[2018-07-11T09:15:43,687][INFO ][o.e.n.Node ] [] initializing ... [2018-07-11T09:15:43,754][INFO ][o.e.e.NodeEnvironment ] [dod0z6s] using [1] data paths, mounts [[/ (rootfs)]], net usable_space [11.8gb], net total_space [16.9gb], types [rootfs] [2018-07-11T09:15:43,754][INFO ][o.e.e.NodeEnvironment ] [dod0z6s] heap size [1015.6mb], compressed ordinary object pointers [true] [2018-07-11T09:15:43,780][INFO ][o.e.n.Node ] [dod0z6s] node name derived from node ID [dod0z6sPTWmFN_onJc18Tg]; set [node.name] to override [2018-07-11T09:15:43,780][INFO ][o.e.n.Node ] [dod0z6s] version[6.3.0], pid[4498], build[default/tar/424e937/2018-06-11T23:38:03.357887Z], OS[Linux/3.10.0-862.6.3.el7.x86_64/amd64], JVM[Oracle Corporation/OpenJDK 64-Bit Server VM/1.8.0_171/25.171-b10] [2018-07-11T09:15:43,780][INFO ][o.e.n.Node ] [dod0z6s] JVM arguments [-Xms1g, -Xmx1g, -XX:+UseConcMarkSweepGC, -XX:CMSInitiatingOccupancyFraction=75, -XX:+UseCMSInitiatingOccupancyOnly, -XX:+AlwaysPreTouch, -Xss1m, -Djava.awt.headless=true, -Dfile.encoding=UTF-8, -Djna.nosys=true, -XX:-OmitStackTraceInFastThrow, -Dio.netty.noUnsafe=true, -Dio.netty.noKeySetOptimization=true, -Dio.netty.recycler.maxCapacityPerThread=0, -Dlog4j.shutdownHookEnabled=false, -Dlog4j2.disable.jmx=true, -Djava.io.tmpdir=/tmp/elasticsearch.mJPf6QpF, -XX:+HeapDumpOnOutOfMemoryError, -XX:HeapDumpPath=data, -XX:ErrorFile=logs/hs_err_pid%p.log, -XX:+PrintGCDetails, -XX:+PrintGCDateStamps, -XX:+PrintTenuringDistribution, -XX:+PrintGCApplicationStoppedTime, -Xloggc:logs/gc.log, -XX:+UseGCLogFileRotation, -XX:NumberOfGCLogFiles=32, -XX:GCLogFileSize=64m, -Des.path.home=/home/asv/Documents/elasticsearch-6.3.0, -Des.path.conf=/home/asv/Documents/elasticsearch-6.3.0/config, -Des.distribution.flavor=default, -Des.distribution.type=tar] [2018-07-11T09:15:48,943][INFO ][c.f.s.SearchGuardPlugin ] ES Config path is /home/asv/Documents/elasticsearch-6.3.0/config [2018-07-11T09:15:48,944][DEBUG][c.f.s.SearchGuardPlugin ] Client side initiated TLS renegotiation forcibly disabled. This can prevent DoS attacks. (jdk.tls.rejectClientInitiatedRenegotiation set to true). [2018-07-11T09:15:48,983][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] OpenSSL not available (this is not an error, we simply fallback to built-in JDK SSL) because of java.lang.ClassNotFoundException: io.netty.internal.tcnative.SSL [2018-07-11T09:15:49,026][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] JVM supports the following 65 ciphers for https [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5] [2018-07-11T09:15:49,031][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] JVM supports the following 65 ciphers for transport [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5] [2018-07-11T09:15:49,032][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] Config directory is /home/asv/Documents/elasticsearch-6.3.0/config/, from there the key- and truststore files are resolved relatively [2018-07-11T09:15:49,032][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Value for searchguard.ssl.transport.keystore_filepath is CN=sgnode-keystore.jks [2018-07-11T09:15:49,032][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Resolved CN=sgnode-keystore.jks to /home/asv/Documents/elasticsearch-6.3.0/config/CN=sgnode-keystore.jks against /home/asv/Documents/elasticsearch-6.3.0/config [2018-07-11T09:15:49,033][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Value for searchguard.ssl.transport.truststore_filepath is truststore.jks [2018-07-11T09:15:49,033][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Resolved truststore.jks to /home/asv/Documents/elasticsearch-6.3.0/config/truststore.jks against /home/asv/Documents/elasticsearch-6.3.0/config [2018-07-11T09:15:49,044][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2018-07-11T09:15:49,044][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: is a certificate entry?false/is a key entry?true [2018-07-11T09:15:49,044][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: chain len 3 [2018-07-11T09:15:49,045][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=sgnode of type -1 -> false [2018-07-11T09:15:49,045][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=zeta Signing CA, OU=zeta Signing CA, O=zeta of type 0 -> false [2018-07-11T09:15:49,045][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=zeta Root CA, OU=zeta Root CA, O=zeta of type 2147483647 -> true [2018-07-11T09:15:49,045][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: single cert CN=sgnode of type -1 -> false [2018-07-11T09:15:49,045][INFO ][c.f.s.s.u.SSLCertificateHelper] No alias given, use the first one: cn=sgnode [2018-07-11T09:15:49,046][WARN ][c.f.s.s.u.SSLCertificateHelper] Certificate chain for alias cn=sgnode contains a root certificate [2018-07-11T09:15:49,046][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2018-07-11T09:15:49,046][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: is a certificate entry?false/is a key entry?true [2018-07-11T09:15:49,046][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: chain len 3 [2018-07-11T09:15:49,046][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=sgnode of type -1 -> false [2018-07-11T09:15:49,046][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=zeta Signing CA, OU=zeta Signing CA, O=zeta of type 0 -> false [2018-07-11T09:15:49,046][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=zeta Root CA, OU=zeta Root CA, O=zeta of type 2147483647 -> true [2018-07-11T09:15:49,047][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: single cert CN=sgnode of type -1 -> false [2018-07-11T09:15:49,061][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2018-07-11T09:15:49,061][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias root-ca-chain: is a certificate entry?true/is a key entry?false [2018-07-11T09:15:49,061][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias root-ca-chain: single cert CN=zeta Root CA, OU=zeta Root CA, O=zeta of type 2147483647 -> true [2018-07-11T09:15:49,062][DEBUG][c.f.s.s.u.SSLCertificateHelper] No alias given, will trust all of the certificates in the store [2018-07-11T09:15:49,109][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Value for searchguard.ssl.http.keystore_filepath is CN=sgnode-keystore.jks [2018-07-11T09:15:49,109][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Resolved CN=sgnode-keystore.jks to /home/asv/Documents/elasticsearch-6.3.0/config/CN=sgnode-keystore.jks against /home/asv/Documents/elasticsearch-6.3.0/config [2018-07-11T09:15:49,109][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] HTTPS client auth mode OPTIONAL [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: is a certificate entry?false/is a key entry?true [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: chain len 3 [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=sgnode of type -1 -> false [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=zeta Signing CA, OU=zeta Signing CA, O=zeta of type 0 -> false [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=zeta Root CA, OU=zeta Root CA, O=zeta of type 2147483647 -> true [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: single cert CN=sgnode of type -1 -> false [2018-07-11T09:15:49,110][INFO ][c.f.s.s.u.SSLCertificateHelper] No alias given, use the first one: cn=sgnode [2018-07-11T09:15:49,110][WARN ][c.f.s.s.u.SSLCertificateHelper] Certificate chain for alias cn=sgnode contains a root certificate [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: is a certificate entry?false/is a key entry?true [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: chain len 3 [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=sgnode of type -1 -> false [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=zeta Signing CA, OU=zeta Signing CA, O=zeta of type 0 -> false [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=zeta Root CA, OU=zeta Root CA, O=zeta of type 2147483647 -> true [2018-07-11T09:15:49,110][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias cn=sgnode: single cert CN=sgnode of type -1 -> false [2018-07-11T09:15:49,111][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Value for searchguard.ssl.http.truststore_filepath is truststore.jks [2018-07-11T09:15:49,111][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Resolved truststore.jks to /home/asv/Documents/elasticsearch-6.3.0/config/truststore.jks against /home/asv/Documents/elasticsearch-6.3.0/config [2018-07-11T09:15:49,111][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2018-07-11T09:15:49,111][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias root-ca-chain: is a certificate entry?true/is a key entry?false [2018-07-11T09:15:49,111][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias root-ca-chain: single cert CN=zeta Root CA, OU=zeta Root CA, O=zeta of type 2147483647 -> true [2018-07-11T09:15:49,111][DEBUG][c.f.s.s.u.SSLCertificateHelper] No alias given, will trust all of the certificates in the store [2018-07-11T09:15:49,112][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] TLS Transport Client Provider : JDK [2018-07-11T09:15:49,112][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] TLS Transport Server Provider : JDK [2018-07-11T09:15:49,112][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] TLS HTTP Provider : JDK [2018-07-11T09:15:49,112][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] sslTransportClientProvider:JDK with ciphers [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256] [2018-07-11T09:15:49,112][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] sslTransportServerProvider:JDK with ciphers [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256] [2018-07-11T09:15:49,112][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] sslHTTPProvider:JDK with ciphers [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256] [2018-07-11T09:15:49,112][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] Enabled TLS protocols for transport layer : [TLSv1.2, TLSv1.1] [2018-07-11T09:15:49,116][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] Enabled TLS protocols for HTTP layer : [TLSv1.2, TLSv1.1] [2018-07-11T09:15:49,294][INFO ][c.f.s.SearchGuardPlugin ] Clustername: elasticsearch [2018-07-11T09:15:49,297][DEBUG][c.f.s.SearchGuardPlugin ] This node [dod0z6s] is a transportClient: false/tribeNode: false/tribeNodeClient: false [2018-07-11T09:15:49,428][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=DLSFLS, implementing class=com.floragunn.searchguard.configuration.SearchGuardFlsDlsIndexSearcherWrapper] [2018-07-11T09:15:49,442][WARN ][c.f.s.SearchGuardPlugin ] Directory /home/asv/Documents/elasticsearch-6.3.0/config has insecure file permissions (should be 0700) [2018-07-11T09:15:49,442][WARN ][c.f.s.SearchGuardPlugin ] File /home/asv/Documents/elasticsearch-6.3.0/config/truststore.jks has insecure file permissions (should be 0600) [2018-07-11T09:15:49,442][WARN ][c.f.s.SearchGuardPlugin ] File /home/asv/Documents/elasticsearch-6.3.0/config/CN=sgnode-keystore.jks has insecure file permissions (should be 0600) [2018-07-11T09:15:49,453][DEBUG][c.f.s.SearchGuardPlugin ] e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 :: /home/asv/Documents/elasticsearch-6.3.0/config/users [2018-07-11T09:15:49,471][DEBUG][c.f.s.SearchGuardPlugin ] 454c9cfe1ba46859a5b1f0986de7cfa56f382710d7c7d201d7b1bb3fdc16027d :: /home/asv/Documents/elasticsearch-6.3.0/config/roles.yml [2018-07-11T09:15:49,473][DEBUG][c.f.s.SearchGuardPlugin ] f4a4a936b87fd5ffd974acfa34620d72f7a2ea95495f777a4e17efbdafdf30b2 :: /home/asv/Documents/elasticsearch-6.3.0/config/role_mapping.yml [2018-07-11T09:15:49,473][DEBUG][c.f.s.SearchGuardPlugin ] e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 :: /home/asv/Documents/elasticsearch-6.3.0/config/users_roles [2018-07-11T09:15:49,474][DEBUG][c.f.s.SearchGuardPlugin ] e9c2fa60f3d9d64422f7befb4bac23b999bf6eb703a2ecfd3be0b915206f8272 :: /home/asv/Documents/elasticsearch-6.3.0/config/jvm.options [2018-07-11T09:15:49,474][DEBUG][c.f.s.SearchGuardPlugin ] bd1ba8f43642ad534e57c66a27665570c17f6cae481c6eb53ca3d189d349e870 :: /home/asv/Documents/elasticsearch-6.3.0/config/elasticsearch.keystore [2018-07-11T09:15:49,474][DEBUG][c.f.s.SearchGuardPlugin ] 3cf7f49850c3cde18387c7d6ae04181f5e61074f40c7396c035e41eec908c543 :: /home/asv/Documents/elasticsearch-6.3.0/config/truststore.jks [2018-07-11T09:15:49,475][DEBUG][c.f.s.SearchGuardPlugin ] b5d6ca66e4eeb6564a7d84d70024ee877d279966daaff045e82fea41fc8a130d :: /home/asv/Documents/elasticsearch-6.3.0/config/CN=sgnode-keystore.jks [2018-07-11T09:15:49,476][DEBUG][c.f.s.SearchGuardPlugin ] 7c714112b325f9ac18cd753991c2e3090f93bdbb9d35c5a92c4e51a7952ec20c :: /home/asv/Documents/elasticsearch-6.3.0/config/elasticsearch.yml [2018-07-11T09:15:49,477][DEBUG][c.f.s.SearchGuardPlugin ] 4130f7ad2541e7d8237f1d4ab12e193cbdc30cf80900c8d9932d073d51f1bf0c :: /home/asv/Documents/elasticsearch-6.3.0/config/log4j2.properties [2018-07-11T09:15:49,571][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [aggs-matrix-stats] [2018-07-11T09:15:49,571][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [analysis-common] [2018-07-11T09:15:49,571][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [ingest-common] [2018-07-11T09:15:49,571][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [lang-expression] [2018-07-11T09:15:49,571][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [lang-mustache] [2018-07-11T09:15:49,571][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [lang-painless] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [mapper-extras] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [parent-join] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [percolator] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [rank-eval] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [reindex] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [repository-url] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [transport-netty4] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [tribe] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-core] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-deprecation] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-graph] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-logstash] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-ml] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-monitoring] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-rollup] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-security] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-sql] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-upgrade] [2018-07-11T09:15:49,572][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded module [x-pack-watcher] [2018-07-11T09:15:49,573][INFO ][o.e.p.PluginsService ] [dod0z6s] loaded plugin [search-guard-6] [2018-07-11T09:15:49,656][INFO ][c.f.s.SearchGuardPlugin ] Disabled https compression by default to mitigate BREACH attacks. You can enable it by setting 'http.compression: true' in elasticsearch.yml [2018-07-11T09:15:54,657][INFO ][o.e.x.m.j.p.l.CppLogMessageHandler] [controller/4546] [Main.cc@109] controller (64 bit): Version 6.3.0 (Build 0f0a34c67965d7) Copyright (c) 2018 Elasticsearch BV [2018-07-11T09:15:54,889][INFO ][c.f.s.a.i.AuditLogImpl ] Configured categories on rest layer to ignore: [AUTHENTICATED, GRANTED_PRIVILEGES] [2018-07-11T09:15:54,889][INFO ][c.f.s.a.i.AuditLogImpl ] Configured categories on transport layer to ignore: [AUTHENTICATED, GRANTED_PRIVILEGES] [2018-07-11T09:15:54,889][INFO ][c.f.s.a.i.AuditLogImpl ] Configured Users to ignore: [kibanaserver] [2018-07-11T09:15:54,890][INFO ][c.f.s.a.i.AuditLogImpl ] Configured Requests to ignore: [] [2018-07-11T09:15:54,890][DEBUG][c.f.s.a.i.AuditLogImpl ] Create new executor with threadPoolSize: 10 and maxQueueLen: 100000 [2018-07-11T09:15:54,890][INFO ][c.f.s.a.i.AuditLogImpl ] Audit Log available but disabled [2018-07-11T09:15:54,890][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=AUDITLOG, implementing class=com.floragunn.searchguard.auditlog.impl.AuditLogImpl] [2018-07-11T09:15:54,891][DEBUG][c.f.s.SearchGuardPlugin ] Using com.floragunn.searchguard.transport.DefaultInterClusterRequestEvaluator as intercluster request evaluator class [2018-07-11T09:15:54,892][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=MULTITENANCY, implementing class=com.floragunn.searchguard.configuration.PrivilegesInterceptorImpl] [2018-07-11T09:15:54,913][DEBUG][c.f.s.c.AdminDNs ] CN=sgadmin is registered as an admin dn [2018-07-11T09:15:54,930][DEBUG][c.f.s.c.AdminDNs ] Loaded 1 admin DN's [CN=sgadmin] [2018-07-11T09:15:54,933][DEBUG][c.f.s.c.AdminDNs ] Loaded 0 impersonation DN's {} [2018-07-11T09:15:54,933][DEBUG][c.f.s.c.AdminDNs ] Loaded 0 impersonation users for REST {} [2018-07-11T09:15:54,938][DEBUG][c.f.s.c.ConfigurationLoader] Index is: searchguard [2018-07-11T09:15:54,940][DEBUG][c.f.s.c.LegacyConfigurationLoader] Index is: searchguard [2018-07-11T09:15:54,949][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Subscribe on configuration changes by type config with listener com.floragunn.searchguard.http.XFFResolver@2a54c92e [2018-07-11T09:15:55,000][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Subscribe on configuration changes by type config with listener com.floragunn.searchguard.auth.BackendRegistry@3de45b6c [2018-07-11T09:15:55,270][DEBUG][o.e.a.ActionModule ] Using REST wrapper from plugin com.floragunn.searchguard.SearchGuardPlugin [2018-07-11T09:15:55,292][DEBUG][c.f.s.h.SearchGuardHttpServerTransport] [dod0z6s] using max_chunk_size[8kb], max_header_size[8kb], max_initial_line_length[4kb], max_content_length[100mb], receive_predictor[64kb->64kb], pipelining[true], pipelining_max_events[10000] [2018-07-11T09:15:55,645][INFO ][o.e.d.DiscoveryModule ] [dod0z6s] using discovery type [zen] [2018-07-11T09:15:56,452][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-07-11T09:15:56,453][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-07-11T09:15:56,453][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-07-11T09:15:56,454][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-07-11T09:15:56,454][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-07-11T09:15:56,455][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-07-11T09:15:56,455][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-07-11T09:15:56,456][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-07-11T09:15:56,456][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-07-11T09:15:56,456][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=REST_MANAGEMENT_API, implementing class=com.floragunn.searchguard.dlic.rest.api.SearchGuardRestApiActions] [2018-07-11T09:15:56,457][DEBUG][c.f.s.SearchGuardPlugin ] Added 9 management rest handler(s) [2018-07-11T09:15:56,457][INFO ][c.f.s.SearchGuardPlugin ] 4 Search Guard modules loaded so far: [Module [type=REST_MANAGEMENT_API, implementing class=com.floragunn.searchguard.dlic.rest.api.SearchGuardRestApiActions], Module [type=DLSFLS, implementing class=com.floragunn.searchguard.configuration.SearchGuardFlsDlsIndexSearcherWrapper], Module [type=MULTITENANCY, implementing class=com.floragunn.searchguard.configuration.PrivilegesInterceptorImpl], Module [type=AUDITLOG, implementing class=com.floragunn.searchguard.auditlog.impl.AuditLogImpl]] [2018-07-11T09:15:56,457][INFO ][o.e.n.Node ] [dod0z6s] initialized [2018-07-11T09:15:56,457][INFO ][o.e.n.Node ] [dod0z6s] starting ... [2018-07-11T09:15:56,564][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [dod0z6s] using profile[default], worker_count[2], port[9300-9400], bind_host[[]], publish_host[[]], compress[false], connect_timeout[30s], connections_per_node[2/3/6/1/1], receive_predictor[64kb->64kb] [2018-07-11T09:15:56,568][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [dod0z6s] binding server bootstrap to: [::1, 127.0.0.1] [2018-07-11T09:15:56,667][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [dod0z6s] Bound profile [default] to address {[::1]:9300} [2018-07-11T09:15:56,669][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [dod0z6s] Bound profile [default] to address {127.0.0.1:9300} [2018-07-11T09:15:56,670][INFO ][o.e.t.TransportService ] [dod0z6s] publish_address {127.0.0.1:9300}, bound_addresses {[::1]:9300}, {127.0.0.1:9300} [2018-07-11T09:15:56,716][WARN ][o.e.b.BootstrapChecks ] [dod0z6s] max file descriptors [4096] for elasticsearch process is too low, increase to at least [65536] [2018-07-11T09:15:56,716][WARN ][o.e.b.BootstrapChecks ] [dod0z6s] max virtual memory areas vm.max_map_count [65530] is too low, increase to at least [262144] [2018-07-11T09:15:56,784][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Check if searchguard index exists ... [2018-07-11T09:15:56,789][DEBUG][o.e.a.a.i.e.i.TransportIndicesExistsAction] [dod0z6s] no known master node, scheduling a retry [2018-07-11T09:15:59,858][INFO ][o.e.c.s.MasterService ] [dod0z6s] zen-disco-elected-as-master ([0] nodes joined)[, ], reason: new_master {dod0z6s}{dod0z6sPTWmFN_onJc18Tg}{Y4d7IpXbSSCoFk0hgdxO9g}{127.0.0.1}{127.0.0.1:9300}{ml.machine_memory=1928015872, xpack.installed=true, ml.max_open_jobs=20, ml.enabled=true} [2018-07-11T09:15:59,862][INFO ][o.e.c.s.ClusterApplierService] [dod0z6s] new_master {dod0z6s}{dod0z6sPTWmFN_onJc18Tg}{Y4d7IpXbSSCoFk0hgdxO9g}{127.0.0.1}{127.0.0.1:9300}{ml.machine_memory=1928015872, xpack.installed=true, ml.max_open_jobs=20, ml.enabled=true}, reason: apply cluster state (from master [master {dod0z6s}{dod0z6sPTWmFN_onJc18Tg}{Y4d7IpXbSSCoFk0hgdxO9g}{127.0.0.1}{127.0.0.1:9300}{ml.machine_memory=1928015872, xpack.installed=true, ml.max_open_jobs=20, ml.enabled=true} committed version [1] source [zen-disco-elected-as-master ([0] nodes joined)[, ]]]) [2018-07-11T09:15:59,864][DEBUG][c.f.s.c.ClusterInfoHolder] Cluster Info Holder now initialized for 'nodes' [2018-07-11T09:15:59,940][DEBUG][c.f.s.h.SearchGuardHttpServerTransport] [dod0z6s] Bound http to address {[::1]:9200} [2018-07-11T09:15:59,944][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index sg6-auditlog-2018.07.06 [2018-07-11T09:15:59,948][DEBUG][c.f.s.h.SearchGuardHttpServerTransport] [dod0z6s] Bound http to address {127.0.0.1:9200} [2018-07-11T09:15:59,949][INFO ][c.f.s.h.SearchGuardHttpServerTransport] [dod0z6s] publish_address {127.0.0.1:9200}, bound_addresses {[::1]:9200}, {127.0.0.1:9200} [2018-07-11T09:15:59,949][INFO ][o.e.n.Node ] [dod0z6s] started [2018-07-11T09:15:59,996][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index searchguard [2018-07-11T09:15:59,999][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index sg6-auditlog-2018.07.09 [2018-07-11T09:16:01,570][INFO ][o.e.l.LicenseService ] [dod0z6s] license [9cb27baa-fd6c-4915-a996-c7550d18b693] mode [basic] - valid [2018-07-11T09:16:01,735][INFO ][o.e.g.GatewayService ] [dod0z6s] recovered [3] indices into cluster_state [2018-07-11T09:16:01,740][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Node started, try to initialize it. Wait for at least yellow cluster state.... [2018-07-11T09:16:01,753][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index sg6-auditlog-2018.07.09 [2018-07-11T09:16:04,427][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index sg6-auditlog-2018.07.06 [2018-07-11T09:16:05,221][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index searchguard [2018-07-11T09:16:05,878][INFO ][o.e.c.r.a.AllocationService] [dod0z6s] Cluster health status changed from [RED] to [YELLOW] (reason: [shards started [[sg6-auditlog-2018.07.06][0], [searchguard][0]] ...]). [2018-07-11T09:16:05,943][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Try to load config ... [2018-07-11T09:16:05,943][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] sg index exists and was created with ES 6 (new layout) [2018-07-11T09:16:06,050][DEBUG][c.f.s.c.ConfigurationLoader] Received config for config (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=4 [2018-07-11T09:16:06,051][DEBUG][c.f.s.c.ConfigurationLoader] Received config for roles (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=3 [2018-07-11T09:16:06,051][DEBUG][c.f.s.c.ConfigurationLoader] Received config for rolesmapping (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=2 [2018-07-11T09:16:06,051][DEBUG][c.f.s.c.ConfigurationLoader] Received config for internalusers (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=1 [2018-07-11T09:16:06,052][DEBUG][c.f.s.c.ConfigurationLoader] Received config for actiongroups (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=0 [2018-07-11T09:16:06,078][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Notify com.floragunn.searchguard.http.XFFResolver@2a54c92e listener about change configuration with type config [2018-07-11T09:16:06,078][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Notify com.floragunn.searchguard.auth.BackendRegistry@3de45b6c listener about change configuration with type config [2018-07-11T09:16:06,080][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=INTERNAL_USERS_AUTHENTICATION_BACKEND, implementing class=com.floragunn.searchguard.auth.internal.InternalAuthenticationBackend] [2018-07-11T09:16:06,080][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=HTTP_BASIC_AUTHENTICATOR, implementing class=com.floragunn.searchguard.http.HTTPBasicAuthenticator] [2018-07-11T09:16:06,106][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Search Guard License Info: SearchGuardLicense [uid=00000000-0000-0000-0000-000000000000, type=TRIAL, issueDate=2018-07-03, expiryDate=2018-09-02, issuedTo=The world, issuer=floragunn GmbH, startDate=2018-07-03, majorVersion=6, clusterName=*, allowedNodeCount=2147483647, msgs=[], expiresInDays=52, isExpired=false, valid=true, action=, prodUsage=Yes, one cluster with all commercial features and unlimited nodes per cluster., clusterService=org.elasticsearch.cluster.service.ClusterService@641b1156, getMsgs()=[], getExpiresInDays()=52, isExpired()=false, isValid()=true, getAction()=, getProdUsage()=Yes, one cluster with all commercial features and unlimited nodes per cluster.] [2018-07-11T09:16:06,106][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Search Guard License Type: TRIAL, valid [2018-07-11T09:16:06,106][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Node 'dod0z6s' initialized [2018-07-11T09:16:33,110][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator