status
stringclasses 1
value | repo_name
stringclasses 13
values | repo_url
stringclasses 13
values | issue_id
int64 1
104k
| updated_files
stringlengths 11
1.76k
| title
stringlengths 4
369
| body
stringlengths 0
254k
⌀ | issue_url
stringlengths 38
55
| pull_url
stringlengths 38
53
| before_fix_sha
stringlengths 40
40
| after_fix_sha
stringlengths 40
40
| report_datetime
unknown | language
stringclasses 5
values | commit_datetime
unknown |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 82,170 | ["docs/reference/data-management/migrate-index-allocation-filters.asciidoc", "docs/reference/ilm/apis/migrate-to-data-tiers.asciidoc", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/cluster/action/MigrateToDataTiersResponse.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/cluster/action/MigrateToDataTiersResponseTests.java", "x-pack/plugin/ilm/qa/multi-node/src/javaRestTest/java/org/elasticsearch/xpack/MigrateToDataTiersIT.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingService.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/action/TransportMigrateToDataTiersAction.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingServiceTests.java"] | Migrate to data tiers routing API updates all templates in a system to not use custom attribute routing | Currently, the migrate to data tiers routing [API](https://www.elastic.co/guide/en/elasticsearch/reference/7.16/ilm-migrate-to-data-tiers.html) only deletes a legacy template (if one is specified). It doesn't inspect the index templates in the system.
However there might still be the case that templates relying on node attributes are installed in the system via a restore of an old snapshot or accidentally. This would conflict with a system that is already using data tiers.
This proposes that the migrate to data tiers API iterates over all the legacy tempates, composable templates, and component templates and removes the occurrences of the `include`, `required`, and `excludes` routing configuration for the configurated node attribute.
eg. the following template
```
"test_timplate": {
"order": 0,
"index_patterns": [
"*"
],
"settings": {
"index": {
"routing": {
"allocation": {
"require": {
"data": "hot"
}
}
},
"lifecycle": {
"name" : "the_index_lifecycle_policy"
}
}
},
"mappings": {},
"aliases": {}
}
```
would be updated to
```
"test_timplate": {
"order": 0,
"index_patterns": [
"*"
],
"settings": {
"index": {
"lifecycle": {
"name" : "the_index_lifecycle_policy"
}
}
},
"mappings": {},
"aliases": {}
}
``` | https://github.com/elastic/elasticsearch/issues/82170 | https://github.com/elastic/elasticsearch/pull/82472 | 1f90840ba0c58d0d1dd8e2265906eeac7a309eb2 | 3087f164f7abf44ec405184550b7150a8c7bbc2d | "2021-12-31T15:16:20Z" | java | "2022-01-13T10:45:10Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 82,169 | ["docs/reference/ilm/apis/migrate-to-data-tiers.asciidoc", "x-pack/plugin/ilm/qa/multi-node/src/javaRestTest/java/org/elasticsearch/xpack/MigrateToDataTiersIT.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingService.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/action/TransportMigrateToDataTiersAction.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingServiceTests.java"] | Migrate to data tiers routing dry run should not require ILM to be stopped | The migrate to data tiers routing [API](https://www.elastic.co/guide/en/elasticsearch/reference/7.16/ilm-migrate-to-data-tiers.html) has a `dry_run` option that is very useful in scoping what would the API change.
Currently running the API with `dry_run=true` requires ILM to be stopped (just as a "live run" of the API).
We should change this so the `dry_run` of the API is not expensive in terms of operations in order to be able to call the "live run" of the API only if the `dry_run` returns any entities that would be migrated.
| https://github.com/elastic/elasticsearch/issues/82169 | https://github.com/elastic/elasticsearch/pull/82226 | d84b875698306877cdf1a3da0a89ffe2ef5413d0 | f18c9c503ee9d8fd1f0da1ad1cd7eba510b75e35 | "2021-12-31T14:23:05Z" | java | "2022-01-05T13:40:27Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 82,151 | ["rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/cat.allocation/10_basic.yml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/cat.indices/10_basic.yml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/cat.indices/20_hidden.yml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/cat.shards/10_basic.yml"] | YAML test failure "cat.shards/10_basic/Test cat shards output" | **Build scan**: https://gradle-enterprise.elastic.co/s/cvatdzy4g77wu
**Repro line**: `./gradlew ':rest-api-spec:yamlRestTest' --tests "org.elasticsearch.test.rest.ClientYamlTestSuiteIT" -Dtests.method="test {yaml=cat.shards/10_basic/Test cat shards output}" -Dtests.seed=1751BA43AF68208E -Dtests.locale=ar-IQ -Dtests.timezone=Asia/Chita -Druntime.java=17`
**Reproduces locally?**: no
**Applicable branches**: master
**Failure history**: https://gradle-enterprise.elastic.co/scans/tests?search.relativeStartTime=P7D&search.timeZoneId=America/Chicago&tests.container=org.elasticsearch.test.rest.ClientYamlTestSuiteIT&tests.sortField=FAILED&tests.test=test%20%7Byaml%3Dcat.shards/10_basic/Test%20cat%20shards%20output%7D&tests.unstableOnly=true
**Failure excerpt**:
```
Exception
java.lang.AssertionError: Failure at [cat.shards/10_basic:95]: field [$body] was expected to match the provided regex but didn't
Expected: ^$
but: was ".tasks 0 p STARTED 127.0.0.1 yamlRestTest-0\n"
at __randomizedtesting.SeedInfo.seed([1751BA43AF68208E:9F05859901944D76]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
•••
Caused by: java.lang.AssertionError: field [$body] was expected to match the provided regex but didn't
Expected: ^$
but: was ".tasks 0 p STARTED 127.0.0.1 yamlRestTest-0\n"
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
•••
at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:64)
at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
•••
Output View rawDownload raw
[2021-12-31T01:00:42,291][INFO ][o.e.t.r.ClientYamlTestSuiteIT] [test] [yaml=cat.shards/10_basic/Test cat shards output] before test
[2021-12-31T01:00:42,317][INFO ][o.e.t.r.ClientYamlTestSuiteIT] [test] Stash dump on test failure [{
"stash" : {
"body" : ".tasks 0 p STARTED 127.0.0.1 yamlRestTest-0
"
}
}]
```
| https://github.com/elastic/elasticsearch/issues/82151 | https://github.com/elastic/elasticsearch/pull/84539 | 8a1632235daa140f3904cfe46f8215537c75ded3 | c4b1f18f32aa337253664d1295bc1b59233b3d44 | "2021-12-30T16:25:15Z" | java | "2022-03-24T19:08:51Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 82,107 | ["server/src/test/java/org/elasticsearch/common/logging/LoggersTests.java"] | LoggersTests incompatible with tests.iters | **Repro line**:
```
./gradlew ':server:test' --tests "org.elasticsearch.common.logging.LoggersTests" -Dtests.iters=2
```
**Reproduces locally?**:
yes
**Applicable branches**:
master, more?
| https://github.com/elastic/elasticsearch/issues/82107 | https://github.com/elastic/elasticsearch/pull/85092 | 30bb7db9eba7b1f454e8e70f5b96f7be54220190 | aff8fe3f892038247b6c7afd03b61e2ddd797a13 | "2021-12-28T18:03:33Z" | java | "2022-03-21T10:10:04Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 82,065 | ["x-pack/plugin/ilm/src/internalClusterTest/java/org/elasticsearch/xpack/ilm/IndexLifecycleInitialisationTests.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/action/TransportPutLifecycleAction.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/ilm/action/TransportPutLifecycleActionTests.java"] | Updating unchanged ILM policies is not idempotent. | **Elasticsearch version** (`bin/elasticsearch --version`): docker.elastic.co/elasticsearch/elasticsearch:7.16.2-amd64
**Plugins installed**: Whatever the docker container ships
**JVM version** (`java -version`): Whatever the docker container ships
**OS version** (`uname -a` if on a Unix-like system): Whatever the docker container ships
**Description of the problem including expected versus actual behavior**:
Updating an ILM policy always increases the version of the stored policy. @DaveCTurner suggested to open an issue here. I did not check if other operations (updating index templates and mappings) are idempotent or not.
**Steps to reproduce**:
1. `docker run --rm -it -p 9200:9200 -e "discovery.type=single-node" -e "logger.org.elasticsearch=DEBUG" docker.elastic.co/elasticsearch/elasticsearch:7.16.2-amd64`
2. Execute:
```
curl -XPUT "http://localhost:9200/_ilm/policy/my_policy" -H 'Content-Type: application/json' -d'{ "policy" : { "phases" : { "warm" : { "min_age" : "10d", "actions" : { "forcemerge" : { "max_num_segments" : 1 } } }, "delete" : { "min_age" : "30d", "actions" : { "delete" : { "delete_searchable_snapshot" : true } } } } }}'
```
multiple times
3. Check the ILM version: `curl http://localhost:9200/_ilm/policy/my_policy`
4. The returned version is greater than 1 even though nothing changed
**Provide logs (if relevant)**:
```
{"type": "server", "timestamp": "2021-12-23T13:49:21,187Z", "level": "DEBUG", "component": "o.e.c.s.MasterService", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "executing cluster state update for [put-lifecycle-my_policy]", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" }
{"type": "server", "timestamp": "2021-12-23T13:49:21,188Z", "level": "INFO", "component": "o.e.x.i.a.TransportPutLifecycleAction", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "updating index lifecycle policy [my_policy]", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" }
{"type": "server", "timestamp": "2021-12-23T13:49:21,189Z", "level": "DEBUG", "component": "o.e.x.c.i.PhaseCacheManagement", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "policy [my_policy] is unchanged and no phase definition refresh is needed", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" }
{"type": "server", "timestamp": "2021-12-23T13:49:21,189Z", "level": "DEBUG", "component": "o.e.c.s.MasterService", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "took [1ms] to compute cluster state update for [put-lifecycle-my_policy]", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" }
{"type": "server", "timestamp": "2021-12-23T13:49:21,189Z", "level": "DEBUG", "component": "o.e.c.s.MasterService", "cluster.name": "docker-cluster", "node.name": "bf70a0fe0f7e", "message": "cluster state updated, version [65], source [put-lifecycle-my_policy]", "cluster.uuid": "aXsX_Ks1QpiwA-BiYs8kDQ", "node.id": "AgZJParzQPy5L6a5EMU0Lw" }
```
| https://github.com/elastic/elasticsearch/issues/82065 | https://github.com/elastic/elasticsearch/pull/82240 | c937a099af86708aa91f9536426e684dc7b95749 | c8afd3adbcd653b862aa216e913b9511e97dba6a | "2021-12-23T13:53:57Z" | java | "2022-01-05T23:34:29Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 82,059 | ["server/src/main/java/org/elasticsearch/indices/cluster/IndicesClusterStateService.java"] | [CI] BasicDistributedJobsIT testFailOverBasics_withDataFeeder failing | **Build scan:**
https://gradle-enterprise.elastic.co/s/ahbd2x6onqf7o/tests/:x-pack:plugin:ml:internalClusterTest/org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT/testFailOverBasics_withDataFeeder
**Reproduction line:**
`./gradlew ':x-pack:plugin:ml:internalClusterTest' --tests "org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT.testFailOverBasics_withDataFeeder" -Dtests.seed=9E164F100A38775F -Dtests.locale=ar-KW -Dtests.timezone=US/Michigan -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
Didn't try
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT&tests.test=testFailOverBasics_withDataFeeder
**Failure excerpt:**
```
java.lang.AssertionError: unexpected
at org.elasticsearch.test.InternalTestCluster.removeExclusions(InternalTestCluster.java:1903)
at org.elasticsearch.test.InternalTestCluster.stopNodesAndClients(InternalTestCluster.java:1775)
at org.elasticsearch.test.InternalTestCluster.stopNodesAndClient(InternalTestCluster.java:1762)
at org.elasticsearch.test.InternalTestCluster.stopRandomDataNode(InternalTestCluster.java:1634)
at org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT.testFailOverBasics_withDataFeeder(BasicDistributedJobsIT.java:142)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.util.concurrent.ExecutionException: org.elasticsearch.ElasticsearchTimeoutException: timed out waiting for removal of nodes; if nodes should not be removed, set waitForRemoval to false. [{node_t0}{IOp-GFUyRKOWJXN2jJ4Gpw}]
at org.elasticsearch.common.util.concurrent.BaseFuture$Sync.getValue(BaseFuture.java:257)
at org.elasticsearch.common.util.concurrent.BaseFuture$Sync.get(BaseFuture.java:244)
at org.elasticsearch.common.util.concurrent.BaseFuture.get(BaseFuture.java:75)
at org.elasticsearch.test.InternalTestCluster.removeExclusions(InternalTestCluster.java:1901)
at org.elasticsearch.test.InternalTestCluster.stopNodesAndClients(InternalTestCluster.java:1775)
at org.elasticsearch.test.InternalTestCluster.stopNodesAndClient(InternalTestCluster.java:1762)
at org.elasticsearch.test.InternalTestCluster.stopRandomDataNode(InternalTestCluster.java:1634)
at org.elasticsearch.xpack.ml.integration.BasicDistributedJobsIT.testFailOverBasics_withDataFeeder(BasicDistributedJobsIT.java:142)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
Caused by: org.elasticsearch.ElasticsearchTimeoutException: timed out waiting for removal of nodes; if nodes should not be removed, set waitForRemoval to false. [{node_t0}{IOp-GFUyRKOWJXN2jJ4Gpw}]
at org.elasticsearch.action.admin.cluster.configuration.TransportClearVotingConfigExclusionsAction$1.onTimeout(TransportClearVotingConfigExclusionsAction.java:114)
at org.elasticsearch.cluster.ClusterStateObserver$ContextPreservingListener.onTimeout(ClusterStateObserver.java:345)
at org.elasticsearch.cluster.ClusterStateObserver$ObserverClusterStateListener.onTimeout(ClusterStateObserver.java:263)
at org.elasticsearch.cluster.service.ClusterApplierService$NotifyTimeout.run(ClusterApplierService.java:651)
at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:716)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/82059 | https://github.com/elastic/elasticsearch/pull/82056 | 62368ae1fd8e061e0976ce430e3a6853e4afc0e8 | e97b4d50914e771e0c084c858fc0a1abd8e37b34 | "2021-12-23T11:39:52Z" | java | "2021-12-23T11:45:05Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 82,044 | ["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/accesscontrol/FieldSubsetReader.java", "x-pack/plugin/searchable-snapshots/qa/rest/src/yamlRestTest/resources/rest-api-spec/test/field_level_security.yml"] | Document Field Level Security on Frozen Tier not working correctly | **Elasticsearch version** (`bin/elasticsearch --version`): 7.16.2 (running inside Elastic Cloud)
**Plugins installed**: []
**JVM version** (`java -version`): n/a (Elastic Cloud)
**OS version** (`uname -a` if on a Unix-like system): n/a (Elastic Cloud)
**Description of the problem including expected versus actual behavior**:
I seem to be running into an issue where Field Level Security throws a null exception when operating on frozen indices.
I have a simple ILM policy for my index that moves data from Hot to Frozen after 12 hours. Within that data set, I would like to grant access to all fields except for a few specific ones that I would like to remain internal only.
If I create a new user and grant them a custom role with field level security (allowing and denying specific fields), that user cannot search for anything beyond my hot data tier without getting the following exception back
```
"reason": "unsupported_operation_exception: null"
```
Within the data access role, If I disable `Grant access to specific fields`, the user can see and return results from the frozen tier.
I will note that in my current environment, this role also is using a `Grant read privileges to specific documents` templated query, however that does not seem to have an impact on this issue. I have tried to produce a working example below that does not involve that privilege.
**Steps to reproduce**:
1. Create a simple ILM policy that rolls data out of a hot index and into a frozen index
2. Index data into your ILM managed index so that you have both hot data AND frozen data within your cluster. If my ILM index alias was called `pulse`, my underlying indices are `pulse-0001`, `pulse-0002`, etc and the frozen indices look like `partial-pulse-0001`, `partial-pulse-0002`... etc
3. Create a new role that grants read access to you your desired indices, like below (I am using Kibana):
<img width="1399" alt="Screen Shot 2021-12-22 at 1 24 46 PM" src="https://user-images.githubusercontent.com/3504194/147138332-7718ada6-0d8d-4775-b3a3-0311738e9706.png">
4. Create a new user, and assign them typical access to a kibana space and grant them the data role from step 3
5. In a new private browser, log in as your new user and validate they have access to your frozen tier data and hot tier data, by viewing the Discover panel and looking at a timerange that spans hot and frozen tiers. (24 hrs in my case, see below as an example)
<img width="1480" alt="Screen Shot 2021-12-22 at 1 29 14 PM" src="https://user-images.githubusercontent.com/3504194/147138759-6dd4c7d2-09a6-4078-967d-0829b4978c16.png">
6. Go back to the role you created as an admin, and check the box `Grant access to specific fields`. Deny a field in your data (see below as an example)
<img width="1193" alt="Screen Shot 2021-12-22 at 1 30 29 PM" src="https://user-images.githubusercontent.com/3504194/147138977-da783c36-626e-49bb-9295-35872e000412.png">
7. Back as your new user, refresh the page to see shard exceptions being thrown for all your frozen indices (even though my time range is still set to 24 hours, I get exceptions for my entire frozen tier)
<img width="1485" alt="Screen Shot 2021-12-22 at 1 31 46 PM" src="https://user-images.githubusercontent.com/3504194/147139213-4c47a230-47f7-4346-9414-03b32d4f497c.png">
Note in the screenshot above that my data is cut off arbitrarily, right near my frozen tier rollover line from my ILM policy
8. Investigate the exception further and you get the following
<img width="861" alt="image" src="https://user-images.githubusercontent.com/3504194/147139308-6ab996fc-bdb1-467a-9250-061463e55a64.png">
9. Clicking the tab for "Request" shows very normal request, and the "Response" tab looks like below:
<img width="758" alt="Screen Shot 2021-12-22 at 1 35 18 PM" src="https://user-images.githubusercontent.com/3504194/147139434-383d6cec-7bbc-4081-9e72-8c9a1315740e.png">
10. From the command line, I can search the cluster easily if I use a simple count search on a hot tier index
```
curl https://user:[email protected]:9243/pulse-000252/_count
# returns
{"count":<real number here>,"_shards":{"total":1,"successful":1,"skipped":0,"failed":0}}
```
But if I try to do an operation on the whole alias that includes frozen shards, I get shard exceptions.
```
curl https://user:[email protected]:9243/pulse/_count
# returns
{"count":<partial number here>,"_shards":{"total":248,"successful":14,"skipped":0,"failed":234,"failures":[{"shard":0,"index":"partial-pulse-000015","node":"XCRMYhdLR3KHuHxm74vlCg","reason":{"type":"unsupported_operation_exception","reason":"unsupported_operation_exception: null"}},{"shard":0,"index":"partial-pulse-000016","node":"9SNaA5L9TCqZ8l0BA39c1Q","reason":{"type":"unsupported_operation_exception","reason":"unsupported_operation_exception: null"}},{"shard":0,"index":"partial-pulse-000017","node":"XCRMYhdLR3KHuHxm74vlCg","reason":{"type":"unsupported_operation_exception","reason":"unsupported_operation_exception: null"}},.....
```
11. For sanity you can go back to your role configuration and uncheck "Grant access to specific fields" and run that _count command again:
```
curl https://user:[email protected]:9243/pulse/_count
{"count":<real number here>,"_shards":{"total":248,"successful":248,"skipped":0,"failed":0}}
```
and it works.
I have also tried combing through the built in [roles](https://www.elastic.co/guide/en/elasticsearch/reference/7.16/built-in-roles.html) for Elastic, as well as the built in [index priviledges](https://www.elastic.co/guide/en/elasticsearch/reference/7.16/security-privileges.html#privileges-list-indices) to see if there was anything related to the frozen tier specifically that causes this behavior, without much luck.
**Provide logs (if relevant)**:
I have tried to comb the logs inside of Elastic Cloud but the UI does not seem to be surfacing this exception where I can find it.
| https://github.com/elastic/elasticsearch/issues/82044 | https://github.com/elastic/elasticsearch/pull/82521 | d07d27ec1df0a7dc1967280ae70709997719271f | 8a7388cfaa67334fcb4dd6980e1403b8d91b9b9b | "2021-12-22T18:58:59Z" | java | "2022-01-13T16:50:52Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 82,019 | ["docs/reference/snapshot-restore/apis/restore-snapshot-api.asciidoc", "server/src/internalClusterTest/java/org/elasticsearch/snapshots/SnapshotCustomPluginStateIT.java", "server/src/internalClusterTest/java/org/elasticsearch/snapshots/SystemIndicesSnapshotIT.java", "server/src/main/java/org/elasticsearch/snapshots/RestoreService.java", "server/src/test/java/org/elasticsearch/snapshots/RestoreServiceTests.java", "x-pack/plugin/data-streams/src/internalClusterTest/java/org/elasticsearch/datastreams/DataStreamsSnapshotsIT.java", "x-pack/plugin/ilm/qa/multi-node/src/javaRestTest/java/org/elasticsearch/xpack/ilm/actions/SearchableSnapshotActionIT.java"] | Fail with error when restoring global state from a snapshot that does not have one | Currently elasticsearch allow to restore a global state from a snapshot that does not have one.
This silently succeed without changing anything. Once https://github.com/elastic/elasticsearch/issues/81247 is fixed this could result in nullifying entire cluster state.
**Elasticsearch version** (`bin/elasticsearch --version`): 8.x and likely earlier
**Description of the problem including expected versus actual behavior**:
**Steps to reproduce**:
* create a cluster with a snapshot repository
* create a snapshot with `"include_global_state": false`
* restore the snapshot with `"include_global_state": true`
Elasticsearch should return an error in such case, but currently silently succeed without changing the global state.
| https://github.com/elastic/elasticsearch/issues/82019 | https://github.com/elastic/elasticsearch/pull/82037 | 97a546ef674b6c727796e92ea91028aaa0256a52 | e7d89910c2e6e1ae0d51e812d92cb603402c0f7d | "2021-12-22T10:39:15Z" | java | "2022-01-17T14:33:19Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,983 | ["x-pack/plugin/rollup/src/main/java/org/elasticsearch/xpack/rollup/job/RollupJobTask.java", "x-pack/plugin/rollup/src/test/java/org/elasticsearch/xpack/rollup/job/RollupIndexerIndexingTests.java", "x-pack/plugin/rollup/src/test/java/org/elasticsearch/xpack/rollup/job/RollupIndexerStateTests.java", "x-pack/plugin/rollup/src/test/java/org/elasticsearch/xpack/rollup/job/RollupJobTaskTests.java"] | [CI] XPackRestIT test {p0=rollup/security_tests/Index-based access} failing | **Build scan:**
https://gradle-enterprise.elastic.co/s/xpw2rkkkk3pou/tests/:x-pack:plugin:yamlRestTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=rollup%2Fsecurity_tests%2FIndex-based%20access%7D
**Reproduction line:**
`./gradlew ':x-pack:plugin:yamlRestTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=rollup/security_tests/Index-based access}" -Dtests.seed=852F23C0292A926E -Dtests.locale=en-NZ -Dtests.timezone=Africa/Blantyre -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
No
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Drollup/security_tests/Index-based%20access%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [rollup/security_tests:164]:
Expected: <1>
but: was <0>
at __randomizedtesting.SeedInfo.seed([852F23C0292A926E:D7B1C1A87D6FF96]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.lang.AssertionError:
Expected: <1>
but: was <0>
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:99)
at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/81983 | https://github.com/elastic/elasticsearch/pull/86992 | d1bb8f4b1d63bf2d269085f4411deb5c2358618d | 6aca35c68197dca04d1c97c6b85b542a97abc42d | "2021-12-21T11:15:08Z" | java | "2022-07-06T08:33:23Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,981 | ["docs/changelog/82132.yaml", "server/build.gradle", "server/src/main/java/org/elasticsearch/index/engine/LazySoftDeletesDirectoryReaderWrapper.java", "server/src/main/java/org/elasticsearch/index/engine/ReadOnlyEngine.java", "server/src/test/java/org/elasticsearch/lucene/index/LazySoftDeletesDirectoryReaderWrapperTests.java", "test/framework/src/main/java/org/elasticsearch/index/engine/EngineTestCase.java"] | Fix split package LazySoftDeletesDirectoryReaderWrapper | The last split package issue that we have between server and lucene is LazySoftDeletesDirectoryReaderWrapper. This was added early in 2021, so not one of the legacy hangovers from years gone by.
By inspecting the code, the three package-private member dependencies in `org.apache.lucene.index` become clear:
1. access to field SegmentReader.isNRT,
2. CacheKey::new, and
3. PendingSoftDeletes::applySoftDeletes.
First, LazySoftDeletesDirectoryReaderWrapper is only useful for read-only indices that are lazily loaded (a.k.a. frozen tier), so it is doubtful that Lucene would find it generally useful.
A note on each of the specific package-private API points:
1. Access to field SegmentReader.isNRT is only for assertion code, and exposing an accessor from Lucene for this seems like it could be reasonable.
2. The CacheKey constructor is deliberately non-accessible from outside the package. There were past issues where problems arose with short-lived reader wrappers that would not reuse caches across queries. Maybe there's a way to make DelegatingCacheHelper only work with a DirectoryReader, since directory readers would generally not be short-lived. Or otherwise exposing DelegatingCacheHelper as a more generally useful API in Lucene itself.
3. For PendingSoftDeletes::applySoftDeletes one possibility is to just duplicate the code in ES. There are additional package-private issues when this is attempted, but maybe they are more straightforward to resolve.
[ the above notes are a summary of a discussion that included @romseygeek @jpountz, and @ywelsch ]
see #78166 | https://github.com/elastic/elasticsearch/issues/81981 | https://github.com/elastic/elasticsearch/pull/82132 | 223c2e45b90a32981a4c034348c1b606cd16059e | 487077cc056b4c7ff3f47ba1635d2df18c01fe4b | "2021-12-21T10:50:20Z" | java | "2022-03-07T14:22:21Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,978 | ["docs/reference/query-dsl/regexp-syntax.asciidoc"] | RegExp optional operations documentation fails to mention `NONE` | <!--
GitHub is reserved for bug reports and feature requests; it is not the place
for general questions. If you have a question or an unconfirmed bug , please
visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also
check your OS is [supported](https://www.elastic.co/support/matrix#show_os).
If it is not, the issue is likely to be closed.
For security vulnerabilities please only send reports to [email protected].
See https://www.elastic.co/community/security for more information.
Please fill in the following details to help us reproduce the bug:
-->
**Elasticsearch version** (`bin/elasticsearch --version`): 7.16
See documentation at https://www.elastic.co/guide/en/elasticsearch/reference/current/regexp-syntax.html#regexp-optional-operators. It should specify the `NONE` option for disabling all the flags.
Also, the implementations accepts `flags: ""` as a value which apparently maps to `ALL` (which I find quite illogical). I think `""` should either give an exception or maybe mean `NONE`.
| https://github.com/elastic/elasticsearch/issues/81978 | https://github.com/elastic/elasticsearch/pull/82265 | 1cbc10a17f7226aca690c9844709e2d4f1d162e9 | e53ecc3f430a534eedfb8a819043311c7f47b4ae | "2021-12-21T10:05:55Z" | java | "2022-01-18T19:15:29Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,949 | ["server/src/main/java/org/elasticsearch/index/store/Store.java", "x-pack/plugin/searchable-snapshots/src/main/java/org/elasticsearch/xpack/searchablesnapshots/store/input/BaseSearchableSnapshotIndexInput.java"] | [CI] FrozenSearchableSnapshotsIntegTests testCreateAndRestorePartialSearchableSnapshot failing | Happened in a Windows build - not sure if this is just slowness on the Windows worker or something more serious.
**Build scan:**
https://gradle-enterprise.elastic.co/s/xe3ov3qvjhque/tests/:x-pack:plugin:searchable-snapshots:internalClusterTest/org.elasticsearch.xpack.searchablesnapshots.FrozenSearchableSnapshotsIntegTests/testCreateAndRestorePartialSearchableSnapshot
**Reproduction line:**
`gradlew ':x-pack:plugin:searchable-snapshots:internalClusterTest' --tests "org.elasticsearch.xpack.searchablesnapshots.FrozenSearchableSnapshotsIntegTests.testCreateAndRestorePartialSearchableSnapshot" -Dtests.seed=83DAAD1A771DAD8D -Dtests.locale=ja-JP-u-ca-japanese-x-lvariant-JP -Dtests.timezone=Canada/Yukon -Druntime.java=8`
**Applicable branches:**
7.17
**Reproduces locally?:**
No
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.searchablesnapshots.FrozenSearchableSnapshotsIntegTests&tests.test=testCreateAndRestorePartialSearchableSnapshot
**Failure excerpt:**
```
java.lang.AssertionError: Shard [syxjwhutbk][5] is still locked after 5 sec waiting
at __randomizedtesting.SeedInfo.seed([83DAAD1A771DAD8D:F75D6CCB4A7A836F]:0)
at org.junit.Assert.fail(Assert.java:88)
at org.elasticsearch.test.InternalTestCluster.assertAfterTest(InternalTestCluster.java:2751)
at org.elasticsearch.test.ESIntegTestCase.afterInternal(ESIntegTestCase.java:622)
at org.elasticsearch.test.ESIntegTestCase.cleanUpCluster(ESIntegTestCase.java:2396)
at sun.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at java.lang.Thread.run(Thread.java:748)
``` | https://github.com/elastic/elasticsearch/issues/81949 | https://github.com/elastic/elasticsearch/pull/82249 | 332e6d48c430f7f569a9f041814efbf44140d7a0 | be4ff31a250eb8944a55914b5d07d32f54d80b14 | "2021-12-20T16:25:09Z" | java | "2022-01-05T11:19:41Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,943 | ["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ilm/AllocateAction.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ilm/AllocateActionTests.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingService.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/cluster/metadata/MetadataMigrateToDataTiersRoutingServiceTests.java"] | ILM: cannot specify only `total_shards_per_node` in the allocate action | **Elasticsearch version** (`bin/elasticsearch --version`): 7.16, 8.0, 8.1
**Description of the problem including expected versus actual behavior**:
Defining an allocate action that only specifies the `total_shards_per_node` option fails with
```
"caused_by": {
"type": "illegal_argument_exception",
"reason": "At least one of include, exclude or requiremust contain attributes for action allocate"
}
```
**Steps to reproduce**:
```
PUT _ilm/policy/testpolicy
{
"policy": {
"phases": {
"warm" : {
"actions": {
"allocate": {
"total_shards_per_node": 1
}
}
}
}
}
}
```
| https://github.com/elastic/elasticsearch/issues/81943 | https://github.com/elastic/elasticsearch/pull/81944 | a17e0786fe4cf1d56f6fe576cea4bfb9eddb02e3 | c813bd995de6c960c2b8000e9909128ea7997f3a | "2021-12-20T16:14:04Z" | java | "2022-01-04T11:55:03Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,939 | ["docs/changelog/83943.yaml", "x-pack/plugin/sql/qa/jdbc/security/src/test/java/org/elasticsearch/xpack/sql/qa/jdbc/security/JdbcWarningsIT.java", "x-pack/plugin/sql/qa/jdbc/single-node/src/test/java/org/elasticsearch/xpack/sql/qa/jdbc/single_node/JdbcWarningsIT.java", "x-pack/plugin/sql/qa/jdbc/src/main/java/org/elasticsearch/xpack/sql/qa/jdbc/JdbcWarningsTestCase.java", "x-pack/plugin/sql/qa/server/single-node/src/test/java/org/elasticsearch/xpack/sql/qa/single_node/RestSqlDeprecationIT.java", "x-pack/plugin/sql/qa/server/src/main/java/org/elasticsearch/xpack/sql/qa/rest/BaseRestSqlTestCase.java", "x-pack/plugin/sql/sql-action/src/main/java/org/elasticsearch/xpack/sql/action/SqlQueryRequest.java", "x-pack/plugin/sql/sql-action/src/test/java/org/elasticsearch/xpack/sql/action/SqlQueryRequestTests.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/parser/CommandBuilder.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/parser/LogicalPlanBuilder.java"] | SQL: Deprecation warning when querying a frozen index or listing frozen indices | Frozen indices are deprecated which makes all the [SQL features supporting frozen indices](https://www.elastic.co/guide/en/elasticsearch/reference/current/sql-index-frozen.html) obsolete.
This includes:
* `index_include_frozen` request parameter in the `_sql` endpoint
* `index.include.frozen` (J|O)DBC driver settings
* `SHOW TABLES INCLUDE FROZEN` queries and the `FROZEN INDEX` kind in the corresponding response
* The `FROZEN` modifier in `FROM` clauses (as in `SELECT * FROM FROZEN archive`)
`_search` raises a deprecation warning when frozen indices are being searched with `ignore_throttled=false`. SQL could do the same when the `index_include_frozen` request parameter is set or when the `FROZEN` keyword is used.
Relates to https://github.com/elastic/elasticsearch/issues/70192 | https://github.com/elastic/elasticsearch/issues/81939 | https://github.com/elastic/elasticsearch/pull/83943 | da0d33fded35d6b8c4893516f41610aa494a3ad8 | 7900a0bdaacccb8b5501ad21cf1fe3c8589f59de | "2021-12-20T15:57:09Z" | java | "2022-02-23T13:42:55Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,933 | ["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/inference/preprocessing/CustomWordEmbedding.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/inference/trainedmodel/langident/LangIdentNeuralNetwork.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/trainedmodels/langident/LangIdentNeuralNetworkInferenceTests.java"] | [ML] What to do about lang_ident for empty strings and numbers? | It's been [pointed out](https://discuss.elastic.co/t/default-language-for-language-detection/292470) that the lang_ident inference processor returns Japanese as the language for empty strings and numbers.
For example:
```
{
"doc" : {
"_index" : "_index",
"_id" : "_id",
"_source" : {
"contents" : "",
"_ml" : {
"lang_ident" : {
"prediction_score" : 0.7837568024575047,
"model_id" : "lang_ident_model_1",
"top_classes" : [
{
"class_name" : "ja",
"class_probability" : 0.7837568024575047,
"class_score" : 0.7837568024575047
},
{
"class_name" : "ko",
"class_probability" : 0.14699680203424537,
"class_score" : 0.14699680203424537
},
{
"class_name" : "sr",
"class_probability" : 0.04528638971813643,
"class_score" : 0.04528638971813643
}
],
"prediction_probability" : 0.7837568024575047,
"predicted_value" : "ja"
}
}
},
"_ingest" : {
"timestamp" : "2021-12-20T14:46:31.19367Z"
}
}
```
Since we have nothing to go on in these cases, a configurable default is probably the best we can do. Alternatively we could treat the absence of any character in any alphabet as an error, and use the failure handler functionality of ingest processors to allow the user to supply the alternative processors to use in this case (which could just be a set processor to apply a default). Or maybe there's an even better solution. But we shouldn't just predict Japanese in this situation. | https://github.com/elastic/elasticsearch/issues/81933 | https://github.com/elastic/elasticsearch/pull/82746 | e47b7a63f48e1dc58b972fda2007f705b6f5cf13 | 2c925c3363767c04146496d4d3e328cf3bc52e90 | "2021-12-20T14:57:14Z" | java | "2022-01-19T14:02:20Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,891 | ["server/src/main/java/org/elasticsearch/common/geo/SimpleFeatureFactory.java", "server/src/test/java/org/elasticsearch/common/geo/SimpleFeatureFactoryTests.java", "x-pack/plugin/vector-tile/src/javaRestTest/java/org/elasticsearch/xpack/vectortile/VectorTileRestIT.java", "x-pack/plugin/vector-tile/src/main/java/org/elasticsearch/xpack/vectortile/feature/FeatureFactory.java", "x-pack/plugin/vector-tile/src/test/java/org/elasticsearch/xpack/vectortile/feature/FeatureFactoriesConsistencyTests.java"] | MVT API: meta-layer bounding box with 0 width or height seems malformed | **Elasticsearch version** (`bin/elasticsearch --version`):
8.0/1
**Description of the problem including expected versus actual behavior**:
When using the MVT-API, and setting `exact_bounds` to true, the meta-layer seems to have a malformed bounding-box geometry when the width or height of the bounds is 0.
Bounds with 0 width or height occurs often when the tile only contains a single point (or multiple points sharing the same longitude or latitude).
The geometry from the meta-layer cannot be parsed by a client-side library @mapbox/vector-tile (used in MapLibre), leading us to think the geometry is malformed (?)
**Steps to reproduce**:
1. Create index with point
```
PUT my-index-000001
{
"mappings": {
"properties": {
"location": {
"type": "geo_point"
}
}
}
}
PUT my-index-000001/_doc/1
{
"text": "Geopoint as an object",
"location": {
"lat": 41.12,
"lon": -71.34
}
}
```
2. Request a tile
```
POST my-index-000001/_mvt/location/0/0/0
{
"exact_bounds": true
}
```
-> the tile is produced, but the geometry from the `META` layer is not usable. Parsing with @mapbox/vector-tile (https://www.npmjs.com/package/@mapbox/vector-tile) causes failures.
It seems somewhere a command-id of `4` is inserted in the geometry-buffer-array. The only allowed commands are 1 (moveTo), 2 (lineTo), or 7 (closePath). (from https://github.com/mapbox/vector-tile-spec/tree/master/2.1)
cc @iverase
| https://github.com/elastic/elasticsearch/issues/81891 | https://github.com/elastic/elasticsearch/pull/82404 | 31adaf24e89c58e61293aa8ee12007c505c8eb15 | de2781f98696c1e6cfad2b5bf46fe752a5e3edbb | "2021-12-17T20:32:54Z" | java | "2022-01-13T09:04:27Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,880 | ["docs/changelog/85565.yaml", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/IndexLifecycleRunner.java", "x-pack/plugin/ilm/src/main/java/org/elasticsearch/xpack/ilm/MoveToErrorStepUpdateTask.java", "x-pack/plugin/ilm/src/test/java/org/elasticsearch/xpack/ilm/MoveToErrorStepUpdateTaskTests.java"] | Batch up failure-related ILM master tasks | In https://github.com/elastic/elasticsearch/pull/78547 we introduced batching for the ILM master tasks that occur on the happy path. However if a high-shard-count cluster encounters problems while doing ILM-related things—perhaps some nodes are temporarily unavailable for taking a snapshot—then we process the resulting `ilm-retry-failed-step` and `ilm-move-to-error-step` tasks one-by-one which can significantly delay the cluster's recovery from its problems.
We should batch these things together too.
It looks like we also enqueue duplicate `ilm-retry-failed-step` on each poll interval too, although we do appear to treat the duplicates as no-ops at execution time.
Relates https://github.com/elastic/elasticsearch/issues/77466 | https://github.com/elastic/elasticsearch/issues/81880 | https://github.com/elastic/elasticsearch/pull/85565 | 52c52b996dc44aea8a0d47b8f2f53927f506e2b9 | 780b110cba98cd55e0144ba4120d41d223150592 | "2021-12-17T16:20:24Z" | java | "2022-04-01T04:54:01Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,865 | ["docs/changelog/82321.yaml", "server/src/internalClusterTest/java/org/elasticsearch/env/NodeEnvironmentIT.java", "server/src/main/java/org/elasticsearch/env/NodeMetadata.java", "server/src/test/java/org/elasticsearch/env/NodeMetadataTests.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/SecurityImplicitBehaviorBootstrapCheckTests.java"] | Unsupported upgrades from 7.nonlast to 8.x are still permitted | Upgrading to the next major version with a rolling restart requires upgrading to the last minor of the previous major first. However you could upgrade from 5.x to 6.x and from 6.x to 7.x via a full cluster restart without upgrading to 5.last (respectively 6.last) first.
For 8.x we will impose the same restriction on both upgrade paths: they must always go via 7.last. This will ensure that folks are notified about all deprecations and other changes before starting the major upgrade.
We should prevent users from inadvertently doing an unsupported upgrade from 7.15 or earlier to 8.x by bailing out if the on-disk node version is too old. It should be ok to let users explicitly bypass this restriction by running `elasticsearch-node override-version`, but we want this to be an explicit action with a disclaimer and an acknowledgement from the user, rather than something that just silently appears to work.
/cc @skearns64
Relates #81862 | https://github.com/elastic/elasticsearch/issues/81865 | https://github.com/elastic/elasticsearch/pull/82321 | dc27d1d37b232a6089b5ba8fd21c49df183c5a49 | 979e17aa3b7e4550b34b3b629af3ab72ff9f7ddf | "2021-12-17T14:19:03Z" | java | "2022-01-14T15:40:31Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,786 | ["docs/reference/setup/install/.env", "docs/reference/setup/install/create-certs.yml", "docs/reference/setup/install/docker-compose.yml", "docs/reference/setup/install/docker.asciidoc", "docs/reference/setup/install/instances.yml"] | [DOCS] Update installing Elasticsearch with Docker Compose documentation | In the Stack docs, we're updating the Docker Compose configuration with a simpler setup that is a much-improved UX. When the related PR is merged, we should update the installation docs for [staring a multi-node cluster with Docker Compose](https://www.elastic.co/guide/en/elasticsearch/reference/8.0/docker.html#docker-compose-file) to reflect those changes.
Relates to https://github.com/elastic/stack-docs/pull/1906 | https://github.com/elastic/elasticsearch/issues/81786 | https://github.com/elastic/elasticsearch/pull/81835 | 350fe2d21f4c5dce876de9423beaaefb61ec7319 | bf60ce68c653b76e42c2b6edd66a9d245d47a737 | "2021-12-15T20:35:41Z" | java | "2021-12-17T00:42:41Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,776 | ["x-pack/plugin/sql/sql-cli/build.gradle"] | Remove JndiLookup.class from the SQL command line tool | Elasticsearch ships with a [SQL CLI ](https://www.elastic.co/guide/en/elasticsearch/reference/current/sql-cli.html) Client in its bin directory. This client tool is standalone (NOT part of the server), for running ad-hoc SQL interactions. The jar containing the client is not on the servers class path. As a client tool, it does NOT accept external user input from the network, in a way that a server would typically do.
The jar containing the SQL CLI is a stand alone Java application, and can be run as such. Alternatively, the jar could also be used as a client.
This issue has been filed to consider the possible removal of JndiLookup.class from the SQL CLI jar. The mere presence of the JndiLookup.class is not problematic here, but it looks interesting and could lead to confusion for scanners, e.g.
```
unzip -l build/distributions/elasticsearch-sql-cli-8.1.0-SNAPSHOT.jar | grep JndiLookup
2937 07-22-2018 20:45 org/apache/logging/log4j/core/lookup/JndiLookup.class
```
Alternatively, or additionally, upgrade the version of log4j that is bundled in the uber executable jar. | https://github.com/elastic/elasticsearch/issues/81776 | https://github.com/elastic/elasticsearch/pull/81879 | 5f778fa2d8488202ba35d25b6409cdb36e48f7df | 3d5337d8197742b7b28256685020af712d85fb2e | "2021-12-15T19:28:02Z" | java | "2021-12-17T17:13:46Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,770 | ["x-pack/plugin/sql/qa/server/src/main/resources/select.csv-spec", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/analysis/analyzer/Analyzer.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/analysis/analyzer/AnalyzerTests.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/analysis/analyzer/VerifierErrorMessagesTests.java"] | SQL: Name resolution in filter is not consistent with resolution in projection | While looking into #81577 I saw that name resolution in filters does not behave the same way as resolving names in projections which can lead to subtle errors in some edge cases:
E.g. the query `select gender emp_no, emp_no e from test_emp where e > 10099` yields the following result:
```
emp_no | e
---------------+---------------
M |10001
F |10002
M |10003
M |10004
M |10005
F |10006
F |10007
M |10008
F |10009
...
```
The expected result would be equivalent to the result of `select gender emp_no, emp_no e from test_emp where emp_no > 10099`:
```
emp_no | e
---------------+---------------
F |10100
```
Looking at the analyzed plan reveals that SQL resolves `e > 10099` in the `where` clause to `gender > 10099`. This is not consistent with the projection where `e` resolves to `emp_no`. | https://github.com/elastic/elasticsearch/issues/81770 | https://github.com/elastic/elasticsearch/pull/81800 | 3550370c86cfdee60bb5ca991805437f0b87bccc | f1860c17ab4b9e2931a5d7482905fe5f1589239c | "2021-12-15T16:43:43Z" | java | "2022-01-11T14:51:46Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,763 | ["docs/changelog/84584.yaml", "qa/smoke-test-http/src/test/java/org/elasticsearch/http/RolloverRestCancellationIT.java", "server/src/main/java/org/elasticsearch/action/admin/indices/rollover/RolloverRequest.java", "server/src/main/java/org/elasticsearch/action/admin/indices/rollover/TransportRolloverAction.java", "server/src/main/java/org/elasticsearch/rest/action/admin/indices/RestRolloverIndexAction.java", "server/src/test/java/org/elasticsearch/action/admin/indices/rollover/TransportRolloverActionTests.java"] | Use the RestCancellableNodeClient infrastructure for the rollover API | **Elasticsearch version** (`bin/elasticsearch --version`): 7.16 (earlier too), 8.0, 8.1
**Description of the problem including expected versus actual behavior**:
Currently, the rollover requests are not cancellable, irrespective of the underlying incoming HTTP channel being closed (eg. by a proxy). This could result in clients receiving `504` and retrying the rollovers, resulting in multiple rollover operations being processed (some products issue rollovers without specifying conditions, so this could translate in multiple subsequent rollovers being executed).
This proposes using the `RestCancellableNodeClient` infrastructure for the rollover API, such that elasticsearch can react to the incoming HTTP connection being closed by cancelling the rollover operation.
| https://github.com/elastic/elasticsearch/issues/81763 | https://github.com/elastic/elasticsearch/pull/84584 | 104dcad4384d6dd5c3264931b90e5b8ee095187e | 80f5f3e211def11e17d362c6b33a716bbb708cfd | "2021-12-15T14:38:33Z" | java | "2022-03-04T08:16:23Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,758 | ["server/src/main/java/org/elasticsearch/repositories/RepositoriesService.java", "server/src/main/java/org/elasticsearch/repositories/UnknownTypeRepository.java", "server/src/test/java/org/elasticsearch/repositories/RepositoriesServiceTests.java", "server/src/test/java/org/elasticsearch/repositories/UnknownTypeRepositoryTests.java", "test/framework/src/main/java/org/elasticsearch/test/hamcrest/ThrowableAssertions.java"] | Distinguish "repository doesn't exist" from "repository plugin not installed" | **Elasticsearch version** (`bin/elasticsearch --version`): 7.16.1 (and many others)
**Plugins installed**: []
**JVM version** (`java -version`): Any
**OS version** (`uname -a` if on a Unix-like system): Any
**Description of the problem including expected versus actual behavior**:
If you define a repository using a plugin and then remove the plugin then the `RepositoryMetadata` lives on but we do not create a corresponding `Repository` instance. This means that operations on the repository (creating snapshots etc) will fail with a `RepositoryMissingException` which is very confusing because `GET _snapshot` will show that the repository is not missing at all.
I believe in this case we should create a placeholder `Repository` instance so that operations on the repository fail with a more helpful message. | https://github.com/elastic/elasticsearch/issues/81758 | https://github.com/elastic/elasticsearch/pull/82457 | 7018e9ef84264aa54b16da56d468dd31a051a488 | 75579f73dc1028072767b48e6730435a2a313331 | "2021-12-15T13:25:56Z" | java | "2022-01-14T08:22:25Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,752 | ["modules/mapper-extras/build.gradle", "modules/mapper-extras/src/test/java/org/elasticsearch/index/mapper/extras/MatchOnlyTextFieldMapperTests.java"] | [CI] RankFeaturesFieldMapperTests testMinimalIsInvalidInRoutingPath failing | Reproducible with the command from the build scan. Possibly also the cause of the other failures in the build scan as they look similar.
**Build scan:**
https://gradle-enterprise.elastic.co/s/ke34ae4kwfc7u/tests/:modules:mapper-extras:test/org.elasticsearch.index.mapper.extras.RankFeaturesFieldMapperTests/testMinimalIsInvalidInRoutingPath
**Reproduction line:**
`./gradlew ':modules:mapper-extras:test' --tests "org.elasticsearch.index.mapper.extras.RankFeaturesFieldMapperTests.testMinimalIsInvalidInRoutingPath" -Dtests.seed=A20D72D274E2D95E -Dbuild.snapshot=false -Dtests.jvm.argline="-Dbuild.snapshot=false" -Dtests.locale=ar-MA -Dtests.timezone=Indian/Reunion -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.index.mapper.extras.RankFeaturesFieldMapperTests&tests.test=testMinimalIsInvalidInRoutingPath
**Failure excerpt:**
```
java.lang.IllegalArgumentException: setting index.time_series.start_time has not been registered
at __randomizedtesting.SeedInfo.seed([A20D72D274E2D95E:F75FB280A8DFFDD3]:0)
at org.elasticsearch.common.settings.AbstractScopedSettings.get(AbstractScopedSettings.java:740)
at org.elasticsearch.index.TimestampBounds.<init>(TimestampBounds.java:22)
at org.elasticsearch.index.IndexSettings.<init>(IndexSettings.java:701)
at org.elasticsearch.index.IndexSettings.<init>(IndexSettings.java:680)
at org.elasticsearch.index.mapper.MapperServiceTestCase.createIndexSettings(MapperServiceTestCase.java:215)
at org.elasticsearch.index.mapper.MapperTestCase.testMinimalIsInvalidInRoutingPath(MapperTestCase.java:750)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/81752 | https://github.com/elastic/elasticsearch/pull/81780 | c8e8104f66e20e9df3192c50d95d456afddab197 | 730500008b0e546343ef64883ed2d62917ffcedb | "2021-12-15T11:37:48Z" | java | "2021-12-15T22:36:55Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,712 | ["rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/tsdb/40_search.yml"] | [CI] SmokeTestMultiNodeClientYamlTestSuiteIT test {yaml=tsdb/40_search/ids query} failing | **Build scan:**
https://gradle-enterprise.elastic.co/s/nnuzywumonsbg/tests/:qa:smoke-test-multinode:integTest/org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT/test%20%7Byaml=tsdb%2F40_search%2Fids%20query%7D
**Reproduction line:**
`./gradlew ':qa:smoke-test-multinode:integTest' --tests "org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT.test {yaml=tsdb/40_search/ids query}" -Dtests.seed=60911EEF4E11F7C2 -Dtests.locale=sk-SK -Dtests.timezone=America/Rosario -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT&tests.test=test%20%7Byaml%3Dtsdb/40_search/ids%20query%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [tsdb/40_search:358]:
Expected: "u1"
but: was "u3"
at __randomizedtesting.SeedInfo.seed([60911EEF4E11F7C2:E8C52135E0ED9A3A]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.lang.AssertionError:
Expected: "u1"
but: was "u3"
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:99)
at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/81712 | https://github.com/elastic/elasticsearch/pull/81731 | 4d085d7551aedc34cd7a1d7ea06ea9dc1ed12ed9 | 201cc86b31485c5a1ef5a3f336bed1780a229f64 | "2021-12-14T09:55:46Z" | java | "2021-12-14T16:22:59Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,708 | ["docs/changelog/81819.yaml", "qa/evil-tests/src/test/java/org/elasticsearch/common/logging/EvilLoggerTests.java", "server/src/main/java/org/elasticsearch/common/logging/DeprecationLogger.java", "server/src/test/java/org/elasticsearch/common/logging/DeprecationLoggerTests.java"] | Missing doPriviliged in deprecation logger | possibly a doPriviliged in deprecation logger together with a test DeprecationLoggerTests.testLogPermissions
were accidentally removed.
This is possibly a regression.
Scripts run under reduced privileges. (can @elastic/es-core-infra help?) and
the test was introduced to verify deprecation logger not violating Security Manager permission when rolling over the files.
7.0+
https://github.com/elastic/elasticsearch/pull/37281/files#diff-70de5a6ba5c637e7f19c51341417760d6e957beb5a1fa5703049095ea2719ee0R322
However the doPriviliged call in deprecation logger was removed in (7.10+) https://github.com/elastic/elasticsearch/pull/55941/files#diff-593ea478a0a8d462fd38ad70838ee6e4a28673478d28812c48d9ed5cf768c132L249
The test itself was removed in 7.10+
https://github.com/elastic/elasticsearch/pull/61474/files#diff-70de5a6ba5c637e7f19c51341417760d6e957beb5a1fa5703049095ea2719ee0L47
@stu-elastic or @jdconrad do you remember more context about this? Do you think this should be fixed?
| https://github.com/elastic/elasticsearch/issues/81708 | https://github.com/elastic/elasticsearch/pull/81819 | a4b232a09fd7217e6fc7bb7910ca07c7b609d031 | f954919d654654057fb0015a3e484f056bf1b984 | "2021-12-14T08:59:21Z" | java | "2021-12-17T08:18:42Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,600 | ["docs/reference/snapshot-restore/apis/get-snapshot-status-api.asciidoc"] | [DOCS] Fix get snapshot status API docs | As pointed out in https://github.com/elastic/elasticsearch/issues/80931, the [get snapshot status API docs](https://www.elastic.co/guide/en/elasticsearch/reference/current/get-snapshot-status-api.html#get-snapshot-status-api-desc) have some issues:
* `GET _snapshot/_status` `GET _snapshot/<repository>/_status` are undocumented.
* The `<repository>` and `<snapshot>` parameters are not required.
* The `<snapshot>` parameter doesn't support `_current`.
Relates to https://github.com/elastic/elasticsearch/pull/59355. | https://github.com/elastic/elasticsearch/issues/81600 | https://github.com/elastic/elasticsearch/pull/81818 | 3d4e78487a8a51fbd370ad2cd98b70ff548a8b76 | 88be4ed95022231499f7781bfdfb685d3479440a | "2021-12-09T20:18:59Z" | java | "2022-02-03T15:55:23Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,585 | ["docs/changelog/88221.yaml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/search.aggregation/30_sig_terms.yml", "server/src/main/java/org/elasticsearch/search/aggregations/bucket/terms/SignificanceLookup.java", "server/src/main/java/org/elasticsearch/search/aggregations/bucket/terms/SignificantTermsAggregationBuilder.java", "server/src/test/java/org/elasticsearch/search/aggregations/bucket/terms/SignificantTermsAggregatorTests.java"] | significant_terms background ignores alias filter | **Elasticsearch version** (`bin/elasticsearch --version`): v7+
**Description of the problem including expected versus actual behavior**:
When used with an alias that has a filter, only the foreground set is filtered. The background set ignores the alias filter. This skews the results, especially when the user supplies an additional foreground filter, assuming the background filter will respect the alias filter.
**Steps to reproduce**:
```
PUT sig_terms_bug
{
"mappings": {
"properties": {
"field1": {
"type": "keyword"
},
"field2": {
"type": "keyword"
},
"field3": {
"type": "keyword"
}
}
}
}
POST sig_terms_bug/_bulk?refresh=true
{ "index" : {} }
{ "field1" : "failed", "field2": "frontend-node", "field3": "foo" }
{ "index" : {} }
{ "field1" : "failed", "field2": "frontend-node", "field3": "bar" }
{ "index" : {} }
{ "field1" : "failed", "field2": "frontend-node", "field3": "bar" }
{ "index" : {} }
{ "field1" : "success", "field2": "frontend-node", "field3": "bar" }
{ "index" : {} }
{ "field1" : "success", "field2": "frontend-node", "field3": "bar" }
{ "index" : {} }
{ "field1" : "failed", "field2": "backend-node", "field3": "foo" }
{ "index" : {} }
{ "field1" : "failed", "field2": "backend-node", "field3": "bar" }
{ "index" : {} }
{ "field1" : "failed", "field2": "backend-node", "field3": "bar" }
{ "index" : {} }
{ "field1" : "success", "field2": "backend-node", "field3": "bar" }
{ "index" : {} }
{ "field1" : "success", "field2": "backend-node", "field3": "bar" }
{ "index" : {} }
POST _aliases
{
"actions": [
{
"add": {
"index": "sig_terms_bug",
"alias": "sig_terms_bug_alias",
"filter": {
"bool": {
"filter": [
{
"term": {
"field2": "frontend-node"
}
}
]
}
}
}
}
]
}
GET sig_terms_bug_alias/_search?track_total_hits=true&size=0&filter_path=aggregations
{
"aggs": {
"sig_term": {
"significant_terms": {
"field": "field3"
}
}
}
}
```
This results in:
```
{
"aggregations" : {
"sig_term" : {
"doc_count" : 5,
"bg_count" : 10,
"buckets" : [ ]
}
}
}
```
It seems to me that the `bg_count` should respect the alias filter.
| https://github.com/elastic/elasticsearch/issues/81585 | https://github.com/elastic/elasticsearch/pull/88221 | a044b5c01e0f95a37f7ae9f1d0f04529724111c7 | ab2602ecb08e1ec389573ac7f32fe9942d5b732b | "2021-12-09T13:40:48Z" | java | "2022-07-19T17:03:08Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,577 | ["x-pack/plugin/sql/qa/server/src/main/resources/select.csv-spec", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/analysis/analyzer/Analyzer.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/analysis/analyzer/AnalyzerTests.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/analysis/analyzer/VerifierErrorMessagesTests.java"] | [SQL] StackOverflowError from a query using aggregates and aliases | For an index with a single field in its mapping
```
"sequence": {
"type": "long"
}
```
The following query results in a `StackOverflowError`:
```
select max(sequence) as sequence, avg(sequence) as sequence, avg(sequence) as s from test_index where s > 0 group by sequence having s > 0
```
The stacktrace:
```
java.lang.StackOverflowError: null
at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:176) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.lambda$transformDown$8(Node.java:179) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformChildren(Node.java:211) ~[?:?]
at org.elasticsearch.xpack.ql.tree.Node.transformDown(Node.java:179) ~[?:?]
...
``` | https://github.com/elastic/elasticsearch/issues/81577 | https://github.com/elastic/elasticsearch/pull/81800 | 3550370c86cfdee60bb5ca991805437f0b87bccc | f1860c17ab4b9e2931a5d7482905fe5f1589239c | "2021-12-09T09:36:47Z" | java | "2022-01-11T14:51:46Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,529 | ["docs/changelog/83213.yaml", "rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/search.aggregation/40_range.yml", "server/src/main/java/org/elasticsearch/index/mapper/NumberFieldMapper.java", "server/src/test/java/org/elasticsearch/search/aggregations/bucket/range/RangeAggregatorTests.java"] | Long.MIN_VALUE considered out of range for type `long` in range aggregations | <!--
GitHub is reserved for bug reports and feature requests; it is not the place
for general questions. If you have a question or an unconfirmed bug , please
visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also
check your OS is [supported](https://www.elastic.co/support/matrix#show_os).
If it is not, the issue is likely to be closed.
For security vulnerabilities please only send reports to [email protected].
See https://www.elastic.co/community/security for more information.
Please fill in the following details to help us reproduce the bug:
-->
**Elasticsearch version** (`bin/elasticsearch --version`): 7.16.0
**Plugins installed**: []
**JVM version** (`java -version`):
**OS version** (`uname -a` if on a Unix-like system):
**Description of the problem including expected versus actual behavior**:
When defining a range aggregation on a field of type `long`, if one of the ranges has a bound equal to `Long.MIN_VALUE` (the java constant, equal to `-(2^63)`) or just a bit higher, Elasticsearch raises an error:
```
"Value [-9.223372036854776E18] is out of range for a long"
```
This directly contradicts the [documentation of numeric types](https://www.elastic.co/guide/en/elasticsearch/reference/current/number.html) which states that a `long` is "A signed 64-bit integer with a minimum value of -2^63 and a maximum value of 2^63-1"
It is a regression compared to 7.15.2, which didn't raise such an error.
**Steps to reproduce**:
```
curl -XDELETE -H "Content-Type: application/json" 'localhost:9200/test/' || true
echo
curl -XPUT -H "Content-Type: application/json" 'localhost:9200/test/' -d'{"mappings": {"properties": {"mylong": {"type": "long" } } } }'
echo
curl -XPUT -H "Content-Type: application/json" 'localhost:9200/test/_doc/1?refresh=true' -d '{"mylong": -9223372036854775808 }'
echo
curl -XPOST -H "Content-Type: application/json" 'localhost:9200/test/_search?size=0&pretty' -d '{"query":{"match_all":{}},"aggregations":{"myagg":{"range":{"field":"mylong","ranges":[{"from":-9223372036854775808,"to":9223372036854775807}]}}}}'
```
Output of the last command with Elasticsearch 7.16.0:
```json{"total":2,"successful":1,"failed":0},"_seq_no":0,"_primary_term":1}
{
"error" : {
"root_cause" : [
{
"type" : "illegal_argument_exception",
"reason" : "Value [-9.223372036854776E18] is out of range for a long"
}
],
"type" : "search_phase_execution_exception",
"reason" : "all shards failed",
"phase" : "query",
"grouped" : true,
"failed_shards" : [
{
"shard" : 0,
"index" : "test",
"node" : "MgMAsXzNTxeaMkLvCsZjuw",
"reason" : {
"type" : "illegal_argument_exception",
"reason" : "Value [-9.223372036854776E18] is out of range for a long"
}
}
],
"caused_by" : {
"type" : "illegal_argument_exception",
"reason" : "Value [-9.223372036854776E18] is out of range for a long",
"caused_by" : {
"type" : "illegal_argument_exception",
"reason" : "Value [-9.223372036854776E18] is out of range for a long"
}
}
},
"status" : 400
}
```
Output of the last command with Elasticsearch 7.15.2:
```json
{
"took" : 49,
"timed_out" : false,
"_shards" : {
"total" : 1,
"successful" : 1,
"skipped" : 0,
"failed" : 0
},
"hits" : {
"total" : {
"value" : 1,
"relation" : "eq"
},
"max_score" : null,
"hits" : [ ]
},
"aggregations" : {
"myagg" : {
"buckets" : [
{
"key" : "-9.223372036854776E18-9.223372036854776E18",
"from" : -9.223372036854776E18,
"to" : 9.223372036854776E18,
"doc_count" : 1
}
]
}
}
}
```
**Provide logs (if relevant)**: N/A
**Workaround**:
Sending long values as JSON strings instead of JSON numbers removes the problem completely, apparently bypassing the (invalid) check.
So I suppose this is a deserialization bug, where extreme integer values are rounded and converted to doubles during deserialization. | https://github.com/elastic/elasticsearch/issues/81529 | https://github.com/elastic/elasticsearch/pull/83213 | 7f0595abe68e07d927c874a53737556f6555fdaf | 2d701b99670246724399f37df2fd63299af7d33b | "2021-12-08T14:20:37Z" | java | "2022-02-02T13:59:13Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,514 | ["x-pack/plugin/transform/qa/single-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/transform/integration/TransformPivotRestIT.java", "x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/action/TransportPreviewTransformAction.java"] | [Transform] Preview transform returns 'null' when ingest pipeline throws an exception | **Elasticsearch version** (`bin/elasticsearch --version`): 7.15.2
**Description of the problem including expected versus actual behavior**:
Running a transform with a pipeline that throws an exception results in `preview` array containung `null` elements without any further explanation what the issue could be - this makes it very hard to debug.
I would expect an error message, what had failed in the pipeline within my preview response.
**Steps to reproduce**:
```
PUT _ingest/pipeline/orders-set-id
{
"processors": [
{
"script": {
"lang": "painless",
"source": "ctx._id = ctx['non']['existing'];"
}
}
]
}
POST _transform/_preview
{
"source": {
"index": "my-index"
},
"dest": {
"index": "my-other-index",
"pipeline": "orders-set-id"
},
"frequency": "1h",
"pivot": {
"group_by": {
"order_id": {
"terms": {
"field": "order_id.keyword"
}
}
},
"aggregations": {
"products": {
"scripted_metric": {
"init_script": "state.docs = [];",
"map_script": "state.docs.add(doc['order_id.keyword'].value);",
"combine_script": "return state.docs",
"reduce_script": "return [];"
}
}
}
}
}
```
This returns
```json
{
"preview" : [
null
],
"generated_dest_index" : {
"mappings" : {
"_meta" : {
"_transform" : {
"transform" : "transform-preview",
"version" : {
"created" : "7.15.2"
},
"creation_date_in_millis" : 1638962189562
},
"created_by" : "transform"
},
"properties" : {
"order_id" : {
"type" : "keyword"
}
}
},
"settings" : {
"index" : {
"number_of_shards" : "1",
"auto_expand_replicas" : "0-1"
}
},
"aliases" : { }
}
}
```
| https://github.com/elastic/elasticsearch/issues/81514 | https://github.com/elastic/elasticsearch/pull/81972 | c813bd995de6c960c2b8000e9909128ea7997f3a | e9af7c608f9686e04d991034cd0cf043f1d9ed1a | "2021-12-08T11:19:37Z" | java | "2022-01-04T13:25:12Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,502 | ["x-pack/plugin/sql/qa/server/src/main/java/org/elasticsearch/xpack/sql/qa/rest/RestSqlUsageTestCase.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/PlanExecutor.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/search/Querier.java"] | SQL: Incorrect stats reported when sorting by aggregated values | The following query increases the `rest.total` counter by 11 and the `rest.paging` counter by 10 (as returned by `_sql/stats`):
```
GET http://localhost:9201/_sql
{
"fetch_size": 10,
"query": "select last_name, sum(languages) from test_emp group by 1 order by 2"
}
```
Expected behavior would be to only increase `rest.total` by 1.
The bug is caused by `LocalAggregationSorterListener` using `PlanExecutor` to fetch all records before sorting. | https://github.com/elastic/elasticsearch/issues/81502 | https://github.com/elastic/elasticsearch/pull/81510 | 9a3422e1a6cf519e3fedce396784be2ef48dc7f9 | 7d1c434922145c5a285798a7f3dd2525f17a5c74 | "2021-12-08T09:39:44Z" | java | "2021-12-13T08:29:21Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,470 | ["x-pack/plugin/ml/qa/native-multi-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/ml/integration/AutoscalingIT.java", "x-pack/plugin/ml/qa/native-multi-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/ml/integration/PyTorchModelIT.java", "x-pack/plugin/ml/qa/native-multi-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/ml/integration/TestFeatureResetIT.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BertTokenizer.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/BertRequestBuilderTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/NerProcessorTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/TextClassificationProcessorTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/ZeroShotClassificationProcessorTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BertTokenizerTests.java"] | [ML] validate vocab tokens on model initialization | The passed vocabulary for NER models should be validated on model start up.
We should:
- Ensure the UNKNOWN token is provided
- That special tokens exist if they are requested by the tokenizer
- That the PAD token is provided
Right now, there are many smaller functional tests that take advantage of this validation error. But, in production, not having these tokens would result in unfriendly NPEs or weird tokenization errors. | https://github.com/elastic/elasticsearch/issues/81470 | https://github.com/elastic/elasticsearch/pull/81548 | 90e4e8ce630aecba6b1d631cad77c903f892d655 | 0fc4dff194767b6b76c5936163ab16e10d593d7f | "2021-12-07T21:27:05Z" | java | "2021-12-09T13:26:15Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,468 | ["rest-api-spec/src/yamlRestTest/resources/rest-api-spec/test/tsdb/40_search.yml"] | [CI] SmokeTestMultiNodeClientYamlTestSuiteIT test {yaml=tsdb/40_search/ids query} failing | **Build scan:**
https://gradle-enterprise.elastic.co/s/edbbtbzes7dxg/tests/:qa:smoke-test-multinode:integTest/org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT/test%20%7Byaml=tsdb%2F40_search%2Fids%20query%7D
**Reproduction line:**
`./gradlew ':qa:smoke-test-multinode:integTest' --tests "org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT.test {yaml=tsdb/40_search/ids query}" -Dtests.seed=11B63D69F126C92A -Dtests.locale=sk-SK -Dtests.timezone=America/Punta_Arenas -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
Didn't try
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.smoketest.SmokeTestMultiNodeClientYamlTestSuiteIT&tests.test=test%20%7Byaml%3Dtsdb/40_search/ids%20query%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [tsdb/40_search:358]:
Expected: "u1"
but: was "u3"
at __randomizedtesting.SeedInfo.seed([11B63D69F126C92A:99E202B35FDAA4D2]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.lang.AssertionError:
Expected: "u1"
but: was "u3"
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:99)
at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/81468 | https://github.com/elastic/elasticsearch/pull/81731 | 4d085d7551aedc34cd7a1d7ea06ea9dc1ed12ed9 | 201cc86b31485c5a1ef5a3f336bed1780a229f64 | "2021-12-07T21:02:12Z" | java | "2021-12-14T16:22:59Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,462 | ["x-pack/plugin/src/yamlRestTest/resources/rest-api-spec/test/data_stream/10_basic.yml"] | [CI] XPackRestIT test {p0=data_stream/10_basic/Get data stream api check existence of replicated and allow_custom_routing fields} failing | allow_custom_routing is only in 8.0 but the test assumes it's in 7.16.1 and above.
**Build scan:**
https://gradle-enterprise.elastic.co/s/lamn7fwv2wwy2/tests/:x-pack:plugin:yamlRestTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=data_stream%2F10_basic%2FGet%20data%20stream%20api%20check%20existence%20of%20replicated%20and%20allow_custom_routing%20fields%7D
**Reproduction line:**
`./gradlew ':x-pack:plugin:yamlRestTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=data_stream/10_basic/Get data stream api check existence of replicated and allow_custom_routing fields}" -Dtests.seed=862835B30F4AEBBB -Dtests.locale=vi -Dtests.timezone=America/Denver -Druntime.java=8`
**Applicable branches:**
7.16
**Reproduces locally?:**
Didn't try
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Ddata_stream/10_basic/Get%20data%20stream%20api%20check%20existence%20of%20replicated%20and%20allow_custom_routing%20fields%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [data_stream/10_basic:652]: field [data_streams.0.allow_custom_routing] is null
at __randomizedtesting.SeedInfo.seed([862835B30F4AEBBB:E7C0A69A1B68643]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:482)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:455)
at sun.reflect.GeneratedMethodAccessor15.invoke(null:-1)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at java.lang.Thread.run(Thread.java:748)
Caused by: java.lang.AssertionError: field [data_streams.0.allow_custom_routing] is null
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.assertTrue(Assert.java:41)
at org.junit.Assert.assertNotNull(Assert.java:712)
at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:78)
at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:471)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:455)
at sun.reflect.GeneratedMethodAccessor15.invoke(null:-1)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at java.lang.Thread.run(Thread.java:748)
``` | https://github.com/elastic/elasticsearch/issues/81462 | https://github.com/elastic/elasticsearch/pull/81590 | d467aae67eb5ca24cb9d8ec76e9ea29538834aed | 616b417fb07e9653ef3eeeeaab2e65902cc9e710 | "2021-12-07T17:31:30Z" | java | "2021-12-13T12:23:29Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,431 | ["docs/reference/aggregations/bucket/composite-aggregation.asciidoc"] | Update `composite` aggregation docs that `size` is not allowed in `terms` aggregation | It's not possible to use `size` parameter when `terms` aggregation is used as `sources` in a `composite` aggregation.
<img width="1381" alt="Screenshot 2021-12-07 at 14 15 26" src="https://user-images.githubusercontent.com/6585477/145038667-d74305e2-50d1-44b1-bc6e-d9f2f85c38e9.png">
The [docs page](https://www.elastic.co/guide/en/elasticsearch/reference/master/search-aggregations-bucket-composite-aggregation.html#_terms) for `composite` aggregation should mention that. It currently says
> The terms value source is equivalent to a simple terms aggregation. The values are extracted from a field exactly like the terms aggregation. | https://github.com/elastic/elasticsearch/issues/81431 | https://github.com/elastic/elasticsearch/pull/81775 | 1bd0561a91bb6bdbb3103fb3b24de9d1044f143e | 04318961b948cd0794bfd7e5eaf4a0dee8ba8bd4 | "2021-12-07T13:36:22Z" | java | "2021-12-15T19:32:16Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,415 | ["modules/legacy-geo/build.gradle"] | [CI] LegacyGeoShapeFieldMapperTests testMinimalIsInvalidInRoutingPath failing | **Build scan:**
https://gradle-enterprise.elastic.co/s/l3web4uikmzda/tests/:modules:legacy-geo:test/org.elasticsearch.legacygeo.mapper.LegacyGeoShapeFieldMapperTests/testMinimalIsInvalidInRoutingPath
**Reproduction line:**
`./gradlew ':modules:legacy-geo:test' --tests "org.elasticsearch.legacygeo.mapper.LegacyGeoShapeFieldMapperTests.testMinimalIsInvalidInRoutingPath" -Dtests.seed=9D9C10E69693AB84 -Dbuild.snapshot=false -Dtests.jvm.argline="-Dbuild.snapshot=false" -Dtests.locale=fi -Dtests.timezone=America/Bahia_Banderas -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
Didn't try
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.legacygeo.mapper.LegacyGeoShapeFieldMapperTests&tests.test=testMinimalIsInvalidInRoutingPath
**Failure excerpt:**
```
java.lang.IllegalArgumentException: setting index.time_series.start_time has not been registered
at __randomizedtesting.SeedInfo.seed([9D9C10E69693AB84:C8CED0B44AAE8F09]:0)
at org.elasticsearch.common.settings.AbstractScopedSettings.get(AbstractScopedSettings.java:740)
at org.elasticsearch.index.TimestampBounds.<init>(TimestampBounds.java:22)
at org.elasticsearch.index.IndexSettings.<init>(IndexSettings.java:701)
at org.elasticsearch.index.IndexSettings.<init>(IndexSettings.java:680)
at org.elasticsearch.index.mapper.MapperServiceTestCase.createIndexSettings(MapperServiceTestCase.java:215)
at org.elasticsearch.index.mapper.MapperTestCase.testMinimalIsInvalidInRoutingPath(MapperTestCase.java:750)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/81415 | https://github.com/elastic/elasticsearch/pull/81494 | 1ffd17df590af3560829c2c52b06af87633a23a1 | 6819d57bcb96d1b8ace841eb69dfdb0144c75199 | "2021-12-07T10:06:40Z" | java | "2021-12-14T15:22:17Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,380 | ["docs/changelog/86134.yaml", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authc/Realms.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/RealmsTests.java"] | Boot message possible confusion: reporting trial license | ## Description
During Elasticsearch boot, users get the following message:
> license mode is [trial], currently licensed security realms are [reserved/reserved,file/default_file,native/default_native]
Even if it's technically true (and necessary), it may be confusing for end users since they may expect `[basic]` instead.
## Proposal
Avoid the message reporting the trial license, since the "correct" license level is written again later in the boot process. | https://github.com/elastic/elasticsearch/issues/81380 | https://github.com/elastic/elasticsearch/pull/86134 | 0a5523cb4e92a3cb662b9ab1879ef923773aae84 | 25c50919102d27dd8faabb6f6a529b2965907cf3 | "2021-12-06T16:26:46Z" | java | "2022-04-27T06:58:52Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,244 | ["docs/changelog/93329.yaml", "modules/ingest-common/src/yamlRestTest/resources/rest-api-spec/test/ingest/190_script_processor.yml", "server/src/internalClusterTest/java/org/elasticsearch/index/FinalPipelineIT.java", "server/src/main/java/org/elasticsearch/ingest/IngestDocument.java", "server/src/main/java/org/elasticsearch/ingest/IngestService.java", "server/src/test/java/org/elasticsearch/ingest/IngestServiceTests.java"] | Ingest parses index requests twice when there is a final pipeline | I was looking at a flame graph of an ingestion workload with @dliappis, and it looks like we parse the JSON representation of the index request twice when a document has both a pipeline and a final pipeline.
It's hard to know how much we would save on this benchmark since not all data streams in this benchmark had both a pipeline and a final pipeline, but the cost of parsing index request into maps of maps via IngestService represented 4.06% of overall CPU time according to the flame graph, so this might not be negligible. | https://github.com/elastic/elasticsearch/issues/81244 | https://github.com/elastic/elasticsearch/pull/93329 | 63ca70897553fbfea45c7c63b92134d59e5d4c77 | 3e3b2711cf7be388faad499a1d713bb146ef69c6 | "2021-12-02T09:20:17Z" | java | "2023-01-30T16:48:19Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,208 | ["distribution/docker/build.gradle", "distribution/docker/src/docker/Dockerfile", "distribution/src/bin/elasticsearch", "docs/changelog/81245.yaml", "qa/os/src/test/java/org/elasticsearch/packaging/test/DockerTests.java"] | Package cloudflare-zlib with the Docker image | Elasticsearch uses zlib for two purposes:
- Compression of stored fields with `index.codec: best_compression`, which we use for observability and security data.
- Request / response compression.
The original zlib, which is usually the one that is installed, optimizes for portability and misses a number of important optimizations such as leveraging vectorization support for x86 and ARM architectures. Several forks have been created in order to address this, notably an [Intel fork](https://github.com/jtkukunas/zlib), [zlib-ng](https://github.com/zlib-ng/zlib-ng) and a [Cloudflare fork](https://github.com/cloudflare/zlib).
Historically, zlib was packaged within the JDK, so that users wouldn't have to have zlib installed for basic usage of Java. A downside of this approach is that it didn't allow using one of these faster forks, but [since version 9 the JDK uses the system's zlib when available](https://bugs.openjdk.java.net/browse/JDK-8031767) and falls back to the zlib that is packaged within the JDK if a system zlib cannot be found.
I performed testing with the Cloudflare zlib, which yielded almost 2x faster compression and decompression for JSON documents that are representative of those produced by the Elastic Observability solution. A run of the `solutions/logs` track with Rally yielded 2.35% faster indexing, 8.28% less cumulative merge time and 4.83% less cumulative indexing time. One particularity of the Cloudflare zlib is that compression levels retain the same semantics as the original zlib (unlike the Intel fork which uses a compatible format but gives different semantics for some compression levels) so the space efficiency of the produced indices was sensibly the same.
This issue suggests that we update our Docker image to use the Cloudflare fork of zlib instead of the original zlib so that users of the Elastic Cloud service and of the Docker image in general would get better performance out of their Elasticsearch clusters. | https://github.com/elastic/elasticsearch/issues/81208 | https://github.com/elastic/elasticsearch/pull/81245 | a7fdb08046ba7041d91016349df62b7f932b23f9 | 1f5a0ed2d197d7a12eb20ea28bc2c759ec57f416 | "2021-12-01T13:55:30Z" | java | "2021-12-03T09:48:45Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,192 | ["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/Subject.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/permission/LimitedRole.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/permission/Role.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/permission/SimpleRole.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/RoleReferenceIntersection.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authc/SubjectTests.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/permission/LimitedRoleTests.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/RoleReferenceIntersectionTests.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/store/CompositeRolesStore.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authz/store/CompositeRolesStoreTests.java"] | Rework Role and LimitedRole to support more general limiting | The `LimitedRole` limits what a `Role` can authorize by intersecting it privileges with an additional set of privileges. This concept is useful in general and we plan to leverage it in more features. However the current implementation only works for one level of limiting and this prevents its general usefulness. For example, an API key already has one level of limiting. So it is not possible to further limiting it which might be useful in cases like derived API keys, cross-cluster API keys.
We should remove the above constraint by reworking the implementation of `Role` and `LimitedRole`. | https://github.com/elastic/elasticsearch/issues/81192 | https://github.com/elastic/elasticsearch/pull/81403 | c98833f9c6ce2116e95936d9717df1b3eb6101bc | c4912794661e77d15debe08ea49aef27910dc27d | "2021-12-01T00:31:40Z" | java | "2022-01-19T02:44:28Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,183 | ["docs/reference/migration/migrate_8_0/rest-api-changes.asciidoc", "docs/reference/snapshot-restore/apis/create-snapshot-api.asciidoc", "docs/reference/snapshot-restore/apis/restore-snapshot-api.asciidoc", "docs/reference/snapshot-restore/index.asciidoc", "docs/reference/snapshot-restore/restore-snapshot.asciidoc", "docs/reference/snapshot-restore/take-snapshot.asciidoc"] | [DOCS] Update snapshot and restore docs for system index resolution changes | https://github.com/elastic/elasticsearch/pull/79670 updates some of the defaults for capturing system indices in a snapshot and restoring system indices from a snapshot. This issue tracks related updates to the docs. | https://github.com/elastic/elasticsearch/issues/81183 | https://github.com/elastic/elasticsearch/pull/81226 | d0d91c690ead75466dcc920f85a5d47a25bcc75c | 1519bb6ecbcb44375108b650f4d30ee25649e9ee | "2021-11-30T22:06:42Z" | java | "2021-12-08T15:15:14Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,167 | ["docs/reference/mapping/types/dense-vector.asciidoc", "x-pack/plugin/vectors/src/main/java/org/elasticsearch/xpack/vectors/mapper/DenseVectorFieldMapper.java", "x-pack/plugin/vectors/src/test/java/org/elasticsearch/xpack/vectors/mapper/DenseVectorFieldMapperTests.java", "x-pack/plugin/vectors/src/test/java/org/elasticsearch/xpack/vectors/mapper/DenseVectorFieldTypeTests.java"] | Edge cases with 0-vectors in knn_search | While playing around with the new vector search endpoint I ran into two interesting edge cases with "cosine" similarity.
I myabe didn't read the docs too carefully so I used zero-valued vectors in the query which raised an assertion error on my locally started nodes
where we run with "-ea" turned on. If assertions are disabled, and start with this setup
<details>
```
DELETE my-index
PUT my-index
{
"mappings": {
"properties": {
"my_vector": {
"type": "dense_vector",
"dims": 3,
"index": true,
"similarity": "cosine"
},
"my_text" : {
"type" : "keyword"
}
}
}
}
PUT my-index/_doc/1
{
"my_text" : "text1",
"my_vector" : [3, 0, 6]
}
PUT my-index/_doc/2
{
"my_text" : "text2",
"my_vector" : [0, 1, 0]
}
POST my-index/_knn_search
{
"knn": {
"field": "my_vector",
"query_vector": [0, 0, 0],
"k": 2,
"num_candidates" : 100
}
}
```
</details>
I get <details><summary>this error</summary>
```
org.elasticsearch.action.search.SearchPhaseExecutionException: all shards failed
[...]
Caused by: org.elasticsearch.ElasticsearchException$1: Index 2147483645 out of bounds for length 1
at org.elasticsearch.ElasticsearchException.guessRootCauses(ElasticsearchException.java:639) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:410) [elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
... 20 more
Caused by: java.lang.IndexOutOfBoundsException: Index 2147483645 out of bounds for length 1
at jdk.internal.util.Preconditions.outOfBounds(Preconditions.java:64) ~[?:?]
at jdk.internal.util.Preconditions.outOfBoundsCheckIndex(Preconditions.java:70) ~[?:?]
at jdk.internal.util.Preconditions.checkIndex(Preconditions.java:266) ~[?:?]
at java.util.Objects.checkIndex(Objects.java:359) ~[?:?]
at org.apache.lucene.index.CodecReader.checkBounds(CodecReader.java:103) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
at org.apache.lucene.index.CodecReader.document(CodecReader.java:88) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
at org.apache.lucene.index.FilterLeafReader.document(FilterLeafReader.java:374) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
at org.apache.lucene.index.FilterLeafReader.document(FilterLeafReader.java:374) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
at org.elasticsearch.search.internal.FieldUsageTrackingDirectoryReader$FieldUsageTrackingLeafReader.document(FieldUsageTrackingDirectoryReader.java:123) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.apache.lucene.index.FilterLeafReader.document(FilterLeafReader.java:374) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
at org.elasticsearch.search.fetch.FetchPhase.loadStoredFields(FetchPhase.java:448) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.search.fetch.FetchPhase.prepareNonNestedHitContext(FetchPhase.java:314) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.search.fetch.FetchPhase.prepareHitContext(FetchPhase.java:270) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.search.fetch.FetchPhase.buildSearchHits(FetchPhase.java:158) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.search.fetch.FetchPhase.execute(FetchPhase.java:90) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.search.SearchService.executeFetchPhase(SearchService.java:653) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.search.SearchService.executeQueryPhase(SearchService.java:628) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.search.SearchService.lambda$executeQueryPhase$2(SearchService.java:483) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.action.ActionRunnable.lambda$supply$0(ActionRunnable.java:47) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
... 6 more
```
</details>
When running with assertions enabled I run into this check even earlier:
<details>
```
java.lang.AssertionError: null
» at org.apache.lucene.search.TopScoreDocCollector$SimpleTopScoreDocCollector$1.collect(TopScoreDocCollector.java:75) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
» at org.apache.lucene.search.Weight$DefaultBulkScorer.scoreRange(Weight.java:274) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
» at org.apache.lucene.search.Weight$DefaultBulkScorer.score(Weight.java:254) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
» at org.elasticsearch.search.internal.CancellableBulkScorer.score(CancellableBulkScorer.java:45) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
» at org.apache.lucene.search.BulkScorer.score(BulkScorer.java:38) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
» at org.elasticsearch.search.internal.ContextIndexSearcher.searchLeaf(ContextIndexSearcher.java:194) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
» at org.elasticsearch.search.internal.ContextIndexSearcher.search(ContextIndexSearcher.java:167) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
» at org.apache.lucene.search.IndexSearcher.search(IndexSearcher.java:541) ~[lucene-core-9.0.0-snapshot-cc2a31f2be8.jar:9.0.0-snapshot-cc2a31f2be8 cc2a31f2be843935a67c0fdcd3478a65970e791d - mayyasharipova - 2021-11-02 14:36:40]
» at org.elasticsearch.search.query.QueryPhase.searchWithCollector(QueryPhase.java:233) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
» at org.elasticsearch.search.query.QueryPhase.executeInternal(QueryPhase.java:187) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
» at org.elasticsearch.search.query.QueryPhase.execute(QueryPhase.java:88) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
» at org.elasticsearch.search.SearchService.loadOrExecuteQueryPhase(SearchService.java:458) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
» at org.elasticsearch.search.SearchService.executeQueryPhase(SearchService.java:621) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
» at org.elasticsearch.search.SearchService.lambda$executeQueryPhase$2(SearchService.java:483) ~[elasticsearch-8.1.0-SNAPSHOT.jar:8.1.0-SNAPSHOT]
```
</details>
I also noted that indexing a document with e.g. a [0,0,0] vector into a field with similarity "cosine" is possible and if matched returns "null" scores (or runs into an assertion error if -ea is enabled like in local tests etc...)
Just wanted to mention this, maybe its is useful to protect against this with some better error message etc...
| https://github.com/elastic/elasticsearch/issues/81167 | https://github.com/elastic/elasticsearch/pull/82241 | 20c9bf95ea76416fb813dc7fcb265207a8006fa9 | 6c442920ba29165745934f5b24df1f9da1b907fd | "2021-11-30T18:47:54Z" | java | "2022-01-11T17:34:04Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,164 | ["x-pack/plugin/src/yamlRestTest/resources/rest-api-spec/test/data_stream/10_basic.yml"] | [CI] XPackRestIT test {p0=data_stream/10_basic/Create data stream} failing | This has failed about a dozen times today and did reproduce for me.
**Build scan:**
https://gradle-enterprise.elastic.co/s/jx24cqobh7sug/tests/:x-pack:plugin:yamlRestTestV7CompatTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=data_stream%2F10_basic%2FCreate%20data%20stream%7D
**Reproduction line:**
`./gradlew ':x-pack:plugin:yamlRestTestV7CompatTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=data_stream/10_basic/Create data stream}" -Dtests.seed=CDB9BA92F9896F93 -Dtests.locale=de-CH -Dtests.timezone=Pacific/Guam -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Ddata_stream/10_basic/Create%20data%20stream%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [data_stream/10_basic:96]: field [data_streams.0.replicated] is null
at __randomizedtesting.SeedInfo.seed([CDB9BA92F9896F93:45ED85485775026B]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.lang.AssertionError: field [data_streams.0.replicated] is null
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.assertTrue(Assert.java:41)
at org.junit.Assert.assertNotNull(Assert.java:712)
at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:78)
at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/81164 | https://github.com/elastic/elasticsearch/pull/81201 | 8fd4a2d04e6ade1886f14c0b1072749ce4de2893 | c934fb501269eef993b8f0611364a856d661e6f1 | "2021-11-30T18:24:56Z" | java | "2021-12-01T14:47:23Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,157 | ["x-pack/plugin/ql/src/main/java/org/elasticsearch/xpack/ql/index/IndexResolver.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/plan/logical/command/sys/SysTablesTests.java"] | SQL: SYS TABLES returns local aliases for remote clusters | A query like `SYS TABLES CATALOG LIKE 'remoteCluster' LIKE '%' TYPE 'VIEW'` will return the local aliases. Expected is to return nothing (as the remote aliases are not discoverable through field caps). | https://github.com/elastic/elasticsearch/issues/81157 | https://github.com/elastic/elasticsearch/pull/81158 | f205b7655fef514756860d033f6a0d1ee980a3eb | 1650e8096853e66acbd41b0bee0adfa923f05a32 | "2021-11-30T15:28:19Z" | java | "2021-12-08T11:24:46Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,128 | ["server/src/main/java/org/elasticsearch/common/geo/SphericalMercatorUtils.java", "server/src/test/java/org/elasticsearch/common/geo/SphericalMercatorUtilTests.java"] | [CI] GeoShapeWithDocValuesFieldTypeTests testFetchVectorTile failing | **Build scan:**
https://gradle-enterprise.elastic.co/s/nqq2qsasgv6bo/tests/:x-pack:plugin:spatial:test/org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests/testFetchVectorTile
**Reproduction line:**
`./gradlew ':x-pack:plugin:spatial:test' --tests "org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests.testFetchVectorTile" -Dtests.seed=484C606413FB6694 -Dtests.locale=uk -Dtests.timezone=America/Adak -Druntime.java=17`
**Applicable branches:**
8.0
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests&tests.test=testFetchVectorTile
**Failure excerpt:**
```
java.lang.ArrayIndexOutOfBoundsException: Index 0 out of bounds for length 0
at __randomizedtesting.SeedInfo.seed([484C606413FB6694:1F79130016192F24]:0)
at com.wdtinc.mapbox_vector_tile.adapt.jts.JtsAdapter.countCoordRepeatReverse(JtsAdapter.java:576)
at com.wdtinc.mapbox_vector_tile.adapt.jts.JtsAdapter.linesToGeomCmds(JtsAdapter.java:501)
at com.wdtinc.mapbox_vector_tile.adapt.jts.JtsAdapter.toFeature(JtsAdapter.java:344)
at com.wdtinc.mapbox_vector_tile.adapt.jts.JtsAdapter.toFeatures(JtsAdapter.java:300)
at org.elasticsearch.xpack.vectortile.feature.FeatureFactory.getFeatures(FeatureFactory.java:91)
at org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests.fetchVectorTile(GeoShapeWithDocValuesFieldTypeTests.java:118)
at org.elasticsearch.xpack.spatial.index.mapper.GeoShapeWithDocValuesFieldTypeTests.testFetchVectorTile(GeoShapeWithDocValuesFieldTypeTests.java:85)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/81128 | https://github.com/elastic/elasticsearch/pull/81145 | 66dc62618eac2dd2f20762348d932ed2b78db9a2 | 3a3bb236105d06db89ef779ff27ab3d69daa4eea | "2021-11-29T21:24:42Z" | java | "2021-12-01T06:04:40Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,076 | ["server/src/main/java/org/elasticsearch/common/geo/GeoPolygonDecomposer.java", "server/src/test/java/org/elasticsearch/common/geo/GeometryIndexerTests.java"] | geotile_grid aggregation on geo_shape produces incorrect results for polygons in certain corner cases | **Elasticsearch version** (`bin/elasticsearch --version`): 7.13.2-SNAPSHOT
**Description of the problem including expected versus actual behavior**:
Certain geo_shapes cause the geotile_grid aggregation to produce incorrect results.
**Steps to reproduce**:
1. Create the index
```
PUT /test-data
{
"settings": {
"number_of_shards": 1
},
"mappings": {
"properties": {
"shape": { "type": "geo_shape" },
"time": { "type": "date" }
}
}
}
```
2. Put a rectangle
```
POST /test-data/_doc
{
"shape" : {
"type" : "polygon",
"coordinates" : [
[ [180.0, 20.54099347935443], [180.00, 56.22356828010862], [173.32664998748726, 56.22356828010862], [173.32664998748726, 20.54099347935443], [180.0, 20.54099347935443] ]
]
},
"time": "2021-11-26T00:00:00Z"
}
```
3. Do an aggregation and observe correct results.
```
POST test-data/_search?size=0
{
"query": {
"match_all": {}
},
"aggs": {
"grids": {"geotile_grid": {"field": "shape", "precision": 4}}
}
}
"buckets" : [
{
"key" : "4/15/7",
"doc_count" : 1
},
{
"key" : "4/15/6",
"doc_count" : 1
},
{
"key" : "4/15/5",
"doc_count" : 1
},
{
"key" : "4/15/4",
"doc_count" : 1
}
]
```
4. Put a more complex polygon that is contained within the same area as the previous shape
```
POST /test-data/_doc
{
"shape" : {
"type" : "polygon",
"coordinates" : [
[
[
180,
38.382280879731525
],
[
180,
39.20402540758703
],
[
180,
40.20983928828463
],
[
180,
41.5905083136395
],
[
180,
43.79069222748844
],
[
180,
48.05737800943521
],
[
180,
56.22356828010862
],
[
180,
53.61517437197104
],
[
178.17058562712035,
47.44994633100819
],
[
177.161329896696,
44.42163705320016
],
[
176.63491363226575,
42.6928738950413
],
[
176.29683812379142,
41.52175761146341
],
[
176.0458600769842,
40.61841573973024
],
[
175.83768485617443,
39.84528044056929
],
[
175.64814528805073,
39.12101916544052
],
[
175.4602369741285,
38.382280879731525
],
[
175.2576316219736,
37.56053635187602
],
[
175.01887227795362,
36.55472247117842
],
[
174.7078894332312,
35.174053445823546
],
[
174.25388021927512,
32.97386953197461
],
[
173.53771573775157,
28.707183750027852
],
[
173.32664998748726,
20.54099347935443
],
[
177.52259404863642,
23.14938738749197
],
[
180,
29.314615428454847
],
[
180,
32.34292470626289
],
[
180,
34.07168786442174
],
[
180,
35.24280414799964
],
[
180,
36.14614601973281
],
[
180,
36.91928131889376
],
[
180,
37.64354259402253
],
[
180,
38.382280879731525
]
]
]
},
"time": "2021-11-26T00:00:00Z"
}
```
5. Do another aggregation
```
POST test-data/_search?size=0
{
"query": {
"match_all": {}
},
"aggs": {
"grids": {"geotile_grid": {"field": "shape", "precision": 4}}
}
}
```
6. Observe that you get buckets way outside of the expected area. Picture from Kibana makes it very clear.

| https://github.com/elastic/elasticsearch/issues/81076 | https://github.com/elastic/elasticsearch/pull/81155 | 32ca555b620a4d1567d3bca9104e8880299bb5cd | 8b077479b61d9633565440f9b80231c4cb7ca4f6 | "2021-11-26T16:39:13Z" | java | "2021-12-02T08:02:50Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,068 | ["distribution/docker/src/docker/bin/docker-entrypoint.sh", "docs/changelog/81082.yaml", "qa/os/src/test/java/org/elasticsearch/packaging/test/DockerTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/test/EnrollmentProcessTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/util/docker/Docker.java", "qa/os/src/test/java/org/elasticsearch/packaging/util/docker/DockerRun.java", "x-pack/plugin/security/cli/src/main/java/org/elasticsearch/xpack/security/cli/AutoConfigureNode.java"] | Issue enrolling nodes to existing cluster on docker | In 8.0.0 nodes can enroll to an existing secured cluster by passing the `--enrollment-token <token>` parameter on node start. This approach sadly doesn't work for Docker as we don't pass arbitrary parameters passed to `docker run` to the actual entrypoint of our Docker image. The work around for now is to override the entrypoint when starting a new node that should enroll to an existing cluster, as follows for instance :
```
docker run -it --rm -m 1g --entrypoint /usr/share/elasticsearch/bin/elasticsearch docker.elastic.co/elasticsearch/elasticsearch:8.0.0-beta1 --enrollment-token <token>
```
We should look into ways of allowing the enrollment token to be passed to docker run commands in a way that this will be relayed to the the elasticsearch executable so users don't need to override the entrypoint | https://github.com/elastic/elasticsearch/issues/81068 | https://github.com/elastic/elasticsearch/pull/81082 | 0ab502f1943b85a68f27215b353d9f0174682415 | 54eb955a650211cb5d1705f7bacd9d47d2a706dd | "2021-11-25T18:13:35Z" | java | "2021-12-07T16:10:05Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,058 | ["docs/reference/ingest/processors/date.asciidoc"] | Invalid output format when using ISO8601 as date processor output_format | Hello !
**Elasticsearch version** (`bin/elasticsearch --version`): 7.14.2
As the doc mentions it, the [date processor output_format](https://www.elastic.co/guide/en/elasticsearch/reference/current/date-processor.html) should accept `ISO8601` or `UNIX` values as `output_format`. However, here is the result:
```json
PUT _ingest/pipeline/timestamp
{
"processors": [
{
"date": {
"field": "date_iso",
"target_field": "timestamp",
"formats": [
"ISO8601"
],
"output_format": "UNIX"
}
}
]
}
```
```json
{
"error" : {
"root_cause" : [
{
"type" : "exception",
"reason" : "java.lang.IllegalArgumentException: invalid output format [UNIX]",
"processor_type" : "date"
}
],
"type" : "exception",
"reason" : "java.lang.IllegalArgumentException: invalid output format [UNIX]",
"processor_type" : "date",
"caused_by" : {
"type" : "illegal_argument_exception",
"reason" : "invalid output format [UNIX]",
"caused_by" : {
"type" : "illegal_argument_exception",
"reason" : "Invalid format: [UNIX]: Unknown pattern letter: U",
"caused_by" : {
"type" : "illegal_argument_exception",
"reason" : "Unknown pattern letter: U"
}
}
}
},
"status" : 500
}
```
The `format` parameter accepts those values.
Thanks!
Romain
| https://github.com/elastic/elasticsearch/issues/81058 | https://github.com/elastic/elasticsearch/pull/81557 | f0bf6f5ee368cb36080ee3557afbb68a9c44073c | b1f5373e022f1f268aec99470c71f80d014d7429 | "2021-11-25T16:04:38Z" | java | "2021-12-17T12:07:03Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,052 | ["docs/reference/query-dsl/nested-query.asciidoc"] | [Docs] Clarify nested query behavior when using 'must_not' filter | I have a situation when my document could contain several nested objects in it and I want to check that it *doesn't contain* nested object with particular properties. Since I didn't find any tool for working with nested object collections I try to utilize `bool` query with `must_not` clause for this purpose.
So I have the following mapping:
```
{
"space-app.profiles.17": {
"mappings": {
"doc": {
"_routing": {
"required": true
},
"properties": {
"customFields": {
"type": "nested",
"properties": {
"AUTONUMBER": {
"type": "text",
"analyzer": "links"
},
"BOOLEAN": {
"type": "boolean"
},
"CONTACT": {
"type": "text",
"analyzer": "links"
},
"DATE": {
"type": "date"
},
"DATE_TIME": {
"type": "date"
},
"ENUM": {
"type": "keyword"
},
"FRACTION": {
"type": "keyword"
},
"INTEGER": {
"type": "long"
},
"STRING": {
"type": "text",
"analyzer": "string_analyzer"
},
"URL": {
"type": "text",
"analyzer": "links"
},
"VCS_COMMIT": {
"type": "text",
"analyzer": "string_analyzer"
},
"entityLinks": {
"type": "keyword"
},
"extendedType": {
"type": "keyword"
},
"id": {
"type": "long"
},
"valueId": {
"type": "long",
"index": false
}
}
},
"id": {
"type": "long"
},
"organizationKey": {
"type": "long"
},
"profiles_about": {
"type": "text",
"analyzer": "text_analyzer"
},
"profiles_emails": {
"type": "text",
"analyzer": "email"
},
"profiles_firstName": {
"type": "text",
"analyzer": "string_analyzer"
},
"profiles_fullName": {
"type": "text",
"analyzer": "string_analyzer"
},
"profiles_internationalNames": {
"type": "text",
"analyzer": "string_analyzer"
},
"profiles_lastName": {
"type": "text",
"analyzer": "string_analyzer"
},
"profiles_links": {
"type": "text",
"analyzer": "links"
},
"profiles_messengers": {
"type": "text",
"analyzer": "string_analyzer"
},
"profiles_notAMember": {
"type": "boolean"
},
"profiles_phones": {
"type": "text",
"analyzer": "phone"
},
"profiles_userName": {
"type": "text",
"analyzer": "string_analyzer"
}
}
}
}
}
}
```
Than I'm executing the following query:
```
curl -X GET "localhost:9200/space-app.profiles.17/_search?pretty" -H 'Content-Type: application/json' -d'
{
"from": 0,
"size": 30,
"query": {
"bool": {
"must": [
{
"nested": {
"query": {
"bool": {
"must_not": [
{
"term": {
"customFields.id": {
"value": 825769069716586058,
"boost": 1.0
}
}
}
],
"adjust_pure_negative": true,
"boost": 1.0
}
},
"path": "customFields",
"ignore_unmapped": true,
"score_mode": "max",
"boost": 1.0
}
}
],
"adjust_pure_negative": true,
"boost": 1.0
}
}
}
'
```
In the results I'm receiving the following document:
```
{
"_index": "space-app.profiles.17",
"_type": "doc",
"_id": "7010800587899399528-4133272973067776871",
"_score": 0.042559616,
"_routing": "organizationKey",
"_source": {
"id": 4133272973067776871,
"organizationKey": 7010800587899399528,
"profiles_firstName": "Angela",
"profiles_lastName": "Bohl",
"profiles_fullName": "Angela Bohl",
"profiles_about": "At cum ocurreret imperdiet, no sint albucius vix, eius petentium vel ne! Per ut impetus consetetur, tacimates convenire ne nam, no maluisset deseruisse moderatius quo!",
"profiles_userName": "angela.bohl",
"profiles_phones": [],
"profiles_emails": [
"[email protected]",
"[email protected]"
],
"profiles_links": [],
"profiles_messengers": [
"slack:Angela"
],
"profiles_notAMember": false,
"customFields": [
{
"valueId": 7486325966825161302,
"extendedType": "ppl",
"STRING": "Lamborgini",
"id": 825769069716586058
},
{
"valueId": 3106313864822063649,
"entityLinks": "PROJECT|7251758770176377084",
"extendedType": "ppl",
"id": 8935354544283173893
}
]
}
}
```
This document is unexpected for me since I'm trying to filter it out with
```
"must_not": [
{
"term": {
"customFields.id": {
"value": 825769069716586058,
"boost": 1.0
}
}
}
]
```
Looks like I receive this result because I have other nested objects in this document which satisfy my query. This is an unexpected behavior for me since "must" would return me all the documents which contains satisfying nested object, so I need to negate this query somehow.
Elastic version info:
```
{
"name": "N6U3BIi",
"cluster_name": "docker-cluster",
"cluster_uuid": "Q_7PaMemTzGiQvgL8XODBw",
"version": {
"number": "6.5.4",
"build_flavor": "default",
"build_type": "tar",
"build_hash": "d2ef93d",
"build_date": "2018-12-17T21:17:40.758843Z",
"build_snapshot": false,
"lucene_version": "7.5.0",
"minimum_wire_compatibility_version": "5.6.0",
"minimum_index_compatibility_version": "5.0.0"
}
}
``` | https://github.com/elastic/elasticsearch/issues/81052 | https://github.com/elastic/elasticsearch/pull/82727 | 25dd4a31587710d050492cace27aa5d72accc042 | 0a3f6acaddcce12046e0be153fb327c4903d3d9f | "2021-11-25T14:39:15Z" | java | "2022-01-18T15:14:26Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,045 | ["server/src/internalClusterTest/java/org/elasticsearch/timeseries/support/TimeSeriesMetricsIT.java"] | [CI] TimeSeriesMetricsIT runs OOM | **Build scan**: https://gradle-enterprise.elastic.co/s/ifqr2xck7cpao
**Repro line**: `gradlew ':server:internalClusterTest' --tests "org.elasticsearch.timeseries.support.TimeSeriesMetricsIT" -Dtests.seed=3D9EF5828D9382A7 -Dtests.locale=en-US -Dtests.timezone=UTC -Druntime.java=17`
**Reproduces locally?**: Yes
**Applicable branches**: master
**Failure excerpt**:
```
org.elasticsearch.timeseries.support.TimeSeriesMetricsIT > classMethod FAILED
java.lang.Exception: Suite timeout exceeded (>= 1200000 msec).
at __randomizedtesting.SeedInfo.seed([3D9EF5828D9382A7]:0)
REPRODUCE WITH: ./gradlew ':server:internalClusterTest' --tests "org.elasticsearch.timeseries.support.TimeSeriesMetricsIT" -Dtests.seed=3D9EF5828D9382A7 -Dtests.locale=en-US -Dtests.timezone=UTC -Druntime.java=17
org.elasticsearch.timeseries.support.TimeSeriesMetricsIT > classMethod FAILED
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=5779, name=elasticsearch[node_s1][search][T#7], state=RUNNABLE, group=TGRP-TimeSeriesMetricsIT]
Caused by:
java.lang.OutOfMemoryError: Java heap space
at __randomizedtesting.SeedInfo.seed([3D9EF5828D9382A7]:0)
at java.base/java.nio.HeapByteBuffer.<init>(HeapByteBuffer.java:64)
at java.base/java.nio.ByteBuffer.allocate(ByteBuffer.java:363)
at org.apache.lucene.store.BufferedIndexInput.refill(BufferedIndexInput.java:285)
at org.apache.lucene.store.BufferedIndexInput.readByte(BufferedIndexInput.java:55)
at org.apache.lucene.store.DataInput.readInt(DataInput.java:94)
at org.apache.lucene.store.BufferedIndexInput.readInt(BufferedIndexInput.java:149)
at org.apache.lucene.store.MockIndexInputWrapper.readInt(MockIndexInputWrapper.java:172)
at org.apache.lucene.store.IndexInput$1.readInt(IndexInput.java:166)
at org.apache.lucene.util.packed.DirectReader$DirectPackedReader24.get(DirectReader.java:342)
at org.apache.lucene.codecs.lucene90.Lucene90DocValuesProducer$10.longValue(Lucene90DocValuesProducer.java:592)
at org.apache.lucene.document.SortedNumericDocValuesRangeQuery$1$1.matches(SortedNumericDocValuesRangeQuery.java:124)
at org.apache.lucene.search.ConjunctionDISI$ConjunctionTwoPhaseIterator.matches(ConjunctionDISI.java:350)
at org.elasticsearch.common.lucene.Lucene$2.get(Lucene.java:887)
at org.elasticsearch.search.aggregations.bucket.filter.FilterAggregator$1.collect(FilterAggregator.java:55)
at org.elasticsearch.search.aggregations.MultiBucketCollector$MultiLeafBucketCollector.collect(MultiBucketCollector.java:237)
at org.elasticsearch.search.aggregations.bucket.BucketsAggregator.collectExistingBucket(BucketsAggregator.java:92)
at org.elasticsearch.search.aggregations.bucket.BucketsAggregator.collectBucket(BucketsAggregator.java:78)
at org.elasticsearch.search.aggregations.bucket.filter.FilterAggregator$1.collect(FilterAggregator.java:56)
at org.elasticsearch.search.aggregations.bucket.composite.CompositeAggregator$4.collect(CompositeAggregator.java:577)
at org.elasticsearch.search.aggregations.bucket.composite.GlobalOrdinalValuesSource$1.collect(GlobalOrdinalValuesSource.java:144)
at org.elasticsearch.search.aggregations.LeafBucketCollector.collect(LeafBucketCollector.java:86)
at org.elasticsearch.search.aggregations.bucket.composite.CompositeAggregator.runDeferredCollections(CompositeAggregator.java:559)
at org.elasticsearch.search.aggregations.bucket.composite.CompositeAggregator.buildAggregations(CompositeAggregator.java:175)
at org.elasticsearch.search.aggregations.Aggregator.buildTopLevel(Aggregator.java:154)
at org.elasticsearch.search.aggregations.AggregationPhase.execute(AggregationPhase.java:67)
at org.elasticsearch.search.query.QueryPhase.execute(QueryPhase.java:94)
at org.elasticsearch.indices.IndicesService.lambda$loadIntoContext$27(IndicesService.java:1525)
at org.elasticsearch.indices.IndicesService$$Lambda$5684/0x00000008016eca88.accept(Unknown Source)
at org.elasticsearch.indices.IndicesService.lambda$cacheShardLevelResult$28(IndicesService.java:1591)
at org.elasticsearch.indices.IndicesService$$Lambda$5685/0x00000008016ed1e8.get(Unknown Source)
at org.elasticsearch.indices.IndicesRequestCache$Loader.load(IndicesRequestCache.java:178)
at org.elasticsearch.indices.IndicesRequestCache$Loader.load(IndicesRequestCache.java:161)
```
CC @nik9000 @imotov | https://github.com/elastic/elasticsearch/issues/81045 | https://github.com/elastic/elasticsearch/pull/81159 | be7cf05c827c4133d57a9dc56c50e4dbafbb9ec0 | b6f19a8f9d787f95e15980a29feb0aa326196edd | "2021-11-25T12:36:52Z" | java | "2021-11-30T18:37:54Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,024 | ["x-pack/plugin/security/src/internalClusterTest/java/org/elasticsearch/xpack/security/user/AnonymousUserIntegTests.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authc/support/ApiKeyGenerator.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/store/CompositeRolesStore.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/store/RoleDescriptorStore.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/support/ApiKeyGeneratorTests.java"] | Anonymous roles not captured when creating API keys | When creating an API key, the own's roles at creation time are captured. The owner's roles are a superset of the final privileges that an API key can effectively have. Elasticsearch have the feature of [anonymous access](https://www.elastic.co/guide/en/elasticsearch/reference/current/anonymous-access.html). The anonymous roles are automaticaly assigned to every login user (regular users, not service account or API keys). However, these roles are not captured when creating API keys.
This is a surprising behaviour because a user should be able to create API keys to do things that can be done by the user itself. If the user itself has no role and purely rely on anonymous roles for access (for emulating open cluster while still apply other security features), the API key is created with an empty superset of roles. This means the API key is essentially useless because it cannot be used to perform any actions. It is also hard to explain this behaviour in documentation.
The proposal is to fix it by capturing the anonymous roles when creating API keys (including granting API keys). | https://github.com/elastic/elasticsearch/issues/81024 | https://github.com/elastic/elasticsearch/pull/81427 | 24e1888ae3de0cd04a2132716c96c08438f22e78 | 20e24c3db612631712fcf417ea914b88ceab5dfd | "2021-11-24T23:44:31Z" | java | "2022-01-24T11:49:25Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,013 | ["x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/datafeed/DatafeedNodeSelector.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/datafeed/DatafeedNodeSelectorTests.java"] | [ML] Datafeed fails to start when using CCS and multi-index wildcards and data only exists in remote cluster | Seen in `8.0.0-SNAPSHOT`, likely occurs in earlier versions.
Datafeed fails to start when using CCS and multi-index wildcards and data only exists in remote cluster
**Steps to reproduce**
1. Configure 2 clusters for CCS. Remote cluster should contain data. Local cluster should not.
2. Configure datafeed to use `remote:index1-*, remote:index2-*, index1-*, index2-*` with options `{"expand_wildcards":["open"],"ignore_unavailable":true,"allow_no_indices":true,"ignore_throttled":true}`
3. Start datafeed
The following error occurs:
`No node found to start datafeed [datafeed-job1], allocation explanation [cannot start datafeed [datafeed-job1] because index [index1-*,index2-*] does not exist, is closed, or is still initializing.]`
If trying to reproduce without using CCS, the datafeed would successfully start as long as either `index1-*` or `index2-*` existed.
If neither `index1-*` or `index2-*` existed, there is an error `cannot retrieve field [timestamp] because it has no mappings`
Without using wildcards, then I would expect different behaviour, and depending on index options.
Internal edge test clusters are using this CCS pattern and there is no data in the local cluster.
**Expected behaviour**
- As long as data exists in at least one of those indexes (either remote or local), the datafeed should start.
- Errors should be meaningful.
- Where possible, we should follow how this is handled in `_search`
**Workaround**
Either
1. Update the datafeed to exclude the indices which do not exist, or
2. Create empty index in local cluster with mappings for the fields used in the detection config
| https://github.com/elastic/elasticsearch/issues/81013 | https://github.com/elastic/elasticsearch/pull/81074 | d9e73eb441a6a3b1c1a62a4a49b6f7ce8e7d9f4e | e54438004504d543673613fb6bce5ef90dca9fb1 | "2021-11-24T19:21:49Z" | java | "2021-11-29T12:19:34Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,011 | ["x-pack/plugin/ml/src/internalClusterTest/java/org/elasticsearch/xpack/ml/integration/AnomalyJobCRUDIT.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/action/TransportOpenJobAction.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/job/task/OpenJobPersistentTasksExecutor.java"] | [ML] A model state created in 7.0-7.9 should not have to be upgraded before upgrading to version 8 | Step to reproduce:
1. On a 7.6.0 cluster, create and run a few of AD jobs,
2. After jobs finish and stop, upgrade the cluster to 7.16.0
3. After upgrade, login kibana and go to Stack Management -> Upgrade Assistant,
Observed:
there are critical warnings about obsolete minimum version of model snapshot

Expected:
A model state created in 7.0-7.9 should not have to be upgraded before upgrading to version 8 | https://github.com/elastic/elasticsearch/issues/81011 | https://github.com/elastic/elasticsearch/pull/81039 | 15de6035148fd7904bb4f609f10d9b29af492a4f | 64338bff3ef2fbea8b3bd153d92f79168c8cdd7a | "2021-11-24T18:45:34Z" | java | "2021-11-25T13:36:58Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,990 | ["libs/ssl-config/src/test/java/org/elasticsearch/common/ssl/PemUtilsTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/test/PackagesSecurityAutoConfigurationTests.java", "qa/os/src/test/resources/org/elasticsearch/packaging/test/http.crt", "qa/os/src/test/resources/org/elasticsearch/packaging/test/http.key", "qa/os/src/test/resources/org/elasticsearch/packaging/test/http_ca.crt", "qa/os/src/test/resources/org/elasticsearch/packaging/test/http_ca.key", "qa/os/src/test/resources/org/elasticsearch/packaging/test/transport.crt", "qa/os/src/test/resources/org/elasticsearch/packaging/test/transport.key", "qa/os/src/test/resources/org/elasticsearch/packaging/test/transport_ca.crt", "x-pack/plugin/security/cli/src/main/java/org/elasticsearch/xpack/security/cli/AutoConfigureNode.java"] | bin/elasticsearch-reconfigure-node bugs and enhancements | This is a meta issue to cover identified bugs and enhancements we want to make to `elasticsearch-reconfigure-node`. This CLI tool is introduced in 8.0.0 and the main use case it satisfies is to allow users to reconfigure an elasticsearch node that has been installed via a DEB or RPM package and enroll it into an existing cluster.
DEB/RPM installations by default make the assumption that the installed node is the first (or only) one in the cluster and configure TLS for transport and http layers accordingly. This CLI tool allows users to revisit the assumption after installation (before the node is ever started), so that it can enroll to an existing, secured cluster.
- [ ] `elasticsearch-reconfigure-node` should be safer to use. The current behavior is to remove existing configuration and then attempt to enroll to the cluster. We should first attempt to enroll to the cluster and then remove/replace existing configuration, or backup/restore the existing configuration upon failure to enroll, so that we leave the node in a working state in every case.
- [ ] `elasticsearch-reconfigure-node` lacks documentation
- [ ] `elasticsearch-reconfigure-node` is expected to be run as root and wrongly sets file owners for generated keystores, so elasticsearch fails to read them on startup. | https://github.com/elastic/elasticsearch/issues/80990 | https://github.com/elastic/elasticsearch/pull/82789 | 0a16177f407c4b410e93fc52c1d514b3387fc7ee | 814f7f9f52cb8c05db6465b9bfc818ea5d76c575 | "2021-11-24T13:34:18Z" | java | "2022-01-21T13:32:02Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,976 | ["server/src/main/java/org/elasticsearch/cluster/metadata/DataStreamAlias.java", "server/src/main/java/org/elasticsearch/snapshots/RestoreService.java", "server/src/test/java/org/elasticsearch/cluster/metadata/DataStreamAliasTests.java"] | Snapshot restore requests allow you to restore alias with write data stream, even if the alias already has a write data stream | **Elasticsearch version** (`bin/elasticsearch --version`):
Version: 8.1.0-SNAPSHOT, Build: default/tar/e38cadb5283feeea06f09d555dbe47fb1d5e8b39/2021-11-22T22:35:22.825882Z, JVM: 17.0.1
**OS version** (`uname -a` if on a Unix-like system):
Darwin 20.6.0 Darwin Kernel Version 20.6.0: Mon Aug 30 06:12:21 PDT 2021; root:xnu-7195.141.6~3/RELEASE_X86_64 x86_64
**Description of the problem including expected versus actual behavior**:
I expect ES to reject snapshot restore requests that restore an alias with a write data stream if that alias already exists and has another write data stream. However, ES currently accepts these requests. It appears that the alias uses the restored write data stream, which may be unexpected and confusing to users.
This is likely related to https://github.com/elastic/elasticsearch/issues/80972.
**Steps to reproduce**:
1. Register a snapshot repository
```
PUT /_snapshot/my_repository
{
"type": "fs",
"settings": {
"location": "my_backup_location"
}
}
```
2. Create the `logs-my_app-default` data stream.
```
POST logs-my_app-default/_doc
{
"@timestamp": "2099-05-06T16:21:15.000Z"
}
```
3. Add the `logs` alias to the data stream and set it as the write data stream.
```
POST _aliases
{
"actions": [
{
"add": {
"index": "logs-my_app-default",
"alias": "logs",
"is_write_index": true
}
}
]
}
```
4. Create a snapshot containing the data stream. This also backs up its alias.
```
PUT _snapshot/my_repository/my_snapshot?wait_for_completion=true
```
5. Delete the data stream.
```
DELETE _data_stream/logs-my_app-default
```
6. Create another data stream, `logs-my_other_app-default`, and add it as the write data stream to the `logs` alias.
```
POST logs-my_other_app-default/_doc
{
"@timestamp": "2099-05-07T16:21:15.000Z"
}
POST _aliases
{
"actions": [
{
"add": {
"index": "logs-my_other_app-default",
"alias": "logs",
"is_write_index": true
}
}
]
}
```
7. Restore the `logs-my_app-default` data stream and its aliases from the snapshot.
```
POST /_snapshot/my_repository/my_snapshot/_restore?wait_for_completion=true
{
"indices": "logs-my_app-default",
"include_aliases": true
}
```
I expected this to return an error like `alias [logs] has more than one write index [logs-my_other_app-default,logs-my_app-default]`. This occurs for index aliases in a similar situation. However, the request was accepted.
When you check the `logs` alias, the restored `logs-my_app-default` data stream
is the current write data stream:
```
GET _alias/logs
```
Returns:
```
{
"logs-my_other_app-default" : {
"aliases" : {
"logs" : { }
}
},
"logs-my_app-default" : {
"aliases" : {
"logs" : {
"is_write_index" : true
}
}
}
}
``` | https://github.com/elastic/elasticsearch/issues/80976 | https://github.com/elastic/elasticsearch/pull/81217 | eec64f72bf6280445ed0f74d219632b87f46572c | a4b232a09fd7217e6fc7bb7910ca07c7b609d031 | "2021-11-23T23:00:33Z" | java | "2021-12-17T07:40:07Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,972 | ["server/src/main/java/org/elasticsearch/cluster/metadata/Metadata.java", "server/src/test/java/org/elasticsearch/cluster/metadata/MetadataTests.java", "x-pack/plugin/data-streams/src/internalClusterTest/java/org/elasticsearch/datastreams/DataStreamIT.java", "x-pack/plugin/data-streams/src/internalClusterTest/java/org/elasticsearch/datastreams/DataStreamsSnapshotsIT.java"] | Snapshot restore requests allow you to restore data stream alias with conflicting name | **Elasticsearch version** (`bin/elasticsearch --version`):
Version: 8.1.0-SNAPSHOT, Build: default/tar/e38cadb5283feeea06f09d555dbe47fb1d5e8b39/2021-11-22T22:35:22.825882Z, JVM: 17.0.1
**OS version** (`uname -a` if on a Unix-like system):
Darwin 20.6.0 Darwin Kernel Version 20.6.0: Mon Aug 30 06:12:21 PDT 2021; root:xnu-7195.141.6~3/RELEASE_X86_64 x86_64
**Description of the problem including expected versus actual behavior**:
I expect ES to reject snapshot restore requests that restore a data stream alias with the same name as an existing data stream or index.
However, ES currently accepts these requests. This cluster now has a data stream/index and alias with the same name. A user may not be sure which resource a search request targeting the name will hit.
**Steps to reproduce**:
1. Register a snapshot repository
```
PUT /_snapshot/my_repository
{
"type": "fs",
"settings": {
"location": "my_backup_location"
}
}
```
2. Create a data stream.
```
POST logs-my_app-default/_doc
{
"@timestamp": "2099-05-06T16:21:15.000Z"
}
```
3. Add a `logs` alias to the data stream.
```
POST _aliases
{
"actions": [
{
"add": {
"index": "logs-my_app-default",
"alias": "logs"
}
}
]
}
```
4. Create a snapshot containing the data stream and its alias
```
PUT _snapshot/my_repository/my_snapshot?wait_for_completion=true
```
5. Delete the data stream. This also deletes the alias.
```
DELETE _data_stream/logs-my_app-default
```
6. Create another data stream with same name as the deleted alias (`logs`).
```
PUT _index_template/my-index-template
{
"index_patterns": ["logs"],
"data_stream": { },
"priority": 500
}
POST logs/_doc
{
"@timestamp": "2099-05-07T16:21:15.000Z"
}
```
7. Restore the data stream and `logs` alias from the snapshot.
```
POST /_snapshot/my_repository/my_snapshot/_restore?wait_for_completion=true
{
"indices": "logs-my_app-default",
"include_aliases": true
}
```
I expected this to return an error due to a conflict between the restored `logs`
alias and the pre-existing `logs` data stream. However, the request was
accepted, and both resources now exist.
