Briefly, this error occurs when Elasticsearch cannot access the file system (FS) statistics for a specific node. This could be due to insufficient permissions, a non-responsive node, or a network connectivity issue. To resolve this, you can check the node’s status and network connectivity. If the node is down, restart it. If it’s a permissions issue, adjust the permissions to allow Elasticsearch access. If it’s a network issue, check your network settings and connections. Also, ensure that the Elasticsearch process has the necessary system-level permissions to access FS stats.
When you have connectivity issues between Kibana & Elasticsearch you may get this log: unable to retrieve version information from Elasticsearch nodes, and in this case we recommend you try running the Elasticsearch Error Check-Up. The tool can help you pinpoint the source for connectivy issues and offer personalized recommendations on how to improve your ELK performance.
Overview
This is actually a Kibana error log message. Kibana, as well as other Elastic products (Beats, APM server…), interacts with an Elasticsearch cluster playing the role of a client application. This means you have to configure Kibana to access the Elasticsearch service as you normally would for any other client application, by setting up: host addresses for the service, ports, credentials and more. If your cluster is configured to encrypt communications with its clients, you’ll probably want to set some TLS related properties in Kibana’s configuration.
All of those properties can be set in Kibana’s configuration file, kibana.yml, which is typically located at the $KIBANA_HOME/config path. The location of this file can be easily changed by setting the KBN_PATH_CONF environment variable, as such:
KBN_PATH_CONF=/home/kibana/config ./bin/kibana
When it comes to connectivity with the cluster, the following properties are relevant:
- elasticsearch.hosts: The URLs of the Elasticsearch instances to use for all your queries. All nodes listed here must be on the same cluster. Default: [ “http://localhost:9200” ]. To enable SSL/TLS for outbound connections to Elasticsearch, use the https protocol in this setting.
- elasticsearch.username and elasticsearch.password: If your Elasticsearch is protected with basic authentication, these settings provide the username and password that the Kibana server uses to perform maintenance on the Kibana index at startup. Kibana users still need to authenticate with Elasticsearch, which is proxied through the Kibana server.
- elasticsearch.ssl.*: several configurations related to connection encryption.
In its bootstrap process, Kibana will try to connect to all Elasticsearch endpoints configured in elasticsearch.hosts in order to check their versions. This is important because Kibana obeys a strict compatibility matrix, so it can guarantee that there will be no API request errors.
What it means
Typically, you’ll see the “Unable to version information Elasticsearch nodes” message when Kibana can’t connect to one of the hosts included in elasticsearch.hosts for whatever reason. This can be a little misleading, because not only could it not retrieve the specific information (node version), but it actually couldn’t establish a connection at all with the node.
Possible causes
Here are some reasons why this might occur:
- If not all the endpoints included in elasticsearch.hosts are reachable. Check for connectivity and misspellings.
- If the KBN_PATH_CONF environment variable is set and pointing to a different config file.
- If there is a firewall between the Kibana instance and the Elasticsearch cluster preventing the connection from being established.
How to resolve it
To solve this issue just make sure your can establish a connection with all endpoints included in the elasticsearch.hosts configuration parameter, like this:
curl http://es01:9200/
Or in this way, if your cluster is available through https:
# Insecure curl -u elastic -k https://es01:9200/ # Secure curl -u elastic --cacert ~/certs/ca/ca.crt https://es01:9200/
You should receive a response that looks like this:
{ "name" : "node01", "cluster_name" : "elasticsearch", "cluster_uuid" : "fxP-R0FTRcmTl_AWs7-DiA", "version" : { "number" : "7.13.3", "build_flavor" : "default", "build_type" : "tar", "build_hash" : "5d21bea28db1e89ecc1f66311ebdec9dc3aa7d64", "build_date" : "2021-07-02T12:06:10.804015202Z", "build_snapshot" : false, "lucene_version" : "8.8.2", "minimum_wire_compatibility_version" : "6.8.0", "minimum_index_compatibility_version" : "6.0.0-beta1" }, "tagline" : "You Know, for Search" }
Log context
For those seeking for more of an in-depth context, you can look at the exact point of Kibana’s source code where this log message is emitted:
export function mapNodesVersionCompatibility( nodesInfoResponse: NodesInfo & { nodesInfoRequestError?: Error }, kibanaVersion: string, ignoreVersionMismatch: boolean ): NodesVersionCompatibility { if (Object.keys(nodesInfoResponse.nodes ?? {}).length === 0) { // Note: If the a nodesInfoRequestError is present, the message contains the nodesInfoRequestError.message as a suffix let message = `Unable to retrieve version information from Elasticsearch nodes.`; if (nodesInfoResponse.nodesInfoRequestError) { message = message + ` ${nodesInfoResponse.nodesInfoRequestError.message}`; } return { isCompatible: false, message, incompatibleNodes: [], warningNodes: [], kibanaVersion, nodesInfoRequestError: nodesInfoResponse.nodesInfoRequestError, }; } ...
Here you can see that Kibana will test every endpoint in elasticsearch.hosts:
const incompatibleNodes = nodes.filter( (node) => !esVersionCompatibleWithKibana(node.version, kibanaVersion) );
You might also be interested in the code that tests Kibana release version against Elasticsearch’s node release version:
export function esVersionCompatibleWithKibana(esVersion: string, kibanaVersion: string) { const esVersionNumbers = { major: semver.major(esVersion), minor: semver.minor(esVersion), patch: semver.patch(esVersion), }; const kibanaVersionNumbers = { major: semver.major(kibanaVersion), minor: semver.minor(kibanaVersion), patch: semver.patch(kibanaVersion), }; // Reject mismatching major version numbers. if (esVersionNumbers.major !== kibanaVersionNumbers.major) { return false; } // Reject older minor versions of ES. if (esVersionNumbers.minor < kibanaVersionNumbers.minor) { return false; } return true; }
Overview
An Elasticsearch cluster consists of a number of servers (nodes) working together as one. Clustering is a technology which enables Elasticsearch to scale up to hundreds of nodes that together are able to store many terabytes of data and respond coherently to large numbers of requests at the same time.
Search or indexing requests will usually be load-balanced across the Elasticsearch data nodes, and the node that receives the request will relay requests to other nodes as necessary and coordinate the response back to the user.
Notes and good things to know
The key elements to clustering are:
Cluster State – Refers to information about which indices are in the cluster, their data mappings and other information that must be shared between all the nodes to ensure that all operations across the cluster are coherent.
Master Node – Each cluster must elect a single master node responsible for coordinating the cluster and ensuring that each node contains an up-to-date copy of the cluster state.
Cluster Formation – Elasticsearch requires a set of configurations to determine how the cluster is formed, which nodes can join the cluster, and how the nodes collectively elect a master node responsible for controlling the cluster state. These configurations are usually held in the elasticsearch.yml config file, environment variables on the node, or within the cluster state.
Node Roles – In small clusters it is common for all nodes to fill all roles; all nodes can store data, become master nodes or process ingestion pipelines. However as the cluster grows, it is common to allocate specific roles to specific nodes in order to simplify configuration and to make operation more efficient. In particular, it is common to define a limited number of dedicated master nodes.
Replication – Data may be replicated across a number of data nodes. This means that if one node goes down, data is not lost. It also means that a search request can be dealt with by more than one node.
Common problems
Many Elasticsearch problems are caused by operations which place an excessive burden on the cluster because they require an excessive amount of information to be held and transmitted between the nodes as part of the cluster state. For example:
- Shards too small
- Too many fields (field explosion)
Problems may also be caused by inadequate configurations causing situations where the Elasticsearch cluster is unable to safely elect a Master node. This situation is discussed further in:
Backups
Because Elasticsearch is a clustered technology, it is not sufficient to have backups of each node’s data directory. This is because the backups will have been made at different times and so there may not be complete coherency between them. As such, the only way to backup an Elasticsearch cluster is through the use of snapshots, which contain the full picture of an index at any one time.
Cluster resilience
When designing an Elasticsearch cluster, it is important to think about cluster resilience. In particular – what happens when a single node goes down? And for larger clusters where several nodes may share common services such as a network or power supply – what happens if that network or power supply goes down? This is where it is useful to ensure that the master eligible nodes are spread across availability zones, and to use shard allocation awareness to ensure that shards are spread across different racks or availability zones in your data center.
Overview
To put it simply, a node is a single server that is part of a cluster. Each node is assigned one or more roles, which describe the node’s responsibility and operations. Data nodes store the data, and participate in the cluster’s indexing and search capabilities, while master nodes are responsible for managing the cluster’s activities and storing the cluster state, including the metadata.
While it is possible to run several node instances of Elasticsearch on the same hardware, it’s considered a best practice to limit a server to a single running instance of Elasticsearch.
Nodes connect to each other and form a cluster by using a discovery method.
Roles
Master node
Master nodes are in charge of cluster-wide settings and changes – deleting or creating indices and fields, adding or removing nodes and allocating shards to nodes. Each cluster has a single master node that is elected from the master eligible nodes using a distributed consensus algorithm and is reelected if the current master node fails.
Coordinating (client) node
There is some confusion in the use of coordinating node terminology. Client nodes were removed from Elasticsearch after version 2.4 and became coordinating nodes.
Coordinating nodes are nodes that do not hold any configured role. They don’t hold data and are not part of the master eligible group nor execute ingest pipelines. Coordinating nodes serve incoming search requests and act as the query coordinator running query and fetch phases, sending requests to every node that holds a shard being queried. The coordinating node also distributes bulk indexing operations and route queries to shards based on the node’s responsiveness.
Log Context
Log “Unable to retrieve node FS stats for {}” classname is InternalClusterInfoService.java.
We extracted the following from Elasticsearch source code for those seeking an in-depth context :
static void fillDiskUsagePerNode(Logger logger; ListnodeStatsArray; ImmutableOpenMap.Builder newLeastAvailableUsages; ImmutableOpenMap.Builder newMostAvailableUsages) { for (NodeStats nodeStats : nodeStatsArray) { if (nodeStats.getFs() == null) { logger.warn("Unable to retrieve node FS stats for {}"; nodeStats.getNode().getName()); } else { FsInfo.Path leastAvailablePath = null; FsInfo.Path mostAvailablePath = null; for (FsInfo.Path info : nodeStats.getFs()) { if (leastAvailablePath == null) {