Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GET _cluster/settings causes non-actionable deprecation warning #81480

Open
rudolf opened this issue Dec 7, 2021 · 1 comment
Open

GET _cluster/settings causes non-actionable deprecation warning #81480

rudolf opened this issue Dec 7, 2021 · 1 comment
Labels
>bug :Security/Security Security issues without another label Team:Security Meta label for security team

Comments

@rudolf
Copy link
Contributor

rudolf commented Dec 7, 2021

GET /_cluster/settings?include_defaults=true&flat_settings=true causes the following deprecation warning header to be returned:

299 Elasticsearch-8.1.0-SNAPSHOT-ab4581b805ae15d9e3cf3f41dcc7e0498d4b722b "[xpack.security.http.ssl.keystore.password] setting was deprecated in Elasticsearch and will be removed in a future release! See the breaking changes documentation for the next major version."

The deprecation notice only seems to show if the xpack.security.http.ssl.keystore.password configuration option is set.

However, it's not obvious to users how they could resolve this deprecation (at least it wasn't to me). By returning a deprecation notice to an API call it creates the impression that the API itself is deprecated, shouldn't config deprecations only be logged when reading the config file on startup? Returning a deprecation log when a deprecated configuration setting is read through an API causes confusion.

In addition, the documentation doesn't mention that this setting has been deprecated https://www.elastic.co/guide/en/elasticsearch/reference/master/security-settings.html

Related: elastic/kibana#120043

@rudolf rudolf added >bug needs:triage Requires assignment of a team area label labels Dec 7, 2021
@not-napoleon not-napoleon added :Security/Security Security issues without another label and removed needs:triage Requires assignment of a team area label labels Dec 7, 2021
@elasticmachine elasticmachine added the Team:Security Meta label for security team label Dec 7, 2021
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>bug :Security/Security Security issues without another label Team:Security Meta label for security team
Projects
None yet
Development

No branches or pull requests

3 participants