Retrieve the `logs` data stream:
```
GET _data_stream/logs
```
Retrieve the `logs` alias:
```
GET _alias/logs
```
A search on `logs` only hits the `logs` data stream:
```
GET logs/_search
```
However, a search on `log*` hits both the alias and the data stream:
```
GET log*/_search
```
| https://github.com/elastic/elasticsearch/issues/80972 | https://github.com/elastic/elasticsearch/pull/81040 | e20fe6d6390b46d21a09cbdd63f75753cd8d1b0d | 5c4330292ffead1218ddba896431ca04408f766c | "2021-11-23T21:27:38Z" | java | "2021-11-30T08:31:26Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,962 | ["docs/reference/docs/delete-by-query.asciidoc", "docs/reference/docs/update-by-query.asciidoc", "rest-api-spec/src/main/resources/rest-api-spec/api/delete_by_query.json", "rest-api-spec/src/main/resources/rest-api-spec/api/update_by_query.json"] | [Docs] _source* params don't work for Update by query / Delete by query | The docs for [Update by query](https://www.elastic.co/guide/en/elasticsearch/reference/current/docs-update-by-query.html) and [Delete by query](https://www.elastic.co/guide/en/elasticsearch/reference/current/docs-delete-by-query.html) mention that you can use the following parameters to include/exclude fields returned from the affected docs:
* `_source`
* `_source_excludes`
* `_source_includes`
However, in testing this it doesn't appear to actually work.
Example in Kibana Dev Tools:
```
POST test/_doc/123
{ "foo": "bar" }
POST test/_delete_by_query
{
"query": {
"term": {
"foo": { "value": "bar" }
}
},
"_source": true
}
```
Result:
```
{
"took" : 80,
"timed_out" : false,
"total" : 1,
"deleted" : 1,
"batches" : 1,
"version_conflicts" : 0,
"noops" : 0,
"retries" : {
"bulk" : 0,
"search" : 0
},
"throttled_millis" : 0,
"requests_per_second" : -1.0,
"throttled_until_millis" : 0,
"failures" : [ ]
}
```
I spoke with @DaveCTurner offline and he indicated:
> I think this is a docs bug, I don’t believe DBQ or UBQ support `_source`. You could easily hit billions of docs, there’s no way we could return them all.
If that's confirmed to be the case, I believe we should remove mention of those from the docs.
| https://github.com/elastic/elasticsearch/issues/80962 | https://github.com/elastic/elasticsearch/pull/81131 | 86978e87b877b304d81ae749266c248607da6f7e | ca8c9be01696d81998de15ef0ec50cd021cb5dfd | "2021-11-23T18:56:31Z" | java | "2021-12-01T14:06:12Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,952 | ["x-pack/plugin/sql/qa/server/src/main/resources/pivot.csv-spec", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/search/Querier.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/search/SourceGenerator.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/planner/QueryFolder.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/querydsl/container/GlobalCountRef.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/querydsl/container/QueryContainer.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/planner/QueryFolderTests.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/planner/QueryTranslatorTests.java"] | SQL: Cannot reorder columns in PIVOT query | Given a query like `SELECT a, b, birth_date FROM (SELECT * FROM test_emp PIVOT (SUM(salary) FOR languages IN (1 as a, 2 as b)) LIMIT 10)` the response is
```
a | b | birth_date
------------------------+---------------+---------------
null |56415 |null
null |34341 |null
null |39728 |null
1952-04-19T00:00:00.000Z|66174 |null
1953-01-07T00:00:00.000Z|null |52044
1953-01-23T00:00:00.000Z|73717 |null
1953-09-02T00:00:00.000Z|null |57305
1953-09-19T00:00:00.000Z|null |44307
1954-06-19T00:00:00.000Z|null |56760
```
Expected response would be to have the first column with the dates last.
Note, the bug also applies if you don't select any of the pivoted columns as in `SELECT emp_no, birth_date FROM (SELECT * FROM test_emp PIVOT (SUM(salary) FOR languages IN (1 as a, 2 as b)) LIMIT 10)` and also when not using a subquery as in `SELECT a, birth_date, emp_no FROM test_emp PIVOT (SUM(salary) FOR languages IN (1 as a, 2 as b)) LIMIT 10`. | https://github.com/elastic/elasticsearch/issues/80952 | https://github.com/elastic/elasticsearch/pull/81032 | 55b0903ed5042952efadb737d954393d38d5422f | 05ffbff778207f86d6930adaeed641561f96f8bf | "2021-11-23T15:48:45Z" | java | "2021-12-03T07:35:22Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,939 | ["qa/rolling-upgrade/src/test/java/org/elasticsearch/upgrades/SnapshotBasedRecoveryIT.java"] | [CI] SnapshotBasedRecoveryIT testSnapshotBasedRecovery failing | <!--
Please fill out the following information, and ensure you have attempted
to reproduce locally
-->
**Build scan**:
https://gradle-enterprise.elastic.co/s/jduqowizzdlzg
**Repro line**:
`gradlew ':qa:rolling-upgrade:v7.16.0#oneThirdUpgradedTest' -Dtests.class="org.elasticsearch.upgrades.SnapshotBasedRecoveryIT" -Dtests.method="testSnapshotBasedRecovery" -Dtests.seed=3C3FC5FDBBCA3766 -Dtests.bwc=true -Dtests.locale=en-MT -Dtests.timezone=America/Thule -Druntime.java=17`
**Reproduces locally?**:
No
**Applicable branches**:
Master
**Failure history**:
https://gradle-enterprise.elastic.co/scans/tests?search.relativeStartTime=P7D&search.timeZoneId=Europe/Berlin&tests.container=org.elasticsearch.upgrades.SnapshotBasedRecoveryIT&tests.sortField=FAILED&tests.test=testSnapshotBasedRecovery&tests.unstableOnly=true
**Failure excerpt**:
```
ava.lang.AssertionError: timed out waiting for green state for index [snapshot_based_recovery] cluster state
...
```
| https://github.com/elastic/elasticsearch/issues/80939 | https://github.com/elastic/elasticsearch/pull/81384 | b67152a175397254d4a3f7f6a193e96df1a54745 | 3d4c3d2e333d3eb5daf727bf55f50d669e430188 | "2021-11-23T12:28:34Z" | java | "2022-02-01T12:48:53Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,923 | ["x-pack/plugin/security/cli/src/main/java/org/elasticsearch/xpack/security/cli/AutoConfigureNode.java"] | Elasticsearch fails to start when not connected to local network | With security enabled by default, we changed our default to bind to both `_local` and `_site_` when we go through with the security autoconfiguration setup. It makes sense to do so as elasticsearch has authentication and TLS on the HTTP layer enabled and we wanted to allow maximum connectivity as kibana or other clients could run on different hosts.
The issue with setting `http.host: ["_local_", "_site_"]` is that when there is no site-local address (i.e. host is disconnected from local networks ), elasticsearch would fail to start with a message similar to
```
org.elasticsearch.bootstrap.StartupException: java.lang.IllegalArgumentException: No up-and-running site-local (private) addresses found, got [name:lo (lo), name:br-72896d75edab (br-72896d75edab), name:docker0 (docker0), name:br-9a09ce2f5f7e (br-9a09ce2f5f7e), name:br-b6a5fb9fac6d (br-b6a5fb9fac6d), name:br-c11a9a002c33 (br-c11a9a002c33), name:br-eb3168295388 (br-eb3168295388), name:br-f9dd975f4e4d (br-f9dd975f4e4d)]
```
| https://github.com/elastic/elasticsearch/issues/80923 | https://github.com/elastic/elasticsearch/pull/81083 | c139255ba5a98d23b33e9b81d10ed32abf6c2cce | fbda52493cd1a0bbbf7550bf18a74202e1e59348 | "2021-11-23T00:20:20Z" | java | "2021-11-30T16:48:08Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,904 | ["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/accesscontrol/DocumentSubsetBitsetCache.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/accesscontrol/DocumentSubsetBitsetCacheTests.java"] | DLS optimization for rewrite to match all | A possible way to limit users from searching cold or frozen tiers is to setup DLS with a terms query for the `_tier` field. If an index does not match the requested `_tier`, rewriting the query to the shard results in a `MatchNoDocsQuery`, which is handled well by DLS, caching only that the index is unavailable. However, if the role does not contain any other query parts than for the `_tier` field, the rewrite will result in a `MatchAllDocsQuery`. There is an optimization for this case too, but it does not kick in until after the query ran populating a bitset of all the documents in the shard. Instead we can optimize this by checking if the rewritten role query becomes `MatchAllDocsQuery` and use the special `match_all` bitset directly in this case. This would hopefully nearly eliminate the shard level overhead of having a role query with only a `_tier` predicate. There is room for further improvements, but we can consider those outside this issue. | https://github.com/elastic/elasticsearch/issues/80904 | https://github.com/elastic/elasticsearch/pull/81030 | 537f371f348207e7c59d28162b61c3720e931d0c | 806abee75a7c02eb438242bd51d72b236730bf53 | "2021-11-22T14:02:43Z" | java | "2021-11-29T23:12:27Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,898 | ["server/src/main/java/org/elasticsearch/transport/NoSeedNodeLeftException.java", "server/src/main/java/org/elasticsearch/transport/ProxyConnectionStrategy.java", "server/src/main/java/org/elasticsearch/transport/SniffConnectionStrategy.java", "server/src/test/java/org/elasticsearch/transport/ProxyConnectionStrategyTests.java", "x-pack/plugin/ccr/src/main/java/org/elasticsearch/xpack/ccr/action/ShardFollowNodeTask.java"] | CCR unable to open any proxy connections | **Elasticsearch version** (`bin/elasticsearch --version`): 7.15
**Plugins installed**: default plugins in the docker image
**JVM version** (`java -version`): docker image
**OS version** (`uname -a` if on a Unix-like system): docker image
**Description of the problem including expected versus actual behavior**:
We have 2 separated ELK clusters (3 nodes each) deployed in 2 different locations in Openshift.
To deploy we are using a helm (no operator yet).
We enabled the CCR between them. The CCR connection is going through a F5 LoadBalancer.
The cluster is configured with security and TSL enabled.
The cross cluster replication is working fine but sometimes we see the following exception:
`[2021-11-19T14:16:58,628][WARN ][o.e.t.TcpTransport ] [elasticsearch-master-0] exception caught on transport layer [Netty4TcpChannel{localAddress=/XXX.XXX.XXX.XXX:47822, remoteAddress=elk-master.local.net/YYY.YYY.YYY.YYY:443, profile=default}], closing connection
io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
[2021-11-19T14:16:58,629][WARN ][o.e.x.c.a.ShardFollowNodeTask] [elasticsearch-master-0] shard follow task encounter non-retryable error
java.lang.IllegalStateException: Unable to open any proxy connections to remote cluster [elasticsearch-cluster-2]
`
Now we do not know exactly what is going on since the CCR before this exception was working fine. Maybe the F5 LB sometimes closes the connections or maybe sometime we have some network issue, we are still investigating.
However after we get that exception the CCR is broken.
To solve this issue we just have to restart the POD without ANY modification and the CCR starts to work again:
`[2021-11-22T10:24:31,168][INFO ][o.e.x.c.a.ShardFollowTasksExecutor] [elasticsearch-master-0] [myindex-2021.11.18-000001][0] Starting to track leader shard [myindex-2021.11.18-000001][0]
[2021-11-22T10:24:31,558][INFO ][o.e.x.c.a.ShardFollowNodeTask] [elasticsearch-master-0] [myindex-2021.11.18-000001][0] following leader shard [myindex-2021.11.18-000001][0], follower global checkpoint=[-1], mapping version=[2], settings version=[1], aliases version=[1]
`
Now I do not know if this is a bug or intended but we would like to find a solution in order to not have this issues again. From my point of view ELK should retry to open the proxy connections automatically.
Here the CCR settings:
`{
"persistent" : {
"cluster" : {
"remote" : {
"${REMOTE_CLUSTER_NAME}" : {
"mode": "proxy",
"proxy_address": "${remote_route}",
"transport.ping_schedule": "5s"
}
}
}
}
}
`
**Steps to reproduce**:
Don't really know how to replicate this issue.
| https://github.com/elastic/elasticsearch/issues/80898 | https://github.com/elastic/elasticsearch/pull/80961 | b4b489f52e7e0c901df472a2bb57fca6b596f8a0 | b83b08f9f5f19b3cca87c72e302c0039420ac47e | "2021-11-22T10:55:54Z" | java | "2021-11-25T08:39:05Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,895 | ["docs/changelog/85815.yaml", "server/src/main/java/org/elasticsearch/search/fetch/subphase/highlight/FastVectorHighlighter.java", "server/src/main/java/org/elasticsearch/search/fetch/subphase/highlight/SourceScoreOrderFragmentsBuilder.java", "server/src/main/java/org/elasticsearch/search/fetch/subphase/highlight/SourceSimpleFragmentsBuilder.java", "server/src/main/java/org/elasticsearch/search/lookup/SourceLookup.java", "server/src/test/java/org/elasticsearch/search/fetch/subphase/highlight/FastVectorHighlighterTests.java", "test/framework/src/main/java/org/elasticsearch/search/fetch/HighlighterTestCase.java"] | Fast Vector Highlighter does no work with nested field as target | <!--
GitHub is reserved for bug reports and feature requests; it is not the place
for general questions. If you have a question or an unconfirmed bug , please
visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also
check your OS is [supported](https://www.elastic.co/support/matrix#show_os).
If it is not, the issue is likely to be closed.
For security vulnerabilities please only send reports to [email protected].
See https://www.elastic.co/community/security for more information.
Please fill in the following details to help us reproduce the bug:
-->
**Elasticsearch version** (`bin/elasticsearch --version`): 7.15.2
**Plugins installed**: []
**JVM version** (`java -version`): the one included in ES
**OS version** (`uname -a` if on a Unix-like system): Windows 10
**Description of the problem including expected versus actual behavior**:
When using a nested field as target for Fast Vector Highligter no result is produced. (This works fine with the Unified Highlighter).
The problem seems to be that fvh tries to read the target field literally from the source and as this would not be present in the source
it assumes that the field is absent. If the nested field has `store: true` set everything works as expected as it then reads the stored field instead of visiting the source-object.
The reason for using a nested field as target is that the root-field is a date-field and we then have multiple nested fields with different versions of the date-string with `with_positions_offsets` enabled for `term_vector`.
**Steps to reproduce**:
make a search like the following with and without `store:true` enabled in the mapping of the the nested target field (`date.text`).
```
{
"query": {
"query_string": {
"query": "2000-10-10",
"fields": [ "date.text" ],
"quote_field_suffix": ".exact"
}
},
"highlight": {
"fields": {
"date.text": {
"matched_fields": [ "date.text", "date.text.exact" ],
"type": "fvh"
}
}
}
}
```
| https://github.com/elastic/elasticsearch/issues/80895 | https://github.com/elastic/elasticsearch/pull/85815 | cce3d924754a06634a8e353fa227be3af2eeca62 | a69cdd0ff3c23df49b19c35b258b99fc18794476 | "2021-11-21T11:25:46Z" | java | "2022-04-12T14:19:36Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,892 | ["docs/reference/cat/shards.asciidoc", "docs/reference/how-to/fix-common-cluster-issues.asciidoc", "server/src/main/java/org/elasticsearch/rest/action/cat/RestShardsAction.java"] | [+DOC] Shard Unassigned Reasons | Howdy! I like using [CAT Shards](https://www.elastic.co/guide/en/elasticsearch/reference/current/cat-shards.html)'s `unassigned.reason` as reference, but just ran into an undocumented one and realized [the code](https://github.com/elastic/elasticsearch/blob/26c86871fc091900952e88e252c36fbfedf8d5fa/server/src/main/java/org/elasticsearch/cluster/routing/UnassignedInfo.java#L67) includes a couple others as well.
Can you append info on [these](https://github.com/elastic/elasticsearch/blob/26c86871fc091900952e88e252c36fbfedf8d5fa/server/src/main/java/org/elasticsearch/cluster/routing/UnassignedInfo.java#L116-L136)
- PRIMARY_FAILED
- FORCED_EMPTY_PRIMARY
- MANUAL_ALLOCATION
- INDEX_CLOSED
- NODE_RESTARTING
I'm not sure if you're prefer a literal code copy/paste, but am experiencing `MANUAL_ALLOCATION` if you have more information on it. Cheers!
| https://github.com/elastic/elasticsearch/issues/80892 | https://github.com/elastic/elasticsearch/pull/81017 | 43e6cacdb0225e7d92e33fdccab233c6a9c27c21 | ca65718923bc886ab0aa5934ecc1cd3b2e3090ba | "2021-11-20T00:15:02Z" | java | "2021-11-29T18:47:01Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,860 | ["docs/reference/query-dsl/bool-query.asciidoc"] | Named fuzzy query killing performance of nested top_hits aggregation | **Elasticsearch version** (`bin/elasticsearch --version`): 7.15.2
**Plugins installed**: [analysis-icu]
**JVM version** (`java -version`): bundled
**OS version** (`uname -a` if on a Unix-like system): macOS Big Sur
**Description of the problem including expected versus actual behavior**:
I was researching why some queries in our production environment were slow (well, slower than expected anyway), and narrowed it down to the combination of a *named* fuzzy query (match query with fuzziness set to AUTO) and a top_hits aggregation.
The complete query is quite simple:
```json
{
"query": {
"bool": {
"should": [
{
"match": {
"category.std": {
"query": "the query",
"_name": "std"
}
}
},
{
"match": {
"category.prefix": {
"query": "the query",
"_name": "language_std"
}
}
},
{
"match": {
"category": {
"query": "the query",
"_name": "language_search"
}
}
},
{
"match": {
"category.fuzzy": {
"query": "the query",
"operator": "AND",
"fuzziness": "AUTO",
"prefix_length": 2,
"max_expansions": "5",
"boost": "0.5",
"_name": "fuzzy"
}
}
}
]
}
},
"aggs": {
"category": {
"terms": {
"field": "category.base",
"size": 5
},
"aggs": {
"top_category": {
"top_hits": {
"size": 1,
"_source": {
"includes": [
"category"
]
}
}
}
}
}
},
"size": 0
}
```
We are searching for the user's query in the "category" field using a bool should query (since the relevant sub-fields use different search analyzers), then aggregate the top 5 values for the category field (terms aggregation) and finally get the top 1 hit for each of the 5 terms. The reason we do it like that is for highlighting (which is under the top_hits aggregation in the original query but, since it adds a small overhead, I deliberately left it out for simplicity).
With the query cache disabled for testing, this query takes around 70ms to return results. Since we are aiming for a much shorter response time (in the region of 5-20ms), I started taking parts out of the query in order to figure out where the bottleneck is.
Omitting any of the fuzzy query / top hits aggregation brings the response time down to 5ms.
The astonishing discovery is that removing *just* the _name parameter from the fuzzy query leads to constant 7ms responses (removing the same parameter for the rest of the queries makes no difference).
This definitely seems to be a bug, since I was under the impression that named queries are just a convenience for results processing and should not produce any performance overhead whatsoever.
Any help would be appreciated.
PS. I don't know if the issue title is correct, but I could not come up with something better. | https://github.com/elastic/elasticsearch/issues/80860 | https://github.com/elastic/elasticsearch/pull/91512 | 6fc31d3ed392c7dc7880e5dc0b5866c8dd7974e5 | dceff3f86288368aaa022139b29feca5302a7906 | "2021-11-18T23:00:05Z" | java | "2022-11-14T13:05:40Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,837 | ["server/src/main/java/org/elasticsearch/indices/recovery/RecoveryState.java"] | [CI] FullClusterRestartIT testRecovery failing | **Build scan:**
https://gradle-enterprise.elastic.co/s/lqmxb2fffkd42/tests/:qa:full-cluster-restart:v8.1.0%23upgradedClusterTest/org.elasticsearch.upgrades.FullClusterRestartIT/testRecovery
**Reproduction line:**
`gradlew ':qa:full-cluster-restart:v8.1.0#upgradedClusterTest' -Dtests.class="org.elasticsearch.upgrades.FullClusterRestartIT" -Dtests.method="testRecovery" -Dtests.seed=37572CF50121804A -Dtests.bwc=true -Dtests.locale=sr-ME -Dtests.timezone=Asia/Barnaul -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
Didn't try
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.upgrades.FullClusterRestartIT&tests.test=testRecovery
**Failure excerpt:**
```
java.lang.AssertionError: mismatch while checking for translog recovery
testrecovery 0 existing_store done 0
testrecovery 0 peer done 0
expected:<true> but was:<false>
at __randomizedtesting.SeedInfo.seed([37572CF50121804A:F6A755592C714AED]:0)
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.failNotEquals(Assert.java:834)
at org.junit.Assert.assertEquals(Assert.java:118)
at org.elasticsearch.upgrades.FullClusterRestartIT.testRecovery(FullClusterRestartIT.java:880)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/80837 | https://github.com/elastic/elasticsearch/pull/81528 | e421477ac8d699fa37b04e74bd374f8585e02b0e | 26c2ce0b886f4cb13bf07c2c00de89c443b10061 | "2021-11-18T14:02:56Z" | java | "2022-01-13T15:43:56Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,814 | ["docs/changelog/82507.yaml", "server/src/internalClusterTest/java/org/elasticsearch/indices/SystemIndexManagerIT.java", "server/src/main/java/org/elasticsearch/action/admin/indices/settings/put/TransportUpdateSettingsAction.java", "server/src/main/java/org/elasticsearch/indices/SystemIndexManager.java"] | Can set write block on system indices but cannot remove it | Currently it is possible to set the write block on a system index. When you go to remove it by updating settings, the change is rejected.
An example using the fleet agents system index:
```
PUT .fleet-agents-7/_block/write
```
Succeeds.
But this follow up fails:
```
PUT .fleet-agents-7/_settings
{
"index": {
"blocks.write": false
}
}
{
"error" : {
"root_cause" : [
{
"type" : "illegal_state_exception",
"reason" : "Cannot override settings on system indices: [.fleet-agents*] -> [index.blocks.write]"
}
],
"type" : "illegal_state_exception",
"reason" : "Cannot override settings on system indices: [.fleet-agents*] -> [index.blocks.write]"
},
"status" : 500
}
``` | https://github.com/elastic/elasticsearch/issues/80814 | https://github.com/elastic/elasticsearch/pull/82507 | b1c01b12be4239b18fe47c54ff9c08774cfe8b7a | 7018e9ef84264aa54b16da56d468dd31a051a488 | "2021-11-18T03:54:23Z" | java | "2022-01-14T03:22:13Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,782 | ["docs/reference/migration/migrate_8_0/rest-api-changes.asciidoc", "docs/reference/modules/remote-clusters.asciidoc", "docs/reference/search/search-your-data/search-across-clusters.asciidoc"] | [DOCS] Update BWC support for cross-cluster search | As of 8.0, the compatibility window for cross-cluster search (CCS) to an earlier release will be one minor release.
To document this change, we need to update the [supported configurations][0] section of the cross-cluster search docs. We also need to add a related item to the [8.0 breaking changes][1].
[0]: https://www.elastic.co/guide/en/elasticsearch/reference/master/modules-cross-cluster-search.html#ccs-supported-configurations
[1]: https://www.elastic.co/guide/en/elasticsearch/reference/master/migrating-8.0.html#breaking-changes-8.0
CC @giladgal | https://github.com/elastic/elasticsearch/issues/80782 | https://github.com/elastic/elasticsearch/pull/80809 | f1860c17ab4b9e2931a5d7482905fe5f1589239c | dfb9f6f18d1f80241747595ed371c8f7f22485ac | "2021-11-16T22:37:28Z" | java | "2022-01-11T15:33:12Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,763 | ["docs/changelog/93533.yaml", "server/src/internalClusterTest/java/org/elasticsearch/ingest/IngestStatsNamesAndTypesIT.java", "server/src/main/java/org/elasticsearch/ingest/ConfigurationUtils.java", "server/src/main/java/org/elasticsearch/ingest/IngestService.java", "server/src/main/java/org/elasticsearch/ingest/OnFailureProcessor.java", "server/src/test/java/org/elasticsearch/ingest/OnFailureProcessorTests.java", "server/src/test/java/org/elasticsearch/ingest/PipelineFactoryTests.java"] | nodes/stats for ingest pipeline name and type may be misleading | nodes/stats is useful to view the performance of ingest nodes pipelines, showing how many events and how long it took to process events through the different processors. Nodes stats always shows the processors in the same order in which they are defined. However due to some internal code level reasons the name of the processor and type of the processor may be misleading when an `if` condition is present.
Given the following time pipeline (the script is designed to be slow to show the time it took)
```
PUT _ingest/pipeline/mypipeline
{
"processors": [
{
"set": {
"field": "a",
"value": "bl"
}
},
{
"script": {
"if": "true",
"source": " String a = ''; for(int i =0 ;i < 2147483647/10000; i ++){ a = a + 'x'}"
}
},
{
"uppercase": {
"if": "true",
"field": "a",
"on_failure": [
{
"set": {
"field": "error",
"value": "true"
}
}
]
}
}
]
}
PUT test/_doc/1?pipeline=mypipeline
{}
GET _nodes/stats?filter_path=nodes.**.pipelines.mypipeline
```
Will result in :
```
{
"nodes" : {
"xSq7F7CDR7mlUTgw4zu2pg" : {
"ingest" : {
"pipelines" : {
"mypipeline" : {
"count" : 1,
"time_in_millis" : 5406,
"current" : 0,
"failed" : 0,
"processors" : [
{
"set" : {
"type" : "set",
"stats" : {
"count" : 1,
"time_in_millis" : 0,
"current" : 0,
"failed" : 0
}
}
},
{
"script" : {
"type" : "conditional",
"stats" : {
"count" : 1,
"time_in_millis" : 5406,
"current" : 0,
"failed" : 0
}
}
},
{
"compound:CompoundProcessor-null-null" : {
"type" : "conditional",
"stats" : {
"count" : 1,
"time_in_millis" : 0,
"current" : 0,
"failed" : 0
}
}
}
]
}
}
}
}
}
}
```
The first processor output is correct.
The second processor shows `"type" : "conditional"`
The third processor also shows `"type" : "conditional"`, but also has the name `compound:CompoundProcessor-null-null` (it should be "uppercase" in reference to the processor name)
This is due to how the conditional 'if' is implemented as well as the on-failure handler.
As a work around, one can identify which processor the stats are for by counting top down, it will be the same order as the pipeline is defined.
| https://github.com/elastic/elasticsearch/issues/80763 | https://github.com/elastic/elasticsearch/pull/93533 | b61f60af2be616bad4bf44b1612e855e4b615034 | 815e6d730fb57e68d58e7ac58518af82f93cc301 | "2021-11-16T15:49:04Z" | java | "2023-02-07T19:55:30Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,693 | ["docs/changelog/101230.yaml", "server/src/main/java/org/elasticsearch/search/SearchService.java", "test/framework/src/main/java/org/elasticsearch/test/ESIntegTestCase.java", "test/framework/src/main/java/org/elasticsearch/test/ESSingleNodeTestCase.java"] | Concurrent Searching | It looks like Elasticsearch is currently missing support for concurrent searching and that this is a major prospective optimization to reduce latency.
Digression: this is not the topic at hand but I personally consider the fork OpenSearch to be an historical tragedy of duplication of work and a segregation of improvements. What would be even more anti-utilitarist would be to blindly *ignore* each other advances towards making better search.
Lucene concurrent search APIs are probably among the most important feature/optimization currently not leveraged by Elasticsearch.
The fork OpenSearch has a [pull request](https://github.com/opensearch-project/OpenSearch/pull/1500) implementing support for it.
See also the [corresponding issue](https://github.com/opensearch-project/OpenSearch/issues/1286)
I believe it would be great for end users if you could take inspiration from the PR and work on this feature.
Great blog about the Lucene feature:
https://blog.mikemccandless.com/2019/10/concurrent-query-execution-in-apache.html?m=1
See also those performance results:
https://engineeringblog.yelp.com/2021/09/nrtsearch-yelps-fast-scalable-and-cost-effective-search-engine.html | https://github.com/elastic/elasticsearch/issues/80693 | https://github.com/elastic/elasticsearch/pull/101230 | b921c1e627cb99300eb404d9aa573af62bd725e5 | d2f97e7e884afac506381864a4f3d32335e802b5 | "2021-11-14T16:48:53Z" | java | "2023-10-26T10:03:40Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,653 | ["x-pack/plugin/sql/qa/server/src/main/java/org/elasticsearch/xpack/sql/qa/FieldExtractorTestCase.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/execution/search/extractor/TopHitsAggExtractor.java", "x-pack/plugin/sql/src/test/java/org/elasticsearch/xpack/sql/execution/search/extractor/TopHitsAggExtractorTests.java"] | SQL: LAST/FIRST query fails in scenario with ignored field | For an index with mapping
```
{
"mappings": {
"properties": {
"text_field": {
"type": "keyword",
"ignore_above": 10
},
"date": {
"type": "date"
}
}
}
}
```
and data as
```
{"index":{"_id":1}}
{"text_field":"abcdefghijklmno","date":"2021-11-11T11:11:11.000Z"}
{"index":{"_id":2}}
{"text_field":"abc","date":"2021-11-11T12:11:11.000Z"}
{"index":{"_id":3}}
{"text_field":"123","date":"2021-11-11T13:11:11.000Z"}
```
an error is generated:
```
"error": {
"root_cause": [
{
"type": "illegal_argument_exception",
"reason": "failed to parse date field [text_field] with format [strict_date_optional_time]"
}
],
"type": "illegal_argument_exception",
"reason": "failed to parse date field [text_field] with format [strict_date_optional_time]",
"caused_by": {
"type": "date_time_parse_exception",
"reason": "Text 'text_field' could not be parsed at index 0"
}
}
``` | https://github.com/elastic/elasticsearch/issues/80653 | https://github.com/elastic/elasticsearch/pull/80655 | 1b300ac962cdf5d71a0d216a8b20e3aadb6c5290 | 116b1fab454ab4084a32ea0d4a8dea4d79595392 | "2021-11-11T09:06:06Z" | java | "2021-11-11T14:11:09Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,621 | ["x-pack/plugin/ml/src/internalClusterTest/java/org/elasticsearch/xpack/ml/integration/MlDistributedFailureIT.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/datafeed/DatafeedNodeSelector.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/job/process/autodetect/AutodetectProcessManager.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/job/task/OpenJobPersistentTasksExecutor.java"] | [ML] anomaly detection Job failed without reason audit message when model snapshot is too old | Steps to reproduce (easier to do this from a cloud env)
- Deploy a 7.8.1 cluster and start a real-time anomaly detection job,
- Then create a 8.0 cluster by restoring that 7.8.1 cluster snapshot,
- after 8.0 cluster successfully was created, login to check the AD job status:
AD job failed on UI, and there is no failed reason being thrown, neither in job message. (At the time of 11:56 on the below screenshot)
<img width="1969" alt="Screen Shot 2021-11-10 at 9 50 03 AM" src="https://user-images.githubusercontent.com/47184485/141148193-7226e948-51ac-4a9d-b281-79e4383ea95a.png">
After stop datafeed and force-close job (at the time of 16:01 on above screen), restarting job gave the root cause of job failure, which was caused by old model snapshot:
```
{
"error": {
"root_cause": [
{
"type": "exception",
"reason": "[response_code_rates] job snapshot [1636472812] has min version before [7.0.0], please revert to a newer model snapshot or reset the job"
}
],
"type": "exception",
"reason": "[response_code_rates] job snapshot [1636472812] has min version before [7.0.0], please revert to a newer model snapshot or reset the job"
},
"status": 500
}
```
Expected behaviour:
Good failure message on UI and job messages
| https://github.com/elastic/elasticsearch/issues/80621 | https://github.com/elastic/elasticsearch/pull/80665 | 8b2019a10e82d65e9b94bdf2c7c0e5259297feea | d95bca83036a598c2494df246dd32803f2f40805 | "2021-11-10T16:10:51Z" | java | "2021-11-11T20:38:55Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,561 | ["x-pack/plugin/ml/qa/native-multi-node-tests/src/javaRestTest/java/org/elasticsearch/xpack/ml/integration/ModelSnapshotSearchIT.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/job/persistence/JobResultsProvider.java"] | can not write type [class org.elasticsearch.Version] | **Elasticsearch version** (`bin/elasticsearch --version`): 7.16.0 BC3
**Plugins installed**: []
**JVM version** (`java -version`):
**OS version** (`uname -a` if on a Unix-like system): Cloud GCP
**Description of the problem including expected versus actual behavior**: a call to `GET /_migration/deprecations` gives an error response;
```
{
"error" : {
"root_cause" : [
{
"type" : "illegal_argument_exception",
"reason" : "can not write type [class org.elasticsearch.Version]"
}
],
"type" : "search_phase_execution_exception",
"reason" : "all shards failed",
"phase" : "query",
"grouped" : true,
"failed_shards" : [
{
"shard" : 0,
"index" : ".ml-anomalies-shared",
"node" : "czQpoMmrReqHYj1MO35irQ",
"reason" : {
"type" : "illegal_argument_exception",
"reason" : "can not write type [class org.elasticsearch.Version]"
}
}
],
"caused_by" : {
"type" : "",
"reason" : ": can not write type [class org.elasticsearch.Version]",
"caused_by" : {
"type" : "illegal_argument_exception",
"reason" : "can not write type [class org.elasticsearch.Version]"
}
}
},
"status" : 400
}
```
**Steps to reproduce**:
Much of this was done by the Cloud infrastructure so I can only say the steps I performed
1. Create a new 7.16.0 Cloud deployment on GCP Belgium region and select to restore snapshots from my existing 7.15.1 Cloud deployment (it's a bit large so in my case it took around 2 hours)
2. Check in Kibana Upgrade Assistant for Elasticsearch critical deprecations and it shows 16 critical deprecations about `_tier_preference` (1 of the same for each of 16 indices). I updated 1 ilm index and the count of critical deprecations went down from 16 to 15. I didn't do anything with the `.ml-anomalies-shared` index.
3. The next day, the Upgrade Assistant has an error showing the Elasticsearch deprecations. It was suggested I try this in the Kibana Dev Tools console `GET /_migration/deprecations`. See the error.
**Provide logs (if relevant)**:
```
[instance-0000000000] failed to serialize outbound message [Request{indices:data/read/search[phase/query]}{3087052}{false}{false}{false}]
java.lang.IllegalArgumentException: can not write type [class org.elasticsearch.Version]
at org.elasticsearch.common.io.stream.StreamOutput.writeGenericValue(StreamOutput.java:847) ~[elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.search.sort.FieldSortBuilder.writeTo(FieldSortBuilder.java:163) ~[elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.common.io.stream.StreamOutput.writeNamedWriteable(StreamOutput.java:1117) ~[elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.search.builder.SearchSourceBuilder.writeTo(SearchSourceBuilder.java:313) ~[elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.common.io.stream.StreamOutput.writeOptionalWriteable(StreamOutput.java:978) ~[elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.search.internal.ShardSearchRequest.innerWriteTo(ShardSearchRequest.java:333) ~[elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.search.internal.ShardSearchRequest.writeTo(ShardSearchRequest.java:319) ~[elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.OutboundMessage.serialize(OutboundMessage.java:75) ~[elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.OutboundHandler.sendMessage(OutboundHandler.java:180) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.OutboundHandler.sendRequest(OutboundHandler.java:109) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.TcpTransport$NodeChannels.sendRequest(TcpTransport.java:288) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.TransportService.sendRequestInternal(TransportService.java:975) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.xpack.security.transport.SecurityServerTransportInterceptor.sendWithUser(SecurityServerTransportInterceptor.java:206) [x-pack-security-7.16.0.jar:7.16.0]
at org.elasticsearch.xpack.security.transport.SecurityServerTransportInterceptor.access$300(SecurityServerTransportInterceptor.java:53) [x-pack-security-7.16.0.jar:7.16.0]
at org.elasticsearch.xpack.security.transport.SecurityServerTransportInterceptor$1.sendRequest(SecurityServerTransportInterceptor.java:167) [x-pack-security-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.TransportService.sendRequest(TransportService.java:874) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.TransportService.sendChildRequest(TransportService.java:937) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.TransportService.sendChildRequest(TransportService.java:925) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.search.SearchTransportService.sendExecuteQuery(SearchTransportService.java:250) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.search.SearchQueryThenFetchAsyncAction.executePhaseOnShard(SearchQueryThenFetchAsyncAction.java:104) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.search.AbstractSearchAsyncAction.lambda$performPhaseOnShard$3(AbstractSearchAsyncAction.java:328) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.search.AbstractSearchAsyncAction.performPhaseOnShard(AbstractSearchAsyncAction.java:364) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.search.AbstractSearchAsyncAction.onShardFailure(AbstractSearchAsyncAction.java:517) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.search.AbstractSearchAsyncAction.access$000(AbstractSearchAsyncAction.java:64) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.search.AbstractSearchAsyncAction$1.onFailure(AbstractSearchAsyncAction.java:343) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.ActionListener$Delegating.onFailure(ActionListener.java:66) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.ActionListenerResponseHandler.handleException(ActionListenerResponseHandler.java:48) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.action.search.SearchTransportService$ConnectionCountingHandler.handleException(SearchTransportService.java:651) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.TransportService$4.handleException(TransportService.java:853) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.TransportService$ContextRestoreResponseHandler.handleException(TransportService.java:1481) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.transport.TransportService$5.doRun(TransportService.java:1016) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771) [elasticsearch-7.16.0.jar:7.16.0]
at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26) [elasticsearch-7.16.0.jar:7.16.0]
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) [?:?]
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) [?:?]
at java.lang.Thread.run(Thread.java:833) [?:?]
```
| https://github.com/elastic/elasticsearch/issues/80561 | https://github.com/elastic/elasticsearch/pull/80596 | 5e98ea427bc8bbc0120b099e501f425f1880a7b7 | 08324ed4f80cb6796bf71ee081b85af9875bc505 | "2021-11-09T21:00:00Z" | java | "2021-11-10T14:10:53Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,551 | ["docs/changelog/84813.yaml", "x-pack/plugin/eql/src/test/resources/querytranslator_tests.txt", "x-pack/plugin/ql/src/main/java/org/elasticsearch/xpack/ql/expression/function/scalar/ScalarFunction.java", "x-pack/plugin/sql/qa/server/src/main/resources/null.sql-spec", "x-pack/plugin/sql/qa/server/src/main/resources/string-functions.sql-spec"] | SQL: Group by expression with text field does not always use `.keyword` subfield | Given the mapping
```
column | type | mapping
--------------------+---------------+---------------
...
last_name |VARCHAR |text
last_name.keyword |VARCHAR |keyword
...
```
the query `SELECT last_name IS NULL FROM test_emp GROUP BY 1` fails with
```
{
"error": {
"root_cause": [
{
"type": "script_exception",
"reason": "runtime error",
"script_stack": [
"org.elasticsearch.index.mapper.TextFieldMapper$TextFieldType.fielddataBuilder(TextFieldMapper.java:814)",
"org.elasticsearch.index.fielddata.IndexFieldDataService.getForField(IndexFieldDataService.java:109)",
"org.elasticsearch.index.query.SearchExecutionContext.lambda$lookup$2(SearchExecutionContext.java:503)",
"org.elasticsearch.search.lookup.SearchLookup.getForField(SearchLookup.java:105)",
"org.elasticsearch.search.lookup.LeafDocLookup$1.run(LeafDocLookup.java:72)",
"org.elasticsearch.search.lookup.LeafDocLookup$1.run(LeafDocLookup.java:69)",
"java.base/java.security.AccessController.doPrivileged(AccessController.java:318)",
"org.elasticsearch.search.lookup.LeafDocLookup.get(LeafDocLookup.java:69)",
"org.elasticsearch.search.lookup.LeafDocLookup.get(LeafDocLookup.java:27)",
"org.elasticsearch.xpack.ql.expression.function.scalar.whitelist.InternalQlScriptUtils.docValue(InternalQlScriptUtils.java:37)",
"InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))",
" ^---- HERE"
],
"script": "InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))",
"lang": "painless",
"position": {
"offset": 70,
"start": 0,
"end": 75
}
}
],
"type": "search_phase_execution_exception",
"reason": "all shards failed",
"phase": "query",
"grouped": true,
"failed_shards": [
{
"shard": 0,
"index": "test_emp",
"node": "6a6CBLYYQFa6gqsxbMkn5Q",
"reason": {
"type": "script_exception",
"reason": "runtime error",
"script_stack": [
"org.elasticsearch.index.mapper.TextFieldMapper$TextFieldType.fielddataBuilder(TextFieldMapper.java:814)",
"org.elasticsearch.index.fielddata.IndexFieldDataService.getForField(IndexFieldDataService.java:109)",
"org.elasticsearch.index.query.SearchExecutionContext.lambda$lookup$2(SearchExecutionContext.java:503)",
"org.elasticsearch.search.lookup.SearchLookup.getForField(SearchLookup.java:105)",
"org.elasticsearch.search.lookup.LeafDocLookup$1.run(LeafDocLookup.java:72)",
"org.elasticsearch.search.lookup.LeafDocLookup$1.run(LeafDocLookup.java:69)",
"java.base/java.security.AccessController.doPrivileged(AccessController.java:318)",
"org.elasticsearch.search.lookup.LeafDocLookup.get(LeafDocLookup.java:69)",
"org.elasticsearch.search.lookup.LeafDocLookup.get(LeafDocLookup.java:27)",
"org.elasticsearch.xpack.ql.expression.function.scalar.whitelist.InternalQlScriptUtils.docValue(InternalQlScriptUtils.java:37)",
"InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))",
" ^---- HERE"
],
"script": "InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))",
"lang": "painless",
"position": {
"offset": 70,
"start": 0,
"end": 75
},
"caused_by": {
"type": "illegal_argument_exception",
"reason": "Text fields are not optimised for operations that require per-document field data like aggregations and sorting, so these operations are disabled by default. Please use a keyword field instead. Alternatively, set fielddata=true on [last_name] in order to load field data by uninverting the inverted index. Note that this can use significant memory."
}
}
}
]
},
"status": 400
}
```
`/translate` reveals that SQL does not use the `last_name.keyword` subfield in this case:
```
{
"size": 0,
"_source": false,
"aggregations": {
"groupby": {
"composite": {
"size": 1000,
"sources": [
{
"4642bd56": {
"terms": {
"script": {
"source": "InternalQlScriptUtils.isNull(InternalQlScriptUtils.docValue(doc,params.v0))",
"lang": "painless",
"params": {
"v0": "last_name"
}
},
"missing_bucket": true,
"value_type": "boolean",
"order": "asc"
}
}
}
]
}
}
}
}
```
Explicitly using the `.keyword` subfield works (`SELECT last_name.keyword IS NULL FROM test_emp GROUP BY 1`).
Also some other queries like `SELECT CONCAT('Mr. ', last_name) FROM test_emp GROUP BY 1` work as expected.
It looks like only queries grouping on conditions that can be expressed as ES filters are affected by this issue. | https://github.com/elastic/elasticsearch/issues/80551 | https://github.com/elastic/elasticsearch/pull/84813 | 7c33a770adc91ec69261023c73a7848cddab8d52 | 61c3b82c2ed805ab9fa8de764a16e96b41488510 | "2021-11-09T16:59:15Z" | java | "2022-03-15T08:41:38Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,484 | ["x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BasicTokenizer.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/TokenTrieNode.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BasicTokenizerTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/BertTokenizerTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/inference/nlp/tokenizers/TokenTrieNodeTests.java"] | [ML] improve WordPiece tokenization around punctuation. | In certain scenarios, our wordpiece tokenization does not handle punctuation well.
`This is [MASK]~tastic!` in this scenario (with the mask next to a non-common punctuation), the tokenizer doesn't recognize the `[MASK]` token.
| https://github.com/elastic/elasticsearch/issues/80484 | https://github.com/elastic/elasticsearch/pull/81254 | 9fcbc0bb20e4ae032daafe85c4ac377cd808d843 | ab4581b805ae15d9e3cf3f41dcc7e0498d4b722b | "2021-11-08T12:37:17Z" | java | "2021-12-06T13:57:07Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,482 | ["docs/changelog/80906.yaml", "server/src/main/java/org/elasticsearch/rest/BaseRestHandler.java", "server/src/main/java/org/elasticsearch/rest/RestController.java", "server/src/main/java/org/elasticsearch/rest/RestHandler.java", "server/src/test/java/org/elasticsearch/rest/RestControllerTests.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/rest/SecurityRestFilter.java", "x-pack/plugin/sql/src/main/java/org/elasticsearch/xpack/sql/plugin/RestSqlQueryAction.java"] | Allow RestHandlers for Content-Type outside XContentType | It is currently impossible for `RestHandler` to deal with requests that specify a `Content-Type` that doesn't map to `XCotentType` due to strict validation inside `RestController.`
This makes dealing with binary data (for supporting endpoints/protocols that already exist) impossible since the handler never gets access to the underlying request - the sender receiving the response: `Content-Type header [<non-xcontent-type>] is not supported`
It would be great to allow the validation to be pluggable similar to the `Allow` header - a `RestHandler` could return its own `MediaTypeRegistry` to specify the accepted `Content-Type` (including requests without the header being defined).
| https://github.com/elastic/elasticsearch/issues/80482 | https://github.com/elastic/elasticsearch/pull/80906 | d9f77fa3a6f03d8b1360ae717fb380c0b8110c7e | c8d98cf5320d65110a11988746ebed9789011bd9 | "2021-11-08T11:08:03Z" | java | "2022-01-25T08:52:13Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,481 | ["docs/reference/commands/create-enrollment-token.asciidoc", "docs/reference/commands/reset-password.asciidoc", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authc/esnative/tool/ResetPasswordTool.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/enrollment/ExternalEnrollmentTokenGenerator.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/enrollment/tool/CreateEnrollmentTokenTool.java", "x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/tool/BaseRunAsSuperuserCommand.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/enrollment/ExternalEnrollmentTokenGeneratorTests.java", "x-pack/qa/security-tools-tests/src/test/java/org/elasticsearch/xpack/security/authc/esnative/tool/ResetPasswordToolTests.java", "x-pack/qa/security-tools-tests/src/test/java/org/elasticsearch/xpack/security/enrollment/tool/CreateEnrollmentTokenToolTests.java"] | CLI tools extending BaseRunAsSuperuserCommand should only connect to the local node | BaseRunAsSuperuserCommand uses a temporary file realm superuser to execute commands as. Since file realms are node specific, all requests should be executed against the local node from where the CLI runs.
We should not use `CommandLineHttpClient#getDefaultURL` or adjust it to prefer the local node if/when possible. At a minimum all tools that extend BaseRunAsSuperuserCommand should support a `--url` parameter that allows the user to override and point to the local node | https://github.com/elastic/elasticsearch/issues/80481 | https://github.com/elastic/elasticsearch/pull/81025 | 1f933390c146021f22186d2861b199fc9eb5043e | 537f371f348207e7c59d28162b61c3720e931d0c | "2021-11-08T10:55:42Z" | java | "2021-11-29T21:49:27Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,480 | ["distribution/tools/plugin-cli/src/main/java/org/elasticsearch/plugins/cli/InstallPluginAction.java", "distribution/tools/plugin-cli/src/test/java/org/elasticsearch/plugins/cli/InstallPluginActionTests.java", "docs/changelog/84766.yaml"] | elasticsearch-plugin install hang without any reason (no high cpu, nothing) | <!--
GitHub is reserved for bug reports and feature requests; it is not the place
for general questions. If you have a question or an unconfirmed bug , please
visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also
check your OS is [supported](https://www.elastic.co/support/matrix#show_os).
If it is not, the issue is likely to be closed.
For security vulnerabilities please only send reports to [email protected].
See https://www.elastic.co/community/security for more information.
Please fill in the following details to help us reproduce the bug:
-->
**Elasticsearch version** (`bin/elasticsearch --version`): `Version: 7.13.2, Build: default/deb/4d960a0733be83dd2543ca018aa4ddc42e956800/2021-06-10T21:01:55.251515791Z, JVM: 16`
**Plugins installed**: []
**JVM version** (`java -version`): `openjdk 16 2021-03-16
OpenJDK Runtime Environment AdoptOpenJDK (build 16+36)
OpenJDK 64-Bit Server VM AdoptOpenJDK (build 16+36, mixed mode, sharing)`
**OS version** (`uname -a` if on a Unix-like system): `Linux lk-elastic-data-6 4.19.0-18-amd64 #1 SMP Debian 4.19.208-1 (2021-09-29) x86_64 GNU/Linux`
**Description of the problem including expected versus actual behavior**:
Context, I would like to add 3 nodes to an existing cluster, **all of the 3 servers** are fresh install of debian10, and all of them get the same behavior
**Steps to reproduce**:
1. Install any plugin
`/usr/share/elasticsearch/bin/elasticsearch-plugin install analysis-kuromoji`
2. Hang for a long period without any reason
For repository-gcs it hang for 10-15min before asking y/N
```-> Installing repository-gcs
-> Downloading repository-gcs from elastic
[=================================================] 100%
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ WARNING: plugin requires additional permissions @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
* java.lang.RuntimePermission accessDeclaredMembers
* java.lang.RuntimePermission setFactory
* java.lang.reflect.ReflectPermission suppressAccessChecks
* java.net.SocketPermission * connect,resolve
See http://docs.oracle.com/javase/8/docs/technotes/guides/security/permissions.html
for descriptions of what these permissions allow and the associated risks.
Continue with installation? [y/N]
```
Additionnal information, installing with file:///path/plugin.zip works without hanging, and the plugin install do not respect os proxy I was trying to follow if it was an http request that hang.
**Provide logs (if relevant)**:
2 jstack
https://gist.github.com/PMickael/293f0bc431926fe95f7fe15332d72145
https://gist.github.com/PMickael/0f05418a32b9999f04d274d407af1533 | https://github.com/elastic/elasticsearch/issues/80480 | https://github.com/elastic/elasticsearch/pull/84766 | db6c58ed4547720f5e4167a8a8c87c3348aaffe9 | 5ae99a62972e5da428ffb1949096d349942d761e | "2021-11-08T10:54:02Z" | java | "2022-03-11T21:28:16Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,465 | ["qa/os/src/test/java/org/elasticsearch/packaging/test/ArchiveTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/test/ConfigurationTests.java", "qa/os/src/test/java/org/elasticsearch/packaging/util/ServerUtils.java", "x-pack/plugin/security/cli/src/main/java/org/elasticsearch/xpack/security/cli/AutoConfigureNode.java"] | Use node.name instead of `HOSTNAME` for auto-generated certificates | When `node.name` is set, it's most likely the this is what the user wants to identify the node by, rather than the `hostname` of the machine this node runs on. In such cases, we should set the CN of the autogenerated HTTP certifiate to `node.name`. | https://github.com/elastic/elasticsearch/issues/80465 | https://github.com/elastic/elasticsearch/pull/81007 | fbda52493cd1a0bbbf7550bf18a74202e1e59348 | d9ce0b01dd3efd3efcb2f77b0e9828be7c763f59 | "2021-11-07T09:05:32Z" | java | "2021-11-30T17:54:19Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,413 | ["server/src/main/java/org/elasticsearch/action/admin/indices/stats/IndexStats.java", "server/src/main/java/org/elasticsearch/action/admin/indices/stats/IndicesStatsResponse.java", "server/src/main/java/org/elasticsearch/action/admin/indices/stats/TransportIndicesStatsAction.java", "server/src/main/java/org/elasticsearch/cluster/health/ClusterHealthStatus.java", "server/src/main/java/org/elasticsearch/cluster/metadata/IndexMetadata.java", "server/src/test/java/org/elasticsearch/action/admin/indices/rollover/TransportRolloverActionTests.java", "server/src/test/java/org/elasticsearch/action/admin/indices/stats/IndicesStatsResponseTests.java", "server/src/test/java/org/elasticsearch/action/admin/indices/stats/IndicesStatsTests.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ilm/WaitForNoFollowersStepTests.java", "x-pack/plugin/monitoring/src/test/java/org/elasticsearch/xpack/monitoring/collector/indices/IndicesStatsMonitoringDocTests.java"] | Add index health and status to the _stats API | We want to migrate Index Management UI [from using `_cat/indices` API](https://github.com/elastic/kibana/issues/57286) and keep it consistent with the current implementation. I think we could use `_stats` API to retrieve most index properties displayed in the UI. Except for index health (green/yellow/red) and status (open/closed), is it possible to add those properties to the API?
Screenshot
<img width="1114" alt="Screenshot 2021-11-05 at 14 40 51" src="https://user-images.githubusercontent.com/6585477/140519477-867ebd0e-197d-44c9-abe0-bee8276c8274.png">
| https://github.com/elastic/elasticsearch/issues/80413 | https://github.com/elastic/elasticsearch/pull/81954 | 0699c9351f1439e246d408fd6538deafde4087b6 | b118d84288b79723b00f4b50b36435656ce81821 | "2021-11-05T13:25:44Z" | java | "2022-01-10T08:59:30Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,405 | ["x-pack/plugin/build.gradle"] | [CI] XPackRestIT test {p0=data_stream/140_data_stream_aliases/Fix IndexNotFoundException error when handling remove alias action} failing | **Build scan:**
https://gradle-enterprise.elastic.co/s/i76ylsjmi3jxu/tests/:x-pack:plugin:yamlRestTestV7CompatTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=data_stream%2F140_data_stream_aliases%2FFix%20IndexNotFoundException%20error%20when%20handling%20remove%20alias%20action%7D
**Reproduction line:**
`./gradlew ':x-pack:plugin:yamlRestTestV7CompatTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=data_stream/140_data_stream_aliases/Fix IndexNotFoundException error when handling remove alias action}" -Dtests.seed=F04A55B44D69E10C -Dtests.locale=ar-KW -Dtests.timezone=Canada/Pacific -Druntime.java=17`
**Applicable branches:**
8.0
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Ddata_stream/140_data_stream_aliases/Fix%20IndexNotFoundException%20error%20when%20handling%20remove%20alias%20action%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [data_stream/140_data_stream_aliases:397]: expected [2xx] status code but api [indices.update_aliases] returned [404 Not Found] [{"error":{"root_cause":[{"type":"index_not_found_exception","reason":"no such index [log-foobar]","resource.type":"index_or_alias","resource.id":"log-foobar","index_uuid":"_na_","index":"log-foobar","stack_trace":"[log-foobar] org.elasticsearch.index.IndexNotFoundException: no such index [log-foobar]\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.indexNotFoundException(IndexNameExpressionResolver.java:1289)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.innerResolve(IndexNameExpressionResolver.java:1231)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.resolve(IndexNameExpressionResolver.java:1183)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:302)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:236)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:175)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:57)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.executeMasterOperation(TransportMasterNodeAction.java:121)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.lambda$doStart$3(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.EsExecutors$DirectExecutorService.execute(EsExecutors.java:220)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.doStart(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:152)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:52)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:79)\n\tat org.elasticsearch.action.support.ActionFilter$Simple.apply(ActionFilter.java:53)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$3(SecurityActionFilter.java:169)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:576)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.lambda$intercept$4(IndicesAliasesRequestInterceptor.java:105)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.validateIndexPermissionsAreSubset(RBACEngine.java:504)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.intercept(IndicesAliasesRequestInterceptor.java:98)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ShardSearchRequestInterceptor.intercept(ShardSearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.SearchRequestInterceptor.intercept(SearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.BulkShardRequestInterceptor.intercept(BulkShardRequestInterceptor.java:87)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.UpdateRequestInterceptor.intercept(UpdateRequestInterceptor.java:27)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ResizeRequestInterceptor.intercept(ResizeRequestInterceptor.java:96)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.DlsFlsLicenseRequestInterceptor.intercept(DlsFlsLicenseRequestInterceptor.java:85)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.runRequestInterceptors(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.handleIndexActionAuthorizationResult(AuthorizationService.java:555)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorizeAction$11(AuthorizationService.java:449)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:964)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:928)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$authorizeIndexAction$4(RBACEngine.java:378)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:41)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$CachingAsyncSupplier.getAsync(AuthorizationService.java:1012)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.authorizeIndexAction(RBACEngine.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorizeAction(AuthorizationService.java:442)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.maybeAuthorizeRunAs(AuthorizationService.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorize$1(AuthorizationService.java:255)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$resolveAuthorizationInfo$1(RBACEngine.java:138)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authz.store.CompositeRolesStore.getRoles(CompositeRolesStore.java:300)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.getRoles(RBACEngine.java:144)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.resolveAuthorizationInfo(RBACEngine.java:127)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorize(AuthorizationService.java:257)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$4(SecurityActionFilter.java:165)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:93)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:171)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.applyInternal(SecurityActionFilter.java:161)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.apply(SecurityActionFilter.java:120)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.action.support.TransportAction.execute(TransportAction.java:54)\n\tat org.elasticsearch.tasks.TaskManager.registerAndExecute(TaskManager.java:170)\n\tat org.elasticsearch.client.node.NodeClient.executeLocally(NodeClient.java:105)\n\tat org.elasticsearch.client.node.NodeClient.doExecute(NodeClient.java:83)\n\tat org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:380)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.execute(AbstractClient.java:1271)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.aliases(AbstractClient.java:1286)\n\tat org.elasticsearch.rest.action.admin.indices.RestIndicesAliasesAction.lambda$prepareRequest$0(RestIndicesAliasesAction.java:46)\n\tat org.elasticsearch.rest.BaseRestHandler.handleRequest(BaseRestHandler.java:103)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$0(SecurityRestFilter.java:114)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.lambda$authenticateAndAttachToContext$2(SecondaryAuthenticator.java:84)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticate(SecondaryAuthenticator.java:94)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticateAndAttachToContext(SecondaryAuthenticator.java:78)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$2(SecurityRestFilter.java:108)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.action.ActionListener$RunBeforeActionListener.onResponse(ActionListener.java:389)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.writeAuthToContext(AuthenticatorChain.java:378)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.finishAuthentication(AuthenticatorChain.java:354)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.maybeLookupRunAsUser(AuthenticatorChain.java:207)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$doAuthenticate$1(AuthenticatorChain.java:121)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$4(AuthenticatorChain.java:189)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$3(RealmsAuthenticator.java:219)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$0(RealmsAuthenticator.java:164)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$1(CachingUsernamePasswordRealm.java:155)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.handleCachedAuthentication(CachingUsernamePasswordRealm.java:242)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$2(CachingUsernamePasswordRealm.java:139)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticateWithCache(CachingUsernamePasswordRealm.java:134)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticate(CachingUsernamePasswordRealm.java:105)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$2(RealmsAuthenticator.java:148)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.consumeToken(RealmsAuthenticator.java:233)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.authenticate(RealmsAuthenticator.java:84)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:181)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.doAuthenticate(AuthenticatorChain.java:136)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:95)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:149)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:127)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.handleRequest(SecurityRestFilter.java:102)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:363)\n\tat org.elasticsearch.rest.RestController.tryAllHandlers(RestController.java:431)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:278)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.dispatchRequest(AbstractHttpServerTransport.java:382)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.handleIncomingRequest(AbstractHttpServerTransport.java:461)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.incomingRequest(AbstractHttpServerTransport.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:32)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:18)\n\tat io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpPipeliningHandler.channelRead(Netty4HttpPipeliningHandler.java:48)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324)\n\tat io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.timeout.IdleStateHandler.channelRead(IdleStateHandler.java:286)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)\n\tat io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583)\n\tat io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)\n\tat io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986)\n\tat io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)\n\tat java.base/java.lang.Thread.run(Thread.java:833)\n"}],"type":"index_not_found_exception","reason":"no such index [log-foobar]","resource.type":"index_or_alias","resource.id":"log-foobar","index_uuid":"_na_","index":"log-foobar","stack_trace":"[log-foobar] org.elasticsearch.index.IndexNotFoundException: no such index [log-foobar]\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.indexNotFoundException(IndexNameExpressionResolver.java:1289)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.innerResolve(IndexNameExpressionResolver.java:1231)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.resolve(IndexNameExpressionResolver.java:1183)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:302)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:236)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:175)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:57)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.executeMasterOperation(TransportMasterNodeAction.java:121)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.lambda$doStart$3(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.EsExecutors$DirectExecutorService.execute(EsExecutors.java:220)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.doStart(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:152)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:52)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:79)\n\tat org.elasticsearch.action.support.ActionFilter$Simple.apply(ActionFilter.java:53)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$3(SecurityActionFilter.java:169)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:576)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.lambda$intercept$4(IndicesAliasesRequestInterceptor.java:105)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.validateIndexPermissionsAreSubset(RBACEngine.java:504)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.intercept(IndicesAliasesRequestInterceptor.java:98)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ShardSearchRequestInterceptor.intercept(ShardSearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.SearchRequestInterceptor.intercept(SearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.BulkShardRequestInterceptor.intercept(BulkShardRequestInterceptor.java:87)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.UpdateRequestInterceptor.intercept(UpdateRequestInterceptor.java:27)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ResizeRequestInterceptor.intercept(ResizeRequestInterceptor.java:96)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.DlsFlsLicenseRequestInterceptor.intercept(DlsFlsLicenseRequestInterceptor.java:85)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.runRequestInterceptors(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.handleIndexActionAuthorizationResult(AuthorizationService.java:555)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorizeAction$11(AuthorizationService.java:449)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:964)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:928)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$authorizeIndexAction$4(RBACEngine.java:378)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:41)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$CachingAsyncSupplier.getAsync(AuthorizationService.java:1012)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.authorizeIndexAction(RBACEngine.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorizeAction(AuthorizationService.java:442)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.maybeAuthorizeRunAs(AuthorizationService.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorize$1(AuthorizationService.java:255)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$resolveAuthorizationInfo$1(RBACEngine.java:138)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authz.store.CompositeRolesStore.getRoles(CompositeRolesStore.java:300)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.getRoles(RBACEngine.java:144)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.resolveAuthorizationInfo(RBACEngine.java:127)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorize(AuthorizationService.java:257)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$4(SecurityActionFilter.java:165)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:93)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:171)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.applyInternal(SecurityActionFilter.java:161)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.apply(SecurityActionFilter.java:120)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.action.support.TransportAction.execute(TransportAction.java:54)\n\tat org.elasticsearch.tasks.TaskManager.registerAndExecute(TaskManager.java:170)\n\tat org.elasticsearch.client.node.NodeClient.executeLocally(NodeClient.java:105)\n\tat org.elasticsearch.client.node.NodeClient.doExecute(NodeClient.java:83)\n\tat org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:380)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.execute(AbstractClient.java:1271)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.aliases(AbstractClient.java:1286)\n\tat org.elasticsearch.rest.action.admin.indices.RestIndicesAliasesAction.lambda$prepareRequest$0(RestIndicesAliasesAction.java:46)\n\tat org.elasticsearch.rest.BaseRestHandler.handleRequest(BaseRestHandler.java:103)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$0(SecurityRestFilter.java:114)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.lambda$authenticateAndAttachToContext$2(SecondaryAuthenticator.java:84)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticate(SecondaryAuthenticator.java:94)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticateAndAttachToContext(SecondaryAuthenticator.java:78)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$2(SecurityRestFilter.java:108)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.action.ActionListener$RunBeforeActionListener.onResponse(ActionListener.java:389)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.writeAuthToContext(AuthenticatorChain.java:378)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.finishAuthentication(AuthenticatorChain.java:354)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.maybeLookupRunAsUser(AuthenticatorChain.java:207)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$doAuthenticate$1(AuthenticatorChain.java:121)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$4(AuthenticatorChain.java:189)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$3(RealmsAuthenticator.java:219)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$0(RealmsAuthenticator.java:164)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$1(CachingUsernamePasswordRealm.java:155)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.handleCachedAuthentication(CachingUsernamePasswordRealm.java:242)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$2(CachingUsernamePasswordRealm.java:139)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticateWithCache(CachingUsernamePasswordRealm.java:134)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticate(CachingUsernamePasswordRealm.java:105)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$2(RealmsAuthenticator.java:148)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.consumeToken(RealmsAuthenticator.java:233)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.authenticate(RealmsAuthenticator.java:84)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:181)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.doAuthenticate(AuthenticatorChain.java:136)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:95)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:149)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:127)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.handleRequest(SecurityRestFilter.java:102)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:363)\n\tat org.elasticsearch.rest.RestController.tryAllHandlers(RestController.java:431)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:278)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.dispatchRequest(AbstractHttpServerTransport.java:382)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.handleIncomingRequest(AbstractHttpServerTransport.java:461)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.incomingRequest(AbstractHttpServerTransport.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:32)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:18)\n\tat io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpPipeliningHandler.channelRead(Netty4HttpPipeliningHandler.java:48)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324)\n\tat io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.timeout.IdleStateHandler.channelRead(IdleStateHandler.java:286)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)\n\tat io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583)\n\tat io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)\n\tat io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986)\n\tat io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)\n\tat java.base/java.lang.Thread.run(Thread.java:833)\n"},"status":404}]
at __randomizedtesting.SeedInfo.seed([F04A55B44D69E10C:781E6A6EE3958CF4]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.lang.AssertionError: expected [2xx] status code but api [indices.update_aliases] returned [404 Not Found] [{"error":{"root_cause":[{"type":"index_not_found_exception","reason":"no such index [log-foobar]","resource.type":"index_or_alias","resource.id":"log-foobar","index_uuid":"_na_","index":"log-foobar","stack_trace":"[log-foobar] org.elasticsearch.index.IndexNotFoundException: no such index [log-foobar]\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.indexNotFoundException(IndexNameExpressionResolver.java:1289)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.innerResolve(IndexNameExpressionResolver.java:1231)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.resolve(IndexNameExpressionResolver.java:1183)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:302)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:236)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:175)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:57)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.executeMasterOperation(TransportMasterNodeAction.java:121)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.lambda$doStart$3(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.EsExecutors$DirectExecutorService.execute(EsExecutors.java:220)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.doStart(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:152)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:52)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:79)\n\tat org.elasticsearch.action.support.ActionFilter$Simple.apply(ActionFilter.java:53)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$3(SecurityActionFilter.java:169)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:576)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.lambda$intercept$4(IndicesAliasesRequestInterceptor.java:105)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.validateIndexPermissionsAreSubset(RBACEngine.java:504)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.intercept(IndicesAliasesRequestInterceptor.java:98)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ShardSearchRequestInterceptor.intercept(ShardSearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.SearchRequestInterceptor.intercept(SearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.BulkShardRequestInterceptor.intercept(BulkShardRequestInterceptor.java:87)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.UpdateRequestInterceptor.intercept(UpdateRequestInterceptor.java:27)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ResizeRequestInterceptor.intercept(ResizeRequestInterceptor.java:96)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.DlsFlsLicenseRequestInterceptor.intercept(DlsFlsLicenseRequestInterceptor.java:85)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.runRequestInterceptors(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.handleIndexActionAuthorizationResult(AuthorizationService.java:555)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorizeAction$11(AuthorizationService.java:449)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:964)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:928)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$authorizeIndexAction$4(RBACEngine.java:378)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:41)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$CachingAsyncSupplier.getAsync(AuthorizationService.java:1012)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.authorizeIndexAction(RBACEngine.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorizeAction(AuthorizationService.java:442)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.maybeAuthorizeRunAs(AuthorizationService.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorize$1(AuthorizationService.java:255)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$resolveAuthorizationInfo$1(RBACEngine.java:138)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authz.store.CompositeRolesStore.getRoles(CompositeRolesStore.java:300)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.getRoles(RBACEngine.java:144)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.resolveAuthorizationInfo(RBACEngine.java:127)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorize(AuthorizationService.java:257)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$4(SecurityActionFilter.java:165)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:93)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:171)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.applyInternal(SecurityActionFilter.java:161)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.apply(SecurityActionFilter.java:120)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.action.support.TransportAction.execute(TransportAction.java:54)\n\tat org.elasticsearch.tasks.TaskManager.registerAndExecute(TaskManager.java:170)\n\tat org.elasticsearch.client.node.NodeClient.executeLocally(NodeClient.java:105)\n\tat org.elasticsearch.client.node.NodeClient.doExecute(NodeClient.java:83)\n\tat org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:380)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.execute(AbstractClient.java:1271)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.aliases(AbstractClient.java:1286)\n\tat org.elasticsearch.rest.action.admin.indices.RestIndicesAliasesAction.lambda$prepareRequest$0(RestIndicesAliasesAction.java:46)\n\tat org.elasticsearch.rest.BaseRestHandler.handleRequest(BaseRestHandler.java:103)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$0(SecurityRestFilter.java:114)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.lambda$authenticateAndAttachToContext$2(SecondaryAuthenticator.java:84)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticate(SecondaryAuthenticator.java:94)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticateAndAttachToContext(SecondaryAuthenticator.java:78)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$2(SecurityRestFilter.java:108)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.action.ActionListener$RunBeforeActionListener.onResponse(ActionListener.java:389)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.writeAuthToContext(AuthenticatorChain.java:378)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.finishAuthentication(AuthenticatorChain.java:354)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.maybeLookupRunAsUser(AuthenticatorChain.java:207)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$doAuthenticate$1(AuthenticatorChain.java:121)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$4(AuthenticatorChain.java:189)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$3(RealmsAuthenticator.java:219)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$0(RealmsAuthenticator.java:164)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$1(CachingUsernamePasswordRealm.java:155)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.handleCachedAuthentication(CachingUsernamePasswordRealm.java:242)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$2(CachingUsernamePasswordRealm.java:139)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticateWithCache(CachingUsernamePasswordRealm.java:134)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticate(CachingUsernamePasswordRealm.java:105)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$2(RealmsAuthenticator.java:148)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.consumeToken(RealmsAuthenticator.java:233)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.authenticate(RealmsAuthenticator.java:84)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:181)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.doAuthenticate(AuthenticatorChain.java:136)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:95)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:149)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:127)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.handleRequest(SecurityRestFilter.java:102)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:363)\n\tat org.elasticsearch.rest.RestController.tryAllHandlers(RestController.java:431)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:278)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.dispatchRequest(AbstractHttpServerTransport.java:382)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.handleIncomingRequest(AbstractHttpServerTransport.java:461)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.incomingRequest(AbstractHttpServerTransport.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:32)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:18)\n\tat io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpPipeliningHandler.channelRead(Netty4HttpPipeliningHandler.java:48)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324)\n\tat io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.timeout.IdleStateHandler.channelRead(IdleStateHandler.java:286)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)\n\tat io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583)\n\tat io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)\n\tat io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986)\n\tat io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)\n\tat java.base/java.lang.Thread.run(Thread.java:833)\n"}],"type":"index_not_found_exception","reason":"no such index [log-foobar]","resource.type":"index_or_alias","resource.id":"log-foobar","index_uuid":"_na_","index":"log-foobar","stack_trace":"[log-foobar] org.elasticsearch.index.IndexNotFoundException: no such index [log-foobar]\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.indexNotFoundException(IndexNameExpressionResolver.java:1289)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.innerResolve(IndexNameExpressionResolver.java:1231)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver$WildcardExpressionResolver.resolve(IndexNameExpressionResolver.java:1183)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:302)\n\tat org.elasticsearch.cluster.metadata.IndexNameExpressionResolver.concreteIndices(IndexNameExpressionResolver.java:236)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:175)\n\tat org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction.masterOperation(TransportIndicesAliasesAction.java:57)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.executeMasterOperation(TransportMasterNodeAction.java:121)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.lambda$doStart$3(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.ActionRunnable$2.doRun(ActionRunnable.java:62)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.EsExecutors$DirectExecutorService.execute(EsExecutors.java:220)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction$AsyncSingleAction.doStart(TransportMasterNodeAction.java:215)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:152)\n\tat org.elasticsearch.action.support.master.TransportMasterNodeAction.doExecute(TransportMasterNodeAction.java:52)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:79)\n\tat org.elasticsearch.action.support.ActionFilter$Simple.apply(ActionFilter.java:53)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$3(SecurityActionFilter.java:169)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:576)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.lambda$intercept$4(IndicesAliasesRequestInterceptor.java:105)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.validateIndexPermissionsAreSubset(RBACEngine.java:504)\n\tat org.elasticsearch.xpack.security.authz.interceptor.IndicesAliasesRequestInterceptor.intercept(IndicesAliasesRequestInterceptor.java:98)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ShardSearchRequestInterceptor.intercept(ShardSearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.SearchRequestInterceptor.intercept(SearchRequestInterceptor.java:26)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.BulkShardRequestInterceptor.intercept(BulkShardRequestInterceptor.java:87)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.FieldAndDocumentLevelSecurityRequestInterceptor.intercept(FieldAndDocumentLevelSecurityRequestInterceptor.java:84)\n\tat org.elasticsearch.xpack.security.authz.interceptor.UpdateRequestInterceptor.intercept(UpdateRequestInterceptor.java:27)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.ResizeRequestInterceptor.intercept(ResizeRequestInterceptor.java:96)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:574)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$1.onResponse(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.interceptor.DlsFlsLicenseRequestInterceptor.intercept(DlsFlsLicenseRequestInterceptor.java:85)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.runRequestInterceptors(AuthorizationService.java:570)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.handleIndexActionAuthorizationResult(AuthorizationService.java:555)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorizeAction$11(AuthorizationService.java:449)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:964)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$AuthorizationResultListener.onResponse(AuthorizationService.java:928)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$authorizeIndexAction$4(RBACEngine.java:378)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:41)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService$CachingAsyncSupplier.getAsync(AuthorizationService.java:1012)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.authorizeIndexAction(RBACEngine.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorizeAction(AuthorizationService.java:442)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.maybeAuthorizeRunAs(AuthorizationService.java:370)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.lambda$authorize$1(AuthorizationService.java:255)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.lambda$resolveAuthorizationInfo$1(RBACEngine.java:138)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authz.store.CompositeRolesStore.getRoles(CompositeRolesStore.java:300)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.getRoles(RBACEngine.java:144)\n\tat org.elasticsearch.xpack.security.authz.RBACEngine.resolveAuthorizationInfo(RBACEngine.java:127)\n\tat org.elasticsearch.xpack.security.authz.AuthorizationService.authorize(AuthorizationService.java:257)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$4(SecurityActionFilter.java:165)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:93)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:171)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.applyInternal(SecurityActionFilter.java:161)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.apply(SecurityActionFilter.java:120)\n\tat org.elasticsearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:77)\n\tat org.elasticsearch.action.support.TransportAction.execute(TransportAction.java:54)\n\tat org.elasticsearch.tasks.TaskManager.registerAndExecute(TaskManager.java:170)\n\tat org.elasticsearch.client.node.NodeClient.executeLocally(NodeClient.java:105)\n\tat org.elasticsearch.client.node.NodeClient.doExecute(NodeClient.java:83)\n\tat org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:380)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.execute(AbstractClient.java:1271)\n\tat org.elasticsearch.client.support.AbstractClient$IndicesAdmin.aliases(AbstractClient.java:1286)\n\tat org.elasticsearch.rest.action.admin.indices.RestIndicesAliasesAction.lambda$prepareRequest$0(RestIndicesAliasesAction.java:46)\n\tat org.elasticsearch.rest.BaseRestHandler.handleRequest(BaseRestHandler.java:103)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$0(SecurityRestFilter.java:114)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.lambda$authenticateAndAttachToContext$2(SecondaryAuthenticator.java:84)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticate(SecondaryAuthenticator.java:94)\n\tat org.elasticsearch.xpack.security.authc.support.SecondaryAuthenticator.authenticateAndAttachToContext(SecondaryAuthenticator.java:78)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.lambda$handleRequest$2(SecurityRestFilter.java:108)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.ActionListener$MappedActionListener.onResponse(ActionListener.java:101)\n\tat org.elasticsearch.action.ActionListener$RunBeforeActionListener.onResponse(ActionListener.java:389)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.writeAuthToContext(AuthenticatorChain.java:378)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.finishAuthentication(AuthenticatorChain.java:354)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.maybeLookupRunAsUser(AuthenticatorChain.java:207)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$doAuthenticate$1(AuthenticatorChain.java:121)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$4(AuthenticatorChain.java:189)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$3(RealmsAuthenticator.java:219)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:141)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$0(RealmsAuthenticator.java:164)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$1(CachingUsernamePasswordRealm.java:155)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.handleCachedAuthentication(CachingUsernamePasswordRealm.java:242)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.lambda$authenticateWithCache$2(CachingUsernamePasswordRealm.java:139)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.notifyListenerDirectly(ListenableFuture.java:113)\n\tat org.elasticsearch.common.util.concurrent.ListenableFuture.addListener(ListenableFuture.java:55)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticateWithCache(CachingUsernamePasswordRealm.java:134)\n\tat org.elasticsearch.xpack.security.authc.support.CachingUsernamePasswordRealm.authenticate(CachingUsernamePasswordRealm.java:105)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.lambda$consumeToken$2(RealmsAuthenticator.java:148)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.consumeToken(RealmsAuthenticator.java:233)\n\tat org.elasticsearch.xpack.security.authc.RealmsAuthenticator.authenticate(RealmsAuthenticator.java:84)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:181)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.onResponse(IteratingActionListener.java:135)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.lambda$getAuthenticatorConsumer$5(AuthenticatorChain.java:158)\n\tat org.elasticsearch.xpack.core.common.IteratingActionListener.run(IteratingActionListener.java:117)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.doAuthenticate(AuthenticatorChain.java:136)\n\tat org.elasticsearch.xpack.security.authc.AuthenticatorChain.authenticateAsync(AuthenticatorChain.java:95)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:149)\n\tat org.elasticsearch.xpack.security.authc.AuthenticationService.authenticate(AuthenticationService.java:127)\n\tat org.elasticsearch.xpack.security.rest.SecurityRestFilter.handleRequest(SecurityRestFilter.java:102)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:363)\n\tat org.elasticsearch.rest.RestController.tryAllHandlers(RestController.java:431)\n\tat org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:278)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.dispatchRequest(AbstractHttpServerTransport.java:382)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.handleIncomingRequest(AbstractHttpServerTransport.java:461)\n\tat org.elasticsearch.http.AbstractHttpServerTransport.incomingRequest(AbstractHttpServerTransport.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:32)\n\tat org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:18)\n\tat io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:99)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat org.elasticsearch.http.netty4.Netty4HttpPipeliningHandler.channelRead(Netty4HttpPipeliningHandler.java:48)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324)\n\tat io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.timeout.IdleStateHandler.channelRead(IdleStateHandler.java:286)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)\n\tat io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)\n\tat io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)\n\tat io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)\n\tat io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620)\n\tat io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583)\n\tat io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)\n\tat io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986)\n\tat io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)\n\tat java.base/java.lang.Thread.run(Thread.java:833)\n"},"status":404}]
at org.junit.Assert.fail(Assert.java:88)
at org.elasticsearch.test.rest.yaml.section.DoSection.execute(DoSection.java:374)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/80405 | https://github.com/elastic/elasticsearch/pull/93558 | eff2fdb95889a6a88d22a5bb1b4c6633cb4680e8 | bb76d2eeae6adb7563db12eec227961dda595b22 | "2021-11-05T10:45:07Z" | java | "2023-02-07T14:49:12Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,398 | ["docs/changelog/84410.yaml", "plugins/discovery-ec2/qa/amazon-ec2/src/yamlRestTest/java/org/elasticsearch/discovery/ec2/AmazonEC2Fixture.java", "plugins/discovery-ec2/src/main/java/org/elasticsearch/discovery/ec2/AwsEc2Utils.java", "plugins/discovery-ec2/src/main/java/org/elasticsearch/discovery/ec2/Ec2DiscoveryPlugin.java", "plugins/discovery-ec2/src/main/java/org/elasticsearch/discovery/ec2/Ec2NameResolver.java", "plugins/discovery-ec2/src/test/java/org/elasticsearch/discovery/ec2/Ec2DiscoveryPluginTests.java"] | Support IMDSv2 for EC2 Discovery | We have been using Elasticsearch for storing our application data, and are extensively using the EC2 discovery plugin and S3 plugin. As per AWS best practices, we are making use of the EC2 instance metadata to get the required auth tokens for EC2 discovery and S3 snapshots, and dont make use of any access_keys and secret_access_keys. Following is the elasticsearch.yml file:
**discovery.seed_providers: ec2
discovery.ec2.tag.cluster_name: elasticsearch
network.host: \_ec2:privateIpv4_\
http.port: 9200
discovery.ec2.endpoint: ec2.ap-south-1.amazonaws.com
cloud.node.auto_attributes: true
cluster.routing.allocation.awareness.attributes: aws_availability_zone
logger.org.elasticsearch.discovery.ec2: "WARN"**
Recently during our security audit, we got to know about a new Session oriented way of interacting with the EC2 metadata plugin. More info [here](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html). As this was a more secured way, we tried it out in our lower environments, which led to our Elasticsearch clusters go into YELLOW state. The reason for this is that the nodes were not able to get the availability zone by querying the instance metadata service.
Logs for the same:
`{"type": "server", "timestamp": "2021-11-05T07:31:59,234Z", "level": "DEBUG", "component": "o.e.d.e.Ec2DiscoveryPlugin", "cluster.name": "elasticsearch", "node.name": "elasticsearch-master-2", "message": "obtaining ec2 [placement/availability-zone] from ec2 meta-data url http://169.254.169.254/latest/meta-data/placement/availability-zone" }
{"type": "server", "timestamp": "2021-11-05T07:31:59,321Z", "level": "ERROR", "component": "o.e.d.e.Ec2DiscoveryPlugin", "cluster.name": "elasticsearch", "node.name": "elasticsearch-master-2", "message": "failed to get metadata for [placement/availability-zone]",
"stacktrace": ["java.io.IOException: Server returned HTTP response code: 401 for URL: http://169.254.169.254/latest/meta-data/placement/availability-zone",
`
I am not really sure if this is already implemented or not, as I could not find any documentation for the same. It would be great if we could support this new way of authorization, if not supported yet :) | https://github.com/elastic/elasticsearch/issues/80398 | https://github.com/elastic/elasticsearch/pull/84410 | 5ebcf60fbc7a4a629bbbe4a267b4b05f11fe5794 | 892d2a2a942275dd350721e5a4463e48d7d9c43a | "2021-11-05T09:44:21Z" | java | "2022-03-09T13:43:14Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,321 | ["x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/action/TransformUpdater.java", "x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/action/TransportUpgradeTransformsAction.java"] | [CI] UpgradeClusterClientYamlTestSuiteIT test {p0=upgraded_cluster/80_transform_jobs_crud/Get start, stop, upgrade and delete old cluster batch transform} failing | **Build scan:**
https://gradle-enterprise.elastic.co/s/t437exhetbvac/tests/:x-pack:qa:rolling-upgrade:v7.4.0%23upgradedClusterTest/org.elasticsearch.upgrades.UpgradeClusterClientYamlTestSuiteIT/test%20%7Bp0=upgraded_cluster%2F80_transform_jobs_crud%2FGet%20start,%20stop,%20upgrade%20and%20delete%20old%20cluster%20batch%20transform%7D
**Reproduction line:**
`./gradlew ':x-pack:qa:rolling-upgrade:v7.4.0#upgradedClusterTest' -Dtests.class="org.elasticsearch.upgrades.UpgradeClusterClientYamlTestSuiteIT" -Dtests.method="test {p0=upgraded_cluster/80_transform_jobs_crud/Get start, stop, upgrade and delete old cluster batch transform}" -Dtests.seed=B85BC0E14879F0B6 -Dtests.bwc=true -Dtests.locale=es-BO -Dtests.timezone=Asia/Vladivostok -Druntime.java=8`
**Applicable branches:**
7.16
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.upgrades.UpgradeClusterClientYamlTestSuiteIT&tests.test=test%20%7Bp0%3Dupgraded_cluster/80_transform_jobs_crud/Get%20start,%20stop,%20upgrade%20and%20delete%20old%20cluster%20batch%20transform%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [upgraded_cluster/80_transform_jobs_crud:80]: expected [2xx] status code but api [transform.upgrade_transforms] returned [404 Not Found] [{"error":{"root_cause":[{"type":"resource_not_found_exception","reason":"Transform with id [mixed-simple-continuous-transform] could not be found","stack_trace":"ResourceNotFoundException[Transform with id [mixed-simple-continuous-transform] could not be found]\n\tat org.elasticsearch.xpack.transform.persistence.IndexBasedTransformConfigManager.lambda$getTransformConfigurationForUpdate$12(IndexBasedTransformConfigManager.java:497)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:88)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:82)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$2(SecurityActionFilter.java:192)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.action.ActionListener$RunAfterActionListener.onResponse(ActionListener.java:341)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.sendSearchResponse(AbstractSearchAsyncAction.java:719)\n\tat org.elasticsearch.action.search.ExpandSearchPhase.run(ExpandSearchPhase.java:106)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executePhase(AbstractSearchAsyncAction.java:466)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:460)\n\tat org.elasticsearch.action.search.FetchSearchPhase.moveToNextPhase(FetchSearchPhase.java:287)\n\tat org.elasticsearch.action.search.FetchSearchPhase.lambda$innerRun$1(FetchSearchPhase.java:114)\n\tat org.elasticsearch.action.search.FetchSearchPhase.innerRun(FetchSearchPhase.java:132)\n\tat org.elasticsearch.action.search.FetchSearchPhase.access$000(FetchSearchPhase.java:37)\n\tat org.elasticsearch.action.search.FetchSearchPhase$1.doRun(FetchSearchPhase.java:98)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.TimedRunnable.doRun(TimedRunnable.java:33)\n\tat org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tat java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\tat java.lang.Thread.run(Thread.java:748)\n"}],"type":"resource_not_found_exception","reason":"Transform with id [mixed-simple-continuous-transform] could not be found","stack_trace":"ResourceNotFoundException[Transform with id [mixed-simple-continuous-transform] could not be found]\n\tat org.elasticsearch.xpack.transform.persistence.IndexBasedTransformConfigManager.lambda$getTransformConfigurationForUpdate$12(IndexBasedTransformConfigManager.java:497)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:88)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:82)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$2(SecurityActionFilter.java:192)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.action.ActionListener$RunAfterActionListener.onResponse(ActionListener.java:341)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.sendSearchResponse(AbstractSearchAsyncAction.java:719)\n\tat org.elasticsearch.action.search.ExpandSearchPhase.run(ExpandSearchPhase.java:106)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executePhase(AbstractSearchAsyncAction.java:466)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:460)\n\tat org.elasticsearch.action.search.FetchSearchPhase.moveToNextPhase(FetchSearchPhase.java:287)\n\tat org.elasticsearch.action.search.FetchSearchPhase.lambda$innerRun$1(FetchSearchPhase.java:114)\n\tat org.elasticsearch.action.search.FetchSearchPhase.innerRun(FetchSearchPhase.java:132)\n\tat org.elasticsearch.action.search.FetchSearchPhase.access$000(FetchSearchPhase.java:37)\n\tat org.elasticsearch.action.search.FetchSearchPhase$1.doRun(FetchSearchPhase.java:98)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.TimedRunnable.doRun(TimedRunnable.java:33)\n\tat org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tat java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\tat java.lang.Thread.run(Thread.java:748)\n"},"status":404}]
at __randomizedtesting.SeedInfo.seed([B85BC0E14879F0B6:300FFF3BE6859D4E]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:482)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:455)
at sun.reflect.GeneratedMethodAccessor23.invoke(null:-1)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at java.lang.Thread.run(Thread.java:748)
Caused by: java.lang.AssertionError: expected [2xx] status code but api [transform.upgrade_transforms] returned [404 Not Found] [{"error":{"root_cause":[{"type":"resource_not_found_exception","reason":"Transform with id [mixed-simple-continuous-transform] could not be found","stack_trace":"ResourceNotFoundException[Transform with id [mixed-simple-continuous-transform] could not be found]\n\tat org.elasticsearch.xpack.transform.persistence.IndexBasedTransformConfigManager.lambda$getTransformConfigurationForUpdate$12(IndexBasedTransformConfigManager.java:497)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:88)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:82)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$2(SecurityActionFilter.java:192)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.action.ActionListener$RunAfterActionListener.onResponse(ActionListener.java:341)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.sendSearchResponse(AbstractSearchAsyncAction.java:719)\n\tat org.elasticsearch.action.search.ExpandSearchPhase.run(ExpandSearchPhase.java:106)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executePhase(AbstractSearchAsyncAction.java:466)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:460)\n\tat org.elasticsearch.action.search.FetchSearchPhase.moveToNextPhase(FetchSearchPhase.java:287)\n\tat org.elasticsearch.action.search.FetchSearchPhase.lambda$innerRun$1(FetchSearchPhase.java:114)\n\tat org.elasticsearch.action.search.FetchSearchPhase.innerRun(FetchSearchPhase.java:132)\n\tat org.elasticsearch.action.search.FetchSearchPhase.access$000(FetchSearchPhase.java:37)\n\tat org.elasticsearch.action.search.FetchSearchPhase$1.doRun(FetchSearchPhase.java:98)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.TimedRunnable.doRun(TimedRunnable.java:33)\n\tat org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tat java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\tat java.lang.Thread.run(Thread.java:748)\n"}],"type":"resource_not_found_exception","reason":"Transform with id [mixed-simple-continuous-transform] could not be found","stack_trace":"ResourceNotFoundException[Transform with id [mixed-simple-continuous-transform] could not be found]\n\tat org.elasticsearch.xpack.transform.persistence.IndexBasedTransformConfigManager.lambda$getTransformConfigurationForUpdate$12(IndexBasedTransformConfigManager.java:497)\n\tat org.elasticsearch.action.ActionListener$1.onResponse(ActionListener.java:136)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:88)\n\tat org.elasticsearch.action.support.TransportAction$1.onResponse(TransportAction.java:82)\n\tat org.elasticsearch.action.support.ContextPreservingActionListener.onResponse(ContextPreservingActionListener.java:31)\n\tat org.elasticsearch.xpack.security.action.filter.SecurityActionFilter.lambda$applyInternal$2(SecurityActionFilter.java:192)\n\tat org.elasticsearch.action.ActionListener$DelegatingFailureActionListener.onResponse(ActionListener.java:219)\n\tat org.elasticsearch.action.ActionListener$RunAfterActionListener.onResponse(ActionListener.java:341)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.sendSearchResponse(AbstractSearchAsyncAction.java:719)\n\tat org.elasticsearch.action.search.ExpandSearchPhase.run(ExpandSearchPhase.java:106)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executePhase(AbstractSearchAsyncAction.java:466)\n\tat org.elasticsearch.action.search.AbstractSearchAsyncAction.executeNextPhase(AbstractSearchAsyncAction.java:460)\n\tat org.elasticsearch.action.search.FetchSearchPhase.moveToNextPhase(FetchSearchPhase.java:287)\n\tat org.elasticsearch.action.search.FetchSearchPhase.lambda$innerRun$1(FetchSearchPhase.java:114)\n\tat org.elasticsearch.action.search.FetchSearchPhase.innerRun(FetchSearchPhase.java:132)\n\tat org.elasticsearch.action.search.FetchSearchPhase.access$000(FetchSearchPhase.java:37)\n\tat org.elasticsearch.action.search.FetchSearchPhase$1.doRun(FetchSearchPhase.java:98)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat org.elasticsearch.common.util.concurrent.TimedRunnable.doRun(TimedRunnable.java:33)\n\tat org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:771)\n\tat org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)\n\tat java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tat java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\tat java.lang.Thread.run(Thread.java:748)\n"},"status":404}]
at org.junit.Assert.fail(Assert.java:88)
at org.elasticsearch.test.rest.yaml.section.DoSection.execute(DoSection.java:375)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:471)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:455)
at sun.reflect.GeneratedMethodAccessor23.invoke(null:-1)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at java.lang.Thread.run(Thread.java:748)
``` | https://github.com/elastic/elasticsearch/issues/80321 | https://github.com/elastic/elasticsearch/pull/80550 | c9303e273d51492be2e970c2bc005381f25ea74e | e79291621a7d6c3fbd123a83a88d7c3180a7eb5b | "2021-11-04T00:17:11Z" | java | "2021-11-10T09:51:52Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,320 | ["build-tools-internal/src/main/java/org/elasticsearch/gradle/internal/InternalDistributionDownloadPlugin.java"] | Running BWC tests using current version of Elasticsearch should avoid packaging archives | We have BWC tests that test the current version against itself, essentially, we're really just testing that I can restart a cluster and things will be happy.
The confusion here seems to be that when doing so we are building an archive (tar in the case of linux) distribution for these tests instead of the much more efficient expanded artifact. It's not clear why exactly this is the case but perhaps there's missing edge case here related to either a) testing against the current version or b) some fallout from the 8.0 version branching.
Example: https://gradle-enterprise.elastic.co/s/gz2sybzc7o3je/timeline?anchor=zqqpksynbwwag&task-path=:distribution:archives | https://github.com/elastic/elasticsearch/issues/80320 | https://github.com/elastic/elasticsearch/pull/80350 | 025dbdc73e228c71025ae599bec2bbf12e1720fe | ad4694c4ad3e09ab6c78adb7d2b0fdf01ea3ce90 | "2021-11-03T22:23:39Z" | java | "2021-11-15T07:07:42Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,305 | ["x-pack/plugin/core/build.gradle", "x-pack/plugin/core/licenses/unboundid-ldapsdk-6.0.2.jar.sha1", "x-pack/plugin/core/licenses/unboundid-ldapsdk-6.0.3.jar.sha1", "x-pack/plugin/security/build.gradle"] | SearchGroupsResolverInMemoryTests leaking threads | **Build scan**: [sample scan](https://gradle-enterprise.elastic.co/s/2wsdisepd3hd6/tests/:x-pack:plugin:security:test/org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests/classMethod?top-execution=1)
**Repro line**: None given
**Reproduces locally?**: n/a, see above
**Applicable branches**: `8.0`, `master`
**Failure history**: [build-stats](https://build-stats.elastic.co/app/kibana#/discover?_g=h@e8eb03e&_a=h@256d290) - looks like failures with this error go back to Oct. 18 at least.
<!--
Link to build stats and possible indication of when this started failing and how often it fails
<https://build-stats.elastic.co/app/kibana>
-->
**Failure excerpt**:
```
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests:
1) Thread[id=124, name=Timer thread for LDAPConnection(name='test-connection-testSearchTimeoutIsFailure', not connected), state=WAITING, group=TGRP-SearchGroupsResolverInMemoryTests]
at [email protected]/java.lang.Object.wait(Native Method)
at [email protected]/java.lang.Object.wait(Object.java:338)
at [email protected]/java.util.TimerThread.mainLoop(Timer.java:537)
at [email protected]/java.util.TimerThread.run(Timer.java:516)
at __randomizedtesting.SeedInfo.seed([42DA9C1586F63FD5]:0)
```
| https://github.com/elastic/elasticsearch/issues/80305 | https://github.com/elastic/elasticsearch/pull/81568 | c8dcbe49ae28b82bb59fa149a472c7e36df40884 | f01871464bdfca570a5f258142583f3071bca1fb | "2021-11-03T18:39:48Z" | java | "2021-12-09T11:43:06Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,264 | ["docs/reference/indices/recovery.asciidoc"] | [docs] Index recovery API Response wrong types | The Index recovery API documentation (https://www.elastic.co/guide/en/elasticsearch/reference/current/indices-recovery.html#index-recovery-api-response-body) provides incorrect information. The valid values are listed as:
> STORE
The recovery is related to a node startup or failure. This type of recovery is called a local store recovery.
SNAPSHOT
The recovery is related to a snapshot restoration.
REPLICA
The recovery is related to a primary shard replication.
RELOCATING
The recovery is related to the relocation of a shard to a different node in the same cluster.
But this is not correct. These should be:
> EMPTY_STORE
EXISTING_STORE
PEER
SNAPSHOT
LOCAL_SHARDS.
| https://github.com/elastic/elasticsearch/issues/80264 | https://github.com/elastic/elasticsearch/pull/81000 | d1af86cfdd770b6079d51b0421bfd377ae0c7d69 | 2a30dfe4d213769e5c4982d201117562377e0e8d | "2021-11-03T10:53:08Z" | java | "2021-11-24T19:34:25Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,239 | ["x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/ldap/SearchGroupsResolverInMemoryTests.java"] | [CI] SearchGroupsResolverInMemoryTests classMethod failing | The failure occurs during tearDown time when it checks for leaked threads. But the actual test that failed for cleaning up the thread is `testSearchTimeoutIsFailure`.
**Build scan:**
https://gradle-enterprise.elastic.co/s/yj773p6xo52iw/tests/:x-pack:plugin:security:test/org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests/classMethod
**Reproduction line:**
`null`
**Applicable branches:**
master
**Reproduces locally?:**
No
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests&tests.test=classMethod
**Failure excerpt:**
```
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.elasticsearch.xpack.security.authc.ldap.SearchGroupsResolverInMemoryTests:
1) Thread[id=148, name=Timer thread for LDAPConnection(name='test-connection-testSearchTimeoutIsFailure', not connected), state=WAITING, group=TGRP-SearchGroupsResolverInMemoryTests]
at [email protected]/java.lang.Object.wait(Native Method)
at [email protected]/java.lang.Object.wait(Object.java:338)
at [email protected]/java.util.TimerThread.mainLoop(Timer.java:537)
at [email protected]/java.util.TimerThread.run(Timer.java:516)
at __randomizedtesting.SeedInfo.seed([5BBC99EB0BD500E2]:0)
``` | https://github.com/elastic/elasticsearch/issues/80239 | https://github.com/elastic/elasticsearch/pull/80250 | 6efc09244ff7095213043bca95d6125658d4842f | 5a4a7446dd5692b07c42c563e3e46f79c4da4e0d | "2021-11-03T01:21:13Z" | java | "2021-11-03T11:42:16Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,236 | ["x-pack/docs/en/security/authorization/privileges.asciidoc"] | Docs incorrectly state that index "manage" privilege provides template access | On https://www.elastic.co/guide/en/elasticsearch/reference/7.16/security-privileges.html#privileges-list-indices it says
> **`manage`** All monitor privileges plus index and data stream administration (aliases, analyze, cache clear, close, delete, exists, flush, mapping, open, field capabilties, force merge, refresh, settings, search shards, templates, validate query).
However, there are no index-level template actions in security. All template actions are managed as cluster privileges (via the cluster `manage` privilege`).
Also `field capabilties` is spelt wrong :)
| https://github.com/elastic/elasticsearch/issues/80236 | https://github.com/elastic/elasticsearch/pull/80284 | 7ff1b6d848d759f205aa05e840a89fbcfde469a1 | efbfd985496d7bbf10bf89f13e4e0989220a7aa2 | "2021-11-02T23:27:19Z" | java | "2021-11-09T13:41:41Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,200 | ["docs/reference/rest-api/usage.asciidoc", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ml/action/GetDeploymentStatsAction.java", "x-pack/plugin/ml/src/main/java/org/elasticsearch/xpack/ml/MachineLearningUsageTransportAction.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/MachineLearningInfoTransportActionTests.java"] | [ML] Telemetry for NLP models | Add information about NLP models and deployments in the usage API. | https://github.com/elastic/elasticsearch/issues/80200 | https://github.com/elastic/elasticsearch/pull/80282 | 265b3d959c87665f4be62c53968856ffed881bd3 | 4557d5f797ddb58b1862f2c845b09859e492faa8 | "2021-11-02T15:34:16Z" | java | "2021-11-04T15:26:37Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,182 | ["build-tools-internal/src/main/resources/checkstyle.xml"] | [CI] Checkstyle license header check fails on Windows | The task `:docs:checkstyleTest` fails regularly on Windows platforms, looks related to #79603.
**Build scan**:
https://gradle-enterprise.elastic.co/s/v4julezaoxpmk
https://gradle-enterprise.elastic.co/s/c2mi2ziflwcnk
https://gradle-enterprise.elastic.co/s/jzykxzzrjaari
and more
**Repro line**:
**Reproduces locally?**:
No (no windows platforms)
**Applicable branches**:
master
**Failure excerpt**:
```
:docs:checkstyleTest FAILED
[ant:checkstyle] [ERROR] C:\Users\jenkins\workspace\platform-support\365\docs\src\test\java\org\elasticsearch\smoketest\DocsClientYamlTestSuiteIT.java:1: Duplicate header javadocs are forbidden [MultipleHeaderJavadoc]
```
| https://github.com/elastic/elasticsearch/issues/80182 | https://github.com/elastic/elasticsearch/pull/80201 | 902f0527a407bc6e0e26b5a22a51eb4e4588ba0a | 3bd67f42e3abaef368209a15c604424d7dcf94ec | "2021-11-02T11:28:29Z" | java | "2021-11-02T18:44:58Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,180 | ["docs/changelog/84434.yaml", "server/src/main/java/org/elasticsearch/action/admin/indices/shrink/ResizeNumberOfShardsCalculator.java", "server/src/main/java/org/elasticsearch/action/admin/indices/shrink/TransportResizeAction.java", "server/src/test/java/org/elasticsearch/action/admin/indices/shrink/ResizeNumberOfShardsCalculatorTests.java", "server/src/test/java/org/elasticsearch/action/admin/indices/shrink/TransportResizeActionTests.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ilm/AsyncBranchingStep.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ilm/ShrinkAction.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ilm/AsyncBranchingStepTests.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ilm/ShrinkActionTests.java", "x-pack/plugin/ilm/qa/multi-node/src/javaRestTest/java/org/elasticsearch/xpack/ilm/actions/ShrinkActionIT.java"] | [ILM] Shrink action fails with a single primary shard in conjunction with `max_primary_shard_size` | <!--
GitHub is reserved for bug reports and feature requests; it is not the place
for general questions. If you have a question or an unconfirmed bug , please
visit the [forums](https://discuss.elastic.co/c/elasticsearch). Please also
check your OS is [supported](https://www.elastic.co/support/matrix#show_os).
If it is not, the issue is likely to be closed.
For security vulnerabilities please only send reports to [email protected].
See https://www.elastic.co/community/security for more information.
Please fill in the following details to help us reproduce the bug:
-->
**Elasticsearch version** (`bin/elasticsearch --version`): `7.14.2`
**Plugins installed**: []
**JVM version** (`java -version`): ESS
**OS version** (`uname -a` if on a Unix-like system): ESS
**Description of the problem including expected versus actual behavior**:
The `shrink` ILM phase failed when trying to apply to an index with a single primary shard and a phase definition that utilises the `max_primary_shard_size` option.
Exception recorded:
```
java.lang.IllegalArgumentException: can't shrink an index with only one shard
at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.validateShrinkIndex(MetadataCreateIndexService.java:1147)
at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.prepareResizeIndexSettings(MetadataCreateIndexService.java:1233)
at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.aggregateIndexSettings(MetadataCreateIndexService.java:809)
at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.applyCreateIndexRequestWithExistingMetadata(MetadataCreateIndexService.java:631)
at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.applyCreateIndexRequest(MetadataCreateIndexService.java:334)
at org.elasticsearch.cluster.metadata.MetadataCreateIndexService.applyCreateIndexRequest(MetadataCreateIndexService.java:377)
at org.elasticsearch.cluster.metadata.MetadataCreateIndexService$1.execute(MetadataCreateIndexService.java:294)
at org.elasticsearch.cluster.ClusterStateUpdateTask.execute(ClusterStateUpdateTask.java:48)
at org.elasticsearch.cluster.service.MasterService.executeTasks(MasterService.java:691)
at org.elasticsearch.cluster.service.MasterService.calculateTaskOutputs(MasterService.java:313)
at org.elasticsearch.cluster.service.MasterService.runTasks(MasterService.java:208)
at org.elasticsearch.cluster.service.MasterService.access$000(MasterService.java:62)
at org.elasticsearch.cluster.service.MasterService$Batcher.run(MasterService.java:140)
at org.elasticsearch.cluster.service.TaskBatcher.runIfNotProcessed(TaskBatcher.java:139)
at org.elasticsearch.cluster.service.TaskBatcher$BatchedTask.run(TaskBatcher.java:177)
at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:673)
at org.elasticsearch.common.util.concurrent.PrioritizedEsThreadPoolExecutor$TieBreakingPrioritizedRunnable.runAndClean(PrioritizedEsThreadPoolExecutor.java:241)
at org.elasticsearch.common.util.concurrent.PrioritizedEsThreadPoolExecutor$TieBreakingPrioritizedRunnable.run(PrioritizedEsThreadPoolExecutor.java:204)
at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1130)
at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:630)
at java.base/java.lang.Thread.run(Thread.java:831)
```
**Steps to reproduce**:
Please include a *minimal* but *complete* recreation of the problem,
including (e.g.) index creation, mappings, settings, query etc. The easier
you make for us to reproduce it, the more likely that somebody will take the
time to look at it.
1. Create an index with a single primary shard.
2. Define an ILM policy with the following `warm` phase:
```json
{
"policy": "metricbeat",
"phase_definition": {
"min_age": "0d",
"actions": {
"allocate": {
"number_of_replicas": 1,
"include": {},
"exclude": {},
"require": {}
},
"forcemerge": {
"max_num_segments": 1
},
"set_priority": {
"priority": 25
},
"shrink": {
"max_primary_shard_size": "50gb"
}
}
},
"version": 18,
"modified_date_in_millis": 1635781185067
}
```
3. Associate ILM policy with index
4. Trigger rollover of index.
**Provide logs (if relevant)**:
Related: #33275
| https://github.com/elastic/elasticsearch/issues/80180 | https://github.com/elastic/elasticsearch/pull/84434 | e7c4e8cdf8e939055a8cbde7e6da6c429fb05586 | 155638b2cacc2cc96e866cfd1f3b66155fc66360 | "2021-11-02T11:11:21Z" | java | "2022-03-04T14:00:51Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,117 | ["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/Authentication.java", "x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/Subject.java", "x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authc/AuthenticationSerializationTests.java"] | Revisit and rationalise the Authentication class | We would like to revisit the `Authentication` class to make it provide better and easier to use interface to the consumers.
#79809 enables run-as for all authentication schemes in addition to `realm` which is already supported. This adds more complexity to an `Authentication` object and how it should be used. For an example, building the role associated to an user now has to consider whether the user is the authenticated user or run-as user and the authentication scheme of the authenticated user. The existing `Authentication` class can answer all these question today. But its interface and internals are not aligned for these questions and the usage is error prone. For example, the `Authentication` object itself does not know whether the user has run-as. This information is kept by the `User` object. If the `User` object has an `authenticatedUser`, it's the run-as user. Otherwise it is not. But the information about realms for each `User` is directly kept in `Authentication`. Therefore, for full picture, the caller must check both `User` and `Authentication` realms and understands the nuance of their differenent combinations.
- [x] Refactor CompositeRolesStore to separate roleDescriptors resolving (#80926)
- [ ] Move effective role descriptor checking from Resolver to CompositeRolesStore
- [x] https://github.com/elastic/elasticsearch/issues/81192
- [ ] Replace Authentication with AuthenticationContext in places other than CompositeRolesStore | https://github.com/elastic/elasticsearch/issues/80117 | https://github.com/elastic/elasticsearch/pull/88494 | cb5fc605337d039e8b6b9817daccd4125bf89584 | 8b0832d0e23605aa82136213c6347f8ecbead7b9 | "2021-11-01T05:33:06Z" | java | "2022-07-14T02:35:22Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,073 | ["x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/action/TransformUpdater.java", "x-pack/plugin/transform/src/main/java/org/elasticsearch/xpack/transform/persistence/IndexBasedTransformConfigManager.java"] | [CI] TransformSurvivesUpgradeIT testTransformRollingUpgrade failing | probably a regression of #80013
**Build scan:**
https://gradle-enterprise.elastic.co/s/toqidjvpswti4/tests/:x-pack:qa:rolling-upgrade:v7.11.2%23upgradedClusterTest/org.elasticsearch.upgrades.TransformSurvivesUpgradeIT/testTransformRollingUpgrade
**Reproduction line:**
`./gradlew ':x-pack:qa:rolling-upgrade:v7.11.2#upgradedClusterTest' -Dtests.class="org.elasticsearch.upgrades.TransformSurvivesUpgradeIT" -Dtests.method="testTransformRollingUpgrade" -Dtests.seed=11151805F4A613BA -Dtests.bwc=true -Dtests.locale=und -Dtests.timezone=America/Indiana/Knox -Druntime.java=8`
**Applicable branches:**
7.16
**Reproduces locally?:**
Didn't try
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.upgrades.TransformSurvivesUpgradeIT&tests.test=testTransformRollingUpgrade
**Failure excerpt:**
```
java.lang.AssertionError:
Expected: a value greater than <7>
but: <7> was equal to <7>
at __randomizedtesting.SeedInfo.seed([11151805F4A613BA:BE682DBC5FE0C07E]:0)
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.lambda$verifyContinuousTransformHandlesData$8(TransformSurvivesUpgradeIT.java:248)
at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.lambda$awaitWrittenIndexerState$9(TransformSurvivesUpgradeIT.java:301)
at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:1123)
at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.awaitWrittenIndexerState(TransformSurvivesUpgradeIT.java:293)
at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.verifyContinuousTransformHandlesData(TransformSurvivesUpgradeIT.java:243)
at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.testTransformRollingUpgrade(TransformSurvivesUpgradeIT.java:153)
at sun.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1750)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:938)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:974)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:988)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:49)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:48)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:817)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:468)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:947)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:832)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:883)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:894)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:45)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:41)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:47)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:64)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:54)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:368)
at java.lang.Thread.run(Thread.java:748)
``` | https://github.com/elastic/elasticsearch/issues/80073 | https://github.com/elastic/elasticsearch/pull/80579 | 4f00058d22c3e53324c1650091b32c400e93adeb | 44314120fc196ac866fcee372069772335e965ec | "2021-10-29T10:01:44Z" | java | "2021-11-10T14:29:45Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 81,966 | ["docs/reference/ingest.asciidoc", "docs/reference/ingest/processors/common-options.asciidoc", "docs/reference/ingest/processors/dissect.asciidoc"] | Minor issue with processor documentation | In all processor documentations where the processor supports conditional execution the documentation links to _Handling pipeline failures_ (#handling-pipeline-failures) where it should link to _Conditionally run a processor_ (#conditionally-run-processor)

The example is taken from the append processor but it should be the same on all processors supporting conditional execution.
For confirmed bugs, please report:
- Version: 7.15 and some earlier version
- Steps to Reproduce: see processor documentations like https://www.elastic.co/guide/en/elasticsearch/reference/current/append-processor.html
| https://github.com/elastic/elasticsearch/issues/81966 | https://github.com/elastic/elasticsearch/pull/82001 | 1c94fc3517d9b120b61fa0910d90d9af001f188c | f1004ee698ba391399d8099f948aeeb62536e7a0 | "2021-10-29T06:33:04Z" | java | "2021-12-21T16:37:20Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 80,001 | ["build-tools-internal/src/main/java/org/elasticsearch/gradle/internal/test/DistroTestPlugin.java", "build-tools-internal/version.properties", "docs/changelog/80034.yaml"] | Upgrade Adoptium OpenJDK to 17.0.1+12 | Adoptium OpenJDK 17.0.1+12 is now available. We need to upgrade the version that is bundled with Elasticsearch to the newer version. We currently bundle 17+35. | https://github.com/elastic/elasticsearch/issues/80001 | https://github.com/elastic/elasticsearch/pull/80034 | bdbd4e3a1d62c1174134d4d5645fa7ae343dd519 | da58264fb665571a30e25781e26b5a3e7f253e93 | "2021-10-28T10:01:44Z" | java | "2021-11-03T22:01:20Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 79,986 | ["modules/lang-painless/src/yamlRestTest/resources/rest-api-spec/test/painless/20_scriptfield.yml"] | [CI] LangPainlessClientYamlTestSuiteIT test {yaml=painless/20_scriptfield/Scripted Field with error accessing an unsupported field via the script fields api} failing | This failed on my PR and is reproducible
**Build scan:**
https://gradle-enterprise.elastic.co/s/co5sy2mcxu2xg/tests/:modules:lang-painless:yamlRestTest/org.elasticsearch.painless.LangPainlessClientYamlTestSuiteIT/test%20%7Byaml=painless%2F20_scriptfield%2FScripted%20Field%20with%20error%20accessing%20an%20unsupported%20field%20via%20the%20script%20fields%20api%7D
**Reproduction line:**
`./gradlew ':modules:lang-painless:yamlRestTest' --tests "org.elasticsearch.painless.LangPainlessClientYamlTestSuiteIT.test {yaml=painless/20_scriptfield/Scripted Field with error accessing an unsupported field via the script fields api}" -Dtests.seed=18C365613D7AD5B6 -Dtests.locale=de-DE -Dtests.timezone=SystemV/CST6 -Druntime.java=17`
**Applicable branches:**
master, 8.0
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.painless.LangPainlessClientYamlTestSuiteIT&tests.test=test%20%7Byaml%3Dpainless/20_scriptfield/Scripted%20Field%20with%20error%20accessing%20an%20unsupported%20field%20via%20the%20script%20fields%20api%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [painless/20_scriptfield:160]: expected [400] status code but api [search] returned [200 OK] [---
took: 12
timed_out: false
_shards:
total: 2
successful: 1
skipped: 0
failed: 1
failures:
- shard: 0
index: "test"
node: "8soJAuywRHKzkmoG2YSV7g"
reason:
type: "script_exception"
reason: "runtime error"
script_stack:
- "org.elasticsearch.script.field.DelegateDocValuesField.getValue(DelegateDocValuesField.java:56)"
- "field('foo').getValue('')"
- " ^---- HERE"
script: "field('foo').getValue('')"
lang: "painless"
position:
offset: 12
start: 0
end: 25
caused_by:
type: "unsupported_operation_exception"
reason: "field [foo] is not supported through the fields api, use [doc] instead"
hits:
total: 1
max_score: 1.0
hits: []
]
at __randomizedtesting.SeedInfo.seed([18C365613D7AD5B6:90975ABB9386B84E]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:489)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.lang.AssertionError: expected [400] status code but api [search] returned [200 OK] [---
took: 12
timed_out: false
_shards:
total: 2
successful: 1
skipped: 0
failed: 1
failures:
- shard: 0
index: "test"
node: "8soJAuywRHKzkmoG2YSV7g"
reason:
type: "script_exception"
reason: "runtime error"
script_stack:
- "org.elasticsearch.script.field.DelegateDocValuesField.getValue(DelegateDocValuesField.java:56)"
- "field('foo').getValue('')"
- " ^---- HERE"
script: "field('foo').getValue('')"
lang: "painless"
position:
offset: 12
start: 0
end: 25
caused_by:
type: "unsupported_operation_exception"
reason: "field [foo] is not supported through the fields api, use [doc] instead"
hits:
total: 1
max_score: 1.0
hits: []
]
at org.junit.Assert.fail(Assert.java:88)
at org.elasticsearch.test.rest.yaml.section.DoSection.execute(DoSection.java:365)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor12.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/79986 | https://github.com/elastic/elasticsearch/pull/80026 | 985200b1fc5a1d935b8d9dcb1f616ebade742553 | 9511c546806fc1cff3b8db3c77e9c6cea6e96eaf | "2021-10-28T06:32:48Z" | java | "2021-10-28T16:36:50Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 79,948 | ["x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/SecurityContext.java", "x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/SecurityContextTests.java"] | `x-opaque-id` header breaks CCS in mixed version cluster | **Elasticsearch version** (`bin/elasticsearch --version`): 7.16.0 bc1 (also potentially 7.15.2)
**Description of the problem including expected versus actual behavior**:
Presence of `x-opaque-id` header changes cross cluster search behavior in **mixed version cluster**
When header is missing cross cluster search works as expected,
When header is present cross cluster search doesn't work
**Steps to reproduce**:
1. Assume 7.16 has a 7.15 as a remote cluster named `7_15`
2. Assume `7_15` has data in `my-index` index
3. Run against 7.16:
```
GET /_resolve/index/7_15:* HTTP/1.1
Host: localhost:9200
```
Observe correct result with return indices from 7.15 cluster resolved
4. Now run against 7.16 adding `x-opaque-id` header:
```
GET /_resolve/index/7_15:* HTTP/1.1
Host: localhost:9200
x-opaque-id: test
```
Observe empty results
**Additional context**:
1. This popped up in Kibana: https://github.com/elastic/kibana/issues/116399, where it can't resolve CCS indices via index pattern creation UI, but can using Dev tools. I found that the difference in the requests that causing this is `x-opaque-id` header: https://github.com/elastic/kibana/issues/116399#issuecomment-953084400
2. I didn't reproduce with 7.15.1 -> 7.14, but I did reproduce with 7.15 snapshot -> 7.14. Likely the bug is introduced in 7.15.2
3. Possibly related pull request: https://github.com/elastic/elasticsearch/pull/79412/
| https://github.com/elastic/elasticsearch/issues/79948 | https://github.com/elastic/elasticsearch/pull/79973 | 71c702263b3d9fbd0d8ee8525b6b60a95ef02ada | 5cc0c38417293a5ec893b1c7f62297b83aab9f4c | "2021-10-27T18:53:49Z" | java | "2021-10-28T06:11:07Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 79,932 | ["x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/ml/datafeed/AggProviderWireSerializationTests.java", "x-pack/plugin/ml/src/test/java/org/elasticsearch/xpack/ml/action/TransportStartDataFrameAnalyticsActionTests.java"] | [CI] AggProviderWireSerializationTests testBwcSerialization failing | Looks like there's some specific logic here for versions starting at 8.0.0 which 8.1.0 is now BWC compatible with that might need tweaking.
**Build scan:**
https://gradle-enterprise.elastic.co/s/x5c4pefiwp3du/tests/:x-pack:plugin:core:test/org.elasticsearch.xpack.core.ml.datafeed.AggProviderWireSerializationTests/testBwcSerialization
**Reproduction line:**
`./gradlew ':x-pack:plugin:core:test' --tests "org.elasticsearch.xpack.core.ml.datafeed.AggProviderWireSerializationTests.testBwcSerialization" -Dtests.seed=91BBD8ECCCA36918 -Dtests.locale=de-DE -Dtests.timezone=Pacific/Guam -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.core.ml.datafeed.AggProviderWireSerializationTests&tests.test=testBwcSerialization
**Failure excerpt:**
```
java.lang.AssertionError: 8.0.0 expected:<AggProvider{parsingException=null, parsedAggs={
"ixquIE" : {
"avg" : {
"field" : "cu"
}
}
}, aggs={ixquIE={avg={field=cu}}}, rewroteAggs=true}> but was:<AggProvider{parsingException=null, parsedAggs={
"ixquIE" : {
"avg" : {
"field" : "cu"
}
}
}, aggs={ixquIE={avg={field=cu}}}, rewroteAggs=false}>
at __randomizedtesting.SeedInfo.seed([91BBD8ECCCA36918:6CF71F598A941E2E]:0)
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.failNotEquals(Assert.java:834)
at org.junit.Assert.assertEquals(Assert.java:118)
at org.elasticsearch.xpack.core.ml.AbstractBWCWireSerializationTestCase.assertOnBWCObject(AbstractBWCWireSerializationTestCase.java:71)
at org.elasticsearch.xpack.core.ml.AbstractBWCWireSerializationTestCase.assertBwcSerialization(AbstractBWCWireSerializationTestCase.java:61)
at org.elasticsearch.xpack.core.ml.AbstractBWCWireSerializationTestCase.testBwcSerialization(AbstractBWCWireSerializationTestCase.java:49)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/79932 | https://github.com/elastic/elasticsearch/pull/79944 | a8258bde1643f8cf5eda0ee437e7c2458f62fada | 24ed875616d837d2dc39a1440d6411dddbb8698c | "2021-10-27T16:57:20Z" | java | "2021-10-27T19:38:36Z" |
closed | elastic/elasticsearch | https://github.com/elastic/elasticsearch | 79,931 | ["docs/reference/ml/df-analytics/apis/put-dfanalytics.asciidoc"] | [CI] DocsClientYamlTestSuiteIT test {yaml=reference/ml/df-analytics/apis/put-dfanalytics/line_641} failing | Started failing after 8.1.0 version bump
**Build scan:**
https://gradle-enterprise.elastic.co/s/l6szaago52kay/tests/:docs:integTest/org.elasticsearch.smoketest.DocsClientYamlTestSuiteIT/test%20%7Byaml=reference%2Fml%2Fdf-analytics%2Fapis%2Fput-dfanalytics%2Fline_641%7D
**Reproduction line:**
`./gradlew ':docs:integTest' --tests "org.elasticsearch.smoketest.DocsClientYamlTestSuiteIT.test {yaml=reference/ml/df-analytics/apis/put-dfanalytics/line_641}" -Dtests.seed=4484A5B1FD32AFA9 -Dtests.locale=vi-VN -Dtests.timezone=Pacific/Funafuti -Druntime.java=17`
**Applicable branches:**
master
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.smoketest.DocsClientYamlTestSuiteIT&tests.test=test%20%7Byaml%3Dreference/ml/df-analytics/apis/put-dfanalytics/line_641%7D
**Failure excerpt:**
```
java.lang.RuntimeException: Failure at [reference/ml/df-analytics/apis/put-dfanalytics:112]: No value present
at __randomizedtesting.SeedInfo.seed([4484A5B1FD32AFA9:CCD09A6B53CEC251]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:491)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor14.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.util.NoSuchElementException: No value present
at java.util.OptionalInt.getAsInt(OptionalInt.java:130)
at io.github.nik9000.mapmatcher.MapMatcher.describePotentialMismatch(MapMatcher.java:218)
at io.github.nik9000.mapmatcher.MapMatcher.describeEntryValue(MapMatcher.java:296)
at io.github.nik9000.mapmatcher.MapMatcher.describePotentialMismatch(MapMatcher.java:227)
at io.github.nik9000.mapmatcher.MapMatcher.describeEntryValue(MapMatcher.java:296)
at io.github.nik9000.mapmatcher.MapMatcher.describePotentialMismatch(MapMatcher.java:227)
at io.github.nik9000.mapmatcher.MapMatcher.describeEntryValue(MapMatcher.java:296)
at io.github.nik9000.mapmatcher.MapMatcher.describePotentialMismatch(MapMatcher.java:227)
at io.github.nik9000.mapmatcher.MapMatcher.describeMismatchSafely(MapMatcher.java:210)
at io.github.nik9000.mapmatcher.MapMatcher.describeMismatchSafely(MapMatcher.java:29)
at org.hamcrest.TypeSafeMatcher.describeMismatch(TypeSafeMatcher.java:82)
at io.github.nik9000.mapmatcher.MapMatcher.assertMap(MapMatcher.java:77)
at io.github.nik9000.mapmatcher.MapMatcher.assertMap(MapMatcher.java:62)
at org.elasticsearch.test.rest.yaml.section.MatchAssertion.doAssert(MatchAssertion.java:94)
at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:478)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:462)
at jdk.internal.reflect.GeneratedMethodAccessor14.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831)
at java.lang.Thread.run(Thread.java:833)
``` | https://github.com/elastic/elasticsearch/issues/79931 | https://github.com/elastic/elasticsearch/pull/79943 | bc78c43e51d3a547e27c721ad760c7eac9c42158 | 6b20e8e1b0fc8987f820bbb6fe243551b621158b | "2021-10-27T16:47:09Z" | java | "2021-10-27T18:45:15Z" |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.