-
Notifications
You must be signed in to change notification settings - Fork 25k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should we always install the main repository plugins? #81652
Comments
Pinging @elastic/es-delivery (Team:Delivery) |
Pinging @elastic/es-core-infra (Team:Core/Infra) |
Yeah, I'm apt to go with option (1) as well. Compressed these three plugins are 24MB so not a huge increase in distro size. We should work to try and get this in 8.0+ soon as this is another breaking change given that these plugins will go away, so any scripts/etc folks have to install them will break. We want to give folks some heads up so getting this included and documented in rc-1 would be ideal. |
@jasontedor thanks for the pointer 👍 |
I'm +1 to include them by default. I did some telemetry analysis, and these plugins are used on ~10% of total deployments. The suggested implementation path sounds like a breaking change only for people that really want to remove them. |
Pinging @elastic/es-distributed (Team:Distributed) |
I don't think we need a way to disable them, and it's a simplification for us to not have a way to do so. We don't need ways to disable other repository types that are built-in to the system. These repository types being distributed as modules should be thought of as being no different than being built-in to the system. They don't consume any resources if they are not in use, so a user shouldn't have any concern in that regard, and when security is active, they require authentication/authorization to be able to create repositories that use them. Does that cover the reasons you have in mind for why a user would need to disable them, or are there other concerns that I'm overlooking? |
Thanks Jason, this helps a lot and I don't have other specific concern that have not been addressed in your response. If our target is 8.0, we are still introducing a breaking change with a very short notice. @qhoxie do you see any concern related to our Make it Minor effort? |
No concerns on my end. We can proceed with option 1. |
@bytebilly I think there's ways to avoid it being considered breaking until a deprecation period has elapsed, and we have some previous experience going through the process of transitioning plugins to modules: #81652 (comment). |
Closes #81652. Convert the `repository-azure`, `repository-gcs` and `repository-s3` plugins into modules, so that they are always included in the Elasticsearch distribution. Also change plugin installation, removal and syncing so that attempting to add or remove these plugins still succeeds but is now a no-op.
Closes elastic#81652. Convert the `repository-azure`, `repository-gcs` and `repository-s3` plugins into modules, so that they are always included in the Elasticsearch distribution. Also change plugin installation, removal and syncing so that attempting to add or remove these plugins still succeeds but is now a no-op.
Backport of #81870. Closes #81652. Convert the `repository-azure`, `repository-gcs` and `repository-s3` plugins into modules, so that they are always included in the Elasticsearch distribution. Also change plugin installation, removal and syncing so that attempting to add or remove these plugins still succeeds but is now a no-op.
This issue is for discussing whether we should always install the following plugins in Elasticsearch:
repository-s3
repository-gcs
repository-azure
Anyone running Elasticsearch one of the three main Cloud providers is likely using their object storage for backups, and other vendors also have S3-compatible system for performing backups in on-premise environments.
The upside of always bundling these plugins is that it relieves a piece of installation overhead, in particular making it easier to run the Docker image in a cloud environment.
The downside is that the distribution size will increase. There may be / are probably other downsides too.
We could:
I would opt for (1) in order to avoid the complexity (and therefore bugs) associated with upgrades.
The text was updated successfully, but these errors were encountered: