Skip to content

Commit 779cb9b

Browse files
Forward port release notes for v8.18.0 (elastic#127013)
1 parent e404350 commit 779cb9b

File tree

4 files changed

+583
-33
lines changed

4 files changed

+583
-33
lines changed

docs/reference/migration/migrate_8_18.asciidoc

Lines changed: 120 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,5 +16,124 @@ coming::[8.18.0]
1616
[[breaking-changes-8.18]]
1717
=== Breaking changes
1818

19-
There are no breaking changes in {es} 8.18.
19+
The following changes in {es} 8.18 might affect your applications
20+
and prevent them from operating normally.
21+
Before upgrading to 8.18, review these changes and take the described steps
22+
to mitigate the impact.
23+
24+
[discrete]
25+
[[breaking_818_analysis_changes]]
26+
==== Analysis changes
27+
28+
[[change_semantic_text_to_act_like_normal_text_field]]
29+
.Change Semantic Text To Act Like A Normal Text Field
30+
[%collapsible]
31+
====
32+
*Details* +
33+
The previous semantic_text format used a complex subfield structure in _source to store the embeddings. This complicated interactions/integrations with semantic_text fields and _source in general. This new semantic_text format treats it as a normal text field, where the field's value in _source is the value assigned by the user.
34+
35+
*Impact* +
36+
Users who parsed the subfield structure of the previous semantic_text format in _source will need to update their parsing logic. The new format does not directly expose the chunks and embeddings generated from the input text. The new format will be applied to all new indices, any existing indices will continue to use the previous format.
37+
====
38+
39+
[discrete]
40+
[[breaking_818_cluster_and_node_setting_changes]]
41+
==== Cluster and node setting changes
42+
43+
[[drop_tls_rsa_cipher_support_for_jdk_24]]
44+
.Drop `TLS_RSA` cipher support for JDK 24
45+
[%collapsible]
46+
====
47+
*Details* +
48+
This change removes `TLS_RSA` ciphers from the list of default supported ciphers, for Elasticsearch deployments running on JDK 24.
49+
50+
*Impact* +
51+
The dropped ciphers are `TLS_RSA_WITH_AES_256_GCM_SHA384`, `TLS_RSA_WITH_AES_128_GCM_SHA256`, `TLS_RSA_WITH_AES_256_CBC_SHA256`, `TLS_RSA_WITH_AES_128_CBC_SHA256`, `TLS_RSA_WITH_AES_256_CBC_SHA`, and `TLS_RSA_WITH_AES_128_CBC_SHA`. TLS connections to Elasticsearch using these ciphers will no longer work. Please configure your clients to use one of supported cipher suites.
52+
====
53+
54+
[discrete]
55+
[[breaking_818_packaging_changes]]
56+
==== Packaging changes
57+
58+
[[disable_machine_learning_on_macos_x86_64]]
59+
.Disable machine learning on macOS x86_64
60+
[%collapsible]
61+
====
62+
*Details* +
63+
The machine learning plugin is permanently disabled on macOS x86_64. For the last three years Apple has been selling hardware based on the arm64 architecture, and support will increasingly focus on this architecture in the future. Changes to upstream dependencies of Elastic's machine learning functionality have made it unviable for Elastic to continue to build machine learning on macOS x86_64.
64+
65+
*Impact* +
66+
To continue to use machine learning functionality on macOS please switch to an arm64 machine (Apple silicon). Alternatively, it will still be possible to run Elasticsearch with machine learning enabled in a Docker container on macOS x86_64.
67+
====
68+
69+
[discrete]
70+
[[breaking_818_rest_api_changes]]
71+
==== REST API changes
72+
73+
[[set_allow_partial_search_results_true_by_default]]
74+
.Set allow_partial_search_results=true by default
75+
[%collapsible]
76+
====
77+
*Details* +
78+
Before this change, in case of shard failures, EQL queries always returned an error. With this change, they will keep running and will return partial results.
79+
80+
*Impact* +
81+
EQL queries that would previously fail due to shard failures, will now succeed and return partial results. The previous defaults can be restored by setting `xpack.eql.default_allow_partial_results` cluster setting to `false` or setting with `allow_partial_search_results` to `false` in the query request.
82+
====
83+
84+
85+
[discrete]
86+
[[deprecated-8.18]]
87+
=== Deprecations
88+
89+
The following functionality has been deprecated in {es} 8.18
90+
and will be removed in a future version.
91+
While this won't have an immediate impact on your applications,
92+
we strongly encourage you to take the described steps to update your code
93+
after upgrading to 8.18.
94+
95+
To find out if you are using any deprecated functionality,
96+
enable <<deprecation-logging, deprecation logging>>.
97+
98+
[discrete]
99+
[[deprecations_818_index_setting]]
100+
==== Index setting deprecations
101+
102+
[[increase_frozen_indices_deprecation_level_to_critical]]
103+
.Increase the frozen indices deprecation level to `CRITICAL`
104+
[%collapsible]
105+
====
106+
*Details* +
107+
The migration deprecations API previously returned a warning on frozen indices. Support for reading frozen indices will be removed in 9.0, so in 8.18 this has been made a critical issue.
108+
109+
*Impact* +
110+
Users are required to unfreeze any frozen indices before upgrading to 9.x. (N.B. It was impossible to freeze indices in 8.x, so this only applies to 7.x indices which have not been reindexed.)
111+
====
112+
113+
[discrete]
114+
[[deprecations_818_rest_api]]
115+
==== REST API deprecations
116+
117+
[[deprecate_ability_to_connect_to_nodes_of_versions_8_17_earlier]]
118+
.Deprecate ability to connect to nodes of versions 8.17 and earlier
119+
[%collapsible]
120+
====
121+
*Details* +
122+
Versions 9.0.0 and later of {es} will not support communication with nodes of versions earlier than 8.18.0, so the ability to connect to nodes of earlier versions is deprecated in this version. This applies both to communication within a cluster and communication across clusters (e.g. for <<modules-cross-cluster-search,{ccs}>> or <<xpack-ccr,{ccr}>>).
123+
{es} will report in its <<deprecation-logging, deprecation logging>> each time it opens a connection to a node that will not be supported from version 9.0.0 onwards. You must upgrade all your clusters to version 8.18.0 or later before upgrading any of your clusters to 9.0.0 or later.
124+
125+
*Impact* +
126+
Upgrade all of your clusters to at least 8.18.0 before upgrading any of them to 9.0.0 or later.
127+
====
128+
129+
[[v_7_deprecation_logging_set_to_critical]]
130+
.V_7 deprecation logging set to critical
131+
[%collapsible]
132+
====
133+
*Details* +
134+
This changes the V_7 API deprecation logging level to CRITICAL.
135+
136+
*Impact* +
137+
Any usage of deprecated V_7 API features will now be logged at the CRITICAL level. This does not change functionality.
138+
====
20139

docs/reference/release-notes.asciidoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ This section summarizes the changes in each release.
1313
* <<release-notes-8.17.2>>
1414
* <<release-notes-8.17.1>>
1515
* <<release-notes-8.17.0>>
16+
* <<release-notes-8.16.6>>
17+
* <<release-notes-8.16.5>>
1618
* <<release-notes-8.16.4>>
1719
* <<release-notes-8.16.3>>
1820
* <<release-notes-8.16.2>>
@@ -94,6 +96,8 @@ include::release-notes/8.17.3.asciidoc[]
9496
include::release-notes/8.17.2.asciidoc[]
9597
include::release-notes/8.17.1.asciidoc[]
9698
include::release-notes/8.17.0.asciidoc[]
99+
include::release-notes/8.16.6.asciidoc[]
100+
include::release-notes/8.16.5.asciidoc[]
97101
include::release-notes/8.16.4.asciidoc[]
98102
include::release-notes/8.16.3.asciidoc[]
99103
include::release-notes/8.16.2.asciidoc[]

0 commit comments

Comments
 (0)