WARNING: Version 6.0 of Elasticsearch has passed its EOL date.
This documentation is no longer being maintained and may be removed. If you are running this version, we strongly advise you to upgrade. For the latest information, see the current release documentation.
IMPORTANT: This documentation is no longer updated. Refer to Elastic's version policy and the latest documentation.
- Machine Learning
-
-
Added the
xpack.ml.max_model_memory_limitsetting, which can be dynamically updated. For more information, see Machine Learning Settings. -
Added checks and error messages for the
ml.enabledandml.max_open_jobsnode attributes. These are reserved for internal use and their values should be set by usingxpack.ml.enabledandxpack.ml.max_open_jobsmachine learning settings.
-
Added the
- Security
-
-
Improved the error messages that are returned by the
setup-passwordscommand.
-
Improved the error messages that are returned by the
- Watcher
-
- Added verification that the required templates exist before Watcher starts. For more information, see Scripts and Templates.
-
Added the
xpack.watcher.history.cleaner_service.enabledsetting. You can use this setting to enable or disable the cleaner service, which removes previous versions of Watcher indices (for example, .watcher-history*) when it determines that they are old. For more information, see Watcher Settings.
- Machine Learning
-
- Fixed a scenario where models were incorrectly combined. This problem occurred when anomaly detectors were considered to be the same despite having different partition field values.
- Cleaned up the job closure process for situations where the job was still in the process of opening.
- Security
-
-
Enabled PKI realms to obtain the password for the truststore from either the
truststore.secure_passwordor thetruststore.passwordsetting. For more information, see PKI realm settings. - Fixed document level security such that if your role has authority to access a root document, you also have access to its nested documents.
- Fixed an issue that caused LDAP authentication requests to be slow and to require multiple binds when authenticating in user search mode.
-
Enabled PKI realms to obtain the password for the truststore from either the
See also: