Skip to content

Conversation

@albertzaharovits
Copy link
Contributor

Backport of #40416

Introduces a new ConsistentSecureSettingsValidatorService service that exposes
a single public method, namely allSecureSettingsConsistent. The method returns
true if the local node's secure settings (inside the keystore) are equal to the
master's, and false otherwise. Technically, the local node has to have exactly
the same secure settings - setting names should not be missing or in surplus -
for all SecureSetting instances that are flagged with the newly introduced
Property.Consistent. It is worth highlighting that the allSecureSettingsConsistent
is not a consensus view across the cluster, but rather the local node's perspective
in relation to the master.

Introduces a new `ConsistentSecureSettingsValidatorService` service that exposes
a single public method, namely `allSecureSettingsConsistent`. The method returns
`true` if the local node's secure settings (inside the keystore) are equal to the
master's, and `false` otherwise. Technically, the local node has to have exactly
the same secure settings - setting names should not be missing or in surplus
- for all `SecureSetting` instances that are flagged with the newly introduced
`Property.Consistent`. It is worth highlighting that the `allSecureSettingsConsistent`
is not a consensus view across the cluster, but rather the local node's perspective
in relation to the master.
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-core-infra

@albertzaharovits
Copy link
Contributor Author

@elasticmachine run elasticsearch-ci/packaging-sample

@albertzaharovits albertzaharovits merged commit 5e17bc5 into elastic:7.x Jun 29, 2019
@albertzaharovits albertzaharovits deleted the 7x_consistent_settings branch June 29, 2019 20:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants