Mashhur
Mashhur
#### Tell us about the issue We have a case where third party services (such as beats) polls LS node stats and sends back to Elasticsearch. (I don't know what...
## Release notes [rn:skip] ## What does this PR do? Add an instruction to resolve the failure when bootstrapping the LS environment. ## Why is it important/What is the impact...
## Release notes ## What does this PR do? ## Why is it important/What is the impact to the user? ## Checklist - [ ] My code follows the style...
#### Tell us about the issue **Description:** According to Logstash readme instruction, `rake bootstrap` should bootstrap the environment. However, when executing the command, resulted gems not found issue. ``` ......
### Description It seems currently LS does not have Java code coverage settings (ruby has). It would improve the code quality and decrease the risk of issues being happen when...
### Description When installing Logstash through the package managers (like `yum install logstash`), running as a service and using file input plugin, Logstash may not able to discover the files....
### Description We are currently using following format for the CI release definition. With the release section all good but to mitigate the future risks, we need to make sure...
## Release notes [rn:skip] ## What does this PR do? Sets the imap plugin as a non-default plugin, so that Logstash will not carry it with its distribution. ## Why...
We have been using `FileUtils.rm_r` with secure option (`FileUtils.rm_r(path, :secure => true)`) and as per [documentation](https://docs.ruby-lang.org/en/master/FileUtils.html#method-c-rm_r), `FileUtils.rm_r` removes the root entries recursively, removes the root at the end. However, somehow...
## Description After gson upgrade, jrjackson needs to catch new version of gson to solve [CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647). Reported issue: https://github.com/avsej/gson.rb/issues/10 Current 0.6.1 version internally uses `lib/gson-2.2.2.jar` which is [CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647) eligible. `gson`...