{node_t0}{IOp-GFUyRKOWJXN2jJ4Gpw}] at org.elasticsearch.action.admin.cluster.configuration.TransportClearVotingConfigExclusionsAction$1.onTimeout(TransportClearVotingConfigExclusionsAction.java:114) at org.elasticsearch.cluster.ClusterStateObserver$ContextPreservingListener.onTimeout(ClusterStateObserver.java:345) at org.elasticsearch.cluster.ClusterStateObserver$ObserverClusterStateListener.onTimeout(ClusterStateObserver.java:263) at org.elasticsearch.cluster.service.ClusterApplierService$NotifyTimeout.run(ClusterApplierService.java:651) at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:716) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/82059
https://github.com/elastic/elasticsearch/pull/82056
62368ae1fd8e061e0976ce430e3a6853e4afc0e8
e97b4d50914e771e0c084c858fc0a1abd8e37b34
"2021-12-23T11:39:52Z"
java
"2021-12-23T11:45:05Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
82,044
["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/accesscontrol/FieldSubsetReader.java", "x-pack/plugin/searchable-snapshots/qa/rest/src/yamlRestTest/resources/rest-api-spec/test/field_level_security.yml"]
Document Field Level Security on Frozen Tier not working correctly
**Elasticsearch version** (`bin/elasticsearch --version`): 7.16.2 (running inside Elastic Cloud) **Plugins installed**: [] **JVM version** (`java -version`): n/a (Elastic Cloud) **OS version** (`uname -a` if on a Unix-like system): n/a (Elastic Cloud) **Description of the problem including expected versus actual behavior**: I seem to be running into an issue where Field Level Security throws a null exception when operating on frozen indices. I have a simple ILM policy for my index that moves data from Hot to Frozen after 12 hours. Within that data set, I would like to grant access to all fields except for a few specific ones that I would like to remain internal only. If I create a new user and grant them a custom role with field level security (allowing and denying specific fields), that user cannot search for anything beyond my hot data tier without getting the following exception back ``` "reason": "unsupported_operation_exception: null" ``` Within the data access role, If I disable `Grant access to specific fields`, the user can see and return results from the frozen tier. I will note that in my current environment, this role also is using a `Grant read privileges to specific documents` templated query, however that does not seem to have an impact on this issue. I have tried to produce a working example below that does not involve that privilege. **Steps to reproduce**: 1. Create a simple ILM policy that rolls data out of a hot index and into a frozen index 2. Index data into your ILM managed index so that you have both hot data AND frozen data within your cluster. If my ILM index alias was called `pulse`, my underlying indices are `pulse-0001`, `pulse-0002`, etc and the frozen indices look like `partial-pulse-0001`, `partial-pulse-0002`... etc 3. Create a new role that grants read access to you your desired indices, like below (I am using Kibana): <img width="1399" alt="Screen Shot 2021-12-22 at 1 24 46 PM" src="https://user-images.githubusercontent.com/3504194/147138332-7718ada6-0d8d-4775-b3a3-0311738e9706.png"> 4. Create a new user, and assign them typical access to a kibana space and grant them the data role from step 3 5. In a new private browser, log in as your new user and validate they have access to your frozen tier data and hot tier data, by viewing the Discover panel and looking at a timerange that spans hot and frozen tiers. (24 hrs in my case, see below as an example) <img width="1480" alt="Screen Shot 2021-12-22 at 1 29 14 PM" src="https://user-images.githubusercontent.com/3504194/147138759-6dd4c7d2-09a6-4078-967d-0829b4978c16.png"> 6. Go back to the role you created as an admin, and check the box `Grant access to specific fields`. Deny a field in your data (see below as an example) <img width="1193" alt="Screen Shot 2021-12-22 at 1 30 29 PM" src="https://user-images.githubusercontent.com/3504194/147138977-da783c36-626e-49bb-9295-35872e000412.png"> 7. Back as your new user, refresh the page to see shard exceptions being thrown for all your frozen indices (even though my time range is still set to 24 hours, I get exceptions for my entire frozen tier) <img width="1485" alt="Screen Shot 2021-12-22 at 1 31 46 PM" src="https://user-images.githubusercontent.com/3504194/147139213-4c47a230-47f7-4346-9414-03b32d4f497c.png"> Note in the screenshot above that my data is cut off arbitrarily, right near my frozen tier rollover line from my ILM policy 8. Investigate the exception further and you get the following <img width="861" alt="image" src="https://user-images.githubusercontent.com/3504194/147139308-6ab996fc-bdb1-467a-9250-061463e55a64.png"> 9. Clicking the tab for "Request" shows very normal request, and the "Response" tab looks like below: <img width="758" alt="Screen Shot 2021-12-22 at 1 35 18 PM" src="https://user-images.githubusercontent.com/3504194/147139434-383d6cec-7bbc-4081-9e72-8c9a1315740e.png"> 10. From the command line, I can search the cluster easily if I use a simple count search on a hot tier index ``` curl https://user:[email protected]:9243/pulse-000252/_count # returns {"count":<real number here>,"_shards":{"total":1,"successful":1,"skipped":0,"failed":0}} ``` But if I try to do an operation on the whole alias that includes frozen shards, I get shard exceptions. ``` curl https://user:[email protected]:9243/pulse/_count # returns {"count":<partial number here>,"_shards":{"total":248,"successful":14,"skipped":0,"failed":234,"failures":[{"shard":0,"index":"partial-pulse-000015","node":"XCRMYhdLR3KHuHxm74vlCg","reason":{"type":"unsupported_operation_exception","reason":"unsupported_operation_exception: null"}},{"shard":0,"index":"partial-pulse-000016","node":"9SNaA5L9TCqZ8l0BA39c1Q","reason":{"type":"unsupported_operation_exception","reason":"unsupported_operation_exception: null"}},{"shard":0,"index":"partial-pulse-000017","node":"XCRMYhdLR3KHuHxm74vlCg","reason":{"type":"unsupported_operation_exception","reason":"unsupported_operation_exception: null"}},..... ``` 11. For sanity you can go back to your role configuration and uncheck "Grant access to specific fields" and run that _count command again: ``` curl https://user:[email protected]:9243/pulse/_count {"count":<real number here>,"_shards":{"total":248,"successful":248,"skipped":0,"failed":0}} ``` and it works. I have also tried combing through the built in [roles](https://www.elastic.co/guide/en/elasticsearch/reference/7.16/built-in-roles.html) for Elastic, as well as the built in [index priviledges](https://www.elastic.co/guide/en/elasticsearch/reference/7.16/security-privileges.html#privileges-list-indices) to see if there was anything related to the frozen tier specifically that causes this behavior, without much luck. **Provide logs (if relevant)**: I have tried to comb the logs inside of Elastic Cloud but the UI does not seem to be surfacing this exception where I can find it.
https://github.com/elastic/elasticsearch/issues/82044
https://github.com/elastic/elasticsearch/pull/82521
d07d27ec1df0a7dc1967280ae70709997719271f
8a7388cfaa67334fcb4dd6980e1403b8d91b9b9b
"2021-12-22T18:58:59Z"
java
"2022-01-13T16:50:52Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
82,019
["docs/reference/snapshot-restore/apis/restore-snapshot-api.asciidoc", "server/src/internalClusterTest/java/org/elasticsearch/snapshots/SnapshotCustomPluginStateIT.java", "server/src/internalClusterTest/java/org/elasticsearch/snapshots/SystemIndicesSnapshotIT.java", "server/src/main/java/org/elasticsearch/snapshots/RestoreService.java", "server/src/test/java/org/elasticsearch/snapshots/RestoreServiceTests.java", "x-pack/plugin/data-streams/src/internalClusterTest/java/org/elasticsearch/datastreams/DataStreamsSnapshotsIT.java", "x-pack/plugin/ilm/qa/multi-node/src/javaRestTest/java/org/elasticsearch/xpack/ilm/actions/SearchableSnapshotActionIT.java"]
Fail with error when restoring global state from a snapshot that does not have one
Currently elasticsearch allow to restore a global state from a snapshot that does not have one. This silently succeed without changing anything. Once https://github.com/elastic/elasticsearch/issues/81247 is fixed this could result in nullifying entire cluster state. **Elasticsearch version** (`bin/elasticsearch --version`): 8.x and likely earlier **Description of the problem including expected versus actual behavior**: **Steps to reproduce**: * create a cluster with a snapshot repository * create a snapshot with `"include_global_state": false` * restore the snapshot with `"include_global_state": true` Elasticsearch should return an error in such case, but currently silently succeed without changing the global state.
https://github.com/elastic/elasticsearch/issues/82019
https://github.com/elastic/elasticsearch/pull/82037
97a546ef674b6c727796e92ea91028aaa0256a52
e7d89910c2e6e1ae0d51e812d92cb603402c0f7d
"2021-12-22T10:39:15Z"
java
"2022-01-17T14:33:19Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,983
["x-pack/plugin/rollup/src/main/java/org/elasticsearch/xpack/rollup/job/RollupJobTask.java", "x-pack/plugin/rollup/src/test/java/org/elasticsearch/xpack/rollup/job/RollupIndexerIndexingTests.java", "x-pack/plugin/rollup/src/test/java/org/elasticsearch/xpack/rollup/job/RollupIndexerStateTests.java", "x-pack/plugin/rollup/src/test/java/org/elasticsearch/xpack/rollup/job/RollupJobTaskTests.java"]
[CI] XPackRestIT test {p0=rollup/security_tests/Index-based access} failing
**Build scan:** https://gradle-enterprise.elastic.co/s/xpw2rkkkk3pou/tests/:x-pack:plugin:yamlRestTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=rollup%2Fsecurity_tests%2FIndex-based%20access%7D **Reproduction line:** `./gradlew ':x-pack:plugin:yamlRestTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=rollup/security_tests/Index-based access}" -Dtests.seed=852F23C0292A926E -Dtests.locale=en-NZ -Dtests.timezone=Africa/Blantyre -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** No **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Drollup/security_tests/Index-based%20access%7D **Failure excerpt:** ``` java.lang.AssertionError: Failure at [rollup/security_tests:164]: Expected: <1> but: was <0> at __randomizedtesting.SeedInfo.seed([852F23C0292A926E:D7B1C1A87D6FF96]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) Caused by: java.lang.AssertionError: Expected: <1> but: was <0> at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:99) at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/81983
https://github.com/elastic/elasticsearch/pull/86992
d1bb8f4b1d63bf2d269085f4411deb5c2358618d
6aca35c68197dca04d1c97c6b85b542a97abc42d
"2021-12-21T11:15:08Z"
java
"2022-07-06T08:33:23Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,981
["docs/changelog/82132.yaml", "server/build.gradle", "server/src/main/java/org/elasticsearch/index/engine/LazySoftDeletesDirectoryReaderWrapper.java", "server/src/main/java/org/elasticsearch/index/engine/ReadOnlyEngine.java", "server/src/test/java/org/elasticsearch/lucene/index/LazySoftDeletesDirectoryReaderWrapperTests.java", "test/framework/src/main/java/org/elasticsearch/index/engine/EngineTestCase.java"]
Fix split package LazySoftDeletesDirectoryReaderWrapper
The last split package issue that we have between server and lucene is LazySoftDeletesDirectoryReaderWrapper. This was added early in 2021, so not one of the legacy hangovers from years gone by. By inspecting the code, the three package-private member dependencies in `org.apache.lucene.index` become clear: 1. access to field SegmentReader.isNRT, 2. CacheKey::new, and 3. PendingSoftDeletes::applySoftDeletes. First, LazySoftDeletesDirectoryReaderWrapper is only useful for read-only indices that are lazily loaded (a.k.a. frozen tier), so it is doubtful that Lucene would find it generally useful. A note on each of the specific package-private API points: 1. Access to field SegmentReader.isNRT is only for assertion code, and exposing an accessor from Lucene for this seems like it could be reasonable. 2. The CacheKey constructor is deliberately non-accessible from outside the package. There were past issues where problems arose with short-lived reader wrappers that would not reuse caches across queries. Maybe there's a way to make DelegatingCacheHelper only work with a DirectoryReader, since directory readers would generally not be short-lived. Or otherwise exposing DelegatingCacheHelper as a more generally useful API in Lucene itself. 3. For PendingSoftDeletes::applySoftDeletes one possibility is to just duplicate the code in ES. There are additional package-private issues when this is attempted, but maybe they are more straightforward to resolve. [ the above notes are a summary of a discussion that included @romseygeek @jpountz, and @ywelsch ] see #78166
https://github.com/elastic/elasticsearch/issues/81981
https://github.com/elastic/elasticsearch/pull/82132
223c2e45b90a32981a4c034348c1b606cd16059e
487077cc056b4c7ff3f47ba1635d2df18c01fe4b
"2021-12-21T10:50:20Z"
java
"2022-03-07T14:22:21Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,978
["docs/reference/query-dsl/regexp-syntax.asciidoc"]
RegExp optional operations documentation fails to mention `NONE`
<!-- GitHub is reserved for bug reports and feature requests; it is not the place for general questions. If you have a question or an unconfirmed bug , please visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also check your OS is [supported](https://www.elastic.co/support/matrix#show_os). If it is not, the issue is likely to be closed. For security vulnerabilities please only send reports to [email protected]. See https://www.elastic.co/community/security for more information. Please fill in the following details to help us reproduce the bug: --> **Elasticsearch version** (`bin/elasticsearch --version`): 7.16 See documentation at https://www.elastic.co/guide/en/elasticsearch/reference/current/regexp-syntax.html#regexp-optional-operators. It should specify the `NONE` option for disabling all the flags. Also, the implementations accepts `flags: ""` as a value which apparently maps to `ALL` (which I find quite illogical). I think `""` should either give an exception or maybe mean `NONE`.
https://github.com/elastic/elasticsearch/issues/81978
https://github.com/elastic/elasticsearch/pull/82265
1cbc10a17f7226aca690c9844709e2d4f1d162e9
e53ecc3f430a534eedfb8a819043311c7f47b4ae
"2021-12-21T10:05:55Z"
java
"2022-01-18T19:15:29Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,949
["server/src/main/java/org/elasticsearch/index/store/Store.java", "x-pack/plugin/searchable-snapshots/src/main/java/org/elasticsearch/xpack/searchablesnapshots/store/input/BaseSearchableSnapshotIndexInput.java"]
[CI] FrozenSearchableSnapshotsIntegTests testCreateAndRestorePartialSearchableSnapshot failing
Happened in a Windows build - not sure if this is just slowness on the Windows worker or something more serious. **Build scan:** https://gradle-enterprise.elastic.co/s/xe3ov3qvjhque/tests/:x-pack:plugin:searchable-snapshots:internalClusterTest/org.elasticsearch.xpack.searchablesnapshots.FrozenSearchableSnapshotsIntegTests/testCreateAndRestorePartialSearchableSnapshot **Reproduction line:** `gradlew ':x-pack:plugin:searchable-snapshots:internalClusterTest' --tests "org.elasticsearch.xpack.searchablesnapshots.FrozenSearchableSnapshotsIntegTests.testCreateAndRestorePartialSearchableSnapshot" -Dtests.seed=83DAAD1A771DAD8D -Dtests.locale=ja-JP-u-ca-japanese-x-lvariant-JP -Dtests.timezone=Canada/Yukon -Druntime.java=8` **Applicable branches:** 7.17 **Reproduces locally?:** No **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.searchablesnapshots.FrozenSearchableSnapshotsIntegTests&tests.test=testCreateAndRestorePartialSearchableSnapshot **Failure excerpt:** ``` java.lang.AssertionError: Shard [syxjwhutbk][5] is still locked after 5 sec waiting at __randomizedtesting.SeedInfo.seed([83DAAD1A771DAD8D:F75D6CCB4A7A836F]:0) at org.junit.Assert.fail(Assert.java:88) at org.elasticsearch.test.InternalTestCluster.assertAfterTest(InternalTestCluster.java:2751) at org.elasticsearch.test.ESIntegTestCase.afterInternal(ESIntegTestCase.java:622) at org.elasticsearch.test.ESIntegTestCase.cleanUpCluster(ESIntegTestCase.java:2396) at sun.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at java.lang.Thread.run(Thread.java:748) ```
https://github.com/elastic/elasticsearch/issues/81949
https://github.com/elastic/elasticsearch/pull/82249
332e6d48c430f7f569a9f041814efbf44140d7a0
be4ff31a250eb8944a55914b5d07d32f54d80b14
"2021-12-20T16:25:09Z"
java
"2022-01-05T11:19:41Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,943
["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ilm/AllocateAction.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ilm/AllocateActionTests.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingService.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingServiceTests.java"]
ILM: cannot specify only `total_shards_per_node` in the allocate action
**Elasticsearch version** (`bin/elasticsearch --version`): 7.16, 8.0, 8.1 **Description of the problem including expected versus actual behavior**: Defining an allocate action that only specifies the `total_shards_per_node` option fails with ``` "caused_by": { "type": "illegal_argument_exception", "reason": "At least one of include, exclude or requiremust contain attributes for action allocate" } ``` **Steps to reproduce**: ``` PUT _ilm/policy/testpolicy { "policy": { "phases": { "warm" : { "actions": { "allocate": { "total_shards_per_node": 1 } } } } } } ```
https://github.com/elastic/elasticsearch/issues/81943
https://github.com/elastic/elasticsearch/pull/81944
a17e0786fe4cf1d56f6fe576cea4bfb9eddb02e3
c813bd995de6c960c2b8000e9909128ea7997f3a
"2021-12-20T16:14:04Z"
java
"2022-01-04T11:55:03Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,939
["docs/changelog/83943.yaml", "x-pack/plugin/sql/qa/jdbc/security/src/test/java/org/elasticsearch/xpack/sql/qa/jdbc/security/JdbcWarningsIT.java", "x-pack/plugin/sql/qa/jdbc/single-node/src/test/java/org/elasticsearch/xpack/sql/qa/jdbc/single_node/JdbcWarningsIT.java", "x-pack/plugin/sql/qa/jdbc/src/main/java/org/elasticsearch/xpack/sql/qa/jdbc/JdbcWarningsTestCase.java", "x-pack/plugin/sql/qa/server/single-node/src/test/java/org/elasticsearch/xpack/sql/qa/single_node/RestSqlDeprecationIT.java", "x-pack/plugin/sql/qa/server/src/main/java/org/elasticsearch/xpack/sql/qa/rest/BaseRestSqlTestCase.java", "x-pack/plugin/sql/sql-action/src/main/java/org/elasticsearch/xpack/sql/action/SqlQueryRequest.java", "x-pack/plugin/sql/sql-action/src/test/java/org/elasticsearch/xpack/sql/action/SqlQueryRequestTests.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/parser/CommandBuilder.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/parser/LogicalPlanBuilder.java"]
SQL: Deprecation warning when querying a frozen index or listing frozen indices
Frozen indices are deprecated which makes all the [SQL features supporting frozen indices](https://www.elastic.co/guide/en/elasticsearch/reference/current/sql-index-frozen.html) obsolete. This includes: * `index_include_frozen` request parameter in the `_sql` endpoint * `index.include.frozen` (J|O)DBC driver settings * `SHOW TABLES INCLUDE FROZEN` queries and the `FROZEN INDEX` kind in the corresponding response * The `FROZEN` modifier in `FROM` clauses (as in `SELECT * FROM FROZEN archive`) `_search` raises a deprecation warning when frozen indices are being searched with `ignore_throttled=false`. SQL could do the same when the `index_include_frozen` request parameter is set or when the `FROZEN` keyword is used. Relates to https://github.com/elastic/elasticsearch/issues/70192
https://github.com/elastic/elasticsearch/issues/81939
https://github.com/elastic/elasticsearch/pull/83943
da0d33fded35d6b8c4893516f41610aa494a3ad8
7900a0bdaacccb8b5501ad21cf1fe3c8589f59de
"2021-12-20T15:57:09Z"
java
"2022-02-23T13:42:55Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,933
["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/inference/preprocessing/CustomWordEmbedding.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/inference/trainedmodel/langident/LangIdentNeuralNetwork.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/trainedmodels/langident/LangIdentNeuralNetworkInferenceTests.java"]
[ML] What to do about lang_ident for empty strings and numbers?
It's been [pointed out](https://discuss.elastic.co/t/default-language-for-language-detection/292470) that the lang_ident inference processor returns Japanese as the language for empty strings and numbers. For example: ``` { "doc" : { "_index" : "_index", "_id" : "_id", "_source" : { "contents" : "", "_ml" : { "lang_ident" : { "prediction_score" : 0.7837568024575047, "model_id" : "lang_ident_model_1", "top_classes" : [ { "class_name" : "ja", "class_probability" : 0.7837568024575047, "class_score" : 0.7837568024575047 }, { "class_name" : "ko", "class_probability" : 0.14699680203424537, "class_score" : 0.14699680203424537 }, { "class_name" : "sr", "class_probability" : 0.04528638971813643, "class_score" : 0.04528638971813643 } ], "prediction_probability" : 0.7837568024575047, "predicted_value" : "ja" } } }, "_ingest" : { "timestamp" : "2021-12-20T14:46:31.19367Z" } } ``` Since we have nothing to go on in these cases, a configurable default is probably the best we can do. Alternatively we could treat the absence of any character in any alphabet as an error, and use the failure handler functionality of ingest processors to allow the user to supply the alternative processors to use in this case (which could just be a set processor to apply a default). Or maybe there's an even better solution. But we shouldn't just predict Japanese in this situation.
https://github.com/elastic/elasticsearch/issues/81933
https://github.com/elastic/elasticsearch/pull/82746
e47b7a63f48e1dc58b972fda2007f705b6f5cf13
2c925c3363767c04146496d4d3e328cf3bc52e90
"2021-12-20T14:57:14Z"
java
"2022-01-19T14:02:20Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,891
["server/src/main/java/org/elasticsearch/common/geo/SimpleFeatureFactory.java", "server/src/test/java/org/elasticsearch/common/geo/SimpleFeatureFactoryTests.java", "x-pack/plugin/vector-tile/src/javaRestTest/java/org/elasticsearch/xpack/vectortile/VectorTileRestIT.java", "x-pack/plugin/vector-tile/src/main/java/org/elasticsearch/xpack/vectortile/feature/FeatureFactory.java", "x-pack/plugin/vector-tile/src/test/java/org/elasticsearch/xpack/vectortile/feature/FeatureFactoriesConsistencyTests.java"]
MVT API: meta-layer bounding box with 0 width or height seems malformed
**Elasticsearch version** (`bin/elasticsearch --version`): 8.0/1 **Description of the problem including expected versus actual behavior**: When using the MVT-API, and setting `exact_bounds` to true, the meta-layer seems to have a malformed bounding-box geometry when the width or height of the bounds is 0. Bounds with 0 width or height occurs often when the tile only contains a single point (or multiple points sharing the same longitude or latitude). The geometry from the meta-layer cannot be parsed by a client-side library @mapbox/vector-tile (used in MapLibre), leading us to think the geometry is malformed (?) **Steps to reproduce**: 1. Create index with point ``` PUT my-index-000001 { "mappings": { "properties": { "location": { "type": "geo_point" } } } } PUT my-index-000001/_doc/1 { "text": "Geopoint as an object", "location": { "lat": 41.12, "lon": -71.34 } } ``` 2. Request a tile ``` POST my-index-000001/_mvt/location/0/0/0 { "exact_bounds": true } ``` -> the tile is produced, but the geometry from the `META` layer is not usable. Parsing with @mapbox/vector-tile (https://www.npmjs.com/package/@mapbox/vector-tile) causes failures. It seems somewhere a command-id of `4` is inserted in the geometry-buffer-array. The only allowed commands are 1 (moveTo), 2 (lineTo), or 7 (closePath). (from https://github.com/mapbox/vector-tile-spec/tree/master/2.1) cc @iverase
https://github.com/elastic/elasticsearch/issues/81891
https://github.com/elastic/elasticsearch/pull/82404
31adaf24e89c58e61293aa8ee12007c505c8eb15
de2781f98696c1e6cfad2b5bf46fe752a5e3edbb
"2021-12-17T20:32:54Z"
java
"2022-01-13T09:04:27Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,880
["docs/changelog/85565.yaml", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/IndexLifecycleRunner.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/MoveToErrorStepUpdateTask.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/ilm/MoveToErrorStepUpdateTaskTests.java"]
Batch up failure-related ILM master tasks
In https://github.com/elastic/elasticsearch/pull/78547 we introduced batching for the ILM master tasks that occur on the happy path. However if a high-shard-count cluster encounters problems while doing ILM-related things—perhaps some nodes are temporarily unavailable for taking a snapshot—then we process the resulting `ilm-retry-failed-step` and `ilm-move-to-error-step` tasks one-by-one which can significantly delay the cluster's recovery from its problems. We should batch these things together too. It looks like we also enqueue duplicate `ilm-retry-failed-step` on each poll interval too, although we do appear to treat the duplicates as no-ops at execution time. Relates https://github.com/elastic/elasticsearch/issues/77466
https://github.com/elastic/elasticsearch/issues/81880
https://github.com/elastic/elasticsearch/pull/85565
52c52b996dc44aea8a0d47b8f2f53927f506e2b9
780b110cba98cd55e0144ba4120d41d223150592
"2021-12-17T16:20:24Z"
java
"2022-04-01T04:54:01Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,865
["docs/changelog/82321.yaml", "server/src/internalClusterTest/java/org/elasticsearch/env/NodeEnvironmentIT.java", "server/src/main/java/org/elasticsearch/env/NodeMetadata.java", "server/src/test/java/org/elasticsearch/env/NodeMetadataTests.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/SecurityImplicitBehaviorBootstrapCheckTests.java"]
Unsupported upgrades from 7.nonlast to 8.x are still permitted
Upgrading to the next major version with a rolling restart requires upgrading to the last minor of the previous major first. However you could upgrade from 5.x to 6.x and from 6.x to 7.x via a full cluster restart without upgrading to 5.last (respectively 6.last) first. For 8.x we will impose the same restriction on both upgrade paths: they must always go via 7.last. This will ensure that folks are notified about all deprecations and other changes before starting the major upgrade. We should prevent users from inadvertently doing an unsupported upgrade from 7.15 or earlier to 8.x by bailing out if the on-disk node version is too old. It should be ok to let users explicitly bypass this restriction by running `elasticsearch-node override-version`, but we want this to be an explicit action with a disclaimer and an acknowledgement from the user, rather than something that just silently appears to work. /cc @skearns64 Relates #81862
https://github.com/elastic/elasticsearch/issues/81865
https://github.com/elastic/elasticsearch/pull/82321
dc27d1d37b232a6089b5ba8fd21c49df183c5a49
979e17aa3b7e4550b34b3b629af3ab72ff9f7ddf
"2021-12-17T14:19:03Z"
java
"2022-01-14T15:40:31Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,786
["docs/reference/setup/install/.env", "docs/reference/setup/install/create-certs.yml", "docs/reference/setup/install/docker-compose.yml", "docs/reference/setup/install/docker.asciidoc", "docs/reference/setup/install/instances.yml"]
[DOCS] Update installing Elasticsearch with Docker Compose documentation
In the Stack docs, we're updating the Docker Compose configuration with a simpler setup that is a much-improved UX. When the related PR is merged, we should update the installation docs for [staring a multi-node cluster with Docker Compose](https://www.elastic.co/guide/en/elasticsearch/reference/8.0/docker.html#docker-compose-file) to reflect those changes. Relates to https://github.com/elastic/stack-docs/pull/1906
https://github.com/elastic/elasticsearch/issues/81786
https://github.com/elastic/elasticsearch/pull/81835
350fe2d21f4c5dce876de9423beaaefb61ec7319
bf60ce68c653b76e42c2b6edd66a9d245d47a737
"2021-12-15T20:35:41Z"
java
"2021-12-17T00:42:41Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,776
["x-pack/plugin/sql/sql-cli/build.gradle"]
Remove JndiLookup.class from the SQL command line tool
Elasticsearch ships with a [SQL CLI ](https://www.elastic.co/guide/en/elasticsearch/reference/current/sql-cli.html) Client in its bin directory. This client tool is standalone (NOT part of the server), for running ad-hoc SQL interactions. The jar containing the client is not on the servers class path. As a client tool, it does NOT accept external user input from the network, in a way that a server would typically do. The jar containing the SQL CLI is a stand alone Java application, and can be run as such. Alternatively, the jar could also be used as a client. This issue has been filed to consider the possible removal of JndiLookup.class from the SQL CLI jar. The mere presence of the JndiLookup.class is not problematic here, but it looks interesting and could lead to confusion for scanners, e.g. ``` unzip -l build/distributions/elasticsearch-sql-cli-8.1.0-SNAPSHOT.jar | grep JndiLookup 2937 07-22-2018 20:45 org/apache/logging/log4j/core/lookup/JndiLookup.class ``` Alternatively, or additionally, upgrade the version of log4j that is bundled in the uber executable jar.
https://github.com/elastic/elasticsearch/issues/81776
https://github.com/elastic/elasticsearch/pull/81879
5f778fa2d8488202ba35d25b6409cdb36e48f7df
3d5337d8197742b7b28256685020af712d85fb2e
"2021-12-15T19:28:02Z"
java
"2021-12-17T17:13:46Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,770
["x-pack/plugin/sql/qa/server/src/main/resources/select.csv-spec", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/analysis/analyzer/Analyzer.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/analysis/analyzer/AnalyzerTests.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/analysis/analyzer/VerifierErrorMessagesTests.java"]
SQL: Name resolution in filter is not consistent with resolution in projection
While looking into #81577 I saw that name resolution in filters does not behave the same way as resolving names in projections which can lead to subtle errors in some edge cases: E.g. the query `select gender emp_no, emp_no e from test_emp where e > 10099` yields the following result: ``` emp_no | e ---------------+--------------- M |10001 F |10002 M |10003 M |10004 M |10005 F |10006 F |10007 M |10008 F |10009 ... ``` The expected result would be equivalent to the result of `select gender emp_no, emp_no e from test_emp where emp_no > 10099`: ``` emp_no | e ---------------+--------------- F |10100 ``` Looking at the analyzed plan reveals that SQL resolves `e > 10099` in the `where` clause to `gender > 10099`. This is not consistent with the projection where `e` resolves to `emp_no`.
https://github.com/elastic/elasticsearch/issues/81770
https://github.com/elastic/elasticsearch/pull/81800
3550370c86cfdee60bb5ca991805437f0b87bccc
f1860c17ab4b9e2931a5d7482905fe5f1589239c
"2021-12-15T16:43:43Z"
java
"2022-01-11T14:51:46Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,763
["docs/changelog/84584.yaml", "qa/smoke-test-http/src/test/java/org/elasticsearch/http/RolloverRestCancellationIT.java", "server/src/main/java/org/elasticsearch/action/admin/indices/rollover/RolloverRequest.java", "server/src/main/java/org/elasticsearch/action/admin/indices/rollover/TransportRolloverAction.java", "server/src/main/java/org/elasticsearch/rest/action/admin/indices/RestRolloverIndexAction.java", "server/src/test/java/org/elasticsearch/action/admin/indices/rollover/TransportRolloverActionTests.java"]
Use the RestCancellableNodeClient infrastructure for the rollover API
**Elasticsearch version** (`bin/elasticsearch --version`): 7.16 (earlier too), 8.0, 8.1 **Description of the problem including expected versus actual behavior**: Currently, the rollover requests are not cancellable, irrespective of the underlying incoming HTTP channel being closed (eg. by a proxy). This could result in clients receiving `504` and retrying the rollovers, resulting in multiple rollover operations being processed (some products issue rollovers without specifying conditions, so this could translate in multiple subsequent rollovers being executed). This proposes using the `RestCancellableNodeClient` infrastructure for the rollover API, such that elasticsearch can react to the incoming HTTP connection being closed by cancelling the rollover operation.
https://github.com/elastic/elasticsearch/issues/81763
https://github.com/elastic/elasticsearch/pull/84584
104dcad4384d6dd5c3264931b90e5b8ee095187e
80f5f3e211def11e17d362c6b33a716bbb708cfd
"2021-12-15T14:38:33Z"
java
"2022-03-04T08:16:23Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,758
["server/src/main/java/org/elasticsearch/repositories/RepositoriesService.java", "server/src/main/java/org/elasticsearch/repositories/UnknownTypeRepository.java", "server/src/test/java/org/elasticsearch/repositories/RepositoriesServiceTests.java", "server/src/test/java/org/elasticsearch/repositories/UnknownTypeRepositoryTests.java", "test/framework/src/main/java/org/elasticsearch/test/hamcrest/ThrowableAssertions.java"]
Distinguish "repository doesn't exist" from "repository plugin not installed"
**Elasticsearch version** (`bin/elasticsearch --version`): 7.16.1 (and many others) **Plugins installed**: [] **JVM version** (`java -version`): Any **OS version** (`uname -a` if on a Unix-like system): Any **Description of the problem including expected versus actual behavior**: If you define a repository using a plugin and then remove the plugin then the `RepositoryMetadata` lives on but we do not create a corresponding `Repository` instance. This means that operations on the repository (creating snapshots etc) will fail with a `RepositoryMissingException` which is very confusing because `GET _snapshot` will show that the repository is not missing at all. I believe in this case we should create a placeholder `Repository` instance so that operations on the repository fail with a more helpful message.
https://github.com/elastic/elasticsearch/issues/81758
https://github.com/elastic/elasticsearch/pull/82457
7018e9ef84264aa54b16da56d468dd31a051a488
75579f73dc1028072767b48e6730435a2a313331
"2021-12-15T13:25:56Z"
java
"2022-01-14T08:22:25Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,752
["modules/mapper-extras/build.gradle", "modules/mapper-extras/src/test/java/org/elasticsearch/index/mapper/extras/MatchOnlyTextFieldMapperTests.java"]
[CI] RankFeaturesFieldMapperTests testMinimalIsInvalidInRoutingPath failing
Reproducible with the command from the build scan. Possibly also the cause of the other failures in the build scan as they look similar. **Build scan:** https://gradle-enterprise.elastic.co/s/ke34ae4kwfc7u/tests/:modules:mapper-extras:test/org.elasticsearch.index.mapper.extras.RankFeaturesFieldMapperTests/testMinimalIsInvalidInRoutingPath **Reproduction line:** `./gradlew ':modules:mapper-extras:test' --tests "org.elasticsearch.index.mapper.extras.RankFeaturesFieldMapperTests.testMinimalIsInvalidInRoutingPath" -Dtests.seed=A20D72D274E2D95E -Dbuild.snapshot=false -Dtests.jvm.argline="-Dbuild.snapshot=false" -Dtests.locale=ar-MA -Dtests.timezone=Indian/Reunion -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.index.mapper.extras.RankFeaturesFieldMapperTests&tests.test=testMinimalIsInvalidInRoutingPath **Failure excerpt:** ``` java.lang.IllegalArgumentException: setting index.time_series.start_time has not been registered at __randomizedtesting.SeedInfo.seed([A20D72D274E2D95E:F75FB280A8DFFDD3]:0) at org.elasticsearch.common.settings.AbstractScopedSettings.get(AbstractScopedSettings.java:740) at org.elasticsearch.index.TimestampBounds.<init>(TimestampBounds.java:22) at org.elasticsearch.index.IndexSettings.<init>(IndexSettings.java:701) at org.elasticsearch.index.IndexSettings.<init>(IndexSettings.java:680) at org.elasticsearch.index.mapper.MapperServiceTestCase.createIndexSettings(MapperServiceTestCase.java:215) at org.elasticsearch.index.mapper.MapperTestCase.testMinimalIsInvalidInRoutingPath(MapperTestCase.java:750) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/81752
https://github.com/elastic/elasticsearch/pull/81780
c8e8104f66e20e9df3192c50d95d456afddab197
730500008b0e546343ef64883ed2d62917ffcedb
"2021-12-15T11:37:48Z"
java
"2021-12-15T22:36:55Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,712
["rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/tsdb/40_search.yml"]
[CI] SmokeTestMultiNodeClientYamlTestSuiteIT test {yaml=tsdb/40_search/ids query} failing
**Build scan:** https://gradle-enterprise.elastic.co/s/nnuzywumonsbg/tests/:qa:smoke-test-multinode:integTest/org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT/test%20%7Byaml=tsdb%2F40_search%2Fids%20query%7D **Reproduction line:** `./gradlew ':qa:smoke-test-multinode:integTest' --tests "org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT.test {yaml=tsdb/40_search/ids query}" -Dtests.seed=60911EEF4E11F7C2 -Dtests.locale=sk-SK -Dtests.timezone=America/Rosario -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT&tests.test=test%20%7Byaml%3Dtsdb/40_search/ids%20query%7D **Failure excerpt:** ``` java.lang.AssertionError: Failure at [tsdb/40_search:358]: Expected: "u1" but: was "u3" at __randomizedtesting.SeedInfo.seed([60911EEF4E11F7C2:E8C52135E0ED9A3A]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) Caused by: java.lang.AssertionError: Expected: "u1" but: was "u3" at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:99) at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/81712
https://github.com/elastic/elasticsearch/pull/81731
4d085d7551aedc34cd7a1d7ea06ea9dc1ed12ed9
201cc86b31485c5a1ef5a3f336bed1780a229f64
"2021-12-14T09:55:46Z"
java
"2021-12-14T16:22:59Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,708
["docs/changelog/81819.yaml", "qa/evil-tests/src/test/java/org/elasticsearch/common/logging/EvilLoggerTests.java", "server/src/main/java/org/elasticsearch/common/logging/DeprecationLogger.java", "server/src/test/java/org/elasticsearch/common/logging/DeprecationLoggerTests.java"]
Missing doPriviliged in deprecation logger
possibly a doPriviliged in deprecation logger together with a test DeprecationLoggerTests.testLogPermissions were accidentally removed. This is possibly a regression. Scripts run under reduced privileges. (can @elastic/es-core-infra help?) and the test was introduced to verify deprecation logger not violating Security Manager permission when rolling over the files. 7.0+ https://github.com/elastic/elasticsearch/pull/37281/files#diff-70de5a6ba5c637e7f19c51341417760d6e957beb5a1fa5703049095ea2719ee0R322 However the doPriviliged call in deprecation logger was removed in (7.10+) https://github.com/elastic/elasticsearch/pull/55941/files#diff-593ea478a0a8d462fd38ad70838ee6e4a28673478d28812c48d9ed5cf768c132L249 The test itself was removed in 7.10+ https://github.com/elastic/elasticsearch/pull/61474/files#diff-70de5a6ba5c637e7f19c51341417760d6e957beb5a1fa5703049095ea2719ee0L47 @stu-elastic or @jdconrad do you remember more context about this? Do you think this should be fixed?
https://github.com/elastic/elasticsearch/issues/81708
https://github.com/elastic/elasticsearch/pull/81819
a4b232a09fd7217e6fc7bb7910ca07c7b609d031
f954919d654654057fb0015a3e484f056bf1b984
"2021-12-14T08:59:21Z"
java
"2021-12-17T08:18:42Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,600
["docs/reference/snapshot-restore/apis/get-snapshot-status-api.asciidoc"]
[DOCS] Fix get snapshot status API docs
As pointed out in https://github.com/elastic/elasticsearch/issues/80931, the [get snapshot status API docs](https://www.elastic.co/guide/en/elasticsearch/reference/current/get-snapshot-status-api.html#get-snapshot-status-api-desc) have some issues: * `GET _snapshot/_status` `GET _snapshot/<repository>/_status` are undocumented. * The `<repository>` and `<snapshot>` parameters are not required. * The `<snapshot>` parameter doesn't support `_current`. Relates to https://github.com/elastic/elasticsearch/pull/59355.
https://github.com/elastic/elasticsearch/issues/81600
https://github.com/elastic/elasticsearch/pull/81818
3d4e78487a8a51fbd370ad2cd98b70ff548a8b76
88be4ed95022231499f7781bfdfb685d3479440a
"2021-12-09T20:18:59Z"
java
"2022-02-03T15:55:23Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,585
["docs/changelog/88221.yaml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/search.aggregation/30_sig_terms.yml", "server/src/main/java/org/elasticsearch/search/aggregations/bucket/terms/SignificanceLookup.java", "server/src/main/java/org/elasticsearch/search/aggregations/bucket/terms/SignificantTermsAggregationBuilder.java", "server/src/test/java/org/elasticsearch/search/aggregations/bucket/terms/SignificantTermsAggregatorTests.java"]
significant_terms background ignores alias filter
**Elasticsearch version** (`bin/elasticsearch --version`): v7+ **Description of the problem including expected versus actual behavior**: When used with an alias that has a filter, only the foreground set is filtered. The background set ignores the alias filter. This skews the results, especially when the user supplies an additional foreground filter, assuming the background filter will respect the alias filter. **Steps to reproduce**: ``` PUT sig_terms_bug { "mappings": { "properties": { "field1": { "type": "keyword" }, "field2": { "type": "keyword" }, "field3": { "type": "keyword" } } } } POST sig_terms_bug/_bulk?refresh=true { "index" : {} } { "field1" : "failed", "field2": "frontend-node", "field3": "foo" } { "index" : {} } { "field1" : "failed", "field2": "frontend-node", "field3": "bar" } { "index" : {} } { "field1" : "failed", "field2": "frontend-node", "field3": "bar" } { "index" : {} } { "field1" : "success", "field2": "frontend-node", "field3": "bar" } { "index" : {} } { "field1" : "success", "field2": "frontend-node", "field3": "bar" } { "index" : {} } { "field1" : "failed", "field2": "backend-node", "field3": "foo" } { "index" : {} } { "field1" : "failed", "field2": "backend-node", "field3": "bar" } { "index" : {} } { "field1" : "failed", "field2": "backend-node", "field3": "bar" } { "index" : {} } { "field1" : "success", "field2": "backend-node", "field3": "bar" } { "index" : {} } { "field1" : "success", "field2": "backend-node", "field3": "bar" } { "index" : {} } POST _aliases { "actions": [ { "add": { "index": "sig_terms_bug", "alias": "sig_terms_bug_alias", "filter": { "bool": { "filter": [ { "term": { "field2": "frontend-node" } } ] } } } } ] } GET sig_terms_bug_alias/_search?track_total_hits=true&size=0&filter_path=aggregations { "aggs": { "sig_term": { "significant_terms": { "field": "field3" } } } } ``` This results in: ``` { "aggregations" : { "sig_term" : { "doc_count" : 5, "bg_count" : 10, "buckets" : [ ] } } } ``` It seems to me that the `bg_count` should respect the alias filter.
https://github.com/elastic/elasticsearch/issues/81585
https://github.com/elastic/elasticsearch/pull/88221
a044b5c01e0f95a37f7ae9f1d0f04529724111c7
ab2602ecb08e1ec389573ac7f32fe9942d5b732b
"2021-12-09T13:40:48Z"
java
"2022-07-19T17:03:08Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,577
["x-pack/plugin/sql/qa/server/src/main/resources/select.csv-spec", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/analysis/analyzer/Analyzer.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/analysis/analyzer/AnalyzerTests.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/analysis/analyzer/VerifierErrorMessagesTests.java"]
[SQL] StackOverflowError from a query using aggregates and aliases
For an index with a single field in its mapping ``` "sequence": { "type": "long" } ``` The following query results in a `StackOverflowError`: ``` select max(sequence) as sequence, avg(sequence) as sequence, avg(sequence) as s from test_index where s > 0 group by sequence having s > 0 ``` The stacktrace: ``` java.lang.StackOverflowError: null at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:176) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?] at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?] ... ```
https://github.com/elastic/elasticsearch/issues/81577
https://github.com/elastic/elasticsearch/pull/81800
3550370c86cfdee60bb5ca991805437f0b87bccc
f1860c17ab4b9e2931a5d7482905fe5f1589239c
"2021-12-09T09:36:47Z"
java
"2022-01-11T14:51:46Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,529
["docs/changelog/83213.yaml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/search.aggregation/40_range.yml", "server/src/main/java/org/elasticsearch/index/mapper/NumberFieldMapper.java", "server/src/test/java/org/elasticsearch/search/aggregations/bucket/range/RangeAggregatorTests.java"]
Long.MIN_VALUE considered out of range for type `long` in range aggregations
<!-- GitHub is reserved for bug reports and feature requests; it is not the place for general questions. If you have a question or an unconfirmed bug , please visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also check your OS is [supported](https://www.elastic.co/support/matrix#show_os). If it is not, the issue is likely to be closed. For security vulnerabilities please only send reports to [email protected]. See https://www.elastic.co/community/security for more information. Please fill in the following details to help us reproduce the bug: --> **Elasticsearch version** (`bin/elasticsearch --version`): 7.16.0 **Plugins installed**: [] **JVM version** (`java -version`): **OS version** (`uname -a` if on a Unix-like system): **Description of the problem including expected versus actual behavior**: When defining a range aggregation on a field of type `long`, if one of the ranges has a bound equal to `Long.MIN_VALUE` (the java constant, equal to `-(2^63)`) or just a bit higher, Elasticsearch raises an error: ``` "Value [-9.223372036854776E18] is out of range for a long" ``` This directly contradicts the [documentation of numeric types](https://www.elastic.co/guide/en/elasticsearch/reference/current/number.html) which states that a `long` is "A signed 64-bit integer with a minimum value of -2^63 and a maximum value of 2^63-1" It is a regression compared to 7.15.2, which didn't raise such an error. **Steps to reproduce**: ``` curl -XDELETE -H "Content-Type: application/json" 'localhost:9200/test/' || true echo curl -XPUT -H "Content-Type: application/json" 'localhost:9200/test/' -d'{"mappings": {"properties": {"mylong": {"type": "long" } } } }' echo curl -XPUT -H "Content-Type: application/json" 'localhost:9200/test/_doc/1?refresh=true' -d '{"mylong": -9223372036854775808 }' echo curl -XPOST -H "Content-Type: application/json" 'localhost:9200/test/_search?size=0&pretty' -d '{"query":{"match_all":{}},"aggregations":{"myagg":{"range":{"field":"mylong","ranges":[{"from":-9223372036854775808,"to":9223372036854775807}]}}}}' ``` Output of the last command with Elasticsearch 7.16.0: ```json{"total":2,"successful":1,"failed":0},"_seq_no":0,"_primary_term":1} { "error" : { "root_cause" : [ { "type" : "illegal_argument_exception", "reason" : "Value [-9.223372036854776E18] is out of range for a long" } ], "type" : "search_phase_execution_exception", "reason" : "all shards failed", "phase" : "query", "grouped" : true, "failed_shards" : [ { "shard" : 0, "index" : "test", "node" : "MgMAsXzNTxeaMkLvCsZjuw", "reason" : { "type" : "illegal_argument_exception", "reason" : "Value [-9.223372036854776E18] is out of range for a long" } } ], "caused_by" : { "type" : "illegal_argument_exception", "reason" : "Value [-9.223372036854776E18] is out of range for a long", "caused_by" : { "type" : "illegal_argument_exception", "reason" : "Value [-9.223372036854776E18] is out of range for a long" } } }, "status" : 400 } ``` Output of the last command with Elasticsearch 7.15.2: ```json { "took" : 49, "timed_out" : false, "_shards" : { "total" : 1, "successful" : 1, "skipped" : 0, "failed" : 0 }, "hits" : { "total" : { "value" : 1, "relation" : "eq" }, "max_score" : null, "hits" : [ ] }, "aggregations" : { "myagg" : { "buckets" : [ { "key" : "-9.223372036854776E18-9.223372036854776E18", "from" : -9.223372036854776E18, "to" : 9.223372036854776E18, "doc_count" : 1 } ] } } } ``` **Provide logs (if relevant)**: N/A **Workaround**: Sending long values as JSON strings instead of JSON numbers removes the problem completely, apparently bypassing the (invalid) check. So I suppose this is a deserialization bug, where extreme integer values are rounded and converted to doubles during deserialization.
https://github.com/elastic/elasticsearch/issues/81529
https://github.com/elastic/elasticsearch/pull/83213
7f0595abe68e07d927c874a53737556f6555fdaf
2d701b99670246724399f37df2fd63299af7d33b
"2021-12-08T14:20:37Z"
java
"2022-02-02T13:59:13Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,514
["x-pack/plugin/transform/qa/single-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/transform/integration/TransformPivotRestIT.java", "x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/action/TransportPreviewTransformAction.java"]
[Transform] Preview transform returns 'null' when ingest pipeline throws an exception
**Elasticsearch version** (`bin/elasticsearch --version`): 7.15.2 **Description of the problem including expected versus actual behavior**: Running a transform with a pipeline that throws an exception results in `preview` array containung `null` elements without any further explanation what the issue could be - this makes it very hard to debug. I would expect an error message, what had failed in the pipeline within my preview response. **Steps to reproduce**: ``` PUT _ingest/pipeline/orders-set-id { "processors": [ { "script": { "lang": "painless", "source": "ctx._id = ctx['non']['existing'];" } } ] } POST _transform/_preview { "source": { "index": "my-index" }, "dest": { "index": "my-other-index", "pipeline": "orders-set-id" }, "frequency": "1h", "pivot": { "group_by": { "order_id": { "terms": { "field": "order_id.keyword" } } }, "aggregations": { "products": { "scripted_metric": { "init_script": "state.docs = [];", "map_script": "state.docs.add(doc['order_id.keyword'].value);", "combine_script": "return state.docs", "reduce_script": "return [];" } } } } } ``` This returns ```json { "preview" : [ null ], "generated_dest_index" : { "mappings" : { "_meta" : { "_transform" : { "transform" : "transform-preview", "version" : { "created" : "7.15.2" }, "creation_date_in_millis" : 1638962189562 }, "created_by" : "transform" }, "properties" : { "order_id" : { "type" : "keyword" } } }, "settings" : { "index" : { "number_of_shards" : "1", "auto_expand_replicas" : "0-1" } }, "aliases" : { } } } ```
https://github.com/elastic/elasticsearch/issues/81514
https://github.com/elastic/elasticsearch/pull/81972
c813bd995de6c960c2b8000e9909128ea7997f3a
e9af7c608f9686e04d991034cd0cf043f1d9ed1a
"2021-12-08T11:19:37Z"
java
"2022-01-04T13:25:12Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,502
["x-pack/plugin/sql/qa/server/src/main/java/org/elasticsearch/xpack/sql/qa/rest/RestSqlUsageTestCase.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/PlanExecutor.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/search/Querier.java"]
SQL: Incorrect stats reported when sorting by aggregated values
The following query increases the `rest.total` counter by 11 and the `rest.paging` counter by 10 (as returned by `_sql/stats`): ``` GET http://localhost:9201/_sql { "fetch_size": 10, "query": "select last_name, sum(languages) from test_emp group by 1 order by 2" } ``` Expected behavior would be to only increase `rest.total` by 1. The bug is caused by `LocalAggregationSorterListener` using `PlanExecutor` to fetch all records before sorting.
https://github.com/elastic/elasticsearch/issues/81502
https://github.com/elastic/elasticsearch/pull/81510
9a3422e1a6cf519e3fedce396784be2ef48dc7f9
7d1c434922145c5a285798a7f3dd2525f17a5c74
"2021-12-08T09:39:44Z"
java
"2021-12-13T08:29:21Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,470
["x-pack/plugin/ml/qa/native-multi-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/ml/integration/AutoscalingIT.java", "x-pack/plugin/ml/qa/native-multi-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/ml/integration/PyTorchModelIT.java", "x-pack/plugin/ml/qa/native-multi-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/ml/integration/TestFeatureResetIT.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BertTokenizer.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/BertRequestBuilderTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/NerProcessorTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/TextClassificationProcessorTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/ZeroShotClassificationProcessorTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BertTokenizerTests.java"]
[ML] validate vocab tokens on model initialization
The passed vocabulary for NER models should be validated on model start up. We should: - Ensure the UNKNOWN token is provided - That special tokens exist if they are requested by the tokenizer - That the PAD token is provided Right now, there are many smaller functional tests that take advantage of this validation error. But, in production, not having these tokens would result in unfriendly NPEs or weird tokenization errors.
https://github.com/elastic/elasticsearch/issues/81470
https://github.com/elastic/elasticsearch/pull/81548
90e4e8ce630aecba6b1d631cad77c903f892d655
0fc4dff194767b6b76c5936163ab16e10d593d7f
"2021-12-07T21:27:05Z"
java
"2021-12-09T13:26:15Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,468
["rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/tsdb/40_search.yml"]
[CI] SmokeTestMultiNodeClientYamlTestSuiteIT test {yaml=tsdb/40_search/ids query} failing
**Build scan:** https://gradle-enterprise.elastic.co/s/edbbtbzes7dxg/tests/:qa:smoke-test-multinode:integTest/org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT/test%20%7Byaml=tsdb%2F40_search%2Fids%20query%7D **Reproduction line:** `./gradlew ':qa:smoke-test-multinode:integTest' --tests "org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT.test {yaml=tsdb/40_search/ids query}" -Dtests.seed=11B63D69F126C92A -Dtests.locale=sk-SK -Dtests.timezone=America/Punta_Arenas -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** Didn't try **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT&tests.test=test%20%7Byaml%3Dtsdb/40_search/ids%20query%7D **Failure excerpt:** ``` java.lang.AssertionError: Failure at [tsdb/40_search:358]: Expected: "u1" but: was "u3" at __randomizedtesting.SeedInfo.seed([11B63D69F126C92A:99E202B35FDAA4D2]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) Caused by: java.lang.AssertionError: Expected: "u1" but: was "u3" at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:99) at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/81468
https://github.com/elastic/elasticsearch/pull/81731
4d085d7551aedc34cd7a1d7ea06ea9dc1ed12ed9
201cc86b31485c5a1ef5a3f336bed1780a229f64
"2021-12-07T21:02:12Z"
java
"2021-12-14T16:22:59Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,462
["x-pack/plugin/src/yamlRestTest/resources/rest-api-spec/test/data_stream/10_basic.yml"]
[CI] XPackRestIT test {p0=data_stream/10_basic/Get data stream api check existence of replicated and allow_custom_routing fields} failing
allow_custom_routing is only in 8.0 but the test assumes it's in 7.16.1 and above. **Build scan:** https://gradle-enterprise.elastic.co/s/lamn7fwv2wwy2/tests/:x-pack:plugin:yamlRestTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=data_stream%2F10_basic%2FGet%20data%20stream%20api%20check%20existence%20of%20replicated%20and%20allow_custom_routing%20fields%7D **Reproduction line:** `./gradlew ':x-pack:plugin:yamlRestTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=data_stream/10_basic/Get data stream api check existence of replicated and allow_custom_routing fields}" -Dtests.seed=862835B30F4AEBBB -Dtests.locale=vi -Dtests.timezone=America/Denver -Druntime.java=8` **Applicable branches:** 7.16 **Reproduces locally?:** Didn't try **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Ddata_stream/10_basic/Get%20data%20stream%20api%20check%20existence%20of%20replicated%20and%20allow_custom_routing%20fields%7D **Failure excerpt:** ``` java.lang.AssertionError: Failure at [data_stream/10_basic:652]: field [data_streams.0.allow_custom_routing] is null at __randomizedtesting.SeedInfo.seed([862835B30F4AEBBB:E7C0A69A1B68643]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:482) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:455) at sun.reflect.GeneratedMethodAccessor15.invoke(null:-1) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at java.lang.Thread.run(Thread.java:748) Caused by: java.lang.AssertionError: field [data_streams.0.allow_custom_routing] is null at org.junit.Assert.fail(Assert.java:88) at org.junit.Assert.assertTrue(Assert.java:41) at org.junit.Assert.assertNotNull(Assert.java:712) at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:78) at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:471) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:455) at sun.reflect.GeneratedMethodAccessor15.invoke(null:-1) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at java.lang.Thread.run(Thread.java:748) ```
https://github.com/elastic/elasticsearch/issues/81462
https://github.com/elastic/elasticsearch/pull/81590
d467aae67eb5ca24cb9d8ec76e9ea29538834aed
616b417fb07e9653ef3eeeeaab2e65902cc9e710
"2021-12-07T17:31:30Z"
java
"2021-12-13T12:23:29Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,431
["docs/reference/aggregations/bucket/composite-aggregation.asciidoc"]
Update `composite` aggregation docs that `size` is not allowed in `terms` aggregation
It's not possible to use `size` parameter when `terms` aggregation is used as `sources` in a `composite` aggregation. <img width="1381" alt="Screenshot 2021-12-07 at 14 15 26" src="https://user-images.githubusercontent.com/6585477/145038667-d74305e2-50d1-44b1-bc6e-d9f2f85c38e9.png"> The [docs page](https://www.elastic.co/guide/en/elasticsearch/reference/master/search-aggregations-bucket-composite-aggregation.html#_terms) for `composite` aggregation should mention that. It currently says > The terms value source is equivalent to a simple terms aggregation. The values are extracted from a field exactly like the terms aggregation.
https://github.com/elastic/elasticsearch/issues/81431
https://github.com/elastic/elasticsearch/pull/81775
1bd0561a91bb6bdbb3103fb3b24de9d1044f143e
04318961b948cd0794bfd7e5eaf4a0dee8ba8bd4
"2021-12-07T13:36:22Z"
java
"2021-12-15T19:32:16Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,415
["modules/legacy-geo/build.gradle"]
[CI] LegacyGeoShapeFieldMapperTests testMinimalIsInvalidInRoutingPath failing
**Build scan:** https://gradle-enterprise.elastic.co/s/l3web4uikmzda/tests/:modules:legacy-geo:test/org.elasticsearch.legacygeo.mapper.LegacyGeoShapeFieldMapperTests/testMinimalIsInvalidInRoutingPath **Reproduction line:** `./gradlew ':modules:legacy-geo:test' --tests "org.elasticsearch.legacygeo.mapper.LegacyGeoShapeFieldMapperTests.testMinimalIsInvalidInRoutingPath" -Dtests.seed=9D9C10E69693AB84 -Dbuild.snapshot=false -Dtests.jvm.argline="-Dbuild.snapshot=false" -Dtests.locale=fi -Dtests.timezone=America/Bahia_Banderas -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** Didn't try **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.legacygeo.mapper.LegacyGeoShapeFieldMapperTests&tests.test=testMinimalIsInvalidInRoutingPath **Failure excerpt:** ``` java.lang.IllegalArgumentException: setting index.time_series.start_time has not been registered at __randomizedtesting.SeedInfo.seed([9D9C10E69693AB84:C8CED0B44AAE8F09]:0) at org.elasticsearch.common.settings.AbstractScopedSettings.get(AbstractScopedSettings.java:740) at org.elasticsearch.index.TimestampBounds.<init>(TimestampBounds.java:22) at org.elasticsearch.index.IndexSettings.<init>(IndexSettings.java:701) at org.elasticsearch.index.IndexSettings.<init>(IndexSettings.java:680) at org.elasticsearch.index.mapper.MapperServiceTestCase.createIndexSettings(MapperServiceTestCase.java:215) at org.elasticsearch.index.mapper.MapperTestCase.testMinimalIsInvalidInRoutingPath(MapperTestCase.java:750) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/81415
https://github.com/elastic/elasticsearch/pull/81494
1ffd17df590af3560829c2c52b06af87633a23a1
6819d57bcb96d1b8ace841eb69dfdb0144c75199
"2021-12-07T10:06:40Z"
java
"2021-12-14T15:22:17Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,380
["docs/changelog/86134.yaml", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authc/Realms.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/RealmsTests.java"]
Boot message possible confusion: reporting trial license
## Description During Elasticsearch boot, users get the following message: > license mode is [trial], currently licensed security realms are [reserved/reserved,file/default_file,native/default_native] Even if it's technically true (and necessary), it may be confusing for end users since they may expect `[basic]` instead. ## Proposal Avoid the message reporting the trial license, since the "correct" license level is written again later in the boot process.
https://github.com/elastic/elasticsearch/issues/81380
https://github.com/elastic/elasticsearch/pull/86134
0a5523cb4e92a3cb662b9ab1879ef923773aae84
25c50919102d27dd8faabb6f6a529b2965907cf3
"2021-12-06T16:26:46Z"
java
"2022-04-27T06:58:52Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,244
["docs/changelog/93329.yaml", "modules/ingest-common/src/yamlRestTest/resources/rest-api-spec/test/ingest/190_script_processor.yml", "server/src/internalClusterTest/java/org/elasticsearch/index/FinalPipelineIT.java", "server/src/main/java/org/elasticsearch/ingest/IngestDocument.java", "server/src/main/java/org/elasticsearch/ingest/IngestService.java", "server/src/test/java/org/elasticsearch/ingest/IngestServiceTests.java"]
Ingest parses index requests twice when there is a final pipeline
I was looking at a flame graph of an ingestion workload with @dliappis, and it looks like we parse the JSON representation of the index request twice when a document has both a pipeline and a final pipeline. It's hard to know how much we would save on this benchmark since not all data streams in this benchmark had both a pipeline and a final pipeline, but the cost of parsing index request into maps of maps via IngestService represented 4.06% of overall CPU time according to the flame graph, so this might not be negligible.
https://github.com/elastic/elasticsearch/issues/81244
https://github.com/elastic/elasticsearch/pull/93329
63ca70897553fbfea45c7c63b92134d59e5d4c77
3e3b2711cf7be388faad499a1d713bb146ef69c6
"2021-12-02T09:20:17Z"
java
"2023-01-30T16:48:19Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,208
["distribution/docker/build.gradle", "distribution/docker/src/docker/Dockerfile", "distribution/src/bin/elasticsearch", "docs/changelog/81245.yaml", "qa/os/src/test/java/org/elasticsearch/packaging/test/DockerTests.java"]
Package cloudflare-zlib with the Docker image
Elasticsearch uses zlib for two purposes: - Compression of stored fields with `index.codec: best_compression`, which we use for observability and security data. - Request / response compression. The original zlib, which is usually the one that is installed, optimizes for portability and misses a number of important optimizations such as leveraging vectorization support for x86 and ARM architectures. Several forks have been created in order to address this, notably an [Intel fork](https://github.com/jtkukunas/zlib), [zlib-ng](https://github.com/zlib-ng/zlib-ng) and a [Cloudflare fork](https://github.com/cloudflare/zlib). Historically, zlib was packaged within the JDK, so that users wouldn't have to have zlib installed for basic usage of Java. A downside of this approach is that it didn't allow using one of these faster forks, but [since version 9 the JDK uses the system's zlib when available](https://bugs.openjdk.java.net/browse/JDK-8031767) and falls back to the zlib that is packaged within the JDK if a system zlib cannot be found. I performed testing with the Cloudflare zlib, which yielded almost 2x faster compression and decompression for JSON documents that are representative of those produced by the Elastic Observability solution. A run of the `solutions/logs` track with Rally yielded 2.35% faster indexing, 8.28% less cumulative merge time and 4.83% less cumulative indexing time. One particularity of the Cloudflare zlib is that compression levels retain the same semantics as the original zlib (unlike the Intel fork which uses a compatible format but gives different semantics for some compression levels) so the space efficiency of the produced indices was sensibly the same. This issue suggests that we update our Docker image to use the Cloudflare fork of zlib instead of the original zlib so that users of the Elastic Cloud service and of the Docker image in general would get better performance out of their Elasticsearch clusters.
https://github.com/elastic/elasticsearch/issues/81208
https://github.com/elastic/elasticsearch/pull/81245
a7fdb08046ba7041d91016349df62b7f932b23f9
1f5a0ed2d197d7a12eb20ea28bc2c759ec57f416
"2021-12-01T13:55:30Z"
java
"2021-12-03T09:48:45Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,192
["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/Subject.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/permission/LimitedRole.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/permission/Role.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/permission/SimpleRole.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/RoleReferenceIntersection.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authc/SubjectTests.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/permission/LimitedRoleTests.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/RoleReferenceIntersectionTests.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/store/CompositeRolesStore.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authz/store/CompositeRolesStoreTests.java"]
Rework Role and LimitedRole to support more general limiting
The `LimitedRole` limits what a `Role` can authorize by intersecting it privileges with an additional set of privileges. This concept is useful in general and we plan to leverage it in more features. However the current implementation only works for one level of limiting and this prevents its general usefulness. For example, an API key already has one level of limiting. So it is not possible to further limiting it which might be useful in cases like derived API keys, cross-cluster API keys. We should remove the above constraint by reworking the implementation of `Role` and `LimitedRole`.
https://github.com/elastic/elasticsearch/issues/81192
https://github.com/elastic/elasticsearch/pull/81403
c98833f9c6ce2116e95936d9717df1b3eb6101bc
c4912794661e77d15debe08ea49aef27910dc27d
"2021-12-01T00:31:40Z"
java
"2022-01-19T02:44:28Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,183
["docs/reference/migration/migrate_8_0/rest-api-changes.asciidoc", "docs/reference/snapshot-restore/apis/create-snapshot-api.asciidoc", "docs/reference/snapshot-restore/apis/restore-snapshot-api.asciidoc", "docs/reference/snapshot-restore/index.asciidoc", "docs/reference/snapshot-restore/restore-snapshot.asciidoc", "docs/reference/snapshot-restore/take-snapshot.asciidoc"]
[DOCS] Update snapshot and restore docs for system index resolution changes
https://github.com/elastic/elasticsearch/pull/79670 updates some of the defaults for capturing system indices in a snapshot and restoring system indices from a snapshot. This issue tracks related updates to the docs.
https://github.com/elastic/elasticsearch/issues/81183
https://github.com/elastic/elasticsearch/pull/81226
d0d91c690ead75466dcc920f85a5d47a25bcc75c
1519bb6ecbcb44375108b650f4d30ee25649e9ee
"2021-11-30T22:06:42Z"
java
"2021-12-08T15:15:14Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,167
["docs/reference/mapping/types/dense-vector.asciidoc", "x-pack/plugin/vectors/src/main/java/org/elasticsearch/xpack/vectors/mapper/DenseVectorFieldMapper.java", "x-pack/plugin/vectors/src/test/java/org/elasticsearch/xpack/vectors/mapper/DenseVectorFieldMapperTests.java", "x-pack/plugin/vectors/src/test/java/org/elasticsearch/xpack/vectors/mapper/DenseVectorFieldTypeTests.java"]
Edge cases with 0-vectors in knn_search
While playing around with the new vector search endpoint I ran into two interesting edge cases with "cosine" similarity. I myabe didn't read the docs too carefully so I used zero-valued vectors in the query which raised an assertion error on my locally started nodes where we run with "-ea" turned on. If assertions are disabled, and start with this setup <details> ``` DELETE my-index PUT my-index { "mappings": { "properties": { "my_vector": { "type": "dense_vector", "dims": 3, "index": true, "similarity": "cosine" }, "my_text" : { "type" : "keyword" } } } } PUT my-index/_doc/1 { "my_text" : "text1", "my_vector" : [3, 0, 6] } PUT my-index/_doc/2 { "my_text" : "text2", "my_vector" : [0, 1, 0] } POST my-index/_knn_search { "knn": { "field": "my_vector", "query_vector": [0, 0, 0], "k": 2, "num_candidates" : 100 } } ``` </details> I get <details><summary>this error</summary> ``` org.elasticsearch.action.search.SearchPhaseExecutionException: all shards failed [...] Caused by: org.elasticsearch.ElasticsearchException$1: Index 2147483645 out of bounds for length 1 at org.elasticsearch.ElasticsearchException.guessRootCauses(ElasticsearchException.java:639) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:410) [elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] ... 20 more Caused by: java.lang.IndexOutOfBoundsException: Index 2147483645 out of bounds for length 1 at jdk.internal.util.Preconditions.outOfBounds(Preconditions.java:64) ~[?:?] at jdk.internal.util.Preconditions.outOfBoundsCheckIndex(Preconditions.java:70) ~[?:?] at jdk.internal.util.Preconditions.checkIndex(Preconditions.java:266) ~[?:?] at java.util.Objects.checkIndex(Objects.java:359) ~[?:?] at org.apache.lucene.index.CodecReader.checkBounds(CodecReader.java:103) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] at org.apache.lucene.index.CodecReader.document(CodecReader.java:88) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] at org.apache.lucene.index.FilterLeafReader.document(FilterLeafReader.java:374) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] at org.apache.lucene.index.FilterLeafReader.document(FilterLeafReader.java:374) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] at org.elasticsearch.search.internal.FieldUsageTrackingDirectoryReader$FieldUsageTrackingLeafReader.document(FieldUsageTrackingDirectoryReader.java:123) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.apache.lucene.index.FilterLeafReader.document(FilterLeafReader.java:374) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] at org.elasticsearch.search.fetch.FetchPhase.loadStoredFields(FetchPhase.java:448) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.search.fetch.FetchPhase.prepareNonNestedHitContext(FetchPhase.java:314) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.search.fetch.FetchPhase.prepareHitContext(FetchPhase.java:270) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.search.fetch.FetchPhase.buildSearchHits(FetchPhase.java:158) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.search.fetch.FetchPhase.execute(FetchPhase.java:90) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.search.SearchService.executeFetchPhase(SearchService.java:653) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.search.SearchService.executeQueryPhase(SearchService.java:628) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.search.SearchService.lambda$executeQueryPhase$2(SearchService.java:483) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.action.ActionRunnable.lambda$supply$0(ActionRunnable.java:47) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] ... 6 more ``` </details> When running with assertions enabled I run into this check even earlier: <details> ``` java.lang.AssertionError: null » at org.apache.lucene.search.TopScoreDocCollector$SimpleTopScoreDocCollector$1.collect(TopScoreDocCollector.java:75) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] » at org.apache.lucene.search.Weight$DefaultBulkScorer.scoreRange(Weight.java:274) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] » at org.apache.lucene.search.Weight$DefaultBulkScorer.score(Weight.java:254) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] » at org.elasticsearch.search.internal.CancellableBulkScorer.score(CancellableBulkScorer.java:45) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] » at org.apache.lucene.search.BulkScorer.score(BulkScorer.java:38) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] » at org.elasticsearch.search.internal.ContextIndexSearcher.searchLeaf(ContextIndexSearcher.java:194) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] » at org.elasticsearch.search.internal.ContextIndexSearcher.search(ContextIndexSearcher.java:167) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] » at org.apache.lucene.search.IndexSearcher.search(IndexSearcher.java:541) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40] » at org.elasticsearch.search.query.QueryPhase.searchWithCollector(QueryPhase.java:233) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] » at org.elasticsearch.search.query.QueryPhase.executeInternal(QueryPhase.java:187) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] » at org.elasticsearch.search.query.QueryPhase.execute(QueryPhase.java:88) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] » at org.elasticsearch.search.SearchService.loadOrExecuteQueryPhase(SearchService.java:458) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] » at org.elasticsearch.search.SearchService.executeQueryPhase(SearchService.java:621) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] » at org.elasticsearch.search.SearchService.lambda$executeQueryPhase$2(SearchService.java:483) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT] ``` </details> I also noted that indexing a document with e.g. a [0,0,0] vector into a field with similarity "cosine" is possible and if matched returns "null" scores (or runs into an assertion error if -ea is enabled like in local tests etc...) Just wanted to mention this, maybe its is useful to protect against this with some better error message etc...
https://github.com/elastic/elasticsearch/issues/81167
https://github.com/elastic/elasticsearch/pull/82241
20c9bf95ea76416fb813dc7fcb265207a8006fa9
6c442920ba29165745934f5b24df1f9da1b907fd
"2021-11-30T18:47:54Z"
java
"2022-01-11T17:34:04Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,164
["x-pack/plugin/src/yamlRestTest/resources/rest-api-spec/test/data_stream/10_basic.yml"]
[CI] XPackRestIT test {p0=data_stream/10_basic/Create data stream} failing
This has failed about a dozen times today and did reproduce for me. **Build scan:** https://gradle-enterprise.elastic.co/s/jx24cqobh7sug/tests/:x-pack:plugin:yamlRestTestV7CompatTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=data_stream%2F10_basic%2FCreate%20data%20stream%7D **Reproduction line:** `./gradlew ':x-pack:plugin:yamlRestTestV7CompatTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=data_stream/10_basic/Create data stream}" -Dtests.seed=CDB9BA92F9896F93 -Dtests.locale=de-CH -Dtests.timezone=Pacific/Guam -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Ddata_stream/10_basic/Create%20data%20stream%7D **Failure excerpt:** ``` java.lang.AssertionError: Failure at [data_stream/10_basic:96]: field [data_streams.0.replicated] is null at __randomizedtesting.SeedInfo.seed([CDB9BA92F9896F93:45ED85485775026B]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) Caused by: java.lang.AssertionError: field [data_streams.0.replicated] is null at org.junit.Assert.fail(Assert.java:88) at org.junit.Assert.assertTrue(Assert.java:41) at org.junit.Assert.assertNotNull(Assert.java:712) at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:78) at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/81164
https://github.com/elastic/elasticsearch/pull/81201
8fd4a2d04e6ade1886f14c0b1072749ce4de2893
c934fb501269eef993b8f0611364a856d661e6f1
"2021-11-30T18:24:56Z"
java
"2021-12-01T14:47:23Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,157
["x-pack/plugin/ql/src/main/java/org/elasticsearch/xpack/ql/index/IndexResolver.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/plan/logical/command/sys/SysTablesTests.java"]
SQL: SYS TABLES returns local aliases for remote clusters
A query like `SYS TABLES CATALOG LIKE 'remoteCluster' LIKE '%' TYPE 'VIEW'` will return the local aliases. Expected is to return nothing (as the remote aliases are not discoverable through field caps).
https://github.com/elastic/elasticsearch/issues/81157
https://github.com/elastic/elasticsearch/pull/81158
f205b7655fef514756860d033f6a0d1ee980a3eb
1650e8096853e66acbd41b0bee0adfa923f05a32
"2021-11-30T15:28:19Z"
java
"2021-12-08T11:24:46Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,128
["server/src/main/java/org/elasticsearch/common/geo/SphericalMercatorUtils.java", "server/src/test/java/org/elasticsearch/common/geo/SphericalMercatorUtilTests.java"]
[CI] GeoShapeWithDocValuesFieldTypeTests testFetchVectorTile failing
**Build scan:** https://gradle-enterprise.elastic.co/s/nqq2qsasgv6bo/tests/:x-pack:plugin:spatial:test/org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests/testFetchVectorTile **Reproduction line:** `./gradlew ':x-pack:plugin:spatial:test' --tests "org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests.testFetchVectorTile" -Dtests.seed=484C606413FB6694 -Dtests.locale=uk -Dtests.timezone=America/Adak -Druntime.java=17` **Applicable branches:** 8.0 **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests&tests.test=testFetchVectorTile **Failure excerpt:** ``` java.lang.ArrayIndexOutOfBoundsException: Index 0 out of bounds for length 0 at __randomizedtesting.SeedInfo.seed([484C606413FB6694:1F79130016192F24]:0) at com.wdtinc.mapbox_vector_tile.adapt.jts.JtsAdapter.countCoordRepeatReverse(JtsAdapter.java:576) at com.wdtinc.mapbox_vector_tile.adapt.jts.JtsAdapter.linesToGeomCmds(JtsAdapter.java:501) at com.wdtinc.mapbox_vector_tile.adapt.jts.JtsAdapter.toFeature(JtsAdapter.java:344) at com.wdtinc.mapbox_vector_tile.adapt.jts.JtsAdapter.toFeatures(JtsAdapter.java:300) at org.elasticsearch.xpack.vectortile.feature.FeatureFactory.getFeatures(FeatureFactory.java:91) at org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests.fetchVectorTile(GeoShapeWithDocValuesFieldTypeTests.java:118) at org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests.testFetchVectorTile(GeoShapeWithDocValuesFieldTypeTests.java:85) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/81128
https://github.com/elastic/elasticsearch/pull/81145
66dc62618eac2dd2f20762348d932ed2b78db9a2
3a3bb236105d06db89ef779ff27ab3d69daa4eea
"2021-11-29T21:24:42Z"
java
"2021-12-01T06:04:40Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,076
["server/src/main/java/org/elasticsearch/common/geo/GeoPolygonDecomposer.java", "server/src/test/java/org/elasticsearch/common/geo/GeometryIndexerTests.java"]
geotile_grid aggregation on geo_shape produces incorrect results for polygons in certain corner cases
**Elasticsearch version** (`bin/elasticsearch --version`): 7.13.2-SNAPSHOT **Description of the problem including expected versus actual behavior**: Certain geo_shapes cause the geotile_grid aggregation to produce incorrect results. **Steps to reproduce**: 1. Create the index ``` PUT /test-data { "settings": { "number_of_shards": 1 }, "mappings": { "properties": { "shape": { "type": "geo_shape" }, "time": { "type": "date" } } } } ``` 2. Put a rectangle ``` POST /test-data/_doc { "shape" : { "type" : "polygon", "coordinates" : [ [ [180.0, 20.54099347935443], [180.00, 56.22356828010862], [173.32664998748726, 56.22356828010862], [173.32664998748726, 20.54099347935443], [180.0, 20.54099347935443] ] ] }, "time": "2021-11-26T00:00:00Z" } ``` 3. Do an aggregation and observe correct results. ``` POST test-data/_search?size=0 { "query": { "match_all": {} }, "aggs": { "grids": {"geotile_grid": {"field": "shape", "precision": 4}} } } "buckets" : [ { "key" : "4/15/7", "doc_count" : 1 }, { "key" : "4/15/6", "doc_count" : 1 }, { "key" : "4/15/5", "doc_count" : 1 }, { "key" : "4/15/4", "doc_count" : 1 } ] ``` 4. Put a more complex polygon that is contained within the same area as the previous shape ``` POST /test-data/_doc { "shape" : { "type" : "polygon", "coordinates" : [ [ [ 180, 38.382280879731525 ], [ 180, 39.20402540758703 ], [ 180, 40.20983928828463 ], [ 180, 41.5905083136395 ], [ 180, 43.79069222748844 ], [ 180, 48.05737800943521 ], [ 180, 56.22356828010862 ], [ 180, 53.61517437197104 ], [ 178.17058562712035, 47.44994633100819 ], [ 177.161329896696, 44.42163705320016 ], [ 176.63491363226575, 42.6928738950413 ], [ 176.29683812379142, 41.52175761146341 ], [ 176.0458600769842, 40.61841573973024 ], [ 175.83768485617443, 39.84528044056929 ], [ 175.64814528805073, 39.12101916544052 ], [ 175.4602369741285, 38.382280879731525 ], [ 175.2576316219736, 37.56053635187602 ], [ 175.01887227795362, 36.55472247117842 ], [ 174.7078894332312, 35.174053445823546 ], [ 174.25388021927512, 32.97386953197461 ], [ 173.53771573775157, 28.707183750027852 ], [ 173.32664998748726, 20.54099347935443 ], [ 177.52259404863642, 23.14938738749197 ], [ 180, 29.314615428454847 ], [ 180, 32.34292470626289 ], [ 180, 34.07168786442174 ], [ 180, 35.24280414799964 ], [ 180, 36.14614601973281 ], [ 180, 36.91928131889376 ], [ 180, 37.64354259402253 ], [ 180, 38.382280879731525 ] ] ] }, "time": "2021-11-26T00:00:00Z" } ``` 5. Do another aggregation ``` POST test-data/_search?size=0 { "query": { "match_all": {} }, "aggs": { "grids": {"geotile_grid": {"field": "shape", "precision": 4}} } } ``` 6. Observe that you get buckets way outside of the expected area. Picture from Kibana makes it very clear. ![image](https://user-images.githubusercontent.com/229922/143610546-9c1a05da-f31b-474d-9692-9a4e89c4dfe7.png)
https://github.com/elastic/elasticsearch/issues/81076
https://github.com/elastic/elasticsearch/pull/81155
32ca555b620a4d1567d3bca9104e8880299bb5cd
8b077479b61d9633565440f9b80231c4cb7ca4f6
"2021-11-26T16:39:13Z"
java
"2021-12-02T08:02:50Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,068
["distribution/docker/src/docker/bin/docker-entrypoint.sh", "docs/changelog/81082.yaml", "qa/os/src/test/java/org/elasticsearch/packaging/test/DockerTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/test/EnrollmentProcessTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/util/docker/Docker.java", "qa/os/src/test/java/org/elasticsearch/packaging/util/docker/DockerRun.java", "x-pack/plugin/security/cli/src/main/java/org/elasticsearch/xpack/security/cli/AutoConfigureNode.java"]
Issue enrolling nodes to existing cluster on docker
In 8.0.0 nodes can enroll to an existing secured cluster by passing the `--enrollment-token <token>` parameter on node start. This approach sadly doesn't work for Docker as we don't pass arbitrary parameters passed to `docker run` to the actual entrypoint of our Docker image. The work around for now is to override the entrypoint when starting a new node that should enroll to an existing cluster, as follows for instance : ``` docker run -it --rm -m 1g --entrypoint /usr/share/elasticsearch/bin/elasticsearch docker.elastic.co/elasticsearch/elasticsearch:8.0.0-beta1 --enrollment-token <token> ``` We should look into ways of allowing the enrollment token to be passed to docker run commands in a way that this will be relayed to the the elasticsearch executable so users don't need to override the entrypoint
https://github.com/elastic/elasticsearch/issues/81068
https://github.com/elastic/elasticsearch/pull/81082
0ab502f1943b85a68f27215b353d9f0174682415
54eb955a650211cb5d1705f7bacd9d47d2a706dd
"2021-11-25T18:13:35Z"
java
"2021-12-07T16:10:05Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,058
["docs/reference/ingest/processors/date.asciidoc"]
Invalid output format when using ISO8601 as date processor output_format
Hello ! **Elasticsearch version** (`bin/elasticsearch --version`): 7.14.2 As the doc mentions it, the [date processor output_format](https://www.elastic.co/guide/en/elasticsearch/reference/current/date-processor.html) should accept `ISO8601` or `UNIX` values as `output_format`. However, here is the result: ```json PUT _ingest/pipeline/timestamp { "processors": [ { "date": { "field": "date_iso", "target_field": "timestamp", "formats": [ "ISO8601" ], "output_format": "UNIX" } } ] } ``` ```json { "error" : { "root_cause" : [ { "type" : "exception", "reason" : "java.lang.IllegalArgumentException: invalid output format [UNIX]", "processor_type" : "date" } ], "type" : "exception", "reason" : "java.lang.IllegalArgumentException: invalid output format [UNIX]", "processor_type" : "date", "caused_by" : { "type" : "illegal_argument_exception", "reason" : "invalid output format [UNIX]", "caused_by" : { "type" : "illegal_argument_exception", "reason" : "Invalid format: [UNIX]: Unknown pattern letter: U", "caused_by" : { "type" : "illegal_argument_exception", "reason" : "Unknown pattern letter: U" } } } }, "status" : 500 } ``` The `format` parameter accepts those values. Thanks! Romain
https://github.com/elastic/elasticsearch/issues/81058
https://github.com/elastic/elasticsearch/pull/81557
f0bf6f5ee368cb36080ee3557afbb68a9c44073c
b1f5373e022f1f268aec99470c71f80d014d7429
"2021-11-25T16:04:38Z"
java
"2021-12-17T12:07:03Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,052
["docs/reference/query-dsl/nested-query.asciidoc"]
[Docs] Clarify nested query behavior when using 'must_not' filter
I have a situation when my document could contain several nested objects in it and I want to check that it *doesn't contain* nested object with particular properties. Since I didn't find any tool for working with nested object collections I try to utilize `bool` query with `must_not` clause for this purpose. So I have the following mapping: ``` { "space-app.profiles.17": { "mappings": { "doc": { "_routing": { "required": true }, "properties": { "customFields": { "type": "nested", "properties": { "AUTONUMBER": { "type": "text", "analyzer": "links" }, "BOOLEAN": { "type": "boolean" }, "CONTACT": { "type": "text", "analyzer": "links" }, "DATE": { "type": "date" }, "DATE_TIME": { "type": "date" }, "ENUM": { "type": "keyword" }, "FRACTION": { "type": "keyword" }, "INTEGER": { "type": "long" }, "STRING": { "type": "text", "analyzer": "string_analyzer" }, "URL": { "type": "text", "analyzer": "links" }, "VCS_COMMIT": { "type": "text", "analyzer": "string_analyzer" }, "entityLinks": { "type": "keyword" }, "extendedType": { "type": "keyword" }, "id": { "type": "long" }, "valueId": { "type": "long", "index": false } } }, "id": { "type": "long" }, "organizationKey": { "type": "long" }, "profiles_about": { "type": "text", "analyzer": "text_analyzer" }, "profiles_emails": { "type": "text", "analyzer": "email" }, "profiles_firstName": { "type": "text", "analyzer": "string_analyzer" }, "profiles_fullName": { "type": "text", "analyzer": "string_analyzer" }, "profiles_internationalNames": { "type": "text", "analyzer": "string_analyzer" }, "profiles_lastName": { "type": "text", "analyzer": "string_analyzer" }, "profiles_links": { "type": "text", "analyzer": "links" }, "profiles_messengers": { "type": "text", "analyzer": "string_analyzer" }, "profiles_notAMember": { "type": "boolean" }, "profiles_phones": { "type": "text", "analyzer": "phone" }, "profiles_userName": { "type": "text", "analyzer": "string_analyzer" } } } } } } ``` Than I'm executing the following query: ``` curl -X GET "localhost:9200/space-app.profiles.17/_search?pretty" -H 'Content-Type: application/json' -d' { "from": 0, "size": 30, "query": { "bool": { "must": [ { "nested": { "query": { "bool": { "must_not": [ { "term": { "customFields.id": { "value": 825769069716586058, "boost": 1.0 } } } ], "adjust_pure_negative": true, "boost": 1.0 } }, "path": "customFields", "ignore_unmapped": true, "score_mode": "max", "boost": 1.0 } } ], "adjust_pure_negative": true, "boost": 1.0 } } } ' ``` In the results I'm receiving the following document: ``` { "_index": "space-app.profiles.17", "_type": "doc", "_id": "7010800587899399528-4133272973067776871", "_score": 0.042559616, "_routing": "organizationKey", "_source": { "id": 4133272973067776871, "organizationKey": 7010800587899399528, "profiles_firstName": "Angela", "profiles_lastName": "Bohl", "profiles_fullName": "Angela Bohl", "profiles_about": "At cum ocurreret imperdiet, no sint albucius vix, eius petentium vel ne! Per ut impetus consetetur, tacimates convenire ne nam, no maluisset deseruisse moderatius quo!", "profiles_userName": "angela.bohl", "profiles_phones": [], "profiles_emails": [ "[email protected]", "[email protected]" ], "profiles_links": [], "profiles_messengers": [ "slack:Angela" ], "profiles_notAMember": false, "customFields": [ { "valueId": 7486325966825161302, "extendedType": "ppl", "STRING": "Lamborgini", "id": 825769069716586058 }, { "valueId": 3106313864822063649, "entityLinks": "PROJECT|7251758770176377084", "extendedType": "ppl", "id": 8935354544283173893 } ] } } ``` This document is unexpected for me since I'm trying to filter it out with ``` "must_not": [ { "term": { "customFields.id": { "value": 825769069716586058, "boost": 1.0 } } } ] ``` Looks like I receive this result because I have other nested objects in this document which satisfy my query. This is an unexpected behavior for me since "must" would return me all the documents which contains satisfying nested object, so I need to negate this query somehow. Elastic version info: ``` { "name": "N6U3BIi", "cluster_name": "docker-cluster", "cluster_uuid": "Q_7PaMemTzGiQvgL8XODBw", "version": { "number": "6.5.4", "build_flavor": "default", "build_type": "tar", "build_hash": "d2ef93d", "build_date": "2018-12-17T21:17:40.758843Z", "build_snapshot": false, "lucene_version": "7.5.0", "minimum_wire_compatibility_version": "5.6.0", "minimum_index_compatibility_version": "5.0.0" } } ```
https://github.com/elastic/elasticsearch/issues/81052
https://github.com/elastic/elasticsearch/pull/82727
25dd4a31587710d050492cace27aa5d72accc042
0a3f6acaddcce12046e0be153fb327c4903d3d9f
"2021-11-25T14:39:15Z"
java
"2022-01-18T15:14:26Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,045
["server/src/internalClusterTest/java/org/elasticsearch/timeseries/support/TimeSeriesMetricsIT.java"]
[CI] TimeSeriesMetricsIT runs OOM
**Build scan**: https://gradle-enterprise.elastic.co/s/ifqr2xck7cpao **Repro line**: `gradlew ':server:internalClusterTest' --tests "org.elasticsearch.timeseries.support.TimeSeriesMetricsIT" -Dtests.seed=3D9EF5828D9382A7 -Dtests.locale=en-US -Dtests.timezone=UTC -Druntime.java=17` **Reproduces locally?**: Yes **Applicable branches**: master **Failure excerpt**: ``` org.elasticsearch.timeseries.support.TimeSeriesMetricsIT > classMethod FAILED java.lang.Exception: Suite timeout exceeded (>= 1200000 msec). at __randomizedtesting.SeedInfo.seed([3D9EF5828D9382A7]:0) REPRODUCE WITH: ./gradlew ':server:internalClusterTest' --tests "org.elasticsearch.timeseries.support.TimeSeriesMetricsIT" -Dtests.seed=3D9EF5828D9382A7 -Dtests.locale=en-US -Dtests.timezone=UTC -Druntime.java=17 org.elasticsearch.timeseries.support.TimeSeriesMetricsIT > classMethod FAILED com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=5779, name=elasticsearch[node_s1][search][T#7], state=RUNNABLE, group=TGRP-TimeSeriesMetricsIT] Caused by: java.lang.OutOfMemoryError: Java heap space at __randomizedtesting.SeedInfo.seed([3D9EF5828D9382A7]:0) at java.base/java.nio.HeapByteBuffer.<init>(HeapByteBuffer.java:64) at java.base/java.nio.ByteBuffer.allocate(ByteBuffer.java:363) at org.apache.lucene.store.BufferedIndexInput.refill(BufferedIndexInput.java:285) at org.apache.lucene.store.BufferedIndexInput.readByte(BufferedIndexInput.java:55) at org.apache.lucene.store.DataInput.readInt(DataInput.java:94) at org.apache.lucene.store.BufferedIndexInput.readInt(BufferedIndexInput.java:149) at org.apache.lucene.store.MockIndexInputWrapper.readInt(MockIndexInputWrapper.java:172) at org.apache.lucene.store.IndexInput$1.readInt(IndexInput.java:166) at org.apache.lucene.util.packed.DirectReader$DirectPackedReader24.get(DirectReader.java:342) at org.apache.lucene.codecs.lucene90.Lucene90DocValuesProducer$10.longValue(Lucene90DocValuesProducer.java:592) at org.apache.lucene.document.SortedNumericDocValuesRangeQuery$1$1.matches(SortedNumericDocValuesRangeQuery.java:124) at org.apache.lucene.search.ConjunctionDISI$ConjunctionTwoPhaseIterator.matches(ConjunctionDISI.java:350) at org.elasticsearch.common.lucene.Lucene$2.get(Lucene.java:887) at org.elasticsearch.search.aggregations.bucket.filter.FilterAggregator$1.collect(FilterAggregator.java:55) at org.elasticsearch.search.aggregations.MultiBucketCollector$MultiLeafBucketCollector.collect(MultiBucketCollector.java:237) at org.elasticsearch.search.aggregations.bucket.BucketsAggregator.collectExistingBucket(BucketsAggregator.java:92) at org.elasticsearch.search.aggregations.bucket.BucketsAggregator.collectBucket(BucketsAggregator.java:78) at org.elasticsearch.search.aggregations.bucket.filter.FilterAggregator$1.collect(FilterAggregator.java:56) at org.elasticsearch.search.aggregations.bucket.composite.CompositeAggregator$4.collect(CompositeAggregator.java:577) at org.elasticsearch.search.aggregations.bucket.composite.GlobalOrdinalValuesSource$1.collect(GlobalOrdinalValuesSource.java:144) at org.elasticsearch.search.aggregations.LeafBucketCollector.collect(LeafBucketCollector.java:86) at org.elasticsearch.search.aggregations.bucket.composite.CompositeAggregator.runDeferredCollections(CompositeAggregator.java:559) at org.elasticsearch.search.aggregations.bucket.composite.CompositeAggregator.buildAggregations(CompositeAggregator.java:175) at org.elasticsearch.search.aggregations.Aggregator.buildTopLevel(Aggregator.java:154) at org.elasticsearch.search.aggregations.AggregationPhase.execute(AggregationPhase.java:67) at org.elasticsearch.search.query.QueryPhase.execute(QueryPhase.java:94) at org.elasticsearch.indices.IndicesService.lambda$loadIntoContext$27(IndicesService.java:1525) at org.elasticsearch.indices.IndicesService$$Lambda$5684/0x00000008016eca88.accept(Unknown Source) at org.elasticsearch.indices.IndicesService.lambda$cacheShardLevelResult$28(IndicesService.java:1591) at org.elasticsearch.indices.IndicesService$$Lambda$5685/0x00000008016ed1e8.get(Unknown Source) at org.elasticsearch.indices.IndicesRequestCache$Loader.load(IndicesRequestCache.java:178) at org.elasticsearch.indices.IndicesRequestCache$Loader.load(IndicesRequestCache.java:161) ``` CC @nik9000 @imotov
https://github.com/elastic/elasticsearch/issues/81045
https://github.com/elastic/elasticsearch/pull/81159
be7cf05c827c4133d57a9dc56c50e4dbafbb9ec0
b6f19a8f9d787f95e15980a29feb0aa326196edd
"2021-11-25T12:36:52Z"
java
"2021-11-30T18:37:54Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,024
["x-pack/plugin/security/src/internalClusterTest/java/org/elasticsearch/xpack/security/user/AnonymousUserIntegTests.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authc/support/ApiKeyGenerator.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/store/CompositeRolesStore.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/store/RoleDescriptorStore.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/support/ApiKeyGeneratorTests.java"]
Anonymous roles not captured when creating API keys
When creating an API key, the own's roles at creation time are captured. The owner's roles are a superset of the final privileges that an API key can effectively have. Elasticsearch have the feature of [anonymous access](https://www.elastic.co/guide/en/elasticsearch/reference/current/anonymous-access.html). The anonymous roles are automaticaly assigned to every login user (regular users, not service account or API keys). However, these roles are not captured when creating API keys. This is a surprising behaviour because a user should be able to create API keys to do things that can be done by the user itself. If the user itself has no role and purely rely on anonymous roles for access (for emulating open cluster while still apply other security features), the API key is created with an empty superset of roles. This means the API key is essentially useless because it cannot be used to perform any actions. It is also hard to explain this behaviour in documentation. The proposal is to fix it by capturing the anonymous roles when creating API keys (including granting API keys).
https://github.com/elastic/elasticsearch/issues/81024
https://github.com/elastic/elasticsearch/pull/81427
24e1888ae3de0cd04a2132716c96c08438f22e78
20e24c3db612631712fcf417ea914b88ceab5dfd
"2021-11-24T23:44:31Z"
java
"2022-01-24T11:49:25Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,013
["x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/datafeed/DatafeedNodeSelector.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/datafeed/DatafeedNodeSelectorTests.java"]
[ML] Datafeed fails to start when using CCS and multi-index wildcards and data only exists in remote cluster
Seen in `8.0.0-SNAPSHOT`, likely occurs in earlier versions. Datafeed fails to start when using CCS and multi-index wildcards and data only exists in remote cluster **Steps to reproduce** 1. Configure 2 clusters for CCS. Remote cluster should contain data. Local cluster should not. 2. Configure datafeed to use `remote:index1-*, remote:index2-*, index1-*, index2-*` with options `{"expand_wildcards":["open"],"ignore_unavailable":true,"allow_no_indices":true,"ignore_throttled":true}` 3. Start datafeed The following error occurs: `No node found to start datafeed [datafeed-job1], allocation explanation [cannot start datafeed [datafeed-job1] because index [index1-*,index2-*] does not exist, is closed, or is still initializing.]` If trying to reproduce without using CCS, the datafeed would successfully start as long as either `index1-*` or `index2-*` existed. If neither `index1-*` or `index2-*` existed, there is an error `cannot retrieve field [timestamp] because it has no mappings` Without using wildcards, then I would expect different behaviour, and depending on index options. Internal edge test clusters are using this CCS pattern and there is no data in the local cluster. **Expected behaviour** - As long as data exists in at least one of those indexes (either remote or local), the datafeed should start. - Errors should be meaningful. - Where possible, we should follow how this is handled in `_search` **Workaround** Either 1. Update the datafeed to exclude the indices which do not exist, or 2. Create empty index in local cluster with mappings for the fields used in the detection config
https://github.com/elastic/elasticsearch/issues/81013
https://github.com/elastic/elasticsearch/pull/81074
d9e73eb441a6a3b1c1a62a4a49b6f7ce8e7d9f4e
e54438004504d543673613fb6bce5ef90dca9fb1
"2021-11-24T19:21:49Z"
java
"2021-11-29T12:19:34Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,011
["x-pack/plugin/ml/src/internalClusterTest/java/org/elasticsearch/xpack/ml/integration/AnomalyJobCRUDIT.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/action/TransportOpenJobAction.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/job/task/OpenJobPersistentTasksExecutor.java"]
[ML] A model state created in 7.0-7.9 should not have to be upgraded before upgrading to version 8
Step to reproduce: 1. On a 7.6.0 cluster, create and run a few of AD jobs, 2. After jobs finish and stop, upgrade the cluster to 7.16.0 3. After upgrade, login kibana and go to Stack Management -> Upgrade Assistant, Observed: there are critical warnings about obsolete minimum version of model snapshot ![image](https://user-images.githubusercontent.com/47184485/143296527-c5882a4a-6081-4b0f-beb3-19676571a19b.png) Expected: A model state created in 7.0-7.9 should not have to be upgraded before upgrading to version 8
https://github.com/elastic/elasticsearch/issues/81011
https://github.com/elastic/elasticsearch/pull/81039
15de6035148fd7904bb4f609f10d9b29af492a4f
64338bff3ef2fbea8b3bd153d92f79168c8cdd7a
"2021-11-24T18:45:34Z"
java
"2021-11-25T13:36:58Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,990
["libs/ssl-config/src/test/java/org/elasticsearch/common/ssl/PemUtilsTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/test/PackagesSecurityAutoConfigurationTests.java", "qa/os/src/test/resources/org/elasticsearch/packaging/test/http.crt", "qa/os/src/test/resources/org/elasticsearch/packaging/test/http.key", "qa/os/src/test/resources/org/elasticsearch/packaging/test/http_ca.crt", "qa/os/src/test/resources/org/elasticsearch/packaging/test/http_ca.key", "qa/os/src/test/resources/org/elasticsearch/packaging/test/transport.crt", "qa/os/src/test/resources/org/elasticsearch/packaging/test/transport.key", "qa/os/src/test/resources/org/elasticsearch/packaging/test/transport_ca.crt", "x-pack/plugin/security/cli/src/main/java/org/elasticsearch/xpack/security/cli/AutoConfigureNode.java"]
bin/elasticsearch-reconfigure-node bugs and enhancements
This is a meta issue to cover identified bugs and enhancements we want to make to `elasticsearch-reconfigure-node`. This CLI tool is introduced in 8.0.0 and the main use case it satisfies is to allow users to reconfigure an elasticsearch node that has been installed via a DEB or RPM package and enroll it into an existing cluster. DEB/RPM installations by default make the assumption that the installed node is the first (or only) one in the cluster and configure TLS for transport and http layers accordingly. This CLI tool allows users to revisit the assumption after installation (before the node is ever started), so that it can enroll to an existing, secured cluster. - [ ] `elasticsearch-reconfigure-node` should be safer to use. The current behavior is to remove existing configuration and then attempt to enroll to the cluster. We should first attempt to enroll to the cluster and then remove/replace existing configuration, or backup/restore the existing configuration upon failure to enroll, so that we leave the node in a working state in every case. - [ ] `elasticsearch-reconfigure-node` lacks documentation - [ ] `elasticsearch-reconfigure-node` is expected to be run as root and wrongly sets file owners for generated keystores, so elasticsearch fails to read them on startup.
https://github.com/elastic/elasticsearch/issues/80990
https://github.com/elastic/elasticsearch/pull/82789
0a16177f407c4b410e93fc52c1d514b3387fc7ee
814f7f9f52cb8c05db6465b9bfc818ea5d76c575
"2021-11-24T13:34:18Z"
java
"2022-01-21T13:32:02Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,976
["server/src/main/java/org/elasticsearch/cluster/metadata/DataStreamAlias.java", "server/src/main/java/org/elasticsearch/snapshots/RestoreService.java", "server/src/test/java/org/elasticsearch/cluster/metadata/DataStreamAliasTests.java"]
Snapshot restore requests allow you to restore alias with write data stream, even if the alias already has a write data stream
**Elasticsearch version** (`bin/elasticsearch --version`): Version: 8.1.0-SNAPSHOT, Build: default/tar/e38cadb5283feeea06f09d555dbe47fb1d5e8b39/2021-11-22T22:35:22.825882Z, JVM: 17.0.1 **OS version** (`uname -a` if on a Unix-like system): Darwin 20.6.0 Darwin Kernel Version 20.6.0: Mon Aug 30 06:12:21 PDT 2021; root:xnu-7195.141.6~3/RELEASE_X86_64 x86_64 **Description of the problem including expected versus actual behavior**: I expect ES to reject snapshot restore requests that restore an alias with a write data stream if that alias already exists and has another write data stream. However, ES currently accepts these requests. It appears that the alias uses the restored write data stream, which may be unexpected and confusing to users. This is likely related to https://github.com/elastic/elasticsearch/issues/80972. **Steps to reproduce**: 1. Register a snapshot repository ``` PUT /_snapshot/my_repository { "type": "fs", "settings": { "location": "my_backup_location" } } ``` 2. Create the `logs-my_app-default` data stream. ``` POST logs-my_app-default/_doc { "@timestamp": "2099-05-06T16:21:15.000Z" } ``` 3. Add the `logs` alias to the data stream and set it as the write data stream. ``` POST _aliases { "actions": [ { "add": { "index": "logs-my_app-default", "alias": "logs", "is_write_index": true } } ] } ``` 4. Create a snapshot containing the data stream. This also backs up its alias. ``` PUT _snapshot/my_repository/my_snapshot?wait_for_completion=true ``` 5. Delete the data stream. ``` DELETE _data_stream/logs-my_app-default ``` 6. Create another data stream, `logs-my_other_app-default`, and add it as the write data stream to the `logs` alias. ``` POST logs-my_other_app-default/_doc { "@timestamp": "2099-05-07T16:21:15.000Z" } POST _aliases { "actions": [ { "add": { "index": "logs-my_other_app-default", "alias": "logs", "is_write_index": true } } ] } ``` 7. Restore the `logs-my_app-default` data stream and its aliases from the snapshot. ``` POST /_snapshot/my_repository/my_snapshot/_restore?wait_for_completion=true { "indices": "logs-my_app-default", "include_aliases": true } ``` I expected this to return an error like `alias [logs] has more than one write index [logs-my_other_app-default,logs-my_app-default]`. This occurs for index aliases in a similar situation. However, the request was accepted. When you check the `logs` alias, the restored `logs-my_app-default` data stream is the current write data stream: ``` GET _alias/logs ``` Returns: ``` { "logs-my_other_app-default" : { "aliases" : { "logs" : { } } }, "logs-my_app-default" : { "aliases" : { "logs" : { "is_write_index" : true } } } } ```
https://github.com/elastic/elasticsearch/issues/80976
https://github.com/elastic/elasticsearch/pull/81217
eec64f72bf6280445ed0f74d219632b87f46572c
a4b232a09fd7217e6fc7bb7910ca07c7b609d031
"2021-11-23T23:00:33Z"
java
"2021-12-17T07:40:07Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,972
["server/src/main/java/org/elasticsearch/cluster/metadata/Metadata.java", "server/src/test/java/org/elasticsearch/cluster/metadata/MetadataTests.java", "x-pack/plugin/data-streams/src/internalClusterTest/java/org/elasticsearch/datastreams/DataStreamIT.java", "x-pack/plugin/data-streams/src/internalClusterTest/java/org/elasticsearch/datastreams/DataStreamsSnapshotsIT.java"]
Snapshot restore requests allow you to restore data stream alias with conflicting name
**Elasticsearch version** (`bin/elasticsearch --version`): Version: 8.1.0-SNAPSHOT, Build: default/tar/e38cadb5283feeea06f09d555dbe47fb1d5e8b39/2021-11-22T22:35:22.825882Z, JVM: 17.0.1 **OS version** (`uname -a` if on a Unix-like system): Darwin 20.6.0 Darwin Kernel Version 20.6.0: Mon Aug 30 06:12:21 PDT 2021; root:xnu-7195.141.6~3/RELEASE_X86_64 x86_64 **Description of the problem including expected versus actual behavior**: I expect ES to reject snapshot restore requests that restore a data stream alias with the same name as an existing data stream or index. However, ES currently accepts these requests. This cluster now has a data stream/index and alias with the same name. A user may not be sure which resource a search request targeting the name will hit. **Steps to reproduce**: 1. Register a snapshot repository ``` PUT /_snapshot/my_repository { "type": "fs", "settings": { "location": "my_backup_location" } } ``` 2. Create a data stream. ``` POST logs-my_app-default/_doc { "@timestamp": "2099-05-06T16:21:15.000Z" } ``` 3. Add a `logs` alias to the data stream. ``` POST _aliases { "actions": [ { "add": { "index": "logs-my_app-default", "alias": "logs" } } ] } ``` 4. Create a snapshot containing the data stream and its alias ``` PUT _snapshot/my_repository/my_snapshot?wait_for_completion=true ``` 5. Delete the data stream. This also deletes the alias. ``` DELETE _data_stream/logs-my_app-default ``` 6. Create another data stream with same name as the deleted alias (`logs`). ``` PUT _index_template/my-index-template { "index_patterns": ["logs"], "data_stream": { }, "priority": 500 } POST logs/_doc { "@timestamp": "2099-05-07T16:21:15.000Z" } ``` 7. Restore the data stream and `logs` alias from the snapshot. ``` POST /_snapshot/my_repository/my_snapshot/_restore?wait_for_completion=true { "indices": "logs-my_app-default", "include_aliases": true } ``` I expected this to return an error due to a conflict between the restored `logs` alias and the pre-existing `logs` data stream. However, the request was accepted, and both resources now exist. Retrieve the `logs` data stream: ``` GET _data_stream/logs ``` Retrieve the `logs` alias: ``` GET _alias/logs ``` A search on `logs` only hits the `logs` data stream: ``` GET logs/_search ``` However, a search on `log*` hits both the alias and the data stream: ``` GET log*/_search ```
https://github.com/elastic/elasticsearch/issues/80972
https://github.com/elastic/elasticsearch/pull/81040
e20fe6d6390b46d21a09cbdd63f75753cd8d1b0d
5c4330292ffead1218ddba896431ca04408f766c
"2021-11-23T21:27:38Z"
java
"2021-11-30T08:31:26Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,962
["docs/reference/docs/delete-by-query.asciidoc", "docs/reference/docs/update-by-query.asciidoc", "rest-api-spec/src/main/resources/rest-api-spec/api/delete_by_query.json", "rest-api-spec/src/main/resources/rest-api-spec/api/update_by_query.json"]
[Docs] _source* params don't work for Update by query / Delete by query
The docs for [Update by query](https://www.elastic.co/guide/en/elasticsearch/reference/current/docs-update-by-query.html) and [Delete by query](https://www.elastic.co/guide/en/elasticsearch/reference/current/docs-delete-by-query.html) mention that you can use the following parameters to include/exclude fields returned from the affected docs: * `_source` * `_source_excludes` * `_source_includes` However, in testing this it doesn't appear to actually work. Example in Kibana Dev Tools: ``` POST test/_doc/123 { "foo": "bar" } POST test/_delete_by_query { "query": { "term": { "foo": { "value": "bar" } } }, "_source": true } ``` Result: ``` { "took" : 80, "timed_out" : false, "total" : 1, "deleted" : 1, "batches" : 1, "version_conflicts" : 0, "noops" : 0, "retries" : { "bulk" : 0, "search" : 0 }, "throttled_millis" : 0, "requests_per_second" : -1.0, "throttled_until_millis" : 0, "failures" : [ ] } ``` I spoke with @DaveCTurner offline and he indicated: > I think this is a docs bug, I don’t believe DBQ or UBQ support `_source`. You could easily hit billions of docs, there’s no way we could return them all. If that's confirmed to be the case, I believe we should remove mention of those from the docs.
https://github.com/elastic/elasticsearch/issues/80962
https://github.com/elastic/elasticsearch/pull/81131
86978e87b877b304d81ae749266c248607da6f7e
ca8c9be01696d81998de15ef0ec50cd021cb5dfd
"2021-11-23T18:56:31Z"
java
"2021-12-01T14:06:12Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,952
["x-pack/plugin/sql/qa/server/src/main/resources/pivot.csv-spec", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/search/Querier.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/search/SourceGenerator.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/planner/QueryFolder.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/querydsl/container/GlobalCountRef.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/querydsl/container/QueryContainer.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/planner/QueryFolderTests.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/planner/QueryTranslatorTests.java"]
SQL: Cannot reorder columns in PIVOT query
Given a query like `SELECT a, b, birth_date FROM (SELECT * FROM test_emp PIVOT (SUM(salary) FOR languages IN (1 as a, 2 as b)) LIMIT 10)` the response is ``` a | b | birth_date ------------------------+---------------+--------------- null |56415 |null null |34341 |null null |39728 |null 1952-04-19T00:00:00.000Z|66174 |null 1953-01-07T00:00:00.000Z|null |52044 1953-01-23T00:00:00.000Z|73717 |null 1953-09-02T00:00:00.000Z|null |57305 1953-09-19T00:00:00.000Z|null |44307 1954-06-19T00:00:00.000Z|null |56760 ``` Expected response would be to have the first column with the dates last. Note, the bug also applies if you don't select any of the pivoted columns as in `SELECT emp_no, birth_date FROM (SELECT * FROM test_emp PIVOT (SUM(salary) FOR languages IN (1 as a, 2 as b)) LIMIT 10)` and also when not using a subquery as in `SELECT a, birth_date, emp_no FROM test_emp PIVOT (SUM(salary) FOR languages IN (1 as a, 2 as b)) LIMIT 10`.
https://github.com/elastic/elasticsearch/issues/80952
https://github.com/elastic/elasticsearch/pull/81032
55b0903ed5042952efadb737d954393d38d5422f
05ffbff778207f86d6930adaeed641561f96f8bf
"2021-11-23T15:48:45Z"
java
"2021-12-03T07:35:22Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,939
["qa/rolling-upgrade/src/test/java/org/elasticsearch/upgrades/SnapshotBasedRecoveryIT.java"]
[CI] SnapshotBasedRecoveryIT testSnapshotBasedRecovery failing
<!-- Please fill out the following information, and ensure you have attempted to reproduce locally --> **Build scan**: https://gradle-enterprise.elastic.co/s/jduqowizzdlzg **Repro line**: `gradlew ':qa:rolling-upgrade:v7.16.0#oneThirdUpgradedTest' -Dtests.class="org.elasticsearch.upgrades.SnapshotBasedRecoveryIT" -Dtests.method="testSnapshotBasedRecovery" -Dtests.seed=3C3FC5FDBBCA3766 -Dtests.bwc=true -Dtests.locale=en-MT -Dtests.timezone=America/Thule -Druntime.java=17` **Reproduces locally?**: No **Applicable branches**: Master **Failure history**: https://gradle-enterprise.elastic.co/scans/tests?search.relativeStartTime=P7D&search.timeZoneId=Europe/Berlin&tests.container=org.elasticsearch.upgrades.SnapshotBasedRecoveryIT&tests.sortField=FAILED&tests.test=testSnapshotBasedRecovery&tests.unstableOnly=true **Failure excerpt**: ``` ava.lang.AssertionError: timed out waiting for green state for index [snapshot_based_recovery] cluster state ... ```
https://github.com/elastic/elasticsearch/issues/80939
https://github.com/elastic/elasticsearch/pull/81384
b67152a175397254d4a3f7f6a193e96df1a54745
3d4c3d2e333d3eb5daf727bf55f50d669e430188
"2021-11-23T12:28:34Z"
java
"2022-02-01T12:48:53Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,923
["x-pack/plugin/security/cli/src/main/java/org/elasticsearch/xpack/security/cli/AutoConfigureNode.java"]
Elasticsearch fails to start when not connected to local network
With security enabled by default, we changed our default to bind to both `_local` and `_site_` when we go through with the security autoconfiguration setup. It makes sense to do so as elasticsearch has authentication and TLS on the HTTP layer enabled and we wanted to allow maximum connectivity as kibana or other clients could run on different hosts. The issue with setting `http.host: ["_local_", "_site_"]` is that when there is no site-local address (i.e. host is disconnected from local networks ), elasticsearch would fail to start with a message similar to ``` org.elasticsearch.bootstrap.StartupException: java.lang.IllegalArgumentException: No up-and-running site-local (private) addresses found, got [name:lo (lo), name:br-72896d75edab (br-72896d75edab), name:docker0 (docker0), name:br-9a09ce2f5f7e (br-9a09ce2f5f7e), name:br-b6a5fb9fac6d (br-b6a5fb9fac6d), name:br-c11a9a002c33 (br-c11a9a002c33), name:br-eb3168295388 (br-eb3168295388), name:br-f9dd975f4e4d (br-f9dd975f4e4d)] ```
https://github.com/elastic/elasticsearch/issues/80923
https://github.com/elastic/elasticsearch/pull/81083
c139255ba5a98d23b33e9b81d10ed32abf6c2cce
fbda52493cd1a0bbbf7550bf18a74202e1e59348
"2021-11-23T00:20:20Z"
java
"2021-11-30T16:48:08Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,904
["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/accesscontrol/DocumentSubsetBitsetCache.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/accesscontrol/DocumentSubsetBitsetCacheTests.java"]
DLS optimization for rewrite to match all
A possible way to limit users from searching cold or frozen tiers is to setup DLS with a terms query for the `_tier` field. If an index does not match the requested `_tier`, rewriting the query to the shard results in a `MatchNoDocsQuery`, which is handled well by DLS, caching only that the index is unavailable. However, if the role does not contain any other query parts than for the `_tier` field, the rewrite will result in a `MatchAllDocsQuery`. There is an optimization for this case too, but it does not kick in until after the query ran populating a bitset of all the documents in the shard. Instead we can optimize this by checking if the rewritten role query becomes `MatchAllDocsQuery` and use the special `match_all` bitset directly in this case. This would hopefully nearly eliminate the shard level overhead of having a role query with only a `_tier` predicate. There is room for further improvements, but we can consider those outside this issue.
https://github.com/elastic/elasticsearch/issues/80904
https://github.com/elastic/elasticsearch/pull/81030
537f371f348207e7c59d28162b61c3720e931d0c
806abee75a7c02eb438242bd51d72b236730bf53
"2021-11-22T14:02:43Z"
java
"2021-11-29T23:12:27Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,898
["server/src/main/java/org/elasticsearch/transport/NoSeedNodeLeftException.java", "server/src/main/java/org/elasticsearch/transport/ProxyConnectionStrategy.java", "server/src/main/java/org/elasticsearch/transport/SniffConnectionStrategy.java", "server/src/test/java/org/elasticsearch/transport/ProxyConnectionStrategyTests.java", "x-pack/plugin/ccr/src/main/java/org/elasticsearch/xpack/ccr/action/ShardFollowNodeTask.java"]
CCR unable to open any proxy connections
**Elasticsearch version** (`bin/elasticsearch --version`): 7.15 **Plugins installed**: default plugins in the docker image **JVM version** (`java -version`): docker image **OS version** (`uname -a` if on a Unix-like system): docker image **Description of the problem including expected versus actual behavior**: We have 2 separated ELK clusters (3 nodes each) deployed in 2 different locations in Openshift. To deploy we are using a helm (no operator yet). We enabled the CCR between them. The CCR connection is going through a F5 LoadBalancer. The cluster is configured with security and TSL enabled. The cross cluster replication is working fine but sometimes we see the following exception: `[2021-11-19T14:16:58,628][WARN ][o.e.t.TcpTransport ] [elasticsearch-master-0] exception caught on transport layer [Netty4TcpChannel{localAddress=/XXX.XXX.XXX.XXX:47822, remoteAddress=elk-master.local.net/YYY.YYY.YYY.YYY:443, profile=default}], closing connection io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target [2021-11-19T14:16:58,629][WARN ][o.e.x.c.a.ShardFollowNodeTask] [elasticsearch-master-0] shard follow task encounter non-retryable error java.lang.IllegalStateException: Unable to open any proxy connections to remote cluster [elasticsearch-cluster-2] ` Now we do not know exactly what is going on since the CCR before this exception was working fine. Maybe the F5 LB sometimes closes the connections or maybe sometime we have some network issue, we are still investigating. However after we get that exception the CCR is broken. To solve this issue we just have to restart the POD without ANY modification and the CCR starts to work again: `[2021-11-22T10:24:31,168][INFO ][o.e.x.c.a.ShardFollowTasksExecutor] [elasticsearch-master-0] [myindex-2021.11.18-000001][0] Starting to track leader shard [myindex-2021.11.18-000001][0] [2021-11-22T10:24:31,558][INFO ][o.e.x.c.a.ShardFollowNodeTask] [elasticsearch-master-0] [myindex-2021.11.18-000001][0] following leader shard [myindex-2021.11.18-000001][0], follower global checkpoint=[-1], mapping version=[2], settings version=[1], aliases version=[1] ` Now I do not know if this is a bug or intended but we would like to find a solution in order to not have this issues again. From my point of view ELK should retry to open the proxy connections automatically. Here the CCR settings: `{ "persistent" : { "cluster" : { "remote" : { "${REMOTE_CLUSTER_NAME}" : { "mode": "proxy", "proxy_address": "${remote_route}", "transport.ping_schedule": "5s" } } } } } ` **Steps to reproduce**: Don't really know how to replicate this issue.
https://github.com/elastic/elasticsearch/issues/80898
https://github.com/elastic/elasticsearch/pull/80961
b4b489f52e7e0c901df472a2bb57fca6b596f8a0
b83b08f9f5f19b3cca87c72e302c0039420ac47e
"2021-11-22T10:55:54Z"
java
"2021-11-25T08:39:05Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,895
["docs/changelog/85815.yaml", "server/src/main/java/org/elasticsearch/search/fetch/subphase/highlight/FastVectorHighlighter.java", "server/src/main/java/org/elasticsearch/search/fetch/subphase/highlight/SourceScoreOrderFragmentsBuilder.java", "server/src/main/java/org/elasticsearch/search/fetch/subphase/highlight/SourceSimpleFragmentsBuilder.java", "server/src/main/java/org/elasticsearch/search/lookup/SourceLookup.java", "server/src/test/java/org/elasticsearch/search/fetch/subphase/highlight/FastVectorHighlighterTests.java", "test/framework/src/main/java/org/elasticsearch/search/fetch/HighlighterTestCase.java"]
Fast Vector Highlighter does no work with nested field as target
<!-- GitHub is reserved for bug reports and feature requests; it is not the place for general questions. If you have a question or an unconfirmed bug , please visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also check your OS is [supported](https://www.elastic.co/support/matrix#show_os). If it is not, the issue is likely to be closed. For security vulnerabilities please only send reports to [email protected]. See https://www.elastic.co/community/security for more information. Please fill in the following details to help us reproduce the bug: --> **Elasticsearch version** (`bin/elasticsearch --version`): 7.15.2 **Plugins installed**: [] **JVM version** (`java -version`): the one included in ES **OS version** (`uname -a` if on a Unix-like system): Windows 10 **Description of the problem including expected versus actual behavior**: When using a nested field as target for Fast Vector Highligter no result is produced. (This works fine with the Unified Highlighter). The problem seems to be that fvh tries to read the target field literally from the source and as this would not be present in the source it assumes that the field is absent. If the nested field has `store: true` set everything works as expected as it then reads the stored field instead of visiting the source-object. The reason for using a nested field as target is that the root-field is a date-field and we then have multiple nested fields with different versions of the date-string with `with_positions_offsets` enabled for `term_vector`. **Steps to reproduce**: make a search like the following with and without `store:true` enabled in the mapping of the the nested target field (`date.text`). ``` { "query": { "query_string": { "query": "2000-10-10", "fields": [ "date.text" ], "quote_field_suffix": ".exact" } }, "highlight": { "fields": { "date.text": { "matched_fields": [ "date.text", "date.text.exact" ], "type": "fvh" } } } } ```
https://github.com/elastic/elasticsearch/issues/80895
https://github.com/elastic/elasticsearch/pull/85815
cce3d924754a06634a8e353fa227be3af2eeca62
a69cdd0ff3c23df49b19c35b258b99fc18794476
"2021-11-21T11:25:46Z"
java
"2022-04-12T14:19:36Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,892
["docs/reference/cat/shards.asciidoc", "docs/reference/how-to/fix-common-cluster-issues.asciidoc", "server/src/main/java/org/elasticsearch/rest/action/cat/RestShardsAction.java"]
[+DOC] Shard Unassigned Reasons
Howdy! I like using [CAT Shards](https://www.elastic.co/guide/en/elasticsearch/reference/current/cat-shards.html)'s `unassigned.reason` as reference, but just ran into an undocumented one and realized [the code](https://github.com/elastic/elasticsearch/blob/26c86871fc091900952e88e252c36fbfedf8d5fa/server/src/main/java/org/elasticsearch/cluster/routing/UnassignedInfo.java#L67) includes a couple others as well. Can you append info on [these](https://github.com/elastic/elasticsearch/blob/26c86871fc091900952e88e252c36fbfedf8d5fa/server/src/main/java/org/elasticsearch/cluster/routing/UnassignedInfo.java#L116-L136) - PRIMARY_FAILED - FORCED_EMPTY_PRIMARY - MANUAL_ALLOCATION - INDEX_CLOSED - NODE_RESTARTING I'm not sure if you're prefer a literal code copy/paste, but am experiencing `MANUAL_ALLOCATION` if you have more information on it. Cheers!
https://github.com/elastic/elasticsearch/issues/80892
https://github.com/elastic/elasticsearch/pull/81017
43e6cacdb0225e7d92e33fdccab233c6a9c27c21
ca65718923bc886ab0aa5934ecc1cd3b2e3090ba
"2021-11-20T00:15:02Z"
java
"2021-11-29T18:47:01Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,860
["docs/reference/query-dsl/bool-query.asciidoc"]
Named fuzzy query killing performance of nested top_hits aggregation
**Elasticsearch version** (`bin/elasticsearch --version`): 7.15.2 **Plugins installed**: [analysis-icu] **JVM version** (`java -version`): bundled **OS version** (`uname -a` if on a Unix-like system): macOS Big Sur **Description of the problem including expected versus actual behavior**: I was researching why some queries in our production environment were slow (well, slower than expected anyway), and narrowed it down to the combination of a *named* fuzzy query (match query with fuzziness set to AUTO) and a top_hits aggregation. The complete query is quite simple: ```json { "query": { "bool": { "should": [ { "match": { "category.std": { "query": "the query", "_name": "std" } } }, { "match": { "category.prefix": { "query": "the query", "_name": "language_std" } } }, { "match": { "category": { "query": "the query", "_name": "language_search" } } }, { "match": { "category.fuzzy": { "query": "the query", "operator": "AND", "fuzziness": "AUTO", "prefix_length": 2, "max_expansions": "5", "boost": "0.5", "_name": "fuzzy" } } } ] } }, "aggs": { "category": { "terms": { "field": "category.base", "size": 5 }, "aggs": { "top_category": { "top_hits": { "size": 1, "_source": { "includes": [ "category" ] } } } } } }, "size": 0 } ``` We are searching for the user's query in the "category" field using a bool should query (since the relevant sub-fields use different search analyzers), then aggregate the top 5 values for the category field (terms aggregation) and finally get the top 1 hit for each of the 5 terms. The reason we do it like that is for highlighting (which is under the top_hits aggregation in the original query but, since it adds a small overhead, I deliberately left it out for simplicity). With the query cache disabled for testing, this query takes around 70ms to return results. Since we are aiming for a much shorter response time (in the region of 5-20ms), I started taking parts out of the query in order to figure out where the bottleneck is. Omitting any of the fuzzy query / top hits aggregation brings the response time down to 5ms. The astonishing discovery is that removing *just* the _name parameter from the fuzzy query leads to constant 7ms responses (removing the same parameter for the rest of the queries makes no difference). This definitely seems to be a bug, since I was under the impression that named queries are just a convenience for results processing and should not produce any performance overhead whatsoever. Any help would be appreciated. PS. I don't know if the issue title is correct, but I could not come up with something better.
https://github.com/elastic/elasticsearch/issues/80860
https://github.com/elastic/elasticsearch/pull/91512
6fc31d3ed392c7dc7880e5dc0b5866c8dd7974e5
dceff3f86288368aaa022139b29feca5302a7906
"2021-11-18T23:00:05Z"
java
"2022-11-14T13:05:40Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,837
["server/src/main/java/org/elasticsearch/indices/recovery/RecoveryState.java"]
[CI] FullClusterRestartIT testRecovery failing
**Build scan:** https://gradle-enterprise.elastic.co/s/lqmxb2fffkd42/tests/:qa:full-cluster-restart:v8.1.0%23upgradedClusterTest/org.elasticsearch.upgrades.FullClusterRestartIT/testRecovery **Reproduction line:** `gradlew ':qa:full-cluster-restart:v8.1.0#upgradedClusterTest' -Dtests.class="org.elasticsearch.upgrades.FullClusterRestartIT" -Dtests.method="testRecovery" -Dtests.seed=37572CF50121804A -Dtests.bwc=true -Dtests.locale=sr-ME -Dtests.timezone=Asia/Barnaul -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** Didn't try **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.upgrades.FullClusterRestartIT&tests.test=testRecovery **Failure excerpt:** ``` java.lang.AssertionError: mismatch while checking for translog recovery testrecovery 0 existing_store done 0 testrecovery 0 peer done 0 expected:<true> but was:<false> at __randomizedtesting.SeedInfo.seed([37572CF50121804A:F6A755592C714AED]:0) at org.junit.Assert.fail(Assert.java:88) at org.junit.Assert.failNotEquals(Assert.java:834) at org.junit.Assert.assertEquals(Assert.java:118) at org.elasticsearch.upgrades.FullClusterRestartIT.testRecovery(FullClusterRestartIT.java:880) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/80837
https://github.com/elastic/elasticsearch/pull/81528
e421477ac8d699fa37b04e74bd374f8585e02b0e
26c2ce0b886f4cb13bf07c2c00de89c443b10061
"2021-11-18T14:02:56Z"
java
"2022-01-13T15:43:56Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,814
["docs/changelog/82507.yaml", "server/src/internalClusterTest/java/org/elasticsearch/indices/SystemIndexManagerIT.java", "server/src/main/java/org/elasticsearch/action/admin/indices/settings/put/TransportUpdateSettingsAction.java", "server/src/main/java/org/elasticsearch/indices/SystemIndexManager.java"]
Can set write block on system indices but cannot remove it
Currently it is possible to set the write block on a system index. When you go to remove it by updating settings, the change is rejected. An example using the fleet agents system index: ``` PUT .fleet-agents-7/_block/write ``` Succeeds. But this follow up fails: ``` PUT .fleet-agents-7/_settings { "index": { "blocks.write": false } } { "error" : { "root_cause" : [ { "type" : "illegal_state_exception", "reason" : "Cannot override settings on system indices: [.fleet-agents*] -> [index.blocks.write]" } ], "type" : "illegal_state_exception", "reason" : "Cannot override settings on system indices: [.fleet-agents*] -> [index.blocks.write]" }, "status" : 500 } ```
https://github.com/elastic/elasticsearch/issues/80814
https://github.com/elastic/elasticsearch/pull/82507
b1c01b12be4239b18fe47c54ff9c08774cfe8b7a
7018e9ef84264aa54b16da56d468dd31a051a488
"2021-11-18T03:54:23Z"
java
"2022-01-14T03:22:13Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,782
["docs/reference/migration/migrate_8_0/rest-api-changes.asciidoc", "docs/reference/modules/remote-clusters.asciidoc", "docs/reference/search/search-your-data/search-across-clusters.asciidoc"]
[DOCS] Update BWC support for cross-cluster search
As of 8.0, the compatibility window for cross-cluster search (CCS) to an earlier release will be one minor release. To document this change, we need to update the [supported configurations][0] section of the cross-cluster search docs. We also need to add a related item to the [8.0 breaking changes][1]. [0]: https://www.elastic.co/guide/en/elasticsearch/reference/master/modules-cross-cluster-search.html#ccs-supported-configurations [1]: https://www.elastic.co/guide/en/elasticsearch/reference/master/migrating-8.0.html#breaking-changes-8.0 CC @giladgal
https://github.com/elastic/elasticsearch/issues/80782
https://github.com/elastic/elasticsearch/pull/80809
f1860c17ab4b9e2931a5d7482905fe5f1589239c
dfb9f6f18d1f80241747595ed371c8f7f22485ac
"2021-11-16T22:37:28Z"
java
"2022-01-11T15:33:12Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,763
["docs/changelog/93533.yaml", "server/src/internalClusterTest/java/org/elasticsearch/ingest/IngestStatsNamesAndTypesIT.java", "server/src/main/java/org/elasticsearch/ingest/ConfigurationUtils.java", "server/src/main/java/org/elasticsearch/ingest/IngestService.java", "server/src/main/java/org/elasticsearch/ingest/OnFailureProcessor.java", "server/src/test/java/org/elasticsearch/ingest/OnFailureProcessorTests.java", "server/src/test/java/org/elasticsearch/ingest/PipelineFactoryTests.java"]
nodes/stats for ingest pipeline name and type may be misleading
nodes/stats is useful to view the performance of ingest nodes pipelines, showing how many events and how long it took to process events through the different processors. Nodes stats always shows the processors in the same order in which they are defined. However due to some internal code level reasons the name of the processor and type of the processor may be misleading when an `if` condition is present. Given the following time pipeline (the script is designed to be slow to show the time it took) ``` PUT _ingest/pipeline/mypipeline { "processors": [ { "set": { "field": "a", "value": "bl" } }, { "script": { "if": "true", "source": " String a = ''; for(int i =0 ;i < 2147483647/10000; i ++){ a = a + 'x'}" } }, { "uppercase": { "if": "true", "field": "a", "on_failure": [ { "set": { "field": "error", "value": "true" } } ] } } ] } PUT test/_doc/1?pipeline=mypipeline {} GET _nodes/stats?filter_path=nodes.**.pipelines.mypipeline ``` Will result in : ``` { "nodes" : { "xSq7F7CDR7mlUTgw4zu2pg" : { "ingest" : { "pipelines" : { "mypipeline" : { "count" : 1, "time_in_millis" : 5406, "current" : 0, "failed" : 0, "processors" : [ { "set" : { "type" : "set", "stats" : { "count" : 1, "time_in_millis" : 0, "current" : 0, "failed" : 0 } } }, { "script" : { "type" : "conditional", "stats" : { "count" : 1, "time_in_millis" : 5406, "current" : 0, "failed" : 0 } } }, { "compound:CompoundProcessor-null-null" : { "type" : "conditional", "stats" : { "count" : 1, "time_in_millis" : 0, "current" : 0, "failed" : 0 } } } ] } } } } } } ``` The first processor output is correct. The second processor shows `"type" : "conditional"` The third processor also shows `"type" : "conditional"`, but also has the name `compound:CompoundProcessor-null-null` (it should be "uppercase" in reference to the processor name) This is due to how the conditional 'if' is implemented as well as the on-failure handler. As a work around, one can identify which processor the stats are for by counting top down, it will be the same order as the pipeline is defined.
https://github.com/elastic/elasticsearch/issues/80763
https://github.com/elastic/elasticsearch/pull/93533
b61f60af2be616bad4bf44b1612e855e4b615034
815e6d730fb57e68d58e7ac58518af82f93cc301
"2021-11-16T15:49:04Z"
java
"2023-02-07T19:55:30Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,693
["docs/changelog/101230.yaml", "server/src/main/java/org/elasticsearch/search/SearchService.java", "test/framework/src/main/java/org/elasticsearch/test/ESIntegTestCase.java", "test/framework/src/main/java/org/elasticsearch/test/ESSingleNodeTestCase.java"]
Concurrent Searching
It looks like Elasticsearch is currently missing support for concurrent searching and that this is a major prospective optimization to reduce latency. Digression: this is not the topic at hand but I personally consider the fork OpenSearch to be an historical tragedy of duplication of work and a segregation of improvements. What would be even more anti-utilitarist would be to blindly *ignore* each other advances towards making better search. Lucene concurrent search APIs are probably among the most important feature/optimization currently not leveraged by Elasticsearch. The fork OpenSearch has a [pull request](https://github.com/opensearch-project/OpenSearch/pull/1500) implementing support for it. See also the [corresponding issue](https://github.com/opensearch-project/OpenSearch/issues/1286) I believe it would be great for end users if you could take inspiration from the PR and work on this feature. Great blog about the Lucene feature: https://blog.mikemccandless.com/2019/10/concurrent-query-execution-in-apache.html?m=1 See also those performance results: https://engineeringblog.yelp.com/2021/09/nrtsearch-yelps-fast-scalable-and-cost-effective-search-engine.html
https://github.com/elastic/elasticsearch/issues/80693
https://github.com/elastic/elasticsearch/pull/101230
b921c1e627cb99300eb404d9aa573af62bd725e5
d2f97e7e884afac506381864a4f3d32335e802b5
"2021-11-14T16:48:53Z"
java
"2023-10-26T10:03:40Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,653
["x-pack/plugin/sql/qa/server/src/main/java/org/elasticsearch/xpack/sql/qa/FieldExtractorTestCase.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/search/extractor/TopHitsAggExtractor.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/execution/search/extractor/TopHitsAggExtractorTests.java"]
SQL: LAST/FIRST query fails in scenario with ignored field
For an index with mapping ``` { "mappings": { "properties": { "text_field": { "type": "keyword", "ignore_above": 10 }, "date": { "type": "date" } } } } ``` and data as ``` {"index":{"_id":1}} {"text_field":"abcdefghijklmno","date":"2021-11-11T11:11:11.000Z"} {"index":{"_id":2}} {"text_field":"abc","date":"2021-11-11T12:11:11.000Z"} {"index":{"_id":3}} {"text_field":"123","date":"2021-11-11T13:11:11.000Z"} ``` an error is generated: ``` "error": { "root_cause": [ { "type": "illegal_argument_exception", "reason": "failed to parse date field [text_field] with format [strict_date_optional_time]" } ], "type": "illegal_argument_exception", "reason": "failed to parse date field [text_field] with format [strict_date_optional_time]", "caused_by": { "type": "date_time_parse_exception", "reason": "Text 'text_field' could not be parsed at index 0" } } ```
https://github.com/elastic/elasticsearch/issues/80653
https://github.com/elastic/elasticsearch/pull/80655
1b300ac962cdf5d71a0d216a8b20e3aadb6c5290
116b1fab454ab4084a32ea0d4a8dea4d79595392
"2021-11-11T09:06:06Z"
java
"2021-11-11T14:11:09Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,621
["x-pack/plugin/ml/src/internalClusterTest/java/org/elasticsearch/xpack/ml/integration/MlDistributedFailureIT.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/datafeed/DatafeedNodeSelector.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/job/process/autodetect/AutodetectProcessManager.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/job/task/OpenJobPersistentTasksExecutor.java"]
[ML] anomaly detection Job failed without reason audit message when model snapshot is too old
Steps to reproduce (easier to do this from a cloud env) - Deploy a 7.8.1 cluster and start a real-time anomaly detection job, - Then create a 8.0 cluster by restoring that 7.8.1 cluster snapshot, - after 8.0 cluster successfully was created, login to check the AD job status: AD job failed on UI, and there is no failed reason being thrown, neither in job message. (At the time of 11:56 on the below screenshot) <img width="1969" alt="Screen Shot 2021-11-10 at 9 50 03 AM" src="https://user-images.githubusercontent.com/47184485/141148193-7226e948-51ac-4a9d-b281-79e4383ea95a.png"> After stop datafeed and force-close job (at the time of 16:01 on above screen), restarting job gave the root cause of job failure, which was caused by old model snapshot: ``` { "error": { "root_cause": [ { "type": "exception", "reason": "[response_code_rates] job snapshot [1636472812] has min version before [7.0.0], please revert to a newer model snapshot or reset the job" } ], "type": "exception", "reason": "[response_code_rates] job snapshot [1636472812] has min version before [7.0.0], please revert to a newer model snapshot or reset the job" }, "status": 500 } ``` Expected behaviour: Good failure message on UI and job messages
https://github.com/elastic/elasticsearch/issues/80621
https://github.com/elastic/elasticsearch/pull/80665
8b2019a10e82d65e9b94bdf2c7c0e5259297feea
d95bca83036a598c2494df246dd32803f2f40805
"2021-11-10T16:10:51Z"
java
"2021-11-11T20:38:55Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,561
["x-pack/plugin/ml/qa/native-multi-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/ml/integration/ModelSnapshotSearchIT.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/job/persistence/JobResultsProvider.java"]
can not write type [class org.elasticsearch.Version]
**Elasticsearch version** (`bin/elasticsearch --version`): 7.16.0 BC3 **Plugins installed**: [] **JVM version** (`java -version`): **OS version** (`uname -a` if on a Unix-like system): Cloud GCP **Description of the problem including expected versus actual behavior**: a call to `GET /_migration/deprecations` gives an error response; ``` { "error" : { "root_cause" : [ { "type" : "illegal_argument_exception", "reason" : "can not write type [class org.elasticsearch.Version]" } ], "type" : "search_phase_execution_exception", "reason" : "all shards failed", "phase" : "query", "grouped" : true, "failed_shards" : [ { "shard" : 0, "index" : ".ml-anomalies-shared", "node" : "czQpoMmrReqHYj1MO35irQ", "reason" : { "type" : "illegal_argument_exception", "reason" : "can not write type [class org.elasticsearch.Version]" } } ], "caused_by" : { "type" : "", "reason" : ": can not write type [class org.elasticsearch.Version]", "caused_by" : { "type" : "illegal_argument_exception", "reason" : "can not write type [class org.elasticsearch.Version]" } } }, "status" : 400 } ``` **Steps to reproduce**: Much of this was done by the Cloud infrastructure so I can only say the steps I performed 1. Create a new 7.16.0 Cloud deployment on GCP Belgium region and select to restore snapshots from my existing 7.15.1 Cloud deployment (it's a bit large so in my case it took around 2 hours) 2. Check in Kibana Upgrade Assistant for Elasticsearch critical deprecations and it shows 16 critical deprecations about `_tier_preference` (1 of the same for each of 16 indices). I updated 1 ilm index and the count of critical deprecations went down from 16 to 15. I didn't do anything with the `.ml-anomalies-shared` index. 3. The next day, the Upgrade Assistant has an error showing the Elasticsearch deprecations. It was suggested I try this in the Kibana Dev Tools console `GET /_migration/deprecations`. See the error. **Provide logs (if relevant)**: ``` [instance-0000000000] failed to serialize outbound message [Request{indices:data/read/search[phase/query]}{3087052}{false}{false}{false}] java.lang.IllegalArgumentException: can not write type [class org.elasticsearch.Version] at org.elasticsearch.common.io.stream.StreamOutput.writeGenericValue(StreamOutput.java:847) ~[elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.search.sort.FieldSortBuilder.writeTo(FieldSortBuilder.java:163) ~[elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.common.io.stream.StreamOutput.writeNamedWriteable(StreamOutput.java:1117) ~[elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.search.builder.SearchSourceBuilder.writeTo(SearchSourceBuilder.java:313) ~[elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.common.io.stream.StreamOutput.writeOptionalWriteable(StreamOutput.java:978) ~[elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.search.internal.ShardSearchRequest.innerWriteTo(ShardSearchRequest.java:333) ~[elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.search.internal.ShardSearchRequest.writeTo(ShardSearchRequest.java:319) ~[elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.OutboundMessage.serialize(OutboundMessage.java:75) ~[elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.OutboundHandler.sendMessage(OutboundHandler.java:180) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.OutboundHandler.sendRequest(OutboundHandler.java:109) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.TcpTransport$NodeChannels.sendRequest(TcpTransport.java:288) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.TransportService.sendRequestInternal(TransportService.java:975) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.xpack.security.transport.SecurityServerTransportInterceptor.sendWithUser(SecurityServerTransportInterceptor.java:206) [x-pack-security-7.16.0.jar:7.16.0] at org.elasticsearch.xpack.security.transport.SecurityServerTransportInterceptor.access$300(SecurityServerTransportInterceptor.java:53) [x-pack-security-7.16.0.jar:7.16.0] at org.elasticsearch.xpack.security.transport.SecurityServerTransportInterceptor$1.sendRequest(SecurityServerTransportInterceptor.java:167) [x-pack-security-7.16.0.jar:7.16.0] at org.elasticsearch.transport.TransportService.sendRequest(TransportService.java:874) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.TransportService.sendChildRequest(TransportService.java:937) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.TransportService.sendChildRequest(TransportService.java:925) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.search.SearchTransportService.sendExecuteQuery(SearchTransportService.java:250) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.search.SearchQueryThenFetchAsyncAction.executePhaseOnShard(SearchQueryThenFetchAsyncAction.java:104) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.search.AbstractSearchAsyncAction.lambda$performPhaseOnShard$3(AbstractSearchAsyncAction.java:328) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.search.AbstractSearchAsyncAction.performPhaseOnShard(AbstractSearchAsyncAction.java:364) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.search.AbstractSearchAsyncAction.onShardFailure(AbstractSearchAsyncAction.java:517) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.search.AbstractSearchAsyncAction.access$000(AbstractSearchAsyncAction.java:64) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.search.AbstractSearchAsyncAction$1.onFailure(AbstractSearchAsyncAction.java:343) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.ActionListener$Delegating.onFailure(ActionListener.java:66) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.ActionListenerResponseHandler.handleException(ActionListenerResponseHandler.java:48) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.action.search.SearchTransportService$ConnectionCountingHandler.handleException(SearchTransportService.java:651) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.TransportService$4.handleException(TransportService.java:853) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.TransportService$ContextRestoreResponseHandler.handleException(TransportService.java:1481) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.transport.TransportService$5.doRun(TransportService.java:1016) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771) [elasticsearch-7.16.0.jar:7.16.0] at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26) [elasticsearch-7.16.0.jar:7.16.0] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) [?:?] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) [?:?] at java.lang.Thread.run(Thread.java:833) [?:?] ```
https://github.com/elastic/elasticsearch/issues/80561
https://github.com/elastic/elasticsearch/pull/80596
5e98ea427bc8bbc0120b099e501f425f1880a7b7
08324ed4f80cb6796bf71ee081b85af9875bc505
"2021-11-09T21:00:00Z"
java
"2021-11-10T14:10:53Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,551
["docs/changelog/84813.yaml", "x-pack/plugin/eql/src/test/resources/querytranslator_tests.txt", "x-pack/plugin/ql/src/main/java/org/elasticsearch/xpack/ql/expression/function/scalar/ScalarFunction.java", "x-pack/plugin/sql/qa/server/src/main/resources/null.sql-spec", "x-pack/plugin/sql/qa/server/src/main/resources/string-functions.sql-spec"]
SQL: Group by expression with text field does not always use `.keyword` subfield
Given the mapping ``` column | type | mapping --------------------+---------------+--------------- ... last_name |VARCHAR |text last_name.keyword |VARCHAR |keyword ... ``` the query `SELECT last_name IS NULL FROM test_emp GROUP BY 1` fails with ``` { "error": { "root_cause": [ { "type": "script_exception", "reason": "runtime error", "script_stack": [ "org.elasticsearch.index.mapper.TextFieldMapper$TextFieldType.fielddataBuilder(TextFieldMapper.java:814)", "org.elasticsearch.index.fielddata.IndexFieldDataService.getForField(IndexFieldDataService.java:109)", "org.elasticsearch.index.query.SearchExecutionContext.lambda$lookup$2(SearchExecutionContext.java:503)", "org.elasticsearch.search.lookup.SearchLookup.getForField(SearchLookup.java:105)", "org.elasticsearch.search.lookup.LeafDocLookup$1.run(LeafDocLookup.java:72)", "org.elasticsearch.search.lookup.LeafDocLookup$1.run(LeafDocLookup.java:69)", "java.base/java.security.AccessController.doPrivileged(AccessController.java:318)", "org.elasticsearch.search.lookup.LeafDocLookup.get(LeafDocLookup.java:69)", "org.elasticsearch.search.lookup.LeafDocLookup.get(LeafDocLookup.java:27)", "org.elasticsearch.xpack.ql.expression.function.scalar.whitelist.InternalQlScriptUtils.docValue(InternalQlScriptUtils.java:37)", "InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))", " ^---- HERE" ], "script": "InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))", "lang": "painless", "position": { "offset": 70, "start": 0, "end": 75 } } ], "type": "search_phase_execution_exception", "reason": "all shards failed", "phase": "query", "grouped": true, "failed_shards": [ { "shard": 0, "index": "test_emp", "node": "6a6CBLYYQFa6gqsxbMkn5Q", "reason": { "type": "script_exception", "reason": "runtime error", "script_stack": [ "org.elasticsearch.index.mapper.TextFieldMapper$TextFieldType.fielddataBuilder(TextFieldMapper.java:814)", "org.elasticsearch.index.fielddata.IndexFieldDataService.getForField(IndexFieldDataService.java:109)", "org.elasticsearch.index.query.SearchExecutionContext.lambda$lookup$2(SearchExecutionContext.java:503)", "org.elasticsearch.search.lookup.SearchLookup.getForField(SearchLookup.java:105)", "org.elasticsearch.search.lookup.LeafDocLookup$1.run(LeafDocLookup.java:72)", "org.elasticsearch.search.lookup.LeafDocLookup$1.run(LeafDocLookup.java:69)", "java.base/java.security.AccessController.doPrivileged(AccessController.java:318)", "org.elasticsearch.search.lookup.LeafDocLookup.get(LeafDocLookup.java:69)", "org.elasticsearch.search.lookup.LeafDocLookup.get(LeafDocLookup.java:27)", "org.elasticsearch.xpack.ql.expression.function.scalar.whitelist.InternalQlScriptUtils.docValue(InternalQlScriptUtils.java:37)", "InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))", " ^---- HERE" ], "script": "InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))", "lang": "painless", "position": { "offset": 70, "start": 0, "end": 75 }, "caused_by": { "type": "illegal_argument_exception", "reason": "Text fields are not optimised for operations that require per-document field data like aggregations and sorting, so these operations are disabled by default. Please use a keyword field instead. Alternatively, set fielddata=true on [last_name] in order to load field data by uninverting the inverted index. Note that this can use significant memory." } } } ] }, "status": 400 } ``` `/translate` reveals that SQL does not use the `last_name.keyword` subfield in this case: ``` { "size": 0, "_source": false, "aggregations": { "groupby": { "composite": { "size": 1000, "sources": [ { "4642bd56": { "terms": { "script": { "source": "InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))", "lang": "painless", "params": { "v0": "last_name" } }, "missing_bucket": true, "value_type": "boolean", "order": "asc" } } } ] } } } } ``` Explicitly using the `.keyword` subfield works (`SELECT last_name.keyword IS NULL FROM test_emp GROUP BY 1`). Also some other queries like `SELECT CONCAT('Mr. ', last_name) FROM test_emp GROUP BY 1` work as expected. It looks like only queries grouping on conditions that can be expressed as ES filters are affected by this issue.
https://github.com/elastic/elasticsearch/issues/80551
https://github.com/elastic/elasticsearch/pull/84813
7c33a770adc91ec69261023c73a7848cddab8d52
61c3b82c2ed805ab9fa8de764a16e96b41488510
"2021-11-09T16:59:15Z"
java
"2022-03-15T08:41:38Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,484
["x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BasicTokenizer.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/TokenTrieNode.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BasicTokenizerTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BertTokenizerTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/TokenTrieNodeTests.java"]
[ML] improve WordPiece tokenization around punctuation.
In certain scenarios, our wordpiece tokenization does not handle punctuation well. `This is [MASK]~tastic!` in this scenario (with the mask next to a non-common punctuation), the tokenizer doesn't recognize the `[MASK]` token.
https://github.com/elastic/elasticsearch/issues/80484
https://github.com/elastic/elasticsearch/pull/81254
9fcbc0bb20e4ae032daafe85c4ac377cd808d843
ab4581b805ae15d9e3cf3f41dcc7e0498d4b722b
"2021-11-08T12:37:17Z"
java
"2021-12-06T13:57:07Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,482
["docs/changelog/80906.yaml", "server/src/main/java/org/elasticsearch/rest/BaseRestHandler.java", "server/src/main/java/org/elasticsearch/rest/RestController.java", "server/src/main/java/org/elasticsearch/rest/RestHandler.java", "server/src/test/java/org/elasticsearch/rest/RestControllerTests.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/rest/SecurityRestFilter.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/plugin/RestSqlQueryAction.java"]
Allow RestHandlers for Content-Type outside XContentType
It is currently impossible for `RestHandler` to deal with requests that specify a `Content-Type` that doesn't map to `XCotentType` due to strict validation inside `RestController.` This makes dealing with binary data (for supporting endpoints/protocols that already exist) impossible since the handler never gets access to the underlying request - the sender receiving the response: `Content-Type header [<non-xcontent-type>] is not supported` It would be great to allow the validation to be pluggable similar to the `Allow` header - a `RestHandler` could return its own `MediaTypeRegistry` to specify the accepted `Content-Type` (including requests without the header being defined).
https://github.com/elastic/elasticsearch/issues/80482
https://github.com/elastic/elasticsearch/pull/80906
d9f77fa3a6f03d8b1360ae717fb380c0b8110c7e
c8d98cf5320d65110a11988746ebed9789011bd9
"2021-11-08T11:08:03Z"
java
"2022-01-25T08:52:13Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,481
["docs/reference/commands/create-enrollment-token.asciidoc", "docs/reference/commands/reset-password.asciidoc", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authc/esnative/tool/ResetPasswordTool.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/enrollment/ExternalEnrollmentTokenGenerator.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/enrollment/tool/CreateEnrollmentTokenTool.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/tool/BaseRunAsSuperuserCommand.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/enrollment/ExternalEnrollmentTokenGeneratorTests.java", "x-pack/qa/security-tools-tests/src/test/java/org/elasticsearch/xpack/security/authc/esnative/tool/ResetPasswordToolTests.java", "x-pack/qa/security-tools-tests/src/test/java/org/elasticsearch/xpack/security/enrollment/tool/CreateEnrollmentTokenToolTests.java"]
CLI tools extending BaseRunAsSuperuserCommand should only connect to the local node
BaseRunAsSuperuserCommand uses a temporary file realm superuser to execute commands as. Since file realms are node specific, all requests should be executed against the local node from where the CLI runs. We should not use `CommandLineHttpClient#getDefaultURL` or adjust it to prefer the local node if/when possible. At a minimum all tools that extend BaseRunAsSuperuserCommand should support a `--url` parameter that allows the user to override and point to the local node
https://github.com/elastic/elasticsearch/issues/80481
https://github.com/elastic/elasticsearch/pull/81025
1f933390c146021f22186d2861b199fc9eb5043e
537f371f348207e7c59d28162b61c3720e931d0c
"2021-11-08T10:55:42Z"
java
"2021-11-29T21:49:27Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,480
["distribution/tools/plugin-cli/src/main/java/org/elasticsearch/plugins/cli/InstallPluginAction.java", "distribution/tools/plugin-cli/src/test/java/org/elasticsearch/plugins/cli/InstallPluginActionTests.java", "docs/changelog/84766.yaml"]
elasticsearch-plugin install hang without any reason (no high cpu, nothing)
<!-- GitHub is reserved for bug reports and feature requests; it is not the place for general questions. If you have a question or an unconfirmed bug , please visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also check your OS is [supported](https://www.elastic.co/support/matrix#show_os). If it is not, the issue is likely to be closed. For security vulnerabilities please only send reports to [email protected]. See https://www.elastic.co/community/security for more information. Please fill in the following details to help us reproduce the bug: --> **Elasticsearch version** (`bin/elasticsearch --version`): `Version: 7.13.2, Build: default/deb/4d960a0733be83dd2543ca018aa4ddc42e956800/2021-06-10T21:01:55.251515791Z, JVM: 16` **Plugins installed**: [] **JVM version** (`java -version`): `openjdk 16 2021-03-16 OpenJDK Runtime Environment AdoptOpenJDK (build 16+36) OpenJDK 64-Bit Server VM AdoptOpenJDK (build 16+36, mixed mode, sharing)` **OS version** (`uname -a` if on a Unix-like system): `Linux lk-elastic-data-6 4.19.0-18-amd64 #1 SMP Debian 4.19.208-1 (2021-09-29) x86_64 GNU/Linux` **Description of the problem including expected versus actual behavior**: Context, I would like to add 3 nodes to an existing cluster, **all of the 3 servers** are fresh install of debian10, and all of them get the same behavior **Steps to reproduce**: 1. Install any plugin `/usr/share/elasticsearch/bin/elasticsearch-plugin install analysis-kuromoji` 2. Hang for a long period without any reason For repository-gcs it hang for 10-15min before asking y/N ```-> Installing repository-gcs -> Downloading repository-gcs from elastic [=================================================] 100% @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ WARNING: plugin requires additional permissions @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ * java.lang.RuntimePermission accessDeclaredMembers * java.lang.RuntimePermission setFactory * java.lang.reflect.ReflectPermission suppressAccessChecks * java.net.SocketPermission * connect,resolve See http://docs.oracle.com/javase/8/docs/technotes/guides/security/permissions.html for descriptions of what these permissions allow and the associated risks. Continue with installation? [y/N] ``` Additionnal information, installing with file:///path/plugin.zip works without hanging, and the plugin install do not respect os proxy I was trying to follow if it was an http request that hang. **Provide logs (if relevant)**: 2 jstack https://gist.github.com/PMickael/293f0bc431926fe95f7fe15332d72145 https://gist.github.com/PMickael/0f05418a32b9999f04d274d407af1533
https://github.com/elastic/elasticsearch/issues/80480
https://github.com/elastic/elasticsearch/pull/84766
db6c58ed4547720f5e4167a8a8c87c3348aaffe9
5ae99a62972e5da428ffb1949096d349942d761e
"2021-11-08T10:54:02Z"
java
"2022-03-11T21:28:16Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,465
["qa/os/src/test/java/org/elasticsearch/packaging/test/ArchiveTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/test/ConfigurationTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/util/ServerUtils.java", "x-pack/plugin/security/cli/src/main/java/org/elasticsearch/xpack/security/cli/AutoConfigureNode.java"]
Use node.name instead of `HOSTNAME` for auto-generated certificates
When `node.name` is set, it's most likely the this is what the user wants to identify the node by, rather than the `hostname` of the machine this node runs on. In such cases, we should set the CN of the autogenerated HTTP certifiate to `node.name`.
https://github.com/elastic/elasticsearch/issues/80465
https://github.com/elastic/elasticsearch/pull/81007
fbda52493cd1a0bbbf7550bf18a74202e1e59348
d9ce0b01dd3efd3efcb2f77b0e9828be7c763f59
"2021-11-07T09:05:32Z"
java
"2021-11-30T17:54:19Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,413
["server/src/main/java/org/elasticsearch/action/admin/indices/stats/IndexStats.java", "server/src/main/java/org/elasticsearch/action/admin/indices/stats/IndicesStatsResponse.java", "server/src/main/java/org/elasticsearch/action/admin/indices/stats/TransportIndicesStatsAction.java", "server/src/main/java/org/elasticsearch/cluster/health/ClusterHealthStatus.java", "server/src/main/java/org/elasticsearch/cluster/metadata/IndexMetadata.java", "server/src/test/java/org/elasticsearch/action/admin/indices/rollover/TransportRolloverActionTests.java", "server/src/test/java/org/elasticsearch/action/admin/indices/stats/IndicesStatsResponseTests.java", "server/src/test/java/org/elasticsearch/action/admin/indices/stats/IndicesStatsTests.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ilm/WaitForNoFollowersStepTests.java", "x-pack/plugin/monitoring/src/test/java/org/elasticsearch/xpack/monitoring/collector/indices/IndicesStatsMonitoringDocTests.java"]
Add index health and status to the _stats API
We want to migrate Index Management UI [from using `_cat/indices` API](https://github.com/elastic/kibana/issues/57286) and keep it consistent with the current implementation. I think we could use `_stats` API to retrieve most index properties displayed in the UI. Except for index health (green/yellow/red) and status (open/closed), is it possible to add those properties to the API? Screenshot <img width="1114" alt="Screenshot 2021-11-05 at 14 40 51" src="https://user-images.githubusercontent.com/6585477/140519477-867ebd0e-197d-44c9-abe0-bee8276c8274.png">
https://github.com/elastic/elasticsearch/issues/80413
https://github.com/elastic/elasticsearch/pull/81954
0699c9351f1439e246d408fd6538deafde4087b6
b118d84288b79723b00f4b50b36435656ce81821
"2021-11-05T13:25:44Z"
java
"2022-01-10T08:59:30Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,405
["x-pack/plugin/build.gradle"]
[CI] XPackRestIT test {p0=data_stream/140_data_stream_aliases/Fix IndexNotFoundException error when handling remove alias action} failing
**Build scan:** https://gradle-enterprise.elastic.co/s/i76ylsjmi3jxu/tests/:x-pack:plugin:yamlRestTestV7CompatTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=data_stream%2F140_data_stream_aliases%2FFix%20IndexNotFoundException%20error%20when%20handling%20remove%20alias%20action%7D **Reproduction line:** `./gradlew ':x-pack:plugin:yamlRestTestV7CompatTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=data_stream/140_data_stream_aliases/Fix IndexNotFoundException error when handling remove alias action}" -Dtests.seed=F04A55B44D69E10C -Dtests.locale=ar-KW -Dtests.timezone=Canada/Pacific -Druntime.java=17` **Applicable branches:** 8.0 **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Ddata_stream/140_data_stream_aliases/Fix%20IndexNotFoundException%20error%20when%20handling%20remove%20alias%20action%7D **Failure excerpt:** ``` java.lang.AssertionError: Failure at [data_stream/140_data_stream_aliases:397]: expected [2xx] status code but api [indices.update_aliases] returned [404 Not Found] [{"error":{"root_cause":[{"type":"index_not_found_exception","reason":"no such index [log-foobar]","resource.type":"index_or_alias","resource.id":"log-foobar","index_uuid":"_na_","index":"log-foobar","stack_trace":"[log-foobar] org.elasticsearch.index.IndexNotFoundException: no such index [log-foobar]\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.indexNotFoundException(IndexNameExpressionResolver.java:1289)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.innerResolve(IndexNameExpressionResolver.java:1231)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.resolve(IndexNameExpressionResolver.java:1183)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:302)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:236)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:175)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:57)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.executeMasterOperation(TransportMasterNodeAction.java:121)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.lambda$doStart$3(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.EsExecutors$DirectExecutorService.execute(EsExecutors.java:220)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.doStart(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:152)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:52)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:79)\n\tat org.elasticsearch.action.support.ActionFilter$Simple.apply(ActionFilter.java:53)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$3(SecurityActionFilter.java:169)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:576)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.lambda$intercept$4(IndicesAliasesRequestInterceptor.java:105)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.validateIndexPermissionsAreSubset(RBACEngine.java:504)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.intercept(IndicesAliasesRequestInterceptor.java:98)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ShardSearchRequestInterceptor.intercept(ShardSearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.SearchRequestInterceptor.intercept(SearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.BulkShardRequestInterceptor.intercept(BulkShardRequestInterceptor.java:87)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.UpdateRequestInterceptor.intercept(UpdateRequestInterceptor.java:27)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ResizeRequestInterceptor.intercept(ResizeRequestInterceptor.java:96)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.DlsFlsLicenseRequestInterceptor.intercept(DlsFlsLicenseRequestInterceptor.java:85)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.runRequestInterceptors(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.handleIndexActionAuthorizationResult(AuthorizationService.java:555)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorizeAction$11(AuthorizationService.java:449)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:964)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:928)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$authorizeIndexAction$4(RBACEngine.java:378)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:41)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$CachingAsyncSupplier.getAsync(AuthorizationService.java:1012)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.authorizeIndexAction(RBACEngine.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorizeAction(AuthorizationService.java:442)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.maybeAuthorizeRunAs(AuthorizationService.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorize$1(AuthorizationService.java:255)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$resolveAuthorizationInfo$1(RBACEngine.java:138)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authz.store.CompositeRolesStore.getRoles(CompositeRolesStore.java:300)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.getRoles(RBACEngine.java:144)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.resolveAuthorizationInfo(RBACEngine.java:127)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorize(AuthorizationService.java:257)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$4(SecurityActionFilter.java:165)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:93)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:171)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.applyInternal(SecurityActionFilter.java:161)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.apply(SecurityActionFilter.java:120)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.action.support.TransportAction.execute(TransportAction.java:54)\n\tat org.elasticsearch.tasks.TaskManager.registerAndExecute(TaskManager.java:170)\n\tat org.elasticsearch.client.node.NodeClient.executeLocally(NodeClient.java:105)\n\tat org.elasticsearch.client.node.NodeClient.doExecute(NodeClient.java:83)\n\tat org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:380)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.execute(AbstractClient.java:1271)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.aliases(AbstractClient.java:1286)\n\tat org.elasticsearch.rest.action.admin.indices.RestIndicesAliasesAction.lambda$prepareRequest$0(RestIndicesAliasesAction.java:46)\n\tat org.elasticsearch.rest.BaseRestHandler.handleRequest(BaseRestHandler.java:103)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$0(SecurityRestFilter.java:114)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.lambda$authenticateAndAttachToContext$2(SecondaryAuthenticator.java:84)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticate(SecondaryAuthenticator.java:94)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticateAndAttachToContext(SecondaryAuthenticator.java:78)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$2(SecurityRestFilter.java:108)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.action.ActionListener$RunBeforeActionListener.onResponse(ActionListener.java:389)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.writeAuthToContext(AuthenticatorChain.java:378)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.finishAuthentication(AuthenticatorChain.java:354)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.maybeLookupRunAsUser(AuthenticatorChain.java:207)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$doAuthenticate$1(AuthenticatorChain.java:121)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$4(AuthenticatorChain.java:189)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$3(RealmsAuthenticator.java:219)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$0(RealmsAuthenticator.java:164)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$1(CachingUsernamePasswordRealm.java:155)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.handleCachedAuthentication(CachingUsernamePasswordRealm.java:242)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$2(CachingUsernamePasswordRealm.java:139)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticateWithCache(CachingUsernamePasswordRealm.java:134)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticate(CachingUsernamePasswordRealm.java:105)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$2(RealmsAuthenticator.java:148)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.consumeToken(RealmsAuthenticator.java:233)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.authenticate(RealmsAuthenticator.java:84)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:181)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.doAuthenticate(AuthenticatorChain.java:136)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:95)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:149)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:127)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.handleRequest(SecurityRestFilter.java:102)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:363)\n\tat org.elasticsearch.rest.RestController.tryAllHandlers(RestController.java:431)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:278)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.dispatchRequest(AbstractHttpServerTransport.java:382)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.handleIncomingRequest(AbstractHttpServerTransport.java:461)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.incomingRequest(AbstractHttpServerTransport.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:32)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:18)\n\tat io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpPipeliningHandler.channelRead(Netty4HttpPipeliningHandler.java:48)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324)\n\tat io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.timeout.IdleStateHandler.channelRead(IdleStateHandler.java:286)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)\n\tat io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583)\n\tat io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)\n\tat io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986)\n\tat io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)\n\tat java.base/java.lang.Thread.run(Thread.java:833)\n"}],"type":"index_not_found_exception","reason":"no such index [log-foobar]","resource.type":"index_or_alias","resource.id":"log-foobar","index_uuid":"_na_","index":"log-foobar","stack_trace":"[log-foobar] org.elasticsearch.index.IndexNotFoundException: no such index [log-foobar]\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.indexNotFoundException(IndexNameExpressionResolver.java:1289)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.innerResolve(IndexNameExpressionResolver.java:1231)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.resolve(IndexNameExpressionResolver.java:1183)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:302)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:236)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:175)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:57)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.executeMasterOperation(TransportMasterNodeAction.java:121)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.lambda$doStart$3(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.EsExecutors$DirectExecutorService.execute(EsExecutors.java:220)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.doStart(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:152)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:52)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:79)\n\tat org.elasticsearch.action.support.ActionFilter$Simple.apply(ActionFilter.java:53)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$3(SecurityActionFilter.java:169)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:576)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.lambda$intercept$4(IndicesAliasesRequestInterceptor.java:105)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.validateIndexPermissionsAreSubset(RBACEngine.java:504)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.intercept(IndicesAliasesRequestInterceptor.java:98)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ShardSearchRequestInterceptor.intercept(ShardSearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.SearchRequestInterceptor.intercept(SearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.BulkShardRequestInterceptor.intercept(BulkShardRequestInterceptor.java:87)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.UpdateRequestInterceptor.intercept(UpdateRequestInterceptor.java:27)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ResizeRequestInterceptor.intercept(ResizeRequestInterceptor.java:96)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.DlsFlsLicenseRequestInterceptor.intercept(DlsFlsLicenseRequestInterceptor.java:85)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.runRequestInterceptors(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.handleIndexActionAuthorizationResult(AuthorizationService.java:555)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorizeAction$11(AuthorizationService.java:449)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:964)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:928)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$authorizeIndexAction$4(RBACEngine.java:378)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:41)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$CachingAsyncSupplier.getAsync(AuthorizationService.java:1012)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.authorizeIndexAction(RBACEngine.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorizeAction(AuthorizationService.java:442)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.maybeAuthorizeRunAs(AuthorizationService.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorize$1(AuthorizationService.java:255)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$resolveAuthorizationInfo$1(RBACEngine.java:138)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authz.store.CompositeRolesStore.getRoles(CompositeRolesStore.java:300)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.getRoles(RBACEngine.java:144)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.resolveAuthorizationInfo(RBACEngine.java:127)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorize(AuthorizationService.java:257)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$4(SecurityActionFilter.java:165)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:93)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:171)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.applyInternal(SecurityActionFilter.java:161)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.apply(SecurityActionFilter.java:120)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.action.support.TransportAction.execute(TransportAction.java:54)\n\tat org.elasticsearch.tasks.TaskManager.registerAndExecute(TaskManager.java:170)\n\tat org.elasticsearch.client.node.NodeClient.executeLocally(NodeClient.java:105)\n\tat org.elasticsearch.client.node.NodeClient.doExecute(NodeClient.java:83)\n\tat org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:380)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.execute(AbstractClient.java:1271)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.aliases(AbstractClient.java:1286)\n\tat org.elasticsearch.rest.action.admin.indices.RestIndicesAliasesAction.lambda$prepareRequest$0(RestIndicesAliasesAction.java:46)\n\tat org.elasticsearch.rest.BaseRestHandler.handleRequest(BaseRestHandler.java:103)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$0(SecurityRestFilter.java:114)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.lambda$authenticateAndAttachToContext$2(SecondaryAuthenticator.java:84)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticate(SecondaryAuthenticator.java:94)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticateAndAttachToContext(SecondaryAuthenticator.java:78)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$2(SecurityRestFilter.java:108)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.action.ActionListener$RunBeforeActionListener.onResponse(ActionListener.java:389)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.writeAuthToContext(AuthenticatorChain.java:378)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.finishAuthentication(AuthenticatorChain.java:354)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.maybeLookupRunAsUser(AuthenticatorChain.java:207)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$doAuthenticate$1(AuthenticatorChain.java:121)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$4(AuthenticatorChain.java:189)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$3(RealmsAuthenticator.java:219)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$0(RealmsAuthenticator.java:164)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$1(CachingUsernamePasswordRealm.java:155)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.handleCachedAuthentication(CachingUsernamePasswordRealm.java:242)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$2(CachingUsernamePasswordRealm.java:139)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticateWithCache(CachingUsernamePasswordRealm.java:134)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticate(CachingUsernamePasswordRealm.java:105)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$2(RealmsAuthenticator.java:148)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.consumeToken(RealmsAuthenticator.java:233)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.authenticate(RealmsAuthenticator.java:84)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:181)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.doAuthenticate(AuthenticatorChain.java:136)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:95)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:149)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:127)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.handleRequest(SecurityRestFilter.java:102)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:363)\n\tat org.elasticsearch.rest.RestController.tryAllHandlers(RestController.java:431)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:278)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.dispatchRequest(AbstractHttpServerTransport.java:382)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.handleIncomingRequest(AbstractHttpServerTransport.java:461)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.incomingRequest(AbstractHttpServerTransport.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:32)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:18)\n\tat io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpPipeliningHandler.channelRead(Netty4HttpPipeliningHandler.java:48)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324)\n\tat io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.timeout.IdleStateHandler.channelRead(IdleStateHandler.java:286)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)\n\tat io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583)\n\tat io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)\n\tat io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986)\n\tat io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)\n\tat java.base/java.lang.Thread.run(Thread.java:833)\n"},"status":404}] at __randomizedtesting.SeedInfo.seed([F04A55B44D69E10C:781E6A6EE3958CF4]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) Caused by: java.lang.AssertionError: expected [2xx] status code but api [indices.update_aliases] returned [404 Not Found] [{"error":{"root_cause":[{"type":"index_not_found_exception","reason":"no such index [log-foobar]","resource.type":"index_or_alias","resource.id":"log-foobar","index_uuid":"_na_","index":"log-foobar","stack_trace":"[log-foobar] org.elasticsearch.index.IndexNotFoundException: no such index [log-foobar]\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.indexNotFoundException(IndexNameExpressionResolver.java:1289)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.innerResolve(IndexNameExpressionResolver.java:1231)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.resolve(IndexNameExpressionResolver.java:1183)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:302)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:236)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:175)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:57)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.executeMasterOperation(TransportMasterNodeAction.java:121)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.lambda$doStart$3(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.EsExecutors$DirectExecutorService.execute(EsExecutors.java:220)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.doStart(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:152)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:52)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:79)\n\tat org.elasticsearch.action.support.ActionFilter$Simple.apply(ActionFilter.java:53)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$3(SecurityActionFilter.java:169)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:576)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.lambda$intercept$4(IndicesAliasesRequestInterceptor.java:105)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.validateIndexPermissionsAreSubset(RBACEngine.java:504)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.intercept(IndicesAliasesRequestInterceptor.java:98)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ShardSearchRequestInterceptor.intercept(ShardSearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.SearchRequestInterceptor.intercept(SearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.BulkShardRequestInterceptor.intercept(BulkShardRequestInterceptor.java:87)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.UpdateRequestInterceptor.intercept(UpdateRequestInterceptor.java:27)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ResizeRequestInterceptor.intercept(ResizeRequestInterceptor.java:96)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.DlsFlsLicenseRequestInterceptor.intercept(DlsFlsLicenseRequestInterceptor.java:85)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.runRequestInterceptors(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.handleIndexActionAuthorizationResult(AuthorizationService.java:555)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorizeAction$11(AuthorizationService.java:449)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:964)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:928)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$authorizeIndexAction$4(RBACEngine.java:378)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:41)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$CachingAsyncSupplier.getAsync(AuthorizationService.java:1012)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.authorizeIndexAction(RBACEngine.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorizeAction(AuthorizationService.java:442)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.maybeAuthorizeRunAs(AuthorizationService.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorize$1(AuthorizationService.java:255)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$resolveAuthorizationInfo$1(RBACEngine.java:138)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authz.store.CompositeRolesStore.getRoles(CompositeRolesStore.java:300)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.getRoles(RBACEngine.java:144)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.resolveAuthorizationInfo(RBACEngine.java:127)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorize(AuthorizationService.java:257)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$4(SecurityActionFilter.java:165)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:93)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:171)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.applyInternal(SecurityActionFilter.java:161)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.apply(SecurityActionFilter.java:120)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.action.support.TransportAction.execute(TransportAction.java:54)\n\tat org.elasticsearch.tasks.TaskManager.registerAndExecute(TaskManager.java:170)\n\tat org.elasticsearch.client.node.NodeClient.executeLocally(NodeClient.java:105)\n\tat org.elasticsearch.client.node.NodeClient.doExecute(NodeClient.java:83)\n\tat org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:380)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.execute(AbstractClient.java:1271)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.aliases(AbstractClient.java:1286)\n\tat org.elasticsearch.rest.action.admin.indices.RestIndicesAliasesAction.lambda$prepareRequest$0(RestIndicesAliasesAction.java:46)\n\tat org.elasticsearch.rest.BaseRestHandler.handleRequest(BaseRestHandler.java:103)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$0(SecurityRestFilter.java:114)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.lambda$authenticateAndAttachToContext$2(SecondaryAuthenticator.java:84)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticate(SecondaryAuthenticator.java:94)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticateAndAttachToContext(SecondaryAuthenticator.java:78)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$2(SecurityRestFilter.java:108)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.action.ActionListener$RunBeforeActionListener.onResponse(ActionListener.java:389)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.writeAuthToContext(AuthenticatorChain.java:378)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.finishAuthentication(AuthenticatorChain.java:354)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.maybeLookupRunAsUser(AuthenticatorChain.java:207)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$doAuthenticate$1(AuthenticatorChain.java:121)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$4(AuthenticatorChain.java:189)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$3(RealmsAuthenticator.java:219)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$0(RealmsAuthenticator.java:164)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$1(CachingUsernamePasswordRealm.java:155)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.handleCachedAuthentication(CachingUsernamePasswordRealm.java:242)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$2(CachingUsernamePasswordRealm.java:139)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticateWithCache(CachingUsernamePasswordRealm.java:134)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticate(CachingUsernamePasswordRealm.java:105)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$2(RealmsAuthenticator.java:148)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.consumeToken(RealmsAuthenticator.java:233)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.authenticate(RealmsAuthenticator.java:84)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:181)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.doAuthenticate(AuthenticatorChain.java:136)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:95)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:149)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:127)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.handleRequest(SecurityRestFilter.java:102)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:363)\n\tat org.elasticsearch.rest.RestController.tryAllHandlers(RestController.java:431)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:278)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.dispatchRequest(AbstractHttpServerTransport.java:382)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.handleIncomingRequest(AbstractHttpServerTransport.java:461)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.incomingRequest(AbstractHttpServerTransport.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:32)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:18)\n\tat io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpPipeliningHandler.channelRead(Netty4HttpPipeliningHandler.java:48)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324)\n\tat io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.timeout.IdleStateHandler.channelRead(IdleStateHandler.java:286)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)\n\tat io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583)\n\tat io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)\n\tat io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986)\n\tat io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)\n\tat java.base/java.lang.Thread.run(Thread.java:833)\n"}],"type":"index_not_found_exception","reason":"no such index [log-foobar]","resource.type":"index_or_alias","resource.id":"log-foobar","index_uuid":"_na_","index":"log-foobar","stack_trace":"[log-foobar] org.elasticsearch.index.IndexNotFoundException: no such index [log-foobar]\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.indexNotFoundException(IndexNameExpressionResolver.java:1289)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.innerResolve(IndexNameExpressionResolver.java:1231)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.resolve(IndexNameExpressionResolver.java:1183)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:302)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:236)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:175)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:57)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.executeMasterOperation(TransportMasterNodeAction.java:121)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.lambda$doStart$3(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.EsExecutors$DirectExecutorService.execute(EsExecutors.java:220)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.doStart(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:152)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:52)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:79)\n\tat org.elasticsearch.action.support.ActionFilter$Simple.apply(ActionFilter.java:53)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$3(SecurityActionFilter.java:169)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:576)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.lambda$intercept$4(IndicesAliasesRequestInterceptor.java:105)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.validateIndexPermissionsAreSubset(RBACEngine.java:504)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.intercept(IndicesAliasesRequestInterceptor.java:98)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ShardSearchRequestInterceptor.intercept(ShardSearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.SearchRequestInterceptor.intercept(SearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.BulkShardRequestInterceptor.intercept(BulkShardRequestInterceptor.java:87)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.UpdateRequestInterceptor.intercept(UpdateRequestInterceptor.java:27)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ResizeRequestInterceptor.intercept(ResizeRequestInterceptor.java:96)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.DlsFlsLicenseRequestInterceptor.intercept(DlsFlsLicenseRequestInterceptor.java:85)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.runRequestInterceptors(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.handleIndexActionAuthorizationResult(AuthorizationService.java:555)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorizeAction$11(AuthorizationService.java:449)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:964)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:928)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$authorizeIndexAction$4(RBACEngine.java:378)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:41)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$CachingAsyncSupplier.getAsync(AuthorizationService.java:1012)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.authorizeIndexAction(RBACEngine.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorizeAction(AuthorizationService.java:442)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.maybeAuthorizeRunAs(AuthorizationService.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorize$1(AuthorizationService.java:255)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$resolveAuthorizationInfo$1(RBACEngine.java:138)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authz.store.CompositeRolesStore.getRoles(CompositeRolesStore.java:300)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.getRoles(RBACEngine.java:144)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.resolveAuthorizationInfo(RBACEngine.java:127)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorize(AuthorizationService.java:257)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$4(SecurityActionFilter.java:165)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:93)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:171)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.applyInternal(SecurityActionFilter.java:161)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.apply(SecurityActionFilter.java:120)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.action.support.TransportAction.execute(TransportAction.java:54)\n\tat org.elasticsearch.tasks.TaskManager.registerAndExecute(TaskManager.java:170)\n\tat org.elasticsearch.client.node.NodeClient.executeLocally(NodeClient.java:105)\n\tat org.elasticsearch.client.node.NodeClient.doExecute(NodeClient.java:83)\n\tat org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:380)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.execute(AbstractClient.java:1271)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.aliases(AbstractClient.java:1286)\n\tat org.elasticsearch.rest.action.admin.indices.RestIndicesAliasesAction.lambda$prepareRequest$0(RestIndicesAliasesAction.java:46)\n\tat org.elasticsearch.rest.BaseRestHandler.handleRequest(BaseRestHandler.java:103)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$0(SecurityRestFilter.java:114)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.lambda$authenticateAndAttachToContext$2(SecondaryAuthenticator.java:84)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticate(SecondaryAuthenticator.java:94)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticateAndAttachToContext(SecondaryAuthenticator.java:78)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$2(SecurityRestFilter.java:108)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.action.ActionListener$RunBeforeActionListener.onResponse(ActionListener.java:389)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.writeAuthToContext(AuthenticatorChain.java:378)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.finishAuthentication(AuthenticatorChain.java:354)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.maybeLookupRunAsUser(AuthenticatorChain.java:207)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$doAuthenticate$1(AuthenticatorChain.java:121)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$4(AuthenticatorChain.java:189)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$3(RealmsAuthenticator.java:219)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$0(RealmsAuthenticator.java:164)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$1(CachingUsernamePasswordRealm.java:155)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.handleCachedAuthentication(CachingUsernamePasswordRealm.java:242)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$2(CachingUsernamePasswordRealm.java:139)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticateWithCache(CachingUsernamePasswordRealm.java:134)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticate(CachingUsernamePasswordRealm.java:105)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$2(RealmsAuthenticator.java:148)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.consumeToken(RealmsAuthenticator.java:233)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.authenticate(RealmsAuthenticator.java:84)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:181)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.doAuthenticate(AuthenticatorChain.java:136)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:95)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:149)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:127)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.handleRequest(SecurityRestFilter.java:102)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:363)\n\tat org.elasticsearch.rest.RestController.tryAllHandlers(RestController.java:431)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:278)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.dispatchRequest(AbstractHttpServerTransport.java:382)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.handleIncomingRequest(AbstractHttpServerTransport.java:461)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.incomingRequest(AbstractHttpServerTransport.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:32)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:18)\n\tat io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpPipeliningHandler.channelRead(Netty4HttpPipeliningHandler.java:48)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324)\n\tat io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.timeout.IdleStateHandler.channelRead(IdleStateHandler.java:286)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)\n\tat io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583)\n\tat io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)\n\tat io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986)\n\tat io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)\n\tat java.base/java.lang.Thread.run(Thread.java:833)\n"},"status":404}] at org.junit.Assert.fail(Assert.java:88) at org.elasticsearch.test.rest.yaml.section.DoSection.execute(DoSection.java:374) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/80405
https://github.com/elastic/elasticsearch/pull/93558
eff2fdb95889a6a88d22a5bb1b4c6633cb4680e8
bb76d2eeae6adb7563db12eec227961dda595b22
"2021-11-05T10:45:07Z"
java
"2023-02-07T14:49:12Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,398
["docs/changelog/84410.yaml", "plugins/discovery-ec2/qa/amazon-ec2/src/yamlRestTest/java/org/elasticsearch/discovery/ec2/AmazonEC2Fixture.java", "plugins/discovery-ec2/src/main/java/org/elasticsearch/discovery/ec2/AwsEc2Utils.java", "plugins/discovery-ec2/src/main/java/org/elasticsearch/discovery/ec2/Ec2DiscoveryPlugin.java", "plugins/discovery-ec2/src/main/java/org/elasticsearch/discovery/ec2/Ec2NameResolver.java", "plugins/discovery-ec2/src/test/java/org/elasticsearch/discovery/ec2/Ec2DiscoveryPluginTests.java"]
Support IMDSv2 for EC2 Discovery
We have been using Elasticsearch for storing our application data, and are extensively using the EC2 discovery plugin and S3 plugin. As per AWS best practices, we are making use of the EC2 instance metadata to get the required auth tokens for EC2 discovery and S3 snapshots, and dont make use of any access_keys and secret_access_keys. Following is the elasticsearch.yml file: **discovery.seed_providers: ec2 discovery.ec2.tag.cluster_name: elasticsearch network.host: \_ec2:privateIpv4_\ http.port: 9200 discovery.ec2.endpoint: ec2.ap-south-1.amazonaws.com cloud.node.auto_attributes: true cluster.routing.allocation.awareness.attributes: aws_availability_zone logger.org.elasticsearch.discovery.ec2: "WARN"** Recently during our security audit, we got to know about a new Session oriented way of interacting with the EC2 metadata plugin. More info [here](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html). As this was a more secured way, we tried it out in our lower environments, which led to our Elasticsearch clusters go into YELLOW state. The reason for this is that the nodes were not able to get the availability zone by querying the instance metadata service. Logs for the same: `{"type": "server", "timestamp": "2021-11-05T07:31:59,234Z", "level": "DEBUG", "component": "o.e.d.e.Ec2DiscoveryPlugin", "cluster.name": "elasticsearch", "node.name": "elasticsearch-master-2", "message": "obtaining ec2 [placement/availability-zone] from ec2 meta-data url http://169.254.169.254/latest/meta-data/placement/availability-zone" } {"type": "server", "timestamp": "2021-11-05T07:31:59,321Z", "level": "ERROR", "component": "o.e.d.e.Ec2DiscoveryPlugin", "cluster.name": "elasticsearch", "node.name": "elasticsearch-master-2", "message": "failed to get metadata for [placement/availability-zone]", "stacktrace": ["java.io.IOException: Server returned HTTP response code: 401 for URL: http://169.254.169.254/latest/meta-data/placement/availability-zone", ` I am not really sure if this is already implemented or not, as I could not find any documentation for the same. It would be great if we could support this new way of authorization, if not supported yet :)
https://github.com/elastic/elasticsearch/issues/80398
https://github.com/elastic/elasticsearch/pull/84410
5ebcf60fbc7a4a629bbbe4a267b4b05f11fe5794
892d2a2a942275dd350721e5a4463e48d7d9c43a
"2021-11-05T09:44:21Z"
java
"2022-03-09T13:43:14Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,321
["x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/action/TransformUpdater.java", "x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/action/TransportUpgradeTransformsAction.java"]
[CI] UpgradeClusterClientYamlTestSuiteIT test {p0=upgraded_cluster/80_transform_jobs_crud/Get start, stop, upgrade and delete old cluster batch transform} failing
**Build scan:** https://gradle-enterprise.elastic.co/s/t437exhetbvac/tests/:x-pack:qa:rolling-upgrade:v7.4.0%23upgradedClusterTest/org.elasticsearch.upgrades.UpgradeClusterClientYamlTestSuiteIT/test%20%7Bp0=upgraded_cluster%2F80_transform_jobs_crud%2FGet%20start,%20stop,%20upgrade%20and%20delete%20old%20cluster%20batch%20transform%7D **Reproduction line:** `./gradlew ':x-pack:qa:rolling-upgrade:v7.4.0#upgradedClusterTest' -Dtests.class="org.elasticsearch.upgrades.UpgradeClusterClientYamlTestSuiteIT" -Dtests.method="test {p0=upgraded_cluster/80_transform_jobs_crud/Get start, stop, upgrade and delete old cluster batch transform}" -Dtests.seed=B85BC0E14879F0B6 -Dtests.bwc=true -Dtests.locale=es-BO -Dtests.timezone=Asia/Vladivostok -Druntime.java=8` **Applicable branches:** 7.16 **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.upgrades.UpgradeClusterClientYamlTestSuiteIT&tests.test=test%20%7Bp0%3Dupgraded_cluster/80_transform_jobs_crud/Get%20start,%20stop,%20upgrade%20and%20delete%20old%20cluster%20batch%20transform%7D **Failure excerpt:** ``` java.lang.AssertionError: Failure at [upgraded_cluster/80_transform_jobs_crud:80]: expected [2xx] status code but api [transform.upgrade_transforms] returned [404 Not Found] [{"error":{"root_cause":[{"type":"resource_not_found_exception","reason":"Transform with id [mixed-simple-continuous-transform] could not be found","stack_trace":"ResourceNotFoundException[Transform with id [mixed-simple-continuous-transform] could not be found]\n\tat org.elasticsearch.xpack.transform.persistence.IndexBasedTransformConfigManager.lambda$getTransformConfigurationForUpdate$12(IndexBasedTransformConfigManager.java:497)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:88)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:82)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$2(SecurityActionFilter.java:192)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.action.ActionListener$RunAfterActionListener.onResponse(ActionListener.java:341)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.sendSearchResponse(AbstractSearchAsyncAction.java:719)\n\tat org.elasticsearch.action.search.ExpandSearchPhase.run(ExpandSearchPhase.java:106)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executePhase(AbstractSearchAsyncAction.java:466)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:460)\n\tat org.elasticsearch.action.search.FetchSearchPhase.moveToNextPhase(FetchSearchPhase.java:287)\n\tat org.elasticsearch.action.search.FetchSearchPhase.lambda$innerRun$1(FetchSearchPhase.java:114)\n\tat org.elasticsearch.action.search.FetchSearchPhase.innerRun(FetchSearchPhase.java:132)\n\tat org.elasticsearch.action.search.FetchSearchPhase.access$000(FetchSearchPhase.java:37)\n\tat org.elasticsearch.action.search.FetchSearchPhase$1.doRun(FetchSearchPhase.java:98)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.TimedRunnable.doRun(TimedRunnable.java:33)\n\tat org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tat java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\tat java.lang.Thread.run(Thread.java:748)\n"}],"type":"resource_not_found_exception","reason":"Transform with id [mixed-simple-continuous-transform] could not be found","stack_trace":"ResourceNotFoundException[Transform with id [mixed-simple-continuous-transform] could not be found]\n\tat org.elasticsearch.xpack.transform.persistence.IndexBasedTransformConfigManager.lambda$getTransformConfigurationForUpdate$12(IndexBasedTransformConfigManager.java:497)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:88)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:82)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$2(SecurityActionFilter.java:192)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.action.ActionListener$RunAfterActionListener.onResponse(ActionListener.java:341)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.sendSearchResponse(AbstractSearchAsyncAction.java:719)\n\tat org.elasticsearch.action.search.ExpandSearchPhase.run(ExpandSearchPhase.java:106)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executePhase(AbstractSearchAsyncAction.java:466)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:460)\n\tat org.elasticsearch.action.search.FetchSearchPhase.moveToNextPhase(FetchSearchPhase.java:287)\n\tat org.elasticsearch.action.search.FetchSearchPhase.lambda$innerRun$1(FetchSearchPhase.java:114)\n\tat org.elasticsearch.action.search.FetchSearchPhase.innerRun(FetchSearchPhase.java:132)\n\tat org.elasticsearch.action.search.FetchSearchPhase.access$000(FetchSearchPhase.java:37)\n\tat org.elasticsearch.action.search.FetchSearchPhase$1.doRun(FetchSearchPhase.java:98)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.TimedRunnable.doRun(TimedRunnable.java:33)\n\tat org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tat java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\tat java.lang.Thread.run(Thread.java:748)\n"},"status":404}] at __randomizedtesting.SeedInfo.seed([B85BC0E14879F0B6:300FFF3BE6859D4E]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:482) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:455) at sun.reflect.GeneratedMethodAccessor23.invoke(null:-1) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at java.lang.Thread.run(Thread.java:748) Caused by: java.lang.AssertionError: expected [2xx] status code but api [transform.upgrade_transforms] returned [404 Not Found] [{"error":{"root_cause":[{"type":"resource_not_found_exception","reason":"Transform with id [mixed-simple-continuous-transform] could not be found","stack_trace":"ResourceNotFoundException[Transform with id [mixed-simple-continuous-transform] could not be found]\n\tat org.elasticsearch.xpack.transform.persistence.IndexBasedTransformConfigManager.lambda$getTransformConfigurationForUpdate$12(IndexBasedTransformConfigManager.java:497)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:88)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:82)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$2(SecurityActionFilter.java:192)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.action.ActionListener$RunAfterActionListener.onResponse(ActionListener.java:341)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.sendSearchResponse(AbstractSearchAsyncAction.java:719)\n\tat org.elasticsearch.action.search.ExpandSearchPhase.run(ExpandSearchPhase.java:106)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executePhase(AbstractSearchAsyncAction.java:466)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:460)\n\tat org.elasticsearch.action.search.FetchSearchPhase.moveToNextPhase(FetchSearchPhase.java:287)\n\tat org.elasticsearch.action.search.FetchSearchPhase.lambda$innerRun$1(FetchSearchPhase.java:114)\n\tat org.elasticsearch.action.search.FetchSearchPhase.innerRun(FetchSearchPhase.java:132)\n\tat org.elasticsearch.action.search.FetchSearchPhase.access$000(FetchSearchPhase.java:37)\n\tat org.elasticsearch.action.search.FetchSearchPhase$1.doRun(FetchSearchPhase.java:98)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.TimedRunnable.doRun(TimedRunnable.java:33)\n\tat org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tat java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\tat java.lang.Thread.run(Thread.java:748)\n"}],"type":"resource_not_found_exception","reason":"Transform with id [mixed-simple-continuous-transform] could not be found","stack_trace":"ResourceNotFoundException[Transform with id [mixed-simple-continuous-transform] could not be found]\n\tat org.elasticsearch.xpack.transform.persistence.IndexBasedTransformConfigManager.lambda$getTransformConfigurationForUpdate$12(IndexBasedTransformConfigManager.java:497)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:88)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:82)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$2(SecurityActionFilter.java:192)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.action.ActionListener$RunAfterActionListener.onResponse(ActionListener.java:341)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.sendSearchResponse(AbstractSearchAsyncAction.java:719)\n\tat org.elasticsearch.action.search.ExpandSearchPhase.run(ExpandSearchPhase.java:106)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executePhase(AbstractSearchAsyncAction.java:466)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:460)\n\tat org.elasticsearch.action.search.FetchSearchPhase.moveToNextPhase(FetchSearchPhase.java:287)\n\tat org.elasticsearch.action.search.FetchSearchPhase.lambda$innerRun$1(FetchSearchPhase.java:114)\n\tat org.elasticsearch.action.search.FetchSearchPhase.innerRun(FetchSearchPhase.java:132)\n\tat org.elasticsearch.action.search.FetchSearchPhase.access$000(FetchSearchPhase.java:37)\n\tat org.elasticsearch.action.search.FetchSearchPhase$1.doRun(FetchSearchPhase.java:98)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.TimedRunnable.doRun(TimedRunnable.java:33)\n\tat org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tat java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\tat java.lang.Thread.run(Thread.java:748)\n"},"status":404}] at org.junit.Assert.fail(Assert.java:88) at org.elasticsearch.test.rest.yaml.section.DoSection.execute(DoSection.java:375) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:471) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:455) at sun.reflect.GeneratedMethodAccessor23.invoke(null:-1) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at java.lang.Thread.run(Thread.java:748) ```
https://github.com/elastic/elasticsearch/issues/80321
https://github.com/elastic/elasticsearch/pull/80550
c9303e273d51492be2e970c2bc005381f25ea74e
e79291621a7d6c3fbd123a83a88d7c3180a7eb5b
"2021-11-04T00:17:11Z"
java
"2021-11-10T09:51:52Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,320
["build-tools-internal/src/main/java/org/elasticsearch/gradle/internal/InternalDistributionDownloadPlugin.java"]
Running BWC tests using current version of Elasticsearch should avoid packaging archives
We have BWC tests that test the current version against itself, essentially, we're really just testing that I can restart a cluster and things will be happy. The confusion here seems to be that when doing so we are building an archive (tar in the case of linux) distribution for these tests instead of the much more efficient expanded artifact. It's not clear why exactly this is the case but perhaps there's missing edge case here related to either a) testing against the current version or b) some fallout from the 8.0 version branching. Example: https://gradle-enterprise.elastic.co/s/gz2sybzc7o3je/timeline?anchor=zqqpksynbwwag&task-path=:distribution:archives
https://github.com/elastic/elasticsearch/issues/80320
https://github.com/elastic/elasticsearch/pull/80350
025dbdc73e228c71025ae599bec2bbf12e1720fe
ad4694c4ad3e09ab6c78adb7d2b0fdf01ea3ce90
"2021-11-03T22:23:39Z"
java
"2021-11-15T07:07:42Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,305
["x-pack/plugin/core/build.gradle", "x-pack/plugin/core/licenses/unboundid-ldapsdk-6.0.2.jar.sha1", "x-pack/plugin/core/licenses/unboundid-ldapsdk-6.0.3.jar.sha1", "x-pack/plugin/security/build.gradle"]
SearchGroupsResolverInMemoryTests leaking threads
**Build scan**: [sample scan](https://gradle-enterprise.elastic.co/s/2wsdisepd3hd6/tests/:x-pack:plugin:security:test/org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests/classMethod?top-execution=1) **Repro line**: None given **Reproduces locally?**: n/a, see above **Applicable branches**: `8.0`, `master` **Failure history**: [build-stats](https://build-stats.elastic.co/app/kibana#/discover?_g=h@e8eb03e&_a=h@256d290) - looks like failures with this error go back to Oct. 18 at least. <!-- Link to build stats and possible indication of when this started failing and how often it fails <https://build-stats.elastic.co/app/kibana> --> **Failure excerpt**: ``` com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests: 1) Thread[id=124, name=Timer thread for LDAPConnection(name='test-connection-testSearchTimeoutIsFailure', not connected), state=WAITING, group=TGRP-SearchGroupsResolverInMemoryTests] at [email protected]/java.lang.Object.wait(Native Method) at [email protected]/java.lang.Object.wait(Object.java:338) at [email protected]/java.util.TimerThread.mainLoop(Timer.java:537) at [email protected]/java.util.TimerThread.run(Timer.java:516) at __randomizedtesting.SeedInfo.seed([42DA9C1586F63FD5]:0) ```
https://github.com/elastic/elasticsearch/issues/80305
https://github.com/elastic/elasticsearch/pull/81568
c8dcbe49ae28b82bb59fa149a472c7e36df40884
f01871464bdfca570a5f258142583f3071bca1fb
"2021-11-03T18:39:48Z"
java
"2021-12-09T11:43:06Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,264
["docs/reference/indices/recovery.asciidoc"]
[docs] Index recovery API Response wrong types
The Index recovery API documentation (https://www.elastic.co/guide/en/elasticsearch/reference/current/indices-recovery.html#index-recovery-api-response-body) provides incorrect information. The valid values are listed as: > STORE The recovery is related to a node startup or failure. This type of recovery is called a local store recovery. SNAPSHOT The recovery is related to a snapshot restoration. REPLICA The recovery is related to a primary shard replication. RELOCATING The recovery is related to the relocation of a shard to a different node in the same cluster. But this is not correct. These should be: > EMPTY_STORE EXISTING_STORE PEER SNAPSHOT LOCAL_SHARDS.
https://github.com/elastic/elasticsearch/issues/80264
https://github.com/elastic/elasticsearch/pull/81000
d1af86cfdd770b6079d51b0421bfd377ae0c7d69
2a30dfe4d213769e5c4982d201117562377e0e8d
"2021-11-03T10:53:08Z"
java
"2021-11-24T19:34:25Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,239
["x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/ldap/SearchGroupsResolverInMemoryTests.java"]
[CI] SearchGroupsResolverInMemoryTests classMethod failing
The failure occurs during tearDown time when it checks for leaked threads. But the actual test that failed for cleaning up the thread is `testSearchTimeoutIsFailure`. **Build scan:** https://gradle-enterprise.elastic.co/s/yj773p6xo52iw/tests/:x-pack:plugin:security:test/org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests/classMethod **Reproduction line:** `null` **Applicable branches:** master **Reproduces locally?:** No **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests&tests.test=classMethod **Failure excerpt:** ``` com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests: 1) Thread[id=148, name=Timer thread for LDAPConnection(name='test-connection-testSearchTimeoutIsFailure', not connected), state=WAITING, group=TGRP-SearchGroupsResolverInMemoryTests] at [email protected]/java.lang.Object.wait(Native Method) at [email protected]/java.lang.Object.wait(Object.java:338) at [email protected]/java.util.TimerThread.mainLoop(Timer.java:537) at [email protected]/java.util.TimerThread.run(Timer.java:516) at __randomizedtesting.SeedInfo.seed([5BBC99EB0BD500E2]:0) ```
https://github.com/elastic/elasticsearch/issues/80239
https://github.com/elastic/elasticsearch/pull/80250
6efc09244ff7095213043bca95d6125658d4842f
5a4a7446dd5692b07c42c563e3e46f79c4da4e0d
"2021-11-03T01:21:13Z"
java
"2021-11-03T11:42:16Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,236
["x-pack/docs/en/security/authorization/privileges.asciidoc"]
Docs incorrectly state that index "manage" privilege provides template access
On https://www.elastic.co/guide/en/elasticsearch/reference/7.16/security-privileges.html#privileges-list-indices it says > **`manage`** All monitor privileges plus index and data stream administration (aliases, analyze, cache clear, close, delete, exists, flush, mapping, open, field capabilties, force merge, refresh, settings, search shards, templates, validate query). However, there are no index-level template actions in security. All template actions are managed as cluster privileges (via the cluster `manage` privilege`). Also `field capabilties` is spelt wrong :)
https://github.com/elastic/elasticsearch/issues/80236
https://github.com/elastic/elasticsearch/pull/80284
7ff1b6d848d759f205aa05e840a89fbcfde469a1
efbfd985496d7bbf10bf89f13e4e0989220a7aa2
"2021-11-02T23:27:19Z"
java
"2021-11-09T13:41:41Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,200
["docs/reference/rest-api/usage.asciidoc", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/action/GetDeploymentStatsAction.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/MachineLearningUsageTransportAction.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/MachineLearningInfoTransportActionTests.java"]
[ML] Telemetry for NLP models
Add information about NLP models and deployments in the usage API.
https://github.com/elastic/elasticsearch/issues/80200
https://github.com/elastic/elasticsearch/pull/80282
265b3d959c87665f4be62c53968856ffed881bd3
4557d5f797ddb58b1862f2c845b09859e492faa8
"2021-11-02T15:34:16Z"
java
"2021-11-04T15:26:37Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,182
["build-tools-internal/src/main/resources/checkstyle.xml"]
[CI] Checkstyle license header check fails on Windows
The task `:docs:checkstyleTest` fails regularly on Windows platforms, looks related to #79603. **Build scan**: https://gradle-enterprise.elastic.co/s/v4julezaoxpmk https://gradle-enterprise.elastic.co/s/c2mi2ziflwcnk https://gradle-enterprise.elastic.co/s/jzykxzzrjaari and more **Repro line**: **Reproduces locally?**: No (no windows platforms) **Applicable branches**: master **Failure excerpt**: ``` :docs:checkstyleTest FAILED [ant:checkstyle] [ERROR] C:\Users\jenkins\workspace\platform-support\365\docs\src\test\java\org\elasticsearch\smoketest\DocsClientYamlTestSuiteIT.java:1: Duplicate header javadocs are forbidden [MultipleHeaderJavadoc] ```
https://github.com/elastic/elasticsearch/issues/80182
https://github.com/elastic/elasticsearch/pull/80201
902f0527a407bc6e0e26b5a22a51eb4e4588ba0a
3bd67f42e3abaef368209a15c604424d7dcf94ec
"2021-11-02T11:28:29Z"
java
"2021-11-02T18:44:58Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,180
["docs/changelog/84434.yaml", "server/src/main/java/org/elasticsearch/action/admin/indices/shrink/ResizeNumberOfShardsCalculator.java", "server/src/main/java/org/elasticsearch/action/admin/indices/shrink/TransportResizeAction.java", "server/src/test/java/org/elasticsearch/action/admin/indices/shrink/ResizeNumberOfShardsCalculatorTests.java", "server/src/test/java/org/elasticsearch/action/admin/indices/shrink/TransportResizeActionTests.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ilm/AsyncBranchingStep.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ilm/ShrinkAction.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ilm/AsyncBranchingStepTests.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ilm/ShrinkActionTests.java", "x-pack/plugin/ilm/qa/multi-node/src/javaRestTest/java/org/elasticsearch/xpack/ilm/actions/ShrinkActionIT.java"]
[ILM] Shrink action fails with a single primary shard in conjunction with `max_primary_shard_size`
<!-- GitHub is reserved for bug reports and feature requests; it is not the place for general questions. If you have a question or an unconfirmed bug , please visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also check your OS is [supported](https://www.elastic.co/support/matrix#show_os). If it is not, the issue is likely to be closed. For security vulnerabilities please only send reports to [email protected]. See https://www.elastic.co/community/security for more information. Please fill in the following details to help us reproduce the bug: --> **Elasticsearch version** (`bin/elasticsearch --version`): `7.14.2` **Plugins installed**: [] **JVM version** (`java -version`): ESS **OS version** (`uname -a` if on a Unix-like system): ESS **Description of the problem including expected versus actual behavior**: The `shrink` ILM phase failed when trying to apply to an index with a single primary shard and a phase definition that utilises the `max_primary_shard_size` option. Exception recorded: ``` java.lang.IllegalArgumentException: can't shrink an index with only one shard at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.validateShrinkIndex(MetadataCreateIndexService.java:1147) at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.prepareResizeIndexSettings(MetadataCreateIndexService.java:1233) at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.aggregateIndexSettings(MetadataCreateIndexService.java:809) at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.applyCreateIndexRequestWithExistingMetadata(MetadataCreateIndexService.java:631) at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.applyCreateIndexRequest(MetadataCreateIndexService.java:334) at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.applyCreateIndexRequest(MetadataCreateIndexService.java:377) at org.elasticsearch.cluster.metadata.MetadataCreateIndexService$1.execute(MetadataCreateIndexService.java:294) at org.elasticsearch.cluster.ClusterStateUpdateTask.execute(ClusterStateUpdateTask.java:48) at org.elasticsearch.cluster.service.MasterService.executeTasks(MasterService.java:691) at org.elasticsearch.cluster.service.MasterService.calculateTaskOutputs(MasterService.java:313) at org.elasticsearch.cluster.service.MasterService.runTasks(MasterService.java:208) at org.elasticsearch.cluster.service.MasterService.access$000(MasterService.java:62) at org.elasticsearch.cluster.service.MasterService$Batcher.run(MasterService.java:140) at org.elasticsearch.cluster.service.TaskBatcher.runIfNotProcessed(TaskBatcher.java:139) at org.elasticsearch.cluster.service.TaskBatcher$BatchedTask.run(TaskBatcher.java:177) at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:673) at org.elasticsearch.common.util.concurrent.PrioritizedEsThreadPoolExecutor$TieBreakingPrioritizedRunnable.runAndClean(PrioritizedEsThreadPoolExecutor.java:241) at org.elasticsearch.common.util.concurrent.PrioritizedEsThreadPoolExecutor$TieBreakingPrioritizedRunnable.run(PrioritizedEsThreadPoolExecutor.java:204) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1130) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:630) at java.base/java.lang.Thread.run(Thread.java:831) ``` **Steps to reproduce**: Please include a *minimal* but *complete* recreation of the problem, including (e.g.) index creation, mappings, settings, query etc. The easier you make for us to reproduce it, the more likely that somebody will take the time to look at it. 1. Create an index with a single primary shard. 2. Define an ILM policy with the following `warm` phase: ```json { "policy": "metricbeat", "phase_definition": { "min_age": "0d", "actions": { "allocate": { "number_of_replicas": 1, "include": {}, "exclude": {}, "require": {} }, "forcemerge": { "max_num_segments": 1 }, "set_priority": { "priority": 25 }, "shrink": { "max_primary_shard_size": "50gb" } } }, "version": 18, "modified_date_in_millis": 1635781185067 } ``` 3. Associate ILM policy with index 4. Trigger rollover of index. **Provide logs (if relevant)**: Related: #33275
https://github.com/elastic/elasticsearch/issues/80180
https://github.com/elastic/elasticsearch/pull/84434
e7c4e8cdf8e939055a8cbde7e6da6c429fb05586
155638b2cacc2cc96e866cfd1f3b66155fc66360
"2021-11-02T11:11:21Z"
java
"2022-03-04T14:00:51Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,117
["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/Authentication.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/Subject.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authc/AuthenticationSerializationTests.java"]
Revisit and rationalise the Authentication class
We would like to revisit the `Authentication` class to make it provide better and easier to use interface to the consumers. #79809 enables run-as for all authentication schemes in addition to `realm` which is already supported. This adds more complexity to an `Authentication` object and how it should be used. For an example, building the role associated to an user now has to consider whether the user is the authenticated user or run-as user and the authentication scheme of the authenticated user. The existing `Authentication` class can answer all these question today. But its interface and internals are not aligned for these questions and the usage is error prone. For example, the `Authentication` object itself does not know whether the user has run-as. This information is kept by the `User` object. If the `User` object has an `authenticatedUser`, it's the run-as user. Otherwise it is not. But the information about realms for each `User` is directly kept in `Authentication`. Therefore, for full picture, the caller must check both `User` and `Authentication` realms and understands the nuance of their differenent combinations. - [x] Refactor CompositeRolesStore to separate roleDescriptors resolving (#80926) - [ ] Move effective role descriptor checking from Resolver to CompositeRolesStore - [x] https://github.com/elastic/elasticsearch/issues/81192 - [ ] Replace Authentication with AuthenticationContext in places other than CompositeRolesStore
https://github.com/elastic/elasticsearch/issues/80117
https://github.com/elastic/elasticsearch/pull/88494
cb5fc605337d039e8b6b9817daccd4125bf89584
8b0832d0e23605aa82136213c6347f8ecbead7b9
"2021-11-01T05:33:06Z"
java
"2022-07-14T02:35:22Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,073
["x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/action/TransformUpdater.java", "x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/persistence/IndexBasedTransformConfigManager.java"]
[CI] TransformSurvivesUpgradeIT testTransformRollingUpgrade failing
probably a regression of #80013 **Build scan:** https://gradle-enterprise.elastic.co/s/toqidjvpswti4/tests/:x-pack:qa:rolling-upgrade:v7.11.2%23upgradedClusterTest/org.elasticsearch.upgrades.TransformSurvivesUpgradeIT/testTransformRollingUpgrade **Reproduction line:** `./gradlew ':x-pack:qa:rolling-upgrade:v7.11.2#upgradedClusterTest' -Dtests.class="org.elasticsearch.upgrades.TransformSurvivesUpgradeIT" -Dtests.method="testTransformRollingUpgrade" -Dtests.seed=11151805F4A613BA -Dtests.bwc=true -Dtests.locale=und -Dtests.timezone=America/Indiana/Knox -Druntime.java=8` **Applicable branches:** 7.16 **Reproduces locally?:** Didn't try **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.upgrades.TransformSurvivesUpgradeIT&tests.test=testTransformRollingUpgrade **Failure excerpt:** ``` java.lang.AssertionError: Expected: a value greater than <7> but: <7> was equal to <7> at __randomizedtesting.SeedInfo.seed([11151805F4A613BA:BE682DBC5FE0C07E]:0) at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.lambda$verifyContinuousTransformHandlesData$8(TransformSurvivesUpgradeIT.java:248) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.lambda$awaitWrittenIndexerState$9(TransformSurvivesUpgradeIT.java:301) at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:1123) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.awaitWrittenIndexerState(TransformSurvivesUpgradeIT.java:293) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.verifyContinuousTransformHandlesData(TransformSurvivesUpgradeIT.java:243) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.testTransformRollingUpgrade(TransformSurvivesUpgradeIT.java:153) at sun.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368) at java.lang.Thread.run(Thread.java:748) ```
https://github.com/elastic/elasticsearch/issues/80073
https://github.com/elastic/elasticsearch/pull/80579
4f00058d22c3e53324c1650091b32c400e93adeb
44314120fc196ac866fcee372069772335e965ec
"2021-10-29T10:01:44Z"
java
"2021-11-10T14:29:45Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
81,966
["docs/reference/ingest.asciidoc", "docs/reference/ingest/processors/common-options.asciidoc", "docs/reference/ingest/processors/dissect.asciidoc"]
Minor issue with processor documentation
In all processor documentations where the processor supports conditional execution the documentation links to _Handling pipeline failures_ (#handling-pipeline-failures) where it should link to _Conditionally run a processor_ (#conditionally-run-processor) ![image](https://user-images.githubusercontent.com/2772669/139386509-0a07dc15-7950-4eaa-a0b6-64eb7bbfde6b.png) The example is taken from the append processor but it should be the same on all processors supporting conditional execution. For confirmed bugs, please report: - Version: 7.15 and some earlier version - Steps to Reproduce: see processor documentations like https://www.elastic.co/guide/en/elasticsearch/reference/current/append-processor.html
https://github.com/elastic/elasticsearch/issues/81966
https://github.com/elastic/elasticsearch/pull/82001
1c94fc3517d9b120b61fa0910d90d9af001f188c
f1004ee698ba391399d8099f948aeeb62536e7a0
"2021-10-29T06:33:04Z"
java
"2021-12-21T16:37:20Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
80,001
["build-tools-internal/src/main/java/org/elasticsearch/gradle/internal/test/DistroTestPlugin.java", "build-tools-internal/version.properties", "docs/changelog/80034.yaml"]
Upgrade Adoptium OpenJDK to 17.0.1+12
Adoptium OpenJDK 17.0.1+12 is now available. We need to upgrade the version that is bundled with Elasticsearch to the newer version. We currently bundle 17+35.
https://github.com/elastic/elasticsearch/issues/80001
https://github.com/elastic/elasticsearch/pull/80034
bdbd4e3a1d62c1174134d4d5645fa7ae343dd519
da58264fb665571a30e25781e26b5a3e7f253e93
"2021-10-28T10:01:44Z"
java
"2021-11-03T22:01:20Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
79,986
["modules/lang-painless/src/yamlRestTest/resources/rest-api-spec/test/painless/20_scriptfield.yml"]
[CI] LangPainlessClientYamlTestSuiteIT test {yaml=painless/20_scriptfield/Scripted Field with error accessing an unsupported field via the script fields api} failing
This failed on my PR and is reproducible **Build scan:** https://gradle-enterprise.elastic.co/s/co5sy2mcxu2xg/tests/:modules:lang-painless:yamlRestTest/org.elasticsearch.painless.LangPainlessClientYamlTestSuiteIT/test%20%7Byaml=painless%2F20_scriptfield%2FScripted%20Field%20with%20error%20accessing%20an%20unsupported%20field%20via%20the%20script%20fields%20api%7D **Reproduction line:** `./gradlew ':modules:lang-painless:yamlRestTest' --tests "org.elasticsearch.painless.LangPainlessClientYamlTestSuiteIT.test {yaml=painless/20_scriptfield/Scripted Field with error accessing an unsupported field via the script fields api}" -Dtests.seed=18C365613D7AD5B6 -Dtests.locale=de-DE -Dtests.timezone=SystemV/CST6 -Druntime.java=17` **Applicable branches:** master, 8.0 **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.painless.LangPainlessClientYamlTestSuiteIT&tests.test=test%20%7Byaml%3Dpainless/20_scriptfield/Scripted%20Field%20with%20error%20accessing%20an%20unsupported%20field%20via%20the%20script%20fields%20api%7D **Failure excerpt:** ``` java.lang.AssertionError: Failure at [painless/20_scriptfield:160]: expected [400] status code but api [search] returned [200 OK] [--- took: 12 timed_out: false _shards: total: 2 successful: 1 skipped: 0 failed: 1 failures: - shard: 0 index: "test" node: "8soJAuywRHKzkmoG2YSV7g" reason: type: "script_exception" reason: "runtime error" script_stack: - "org.elasticsearch.script.field.DelegateDocValuesField.getValue(DelegateDocValuesField.java:56)" - "field('foo').getValue('')" - " ^---- HERE" script: "field('foo').getValue('')" lang: "painless" position: offset: 12 start: 0 end: 25 caused_by: type: "unsupported_operation_exception" reason: "field [foo] is not supported through the fields api, use [doc] instead" hits: total: 1 max_score: 1.0 hits: [] ] at __randomizedtesting.SeedInfo.seed([18C365613D7AD5B6:90975ABB9386B84E]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) Caused by: java.lang.AssertionError: expected [400] status code but api [search] returned [200 OK] [--- took: 12 timed_out: false _shards: total: 2 successful: 1 skipped: 0 failed: 1 failures: - shard: 0 index: "test" node: "8soJAuywRHKzkmoG2YSV7g" reason: type: "script_exception" reason: "runtime error" script_stack: - "org.elasticsearch.script.field.DelegateDocValuesField.getValue(DelegateDocValuesField.java:56)" - "field('foo').getValue('')" - " ^---- HERE" script: "field('foo').getValue('')" lang: "painless" position: offset: 12 start: 0 end: 25 caused_by: type: "unsupported_operation_exception" reason: "field [foo] is not supported through the fields api, use [doc] instead" hits: total: 1 max_score: 1.0 hits: [] ] at org.junit.Assert.fail(Assert.java:88) at org.elasticsearch.test.rest.yaml.section.DoSection.execute(DoSection.java:365) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/79986
https://github.com/elastic/elasticsearch/pull/80026
985200b1fc5a1d935b8d9dcb1f616ebade742553
9511c546806fc1cff3b8db3c77e9c6cea6e96eaf
"2021-10-28T06:32:48Z"
java
"2021-10-28T16:36:50Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
79,948
["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/SecurityContext.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/SecurityContextTests.java"]
`x-opaque-id` header breaks CCS in mixed version cluster
**Elasticsearch version** (`bin/elasticsearch --version`): 7.16.0 bc1 (also potentially 7.15.2) **Description of the problem including expected versus actual behavior**: Presence of `x-opaque-id` header changes cross cluster search behavior in **mixed version cluster** When header is missing cross cluster search works as expected, When header is present cross cluster search doesn't work **Steps to reproduce**: 1. Assume 7.16 has a 7.15 as a remote cluster named `7_15` 2. Assume `7_15` has data in `my-index` index 3. Run against 7.16: ``` GET /_resolve/index/7_15:* HTTP/1.1 Host: localhost:9200 ``` Observe correct result with return indices from 7.15 cluster resolved 4. Now run against 7.16 adding `x-opaque-id` header: ``` GET /_resolve/index/7_15:* HTTP/1.1 Host: localhost:9200 x-opaque-id: test ``` Observe empty results **Additional context**: 1. This popped up in Kibana: https://github.com/elastic/kibana/issues/116399, where it can't resolve CCS indices via index pattern creation UI, but can using Dev tools. I found that the difference in the requests that causing this is `x-opaque-id` header: https://github.com/elastic/kibana/issues/116399#issuecomment-953084400 2. I didn't reproduce with 7.15.1 -> 7.14, but I did reproduce with 7.15 snapshot -> 7.14. Likely the bug is introduced in 7.15.2 3. Possibly related pull request: https://github.com/elastic/elasticsearch/pull/79412/
https://github.com/elastic/elasticsearch/issues/79948
https://github.com/elastic/elasticsearch/pull/79973
71c702263b3d9fbd0d8ee8525b6b60a95ef02ada
5cc0c38417293a5ec893b1c7f62297b83aab9f4c
"2021-10-27T18:53:49Z"
java
"2021-10-28T06:11:07Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
79,932
["x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ml/datafeed/AggProviderWireSerializationTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/action/TransportStartDataFrameAnalyticsActionTests.java"]
[CI] AggProviderWireSerializationTests testBwcSerialization failing
Looks like there's some specific logic here for versions starting at 8.0.0 which 8.1.0 is now BWC compatible with that might need tweaking. **Build scan:** https://gradle-enterprise.elastic.co/s/x5c4pefiwp3du/tests/:x-pack:plugin:core:test/org.elasticsearch.xpack.core.ml.datafeed.AggProviderWireSerializationTests/testBwcSerialization **Reproduction line:** `./gradlew ':x-pack:plugin:core:test' --tests "org.elasticsearch.xpack.core.ml.datafeed.AggProviderWireSerializationTests.testBwcSerialization" -Dtests.seed=91BBD8ECCCA36918 -Dtests.locale=de-DE -Dtests.timezone=Pacific/Guam -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.core.ml.datafeed.AggProviderWireSerializationTests&tests.test=testBwcSerialization **Failure excerpt:** ``` java.lang.AssertionError: 8.0.0 expected:<AggProvider{parsingException=null, parsedAggs={ "ixquIE" : { "avg" : { "field" : "cu" } } }, aggs={ixquIE={avg={field=cu}}}, rewroteAggs=true}> but was:<AggProvider{parsingException=null, parsedAggs={ "ixquIE" : { "avg" : { "field" : "cu" } } }, aggs={ixquIE={avg={field=cu}}}, rewroteAggs=false}> at __randomizedtesting.SeedInfo.seed([91BBD8ECCCA36918:6CF71F598A941E2E]:0) at org.junit.Assert.fail(Assert.java:88) at org.junit.Assert.failNotEquals(Assert.java:834) at org.junit.Assert.assertEquals(Assert.java:118) at org.elasticsearch.xpack.core.ml.AbstractBWCWireSerializationTestCase.assertOnBWCObject(AbstractBWCWireSerializationTestCase.java:71) at org.elasticsearch.xpack.core.ml.AbstractBWCWireSerializationTestCase.assertBwcSerialization(AbstractBWCWireSerializationTestCase.java:61) at org.elasticsearch.xpack.core.ml.AbstractBWCWireSerializationTestCase.testBwcSerialization(AbstractBWCWireSerializationTestCase.java:49) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/79932
https://github.com/elastic/elasticsearch/pull/79944
a8258bde1643f8cf5eda0ee437e7c2458f62fada
24ed875616d837d2dc39a1440d6411dddbb8698c
"2021-10-27T16:57:20Z"
java
"2021-10-27T19:38:36Z"
closed
elastic/elasticsearch
https://github.com/elastic/elasticsearch
79,931
["docs/reference/ml/df-analytics/apis/put-dfanalytics.asciidoc"]
[CI] DocsClientYamlTestSuiteIT test {yaml=reference/ml/df-analytics/apis/put-dfanalytics/line_641} failing
Started failing after 8.1.0 version bump **Build scan:** https://gradle-enterprise.elastic.co/s/l6szaago52kay/tests/:docs:integTest/org.elasticsearch.smoketest.DocsClientYamlTestSuiteIT/test%20%7Byaml=reference%2Fml%2Fdf-analytics%2Fapis%2Fput-dfanalytics%2Fline_641%7D **Reproduction line:** `./gradlew ':docs:integTest' --tests "org.elasticsearch.smoketest.DocsClientYamlTestSuiteIT.test {yaml=reference/ml/df-analytics/apis/put-dfanalytics/line_641}" -Dtests.seed=4484A5B1FD32AFA9 -Dtests.locale=vi-VN -Dtests.timezone=Pacific/Funafuti -Druntime.java=17` **Applicable branches:** master **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.smoketest.DocsClientYamlTestSuiteIT&tests.test=test%20%7Byaml%3Dreference/ml/df-analytics/apis/put-dfanalytics/line_641%7D **Failure excerpt:** ``` java.lang.RuntimeException: Failure at [reference/ml/df-analytics/apis/put-dfanalytics:112]: No value present at __randomizedtesting.SeedInfo.seed([4484A5B1FD32AFA9:CCD09A6B53CEC251]:0) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:491) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor14.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) Caused by: java.util.NoSuchElementException: No value present at java.util.OptionalInt.getAsInt(OptionalInt.java:130) at io.github.nik9000.mapmatcher.MapMatcher.describePotentialMismatch(MapMatcher.java:218) at io.github.nik9000.mapmatcher.MapMatcher.describeEntryValue(MapMatcher.java:296) at io.github.nik9000.mapmatcher.MapMatcher.describePotentialMismatch(MapMatcher.java:227) at io.github.nik9000.mapmatcher.MapMatcher.describeEntryValue(MapMatcher.java:296) at io.github.nik9000.mapmatcher.MapMatcher.describePotentialMismatch(MapMatcher.java:227) at io.github.nik9000.mapmatcher.MapMatcher.describeEntryValue(MapMatcher.java:296) at io.github.nik9000.mapmatcher.MapMatcher.describePotentialMismatch(MapMatcher.java:227) at io.github.nik9000.mapmatcher.MapMatcher.describeMismatchSafely(MapMatcher.java:210) at io.github.nik9000.mapmatcher.MapMatcher.describeMismatchSafely(MapMatcher.java:29) at org.hamcrest.TypeSafeMatcher.describeMismatch(TypeSafeMatcher.java:82) at io.github.nik9000.mapmatcher.MapMatcher.assertMap(MapMatcher.java:77) at io.github.nik9000.mapmatcher.MapMatcher.assertMap(MapMatcher.java:62) at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:94) at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478) at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462) at jdk.internal.reflect.GeneratedMethodAccessor14.invoke(null:-1) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
https://github.com/elastic/elasticsearch/issues/79931
https://github.com/elastic/elasticsearch/pull/79943
bc78c43e51d3a547e27c721ad760c7eac9c42158
6b20e8e1b0fc8987f820bbb6fe243551b621158b
"2021-10-27T16:47:09Z"
java
"2021-10-27T18:45:15Z"