logstash-output-elasticsearch 11.22.12-java → 12.0.0-java

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: b9a7b78791991372bdd4cbeb0f1d6c5f6d9f7a4db88b599ae090f09ecf548377
4
- data.tar.gz: 169225b31802647c4e00070e465d24dc0222ad3d1095fdb47c37db3cab64048e
3
+ metadata.gz: 983d99de3a0dcd5e58fb123e01ad8ee4c2396ce15fd565dda439e43c182b32e6
4
+ data.tar.gz: 8733e1a9b256b36e9f08a9be0803ca667817d7fe9f1e4cd1e090fe95882eb245
5
5
  SHA512:
6
- metadata.gz: 79ebc09c5483def4e6104b90f01bca4780f499cacc4c598e19e773900f9f7dde048242f5302f26798aefbf9e85e84555f23b9d3cbce1d862292c25723d1dc10f
7
- data.tar.gz: 369dc07aa0a5474cd34feda727013fc49a7013c39ef0d28ccc586e6eaf268a37097dc650636d4720d89bd0b017ea37a9d15d9036290a80848432c0526c443748
6
+ metadata.gz: f9626da6b7d428b17a16b2874a8758e260e84af265636fabea8e35dec0777ecdeae1b662910d2e065eccc4742ef706765d87b6cf475a141544a78347c69953de
7
+ data.tar.gz: 7997cfb3b851130a0504c0907761aba37ea31ec35deb7fc4de19eaf7f1ae00cee9df7b2575d59ace2b08c19ad7710460c534467bb79f7019c3a125478d0de5e2
data/CHANGELOG.md CHANGED
@@ -1,7 +1,14 @@
1
- ## 11.22.12
2
- - Properly handle http code 413 (Payload Too Large) [#1199](https://github.com/logstash-plugins/logstash-output-elasticsearch/pull/1199)
3
- ## 11.22.11
4
- - Remove irrelevant log warning about elastic stack version [#1202](https://github.com/logstash-plugins/logstash-output-elasticsearch/pull/1202)
1
+ ## 12.0.0
2
+ - SSL settings that were marked deprecated in version `11.14.0` are now marked obsolete, and will prevent the plugin from starting.
3
+ - These settings are:
4
+ - `cacert`, which should be replaced by `ssl_certificate_authorities`
5
+ - `keystore`, which should be replaced by `ssl_keystore_path`
6
+ - `keystore_password`, which should be replaced by `ssl_keystore_password`
7
+ - `ssl`, which should be replaced by `ssl_enabled`
8
+ - `ssl_certificate_verification`, which should be replaced by `ssl_verification_mode`
9
+ - `truststore`, which should be replaced by `ssl_truststore_path`
10
+ - `truststore_password`, which should be replaced by `ssl_truststore_password`
11
+ - [#1197](https://github.com/logstash-plugins/logstash-output-elasticsearch/pull/1197)
5
12
 
6
13
  ## 11.22.10
7
14
  - Add `x-elastic-product-origin` header to Elasticsearch requests [#1195](https://github.com/logstash-plugins/logstash-output-elasticsearch/pull/1195)
data/docs/index.asciidoc CHANGED
@@ -196,22 +196,7 @@ This plugin uses the Elasticsearch bulk API to optimize its imports into Elastic
196
196
  either partial or total failures. The bulk API sends batches of requests to an HTTP endpoint. Error codes for the HTTP
197
197
  request are handled differently than error codes for individual documents.
198
198
 
199
-
200
- HTTP requests to the bulk API are expected to return a 200 response code. All other response codes are retried indefinitely,
201
- including 413 (Payload Too Large) responses.
202
-
203
- If you want to handle large payloads differently, you can configure 413 responses to go to the Dead Letter Queue instead:
204
-
205
- [source,ruby]
206
- -----
207
- output {
208
- elasticsearch {
209
- hosts => ["localhost:9200"]
210
- dlq_custom_codes => [413] # Send 413 errors to DLQ instead of retrying
211
- }
212
- -----
213
-
214
- This will capture oversized payloads in the DLQ for analysis rather than retrying them.
199
+ HTTP requests to the bulk API are expected to return a 200 response code. All other response codes are retried indefinitely.
215
200
 
216
201
  The following document errors are handled as follows:
217
202
 
@@ -340,8 +325,10 @@ When a string value on an event contains one or more byte sequences that are not
340
325
  [id="plugins-{type}s-{plugin}-options"]
341
326
  ==== Elasticsearch Output Configuration Options
342
327
 
343
- This plugin supports the following configuration options plus the
344
- <<plugins-{type}s-{plugin}-common-options>> and the <<plugins-{type}s-{plugin}-deprecated-options>> described later.
328
+ This plugin supports these configuration options plus the <<plugins-{type}s-{plugin}-common-options>> described later.
329
+
330
+ NOTE: As of version 12.0.0 of this plugin, a number of previously deprecated SSL settings have been removed.
331
+ Please check out <<plugins-{type}s-{plugin}-obsolete-options>> for details.
345
332
 
346
333
  [cols="<,<,<",options="header",]
347
334
  |=======================================================================
@@ -456,7 +443,7 @@ For more details on actions, check out the {ref}/docs-bulk.html[Elasticsearch bu
456
443
  * There is no default value for this setting.
457
444
 
458
445
  Authenticate using Elasticsearch API key.
459
- Note that this option also requires SSL/TLS, which can be enabled by supplying a <<plugins-{type}s-{plugin}-cloud_id>>, a list of HTTPS <<plugins-{type}s-{plugin}-hosts>>, or by setting <<plugins-{type}s-{plugin}-ssl,`ssl_enabled => true`>>.
446
+ Note that this option also requires SSL/TLS, which can be enabled by supplying a <<plugins-{type}s-{plugin}-cloud_id>>, a list of HTTPS <<plugins-{type}s-{plugin}-hosts>>, or by setting <<plugins-{type}s-{plugin}-ssl_enabled,`ssl_enabled => true`>>.
460
447
 
461
448
  Format is `id:api_key` where `id` and `api_key` are as returned by the
462
449
  Elasticsearch {ref}/security-api-create-api-key.html[Create API key API].
@@ -1339,98 +1326,24 @@ https://www.elastic.co/blog/elasticsearch-versioning-support[versioning support
1339
1326
  blog] and {ref}/docs-index_.html#_version_types[Version types] in the
1340
1327
  Elasticsearch documentation.
1341
1328
 
1342
- [id="plugins-{type}s-{plugin}-deprecated-options"]
1343
- ==== Elasticsearch Output Deprecated Configuration Options
1344
-
1345
- This plugin supports the following deprecated configurations.
1329
+ [id="plugins-{type}s-{plugin}-obsolete-options"]
1330
+ ==== Elasticsearch Output Obsolete Configuration Options
1346
1331
 
1347
- WARNING: Deprecated options are subject to removal in future releases.
1332
+ WARNING: As of version `12.0.0` of this plugin, some configuration options have been replaced.
1333
+ The plugin will fail to start if it contains any of these obsolete options.
1348
1334
 
1349
- [cols="<,<,<",options="header",]
1335
+ [cols="<,<",options="header",]
1350
1336
  |=======================================================================
1351
- |Setting|Input type|Replaced by
1352
- | <<plugins-{type}s-{plugin}-cacert>> |a valid filesystem path|<<plugins-{type}s-{plugin}-ssl_certificate_authorities>>
1353
- | <<plugins-{type}s-{plugin}-keystore>> |a valid filesystem path|<<plugins-{type}s-{plugin}-ssl_keystore_path>>
1354
- | <<plugins-{type}s-{plugin}-keystore_password>> |<<password,password>>|<<plugins-{type}s-{plugin}-ssl_keystore_password>>
1355
- | <<plugins-{type}s-{plugin}-ssl>> |<<boolean,boolean>>|<<plugins-{type}s-{plugin}-ssl_enabled>>
1356
- | <<plugins-{type}s-{plugin}-ssl_certificate_verification>> |<<boolean,boolean>>|<<plugins-{type}s-{plugin}-ssl_verification_mode>>
1357
- | <<plugins-{type}s-{plugin}-truststore>> |a valid filesystem path|<<plugins-{type}s-{plugin}-ssl_truststore_path>>
1358
- | <<plugins-{type}s-{plugin}-truststore_password>> |<<password,password>>|<<plugins-{type}s-{plugin}-ssl_truststore_password>>
1337
+ |Setting|Replaced by
1338
+ | cacert | <<plugins-{type}s-{plugin}-ssl_certificate_authorities>>
1339
+ | keystore | <<plugins-{type}s-{plugin}-ssl_keystore_path>>
1340
+ | keystore_password | <<plugins-{type}s-{plugin}-ssl_keystore_password>>
1341
+ | ssl | <<plugins-{type}s-{plugin}-ssl_enabled>>
1342
+ | ssl_certificate_verification | <<plugins-{type}s-{plugin}-ssl_verification_mode>>
1343
+ | truststore | <<plugins-{type}s-{plugin}-ssl_truststore_path>>
1344
+ | truststore_password | <<plugins-{type}s-{plugin}-ssl_truststore_password>>
1359
1345
  |=======================================================================
1360
1346
 
1361
-
1362
- [id="plugins-{type}s-{plugin}-cacert"]
1363
- ===== `cacert`
1364
- deprecated[11.14.0, Replaced by <<plugins-{type}s-{plugin}-ssl_certificate_authorities>>]
1365
-
1366
- * Value type is a list of <<path,path>>
1367
- * There is no default value for this setting.
1368
-
1369
- The .cer or .pem file to validate the server's certificate.
1370
-
1371
- [id="plugins-{type}s-{plugin}-keystore"]
1372
- ===== `keystore`
1373
- deprecated[11.14.0, Replaced by <<plugins-{type}s-{plugin}-ssl_keystore_path>>]
1374
-
1375
- * Value type is <<path,path>>
1376
- * There is no default value for this setting.
1377
-
1378
- The keystore used to present a certificate to the server.
1379
- It can be either .jks or .p12
1380
-
1381
- NOTE: You cannot use this setting and <<plugins-{type}s-{plugin}-ssl_certificate>> at the same time.
1382
-
1383
- [id="plugins-{type}s-{plugin}-keystore_password"]
1384
- ===== `keystore_password`
1385
- deprecated[11.14.0, Replaced by <<plugins-{type}s-{plugin}-ssl_keystore_password>>]
1386
-
1387
- * Value type is <<password,password>>
1388
- * There is no default value for this setting.
1389
-
1390
- Set the keystore password
1391
-
1392
- [id="plugins-{type}s-{plugin}-ssl"]
1393
- ===== `ssl`
1394
- deprecated[11.14.0, Replaced by <<plugins-{type}s-{plugin}-ssl_enabled>>]
1395
-
1396
- * Value type is <<boolean,boolean>>
1397
- * There is no default value for this setting.
1398
-
1399
- Enable SSL/TLS secured communication to Elasticsearch cluster.
1400
- Leaving this unspecified will use whatever scheme is specified in the URLs listed in <<plugins-{type}s-{plugin}-hosts>> or extracted from the <<plugins-{type}s-{plugin}-cloud_id>>.
1401
- If no explicit protocol is specified plain HTTP will be used.
1402
-
1403
- [id="plugins-{type}s-{plugin}-ssl_certificate_verification"]
1404
- ===== `ssl_certificate_verification`
1405
- deprecated[11.14.0, Replaced by <<plugins-{type}s-{plugin}-ssl_verification_mode>>]
1406
-
1407
- * Value type is <<boolean,boolean>>
1408
- * Default value is `true`
1409
-
1410
- Option to validate the server's certificate. Disabling this severely compromises security.
1411
- For more information on disabling certificate verification please read
1412
- https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
1413
-
1414
- [id="plugins-{type}s-{plugin}-truststore"]
1415
- ===== `truststore`
1416
- deprecated[11.14.0, Replaced by <<plugins-{type}s-{plugin}-ssl_truststore_path>>]
1417
-
1418
- * Value type is <<path,path>>
1419
- * There is no default value for this setting.
1420
-
1421
- The truststore to validate the server's certificate.
1422
- It can be either `.jks` or `.p12`.
1423
- Use either `:truststore` or `:cacert`.
1424
-
1425
- [id="plugins-{type}s-{plugin}-truststore_password"]
1426
- ===== `truststore_password`
1427
- deprecated[11.14.0, Replaced by <<plugins-{type}s-{plugin}-ssl_truststore_password>>]
1428
-
1429
- * Value type is <<password,password>>
1430
- * There is no default value for this setting.
1431
-
1432
- Set the truststore password
1433
-
1434
1347
  [id="plugins-{type}s-{plugin}-common-options"]
1435
1348
  include::{include_path}/{type}.asciidoc[]
1436
1349
 
@@ -76,8 +76,11 @@ module LogStash; module Outputs; class ElasticSearch; class HttpClient;
76
76
  raise ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::HostUnreachableError.new(e, request_uri_as_string)
77
77
  end
78
78
 
79
+ # 404s are excluded because they are valid codes in the case of
80
+ # template installation. We might need a better story around this later
81
+ # but for our current purposes this is correct
79
82
  code = resp.code
80
- if code < 200 || code > 299 # assume anything not 2xx is an error that the layer above needs to interpret
83
+ if code < 200 || code > 299 && code != 404
81
84
  raise ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError.new(code, request_uri, body, resp.body)
82
85
  end
83
86
 
@@ -253,11 +253,13 @@ module LogStash; module Outputs; class ElasticSearch; class HttpClient;
253
253
  def health_check_request(url)
254
254
  logger.debug("Running health check to see if an Elasticsearch connection is working",
255
255
  :healthcheck_url => url.sanitized.to_s, :path => @healthcheck_path)
256
- response = perform_request_to_url(url, :head, @healthcheck_path)
257
- return response, nil
258
- rescue ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError => e
259
- logger.warn("Health check failed", code: e.response_code, url: e.url, message: e.message)
260
- return nil, e
256
+ begin
257
+ response = perform_request_to_url(url, :head, @healthcheck_path)
258
+ return response, nil
259
+ rescue ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError => e
260
+ logger.warn("Health check failed", code: e.response_code, url: e.url, message: e.message)
261
+ return nil, e
262
+ end
261
263
  end
262
264
 
263
265
  def healthcheck!(register_phase = true)
@@ -310,11 +312,13 @@ module LogStash; module Outputs; class ElasticSearch; class HttpClient;
310
312
  end
311
313
 
312
314
  def get_root_path(url, params={})
313
- resp = perform_request_to_url(url, :get, ROOT_URI_PATH, params)
314
- return resp, nil
315
- rescue ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError => e
316
- logger.warn("Elasticsearch main endpoint returns #{e.response_code}", message: e.message, body: e.response_body)
317
- return nil, e
315
+ begin
316
+ resp = perform_request_to_url(url, :get, ROOT_URI_PATH, params)
317
+ return resp, nil
318
+ rescue ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError => e
319
+ logger.warn("Elasticsearch main endpoint returns #{e.response_code}", message: e.message, body: e.response_body)
320
+ return nil, e
321
+ end
318
322
  end
319
323
 
320
324
  def test_serverless_connection(url, root_response)
@@ -511,13 +515,20 @@ module LogStash; module Outputs; class ElasticSearch; class HttpClient;
511
515
  major = major_version(version)
512
516
  if @maximum_seen_major_version.nil?
513
517
  @logger.info("Elasticsearch version determined (#{version})", es_version: major)
514
- @maximum_seen_major_version = major
518
+ set_maximum_seen_major_version(major)
515
519
  elsif major > @maximum_seen_major_version
516
520
  warn_on_higher_major_version(major, url)
517
521
  @maximum_seen_major_version = major
518
522
  end
519
523
  end
520
524
 
525
+ def set_maximum_seen_major_version(major)
526
+ if major >= 6
527
+ @logger.warn("Detected a 6.x and above cluster: the `type` event field won't be used to determine the document _type", es_version: major)
528
+ end
529
+ @maximum_seen_major_version = major
530
+ end
531
+
521
532
  def warn_on_higher_major_version(major, url)
522
533
  @logger.warn("Detected a node with a higher major version than previously observed, " +
523
534
  "this could be the result of an Elasticsearch cluster upgrade",
@@ -182,20 +182,22 @@ module LogStash; module Outputs; class ElasticSearch;
182
182
  def bulk_send(body_stream, batch_actions)
183
183
  params = compression_level? ? {:headers => {"Content-Encoding" => "gzip"}} : {}
184
184
 
185
- begin
186
- response = @pool.post(@bulk_path, params, body_stream.string)
187
- @bulk_response_metrics.increment(response.code.to_s)
188
- rescue ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError => e
189
- @bulk_response_metrics.increment(e.response_code.to_s)
190
- raise e unless e.response_code == 413
191
- # special handling for 413, treat it as a document level issue
185
+ response = @pool.post(@bulk_path, params, body_stream.string)
186
+
187
+ @bulk_response_metrics.increment(response.code.to_s)
188
+
189
+ case response.code
190
+ when 200 # OK
191
+ LogStash::Json.load(response.body)
192
+ when 413 # Payload Too Large
192
193
  logger.warn("Bulk request rejected: `413 Payload Too Large`", :action_count => batch_actions.size, :content_length => body_stream.size)
193
- return emulate_batch_error_response(batch_actions, 413, 'payload_too_large')
194
- rescue => e # it may be a network issue instead, re-raise
195
- raise e
194
+ emulate_batch_error_response(batch_actions, response.code, 'payload_too_large')
195
+ else
196
+ url = ::LogStash::Util::SafeURI.new(response.final_url)
197
+ raise ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError.new(
198
+ response.code, url, body_stream.to_s, response.body
199
+ )
196
200
  end
197
-
198
- LogStash::Json.load(response.body)
199
201
  end
200
202
 
201
203
  def emulate_batch_error_response(actions, http_code, reason)
@@ -409,9 +411,6 @@ module LogStash; module Outputs; class ElasticSearch;
409
411
  def exists?(path, use_get=false)
410
412
  response = use_get ? @pool.get(path) : @pool.head(path)
411
413
  response.code >= 200 && response.code <= 299
412
- rescue ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError => e
413
- return false if e.response_code == 404
414
- raise e
415
414
  end
416
415
 
417
416
  def template_exists?(template_endpoint, name)
@@ -422,8 +421,6 @@ module LogStash; module Outputs; class ElasticSearch;
422
421
  path = "#{template_endpoint}/#{name}"
423
422
  logger.info("Installing Elasticsearch template", name: name)
424
423
  @pool.put(path, nil, LogStash::Json.dump(template))
425
- rescue ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError => e
426
- raise e unless e.response_code == 404
427
424
  end
428
425
 
429
426
  # ILM methods
@@ -435,15 +432,17 @@ module LogStash; module Outputs; class ElasticSearch;
435
432
 
436
433
  # Create a new rollover alias
437
434
  def rollover_alias_put(alias_name, alias_definition)
438
- @pool.put(CGI::escape(alias_name), nil, LogStash::Json.dump(alias_definition))
439
- logger.info("Created rollover alias", name: alias_name)
440
- # If the rollover alias already exists, ignore the error that comes back from Elasticsearch
441
- rescue ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError => e
442
- if e.response_code == 400
443
- logger.info("Rollover alias already exists, skipping", name: alias_name)
444
- return
435
+ begin
436
+ @pool.put(CGI::escape(alias_name), nil, LogStash::Json.dump(alias_definition))
437
+ logger.info("Created rollover alias", name: alias_name)
438
+ # If the rollover alias already exists, ignore the error that comes back from Elasticsearch
439
+ rescue ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError => e
440
+ if e.response_code == 400
441
+ logger.info("Rollover alias already exists, skipping", name: alias_name)
442
+ return
443
+ end
444
+ raise e
445
445
  end
446
- raise e
447
446
  end
448
447
 
449
448
  def get_xpack_info
@@ -275,7 +275,6 @@ class LogStash::Outputs::ElasticSearch < LogStash::Outputs::Base
275
275
  def initialize(*params)
276
276
  super
277
277
  setup_ecs_compatibility_related_defaults
278
- setup_ssl_params!
279
278
  setup_compression_level!
280
279
  end
281
280
 
@@ -694,52 +693,6 @@ class LogStash::Outputs::ElasticSearch < LogStash::Outputs::Base
694
693
  end
695
694
  end
696
695
 
697
- def setup_ssl_params!
698
- @ssl_enabled = normalize_config(:ssl_enabled) do |normalize|
699
- normalize.with_deprecated_alias(:ssl)
700
- end
701
-
702
- @ssl_certificate_authorities = normalize_config(:ssl_certificate_authorities) do |normalize|
703
- normalize.with_deprecated_mapping(:cacert) do |cacert|
704
- [cacert]
705
- end
706
- end
707
-
708
- @ssl_keystore_path = normalize_config(:ssl_keystore_path) do |normalize|
709
- normalize.with_deprecated_alias(:keystore)
710
- end
711
-
712
- @ssl_keystore_password = normalize_config(:ssl_keystore_password) do |normalize|
713
- normalize.with_deprecated_alias(:keystore_password)
714
- end
715
-
716
- @ssl_truststore_path = normalize_config(:ssl_truststore_path) do |normalize|
717
- normalize.with_deprecated_alias(:truststore)
718
- end
719
-
720
- @ssl_truststore_password = normalize_config(:ssl_truststore_password) do |normalize|
721
- normalize.with_deprecated_alias(:truststore_password)
722
- end
723
-
724
- @ssl_verification_mode = normalize_config(:ssl_verification_mode) do |normalize|
725
- normalize.with_deprecated_mapping(:ssl_certificate_verification) do |ssl_certificate_verification|
726
- if ssl_certificate_verification == true
727
- "full"
728
- else
729
- "none"
730
- end
731
- end
732
- end
733
-
734
- params['ssl_enabled'] = @ssl_enabled unless @ssl_enabled.nil?
735
- params['ssl_certificate_authorities'] = @ssl_certificate_authorities unless @ssl_certificate_authorities.nil?
736
- params['ssl_keystore_path'] = @ssl_keystore_path unless @ssl_keystore_path.nil?
737
- params['ssl_keystore_password'] = @ssl_keystore_password unless @ssl_keystore_password.nil?
738
- params['ssl_truststore_path'] = @ssl_truststore_path unless @ssl_truststore_path.nil?
739
- params['ssl_truststore_password'] = @ssl_truststore_password unless @ssl_truststore_password.nil?
740
- params['ssl_verification_mode'] = @ssl_verification_mode unless @ssl_verification_mode.nil?
741
- end
742
-
743
696
  def setup_compression_level!
744
697
  @compression_level = normalize_config(:compression_level) do |normalize|
745
698
  normalize.with_deprecated_mapping(:http_compression) do |http_compression|
@@ -43,40 +43,23 @@ module LogStash; module PluginMixins; module ElasticSearch
43
43
  # urls that already have query strings, the one specified here will be appended.
44
44
  :parameters => { :validate => :hash },
45
45
 
46
- # Enable SSL/TLS secured communication to Elasticsearch cluster. Leaving this unspecified will use whatever scheme
47
- # is specified in the URLs listed in 'hosts'. If no explicit protocol is specified plain HTTP will be used.
48
- # If SSL is explicitly disabled here the plugin will refuse to start if an HTTPS URL is given in 'hosts'
49
- :ssl => { :validate => :boolean, :deprecated => "Set 'ssl_enabled' instead." },
50
-
51
46
  # Enable SSL/TLS secured communication to Elasticsearch cluster. Leaving this unspecified will use whatever scheme
52
47
  # is specified in the URLs listed in 'hosts'. If no explicit protocol is specified plain HTTP will be used.
53
48
  # If SSL is explicitly disabled here the plugin will refuse to start if an HTTPS URL is given in 'hosts'
54
49
  :ssl_enabled => { :validate => :boolean },
55
50
 
56
- # Option to validate the server's certificate. Disabling this severely compromises security.
57
- # For more information on disabling certificate verification please read
58
- # https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
59
- :ssl_certificate_verification => { :validate => :boolean, :default => true, :deprecated => "Set 'ssl_verification_mode' instead." },
60
-
61
51
  # Options to verify the server's certificate.
62
52
  # "full": validates that the provided certificate has an issue date that’s within the not_before and not_after dates;
63
53
  # chains to a trusted Certificate Authority (CA); has a hostname or IP address that matches the names within the certificate.
64
54
  # "none": performs no certificate validation. Disabling this severely compromises security (https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf)
65
55
  :ssl_verification_mode => { :validate => %w[full none], :default => 'full' },
66
56
 
67
- # The .cer or .pem file to validate the server's certificate
68
- :cacert => { :validate => :path, :deprecated => "Set 'ssl_certificate_authorities' instead." },
69
-
70
57
  # The .cer or .pem files to validate the server's certificate
71
58
  :ssl_certificate_authorities => { :validate => :path, :list => true },
72
59
 
73
60
  # One or more hex-encoded SHA256 fingerprints to trust as Certificate Authorities
74
61
  :ca_trusted_fingerprint => LogStash::PluginMixins::CATrustedFingerprintSupport,
75
62
 
76
- # The JKS truststore to validate the server's certificate.
77
- # Use either `:truststore` or `:cacert`
78
- :truststore => { :validate => :path, :deprecated => "Set 'ssl_truststore_path' instead." },
79
-
80
63
  # The JKS truststore to validate the server's certificate.
81
64
  # Use either `:ssl_truststore_path` or `:ssl_certificate_authorities`
82
65
  :ssl_truststore_path => { :validate => :path },
@@ -84,16 +67,9 @@ module LogStash; module PluginMixins; module ElasticSearch
84
67
  # The format of the truststore file. It must be either jks or pkcs12
85
68
  :ssl_truststore_type => { :validate => %w[pkcs12 jks] },
86
69
 
87
- # Set the truststore password
88
- :truststore_password => { :validate => :password, :deprecated => "Use 'ssl_truststore_password' instead." },
89
-
90
70
  # Set the truststore password
91
71
  :ssl_truststore_password => { :validate => :password },
92
72
 
93
- # The keystore used to present a certificate to the server.
94
- # It can be either .jks or .p12
95
- :keystore => { :validate => :path, :deprecated => "Set 'ssl_keystore_path' instead." },
96
-
97
73
  # The keystore used to present a certificate to the server.
98
74
  # It can be either .jks or .p12
99
75
  :ssl_keystore_path => { :validate => :path },
@@ -101,9 +77,6 @@ module LogStash; module PluginMixins; module ElasticSearch
101
77
  # The format of the keystore file. It must be either jks or pkcs12
102
78
  :ssl_keystore_type => { :validate => %w[pkcs12 jks] },
103
79
 
104
- # Set the keystore password
105
- :keystore_password => { :validate => :password, :deprecated => "Set 'ssl_keystore_password' instead." },
106
-
107
80
  # Set the keystore password
108
81
  :ssl_keystore_password => { :validate => :password },
109
82
 
@@ -229,7 +202,17 @@ module LogStash; module PluginMixins; module ElasticSearch
229
202
  :dlq_custom_codes => { :validate => :number, :list => true, :default => [] },
230
203
 
231
204
  # if enabled, failed index name interpolation events go into dead letter queue.
232
- :dlq_on_failed_indexname_interpolation => { :validate => :boolean, :default => true }
205
+ :dlq_on_failed_indexname_interpolation => { :validate => :boolean, :default => true },
206
+
207
+ # Obsolete Settings
208
+ :ssl => { :obsolete => "Set 'ssl_enabled' instead." },
209
+ :ssl_certificate_verification => { :obsolete => "Set 'ssl_verification_mode' instead." },
210
+ :cacert => { :obsolete => "Set 'ssl_certificate_authorities' instead." },
211
+ :truststore => { :obsolete => "Set 'ssl_truststore_path' instead." },
212
+ :keystore => { :obsolete => "Set 'ssl_keystore_path' instead." },
213
+ # Leave :validate to ensure obfuscation of sensitive setting for passwords
214
+ :truststore_password => { :validate => :password, :obsolete => "Use 'ssl_truststore_password' instead." },
215
+ :keystore_password => { :validate => :password, :obsolete => "Set 'ssl_keystore_password' instead." }
233
216
  }.freeze
234
217
 
235
218
  def self.included(base)
@@ -243,3 +226,4 @@ module LogStash; module PluginMixins; module ElasticSearch
243
226
  end
244
227
  end
245
228
  end; end; end
229
+
@@ -1,6 +1,6 @@
1
1
  Gem::Specification.new do |s|
2
2
  s.name = 'logstash-output-elasticsearch'
3
- s.version = '11.22.12'
3
+ s.version = '12.0.0'
4
4
  s.licenses = ['apache-2.0']
5
5
  s.summary = "Stores logs in Elasticsearch"
6
6
  s.description = "This gem is a Logstash plugin required to be installed on top of the Logstash core pipeline using $LS_HOME/bin/logstash-plugin install gemname. This gem is not a stand-alone program"
@@ -915,12 +915,7 @@ describe LogStash::Outputs::ElasticSearch do
915
915
  allow(elasticsearch_output_instance.client.pool).to receive(:post) do |path, params, body|
916
916
  if body.length > max_bytes
917
917
  max_bytes *= 2 # ensure a successful retry
918
- raise ::LogStash::Outputs::ElasticSearch::HttpClient::Pool::BadResponseCodeError.new(
919
- 413,
920
- "test-url",
921
- body,
922
- ""
923
- )
918
+ double("Response", :code => 413, :body => "")
924
919
  else
925
920
  double("Response", :code => 200, :body => '{"errors":false,"items":[{"index":{"status":200,"result":"created"}}]}')
926
921
  end
@@ -1130,81 +1125,6 @@ describe LogStash::Outputs::ElasticSearch do
1130
1125
  end
1131
1126
  end
1132
1127
 
1133
- describe "SSL deprecated settings" do
1134
- let(:base_options) { {"ssl" => "true"} }
1135
-
1136
- context "with client certificate" do
1137
- let(:do_register) { true }
1138
- let(:cacert) { Stud::Temporary.file.path }
1139
- let(:options) { base_options.merge(
1140
- "cacert" => cacert,
1141
- "ssl_certificate_verification" => false
1142
- ) }
1143
-
1144
- after :each do
1145
- File.delete(cacert)
1146
- end
1147
-
1148
- it "should map new configs into params" do
1149
- expect(subject.params).to match hash_including(
1150
- "ssl_enabled" => true,
1151
- "ssl_verification_mode" => "none",
1152
- "ssl_certificate_authorities" => [cacert]
1153
- )
1154
- end
1155
-
1156
- it "should set new configs variables" do
1157
- expect(subject.instance_variable_get(:@ssl_enabled)).to eql(true)
1158
- expect(subject.instance_variable_get(:@ssl_verification_mode)).to eql("none")
1159
- expect(subject.instance_variable_get(:@ssl_certificate_authorities)).to eql([cacert])
1160
- end
1161
- end
1162
-
1163
- context "with java stores" do
1164
- let(:do_register) { true }
1165
- let(:keystore) { Stud::Temporary.file.path }
1166
- let(:truststore) { Stud::Temporary.file.path }
1167
- let(:options) { base_options.merge(
1168
- "keystore" => keystore,
1169
- "keystore_password" => "keystore",
1170
- "truststore" => truststore,
1171
- "truststore_password" => "truststore",
1172
- "ssl_certificate_verification" => true
1173
- ) }
1174
-
1175
- let(:spy_http_client_builder!) do
1176
- allow(described_class::HttpClientBuilder).to receive(:build).with(any_args).and_call_original
1177
- allow(described_class::HttpClientBuilder).to receive(:setup_ssl).with(any_args).and_return({})
1178
- end
1179
-
1180
- after :each do
1181
- File.delete(keystore)
1182
- File.delete(truststore)
1183
- end
1184
-
1185
- it "should map new configs into params" do
1186
- expect(subject.params).to match hash_including(
1187
- "ssl_enabled" => true,
1188
- "ssl_keystore_path" => keystore,
1189
- "ssl_truststore_path" => truststore,
1190
- "ssl_verification_mode" => "full"
1191
- )
1192
-
1193
- expect(subject.params["ssl_keystore_password"].value).to eql("keystore")
1194
- expect(subject.params["ssl_truststore_password"].value).to eql("truststore")
1195
- end
1196
-
1197
- it "should set new configs variables" do
1198
- expect(subject.instance_variable_get(:@ssl_enabled)).to eql(true)
1199
- expect(subject.instance_variable_get(:@ssl_keystore_path)).to eql(keystore)
1200
- expect(subject.instance_variable_get(:@ssl_keystore_password).value).to eql("keystore")
1201
- expect(subject.instance_variable_get(:@ssl_truststore_path)).to eql(truststore)
1202
- expect(subject.instance_variable_get(:@ssl_truststore_password).value).to eql("truststore")
1203
- expect(subject.instance_variable_get(:@ssl_verification_mode)).to eql("full")
1204
- end
1205
- end
1206
- end
1207
-
1208
1128
  describe "retry_on_conflict" do
1209
1129
  let(:num_retries) { 123 }
1210
1130
  let(:event) { LogStash::Event.new("myactionfield" => "update", "message" => "blah") }
@@ -195,3 +195,25 @@ describe "SSL options" do
195
195
  end
196
196
  end
197
197
 
198
+ # Move outside the SSL options describe block that has the after hook
199
+ describe "SSL obsolete settings" do
200
+ let(:base_settings) { { "hosts" => "localhost", "pool_max" => 1, "pool_max_per_route" => 1 } }
201
+ [
202
+ {name: 'ssl', replacement: 'ssl_enabled'},
203
+ {name: 'ssl_certificate_verification', replacement: 'ssl_verification_mode'},
204
+ {name: 'cacert', replacement: 'ssl_certificate_authorities'},
205
+ {name: 'truststore', replacement: 'ssl_truststore_path'},
206
+ {name: 'keystore', replacement: 'ssl_keystore_path'},
207
+ {name: 'truststore_password', replacement: 'ssl_truststore_password'},
208
+ {name: 'keystore_password', replacement: 'ssl_keystore_password'}
209
+ ].each do |obsolete_setting|
210
+ context "with option #{obsolete_setting[:name]}" do
211
+ let(:settings) { base_settings.merge(obsolete_setting[:name] => "value") }
212
+
213
+ it "emits an error about the setting being obsolete" do
214
+ error_text = /The setting `#{obsolete_setting[:name]}` in plugin `elasticsearch` is obsolete and is no longer available. (Use|Set) '#{obsolete_setting[:replacement]}' instead/i
215
+ expect { LogStash::Outputs::ElasticSearch.new(settings) }.to raise_error LogStash::ConfigurationError, error_text
216
+ end
217
+ end
218
+ end
219
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: logstash-output-elasticsearch
3
3
  version: !ruby/object:Gem::Version
4
- version: 11.22.12
4
+ version: 12.0.0
5
5
  platform: java
6
6
  authors:
7
7
  - Elastic
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2025-01-28 00:00:00.000000000 Z
11
+ date: 2024-12-24 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  requirement: !ruby/object:Gem::Requirement