Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Request] Add instructions for disabling logsdb by default #6409

Open
marshallmain opened this issue Jan 9, 2025 · 3 comments
Open

[Request] Add instructions for disabling logsdb by default #6409

marshallmain opened this issue Jan 9, 2025 · 3 comments
Assignees
Labels
Effort: Medium Issues that take moderate but not substantial time to complete Priority: High Issues that are time-sensitive and/or are of high customer importance Team: Detections/Response Detections and Response v8.18.0 v9.0.0

Comments

@marshallmain
Copy link
Contributor

Description

In https://www.elastic.co/guide/en/security/current/detections-logsdb-index-mode-impact.html, we describe the impact of using logsdb with the Elastic Security and recommend that users do not enable logsdb at this time. In 9.0, logsdb will be enabled by default for logs indices and in the upgrade assistant we will be recommending that existing users opt out of logsdb by default. We need to document the process for opting out of logsdb.

To opt out, users need to set cluster.logsdb.enabled: false in their cluster settings. The dev tools request to do this is

PUT _cluster/settings
{
   "persistent": {
       "cluster.logsdb.enabled": false
   }
}

Background & resources

Which documentation set does this change impact?

ESS only

ESS release

8.18 and 9.0

Serverless release

n/a

Feature differences

Opting out is only recommended for ESS

API docs impact

No API changes

Prerequisites, privileges, feature flags

Users must have the manage cluster privilege to update the cluster settings (https://www.elastic.co/guide/en/elasticsearch/reference/current/cluster-update-settings.html)

@nicpenning
Copy link

Curious to why forcing this as a default if it's not ready? This sounds like a recipe for disaster?

@tylerperk
Copy link

Hi @nicpenning appreciate your concern. We are still evaluating whether it makes sense to enable logsdb by default in 9.0 or if it might be too disruptive at this time.

@nicpenning
Copy link

Thank you!

If anything, at least automating the disablement for Security with notification would be a an interesting concept. You may need to consider people that may have this enabled already if they are using it some capacity. We are not yet, but have been excited to track its capabilities over time.

@jmikell821 jmikell821 added Team: Detections/Response Detections and Response v8.18.0 v9.0.0 Priority: High Issues that are time-sensitive and/or are of high customer importance Effort: Medium Issues that take moderate but not substantial time to complete labels Jan 22, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Effort: Medium Issues that take moderate but not substantial time to complete Priority: High Issues that are time-sensitive and/or are of high customer importance Team: Detections/Response Detections and Response v8.18.0 v9.0.0
Projects
None yet
Development

No branches or pull requests

5 participants