-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kibana should not auto create it's system indices if these don't exist #81790
Comments
If we do make this the default behavior, will developers be able to determine whether or not the error that ES has thrown indicates that the index hasn't been created yet and be able to explicitly create the mappings and retry the operation? |
Yeah they'll get an "index_not_found_exception". Using
Using the ES config option
I guess we could customize the reason message to be more kibana system index specific. |
Pinging @elastic/kibana-platform (Team:Platform) |
No objections on my end. I think this is worth doing! Especially if we can make a kibana-specific message to help our users out. |
TIL about |
Same here. Orthogonal topic/question: am I the only one who restarts ES (with |
I agree, I think most developers will benefit from the data being persisted by default. |
++ I definitely hadn't realised this was not a supported case and know other members of my team made the same mistake. |
#89992 will prevent Kibana from auto-creating saved object indices. |
Given it's resolved for SO indices should we close this? @elastic/kibana-security is this issue also addressed for the security session indices? |
++ if security can confirm then we can close this issue. |
Yes, we addressed this in #134900! |
Closing as resolved |
Kibana creates it's system indices with specific mappings. This includes:
.kibana
,.kibana_task_manager
.kibana-event-log
and.kibana_security_sessions_N
.When these indices are auto-created they don't infer the correct mappings and leads to unwanted behaviour and failure. Security sessions is the only index that gracefully handles being auto created, but this comes at the cost of added complexity to the plugin.
Kibana always creates these indices on startup and will only start indexing documents after they're created. However, users sometimes delete these indices to restore a snapshot without shutting Kibana down so Kibana keeps writing. Similarly, during development, developers often delete all indices without restarting Kibana. When this happens Kibana sometimes keeps on working for a short while. When Kibana eventually starts failing, it's not obvious what caused the problem.
ES introduced the
require_alias
request parameter to prevent ES from auto creating an index if one doesn't exist elastic/elasticsearch#58917 We can add this parameter to all our requests, but if we want this behaviour to apply to all kibana system indices, it might be better to make this the default behaviour through the Kibana System Indices Elasticsearch plugin.@elastic/kibana-stack-services @elastic/kibana-reporting-services @elastic/kibana-security any objections with disabling auto create for all these indices?
The text was updated successfully, but these errors were encountered: