Skip to content

Conversation

DaveCTurner
Copy link
Contributor

  • Mention EC2 instance roles as well as ECS roles and K8s service accounts.

  • Mention reliability of S3-compatible storage as well as consistency & performance.

- Mention EC2 instance roles as well as ECS roles and K8s service
  accounts.

- Mention reliability of S3-compatible storage as well as consistency &
  performance.
@DaveCTurner DaveCTurner added the documentation Improvements or additions to documentation label Oct 6, 2025
@DaveCTurner DaveCTurner requested a review from a team as a code owner October 6, 2025 15:58
Copy link

github-actions bot commented Oct 6, 2025

🔍 Preview links for changed docs

Copy link
Collaborator

@shainaraskas shainaraskas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

small grammar stuff, otherwise lgtm

@DaveCTurner DaveCTurner enabled auto-merge (squash) October 7, 2025 06:42
@DaveCTurner DaveCTurner merged commit 9c6ed2f into elastic:main Oct 7, 2025
6 of 7 checks passed
@DaveCTurner DaveCTurner deleted the 2025/10/06/s3-repo-more-clarifications branch October 7, 2025 06:57
By default {{es}} communicates with your storage system using HTTPS, and validates the repository’s certificate chain using the JVM-wide truststore. Ensure that the JVM-wide truststore includes an entry for your repository. If you wish to use unsecured HTTP communication instead of HTTPS, set `s3.client.CLIENT_NAME.protocol` to `http`.

There are many systems, including some from very well-known storage vendors, which claim to offer an S3-compatible API despite failing to emulate S3’s behavior in full. If you are using such a system for your snapshots, consider using a [shared filesystem repository](shared-file-system-repository.md) based on a standardized protocol such as NFS to access your storage system instead. The `s3` repository type requires full compatibility with S3. In particular it must support the same set of API endpoints, with the same parameters, return the same errors in case of failures, and offer consistency and performance at least as good as S3 even when accessed concurrently by multiple nodes. You will need to work with the supplier of your storage system to address any incompatibilities you encounter. Don't report {{es}} issues involving storage systems which claim to be S3-compatible unless you can demonstrate that the same issue exists when using a genuine AWS S3 repository.
There are many systems, including some from very well-known storage vendors, which claim to offer an S3-compatible API despite failing to emulate S3’s behavior in full. If you are using such a system for your snapshots, consider using a [shared filesystem repository](shared-file-system-repository.md) based on a standardized protocol such as NFS to access your storage system instead. The `s3` repository type requires full compatibility with S3. In particular it must support the same set of API endpoints, with the same parameters, return the same errors in case of failures, and offer consistency, performance, and reliability at least as good as S3 even when accessed concurrently by multiple nodes. You will need to work with the supplier of your storage system to address any incompatibilities you encounter. Don't report {{es}} issues involving storage systems which claim to be S3-compatible unless you can demonstrate that the same issue exists when using a genuine AWS S3 repository.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@DaveCTurner shouldn't this be checked by the verify repo API call?
Said differently, can a customer be 100% certain that their system will be ok as long as the API call gives the green light.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No, as per the docs you linked the verify repo API call is just there to ...

Check for common misconfigurations in a snapshot repository

No certainty here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants