<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Elasticsearch failed to start during deployment in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/612930#M17873</link>
    <description>Okay, I would suggest you to check the TLS version in the java you are using and also see if that has been configured in the elasticsearch.yml config file.&lt;BR /&gt;&lt;BR /&gt;you can use the below command to check:&lt;BR /&gt;path-to-openssl s_client -connect myhost.example.com:secured–port -CAfile trustedcerts.pem&lt;BR /&gt;&lt;BR /&gt;Also, would advise to reach out to SAS TS for quick resolution.</description>
    <pubDate>Thu, 19 Dec 2019 06:13:26 GMT</pubDate>
    <dc:creator>AnandVyas</dc:creator>
    <dc:date>2019-12-19T06:13:26Z</dc:date>
    <item>
      <title>Elasticsearch failed to start during deployment</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/612904#M17870</link>
      <description>&lt;P&gt;I'm encountering an problem during the deployment of VI 10.51.&lt;/P&gt;&lt;P&gt;The ERROR message is like this:&lt;SPAN&gt;elasticsearch&amp;nbsp;(pid&amp;nbsp;&amp;nbsp;11502)&amp;nbsp;is&amp;nbsp;running...",&amp;nbsp;"Elasticsearch&amp;nbsp;not&amp;nbsp;started&amp;nbsp;correctly,&amp;nbsp;please&amp;nbsp;check&amp;nbsp;logs&amp;nbsp;under&amp;nbsp;/opt/sas/viya/config/var/log/svi-elasticsearch"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and elasticsearch.log shows :&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[2019-12-18T13:51:37,641][ERROR][c.f.s.h.SearchGuardHttpServerTransport]&amp;nbsp;[N3-Q2Nd]&amp;nbsp;SSL&amp;nbsp;Problem&amp;nbsp;Client&amp;nbsp;requested&amp;nbsp;protocol&amp;nbsp;TLSv1&amp;nbsp;not&amp;nbsp;enabled&amp;nbsp;or&amp;nbsp;not&amp;nbsp;supported&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;javax.net.ssl.SSLHandshakeException:&amp;nbsp;Client&amp;nbsp;requested&amp;nbsp;protocol&amp;nbsp;TLSv1&amp;nbsp;not&amp;nbsp;enabled&amp;nbsp;or&amp;nbsp;not&amp;nbsp;supported...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I've uploaded part of the elasticsearch.log, saslogon.log and also elasticsearch.yml under /opt/viya/config/etc/elasticsearch/default/.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I've tried to change SSLProtocol to TLSv1 TLSv1.1 TLSv1.2, and added -Djdk.tls.rejectClientInitiatedRenegotiation=true to jvm.options, neither worked.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I also checked&amp;nbsp;&lt;SPAN&gt;http.enabled_protocols&amp;nbsp;under elasticsearch.yml and it's pointing to TLSv1.2.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The OS version is Red&amp;nbsp;Hat&amp;nbsp;Enterprise&amp;nbsp;Linux&amp;nbsp;Server&amp;nbsp;release&amp;nbsp;6.7&amp;nbsp;(Santiago)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;httpd and mod_ssl version: 2.2.15-45&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;java version: jdk1.8.0_231&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It would be great if there's any suggestions!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2019 03:20:31 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/612904#M17870</guid>
      <dc:creator>Symphony</dc:creator>
      <dc:date>2019-12-19T03:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: Elasticsearch failed to start during deployment</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/612913#M17871</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/304132"&gt;@Symphony&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you checked this section from the link -&amp;gt;&amp;nbsp;&lt;A href="https://docs.search-guard.com/latest/configuring-tls" target="_blank"&gt;https://docs.search-guard.com/latest/configuring-tls&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;By default Search Guard disables TLSv1 because it is unsecure.

If you need to use TLSv1 and you know what you are doing, you can re-enable it like:**

searchguard.ssl.http.enabled_protocols:
  - "TLSv1"
  - "TLSv1.1"
  - "TLSv1.2"&lt;/PRE&gt;</description>
      <pubDate>Thu, 19 Dec 2019 04:31:49 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/612913#M17871</guid>
      <dc:creator>AnandVyas</dc:creator>
      <dc:date>2019-12-19T04:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: Elasticsearch failed to start during deployment</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/612924#M17872</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/52993"&gt;@AnandVyas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've just added TLSv1 and TLSv1.1 to the elasticsearch.yml,&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://communities.sas.com/t5/image/serverpage/image-id/34961i9EBEF592236B917D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;After I restarted sas-viya-svi-elasticsearch-default, the ERROR still exists:&lt;/P&gt;&lt;P&gt;[2019-12-19T12:58:41,628][ERROR][c.f.s.h.SearchGuardHttpServerTransport] [N3-Q2Nd] SSL Problem Client requested protocol TLSv1 not enabled or not supported&lt;BR /&gt;javax.net.ssl.SSLHandshakeException: Client requested protocol TLSv1 not enabled or not supported&lt;BR /&gt;at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1537) ~[?:?]&lt;BR /&gt;at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:528) ~[?:?]&lt;BR /&gt;at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:802) ~[?:?]&lt;BR /&gt;at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:766) ~[?:?]&lt;BR /&gt;at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624) ~[?:1.8.0_231]&lt;BR /&gt;at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:255) ~[netty-handler-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1162) ~[netty-handler-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1084) ~[netty-handler-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:489) ~[netty-codec-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:428) ~[netty-codec-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:265) ~[netty-codec-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1334) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:926) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:134) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:644) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:544) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:498) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:458) [netty-transport-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:858) [netty-common-4.1.13.Final.jar:4.1.13.Final]&lt;BR /&gt;at java.lang.Thread.run(Thread.java:748) [?:1.8.0_231]&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2019 05:06:44 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/612924#M17872</guid>
      <dc:creator>Symphony</dc:creator>
      <dc:date>2019-12-19T05:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: Elasticsearch failed to start during deployment</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/612930#M17873</link>
      <description>Okay, I would suggest you to check the TLS version in the java you are using and also see if that has been configured in the elasticsearch.yml config file.&lt;BR /&gt;&lt;BR /&gt;you can use the below command to check:&lt;BR /&gt;path-to-openssl s_client -connect myhost.example.com:secured–port -CAfile trustedcerts.pem&lt;BR /&gt;&lt;BR /&gt;Also, would advise to reach out to SAS TS for quick resolution.</description>
      <pubDate>Thu, 19 Dec 2019 06:13:26 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/612930#M17873</guid>
      <dc:creator>AnandVyas</dc:creator>
      <dc:date>2019-12-19T06:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: Elasticsearch failed to start during deployment</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/613183#M17889</link>
      <description>&lt;P&gt;Hi &lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/52993"&gt;@AnandVyas&lt;/a&gt;&amp;nbsp;，&lt;/P&gt;&lt;P&gt;Thanks a lot for your suggestions!&lt;/P&gt;&lt;P&gt;Here's the result I get :&lt;/P&gt;&lt;P&gt;[root@svi bin]# ./openssl s_client -connect svi.local:443 -CAfile /home/viya/viya/config/etc/SASSecurityCertificateFramework/cacerts/trustedcerts.pem&lt;BR /&gt;CONNECTED(00000003)&lt;BR /&gt;depth=0 C = US, O = Self-Signed Certificate, CN = svi.local&lt;BR /&gt;verify return:1&lt;BR /&gt;---&lt;BR /&gt;Certificate chain&lt;BR /&gt;0 s:/C=US/O=Self-Signed Certificate/CN=svi.local&lt;BR /&gt;i:/C=US/O=Self-Signed Certificate/CN=svi.local&lt;BR /&gt;---&lt;BR /&gt;Server certificate&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;MIIDsjCCApqgAwIBAgIIJTbscKjKqlQwDQYJKoZIhvcNAQELBQAwQzELMAkGA1UE&lt;BR /&gt;BhMCVVMxIDAeBgNVBAoTF1NlbGYtU2lnbmVkIENlcnRpZmljYXRlMRIwEAYDVQQD&lt;BR /&gt;EwlzdmkubG9jYWwwHhcNMTkxMjE4MDMxNzA2WhcNMjYxMjE4MDMzMjA2WjBDMQsw&lt;BR /&gt;CQYDVQQGEwJVUzEgMB4GA1UEChMXU2VsZi1TaWduZWQgQ2VydGlmaWNhdGUxEjAQ&lt;BR /&gt;BgNVBAMTCXN2aS5sb2NhbDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB&lt;BR /&gt;AMGNvgqmkxFCevL+jae6tZtJMcL2l9wlHTd2FaCyl6rEHZ8YDWPsf/mr2nVlcc/t&lt;BR /&gt;6QCmdhdW533iDTlxzgej7pT1irBxG2ob8XpK+MYDPPDDG55wOCabMu6tL0JQoDVQ&lt;BR /&gt;ygKfWGrsJ/UgPOt6o2z7Nn+oeGS22f1w++NUIIUDgncDrm4neWlN319TfvCzqL1I&lt;BR /&gt;3mugPbhUowcSsoUZuw8oz4fSqb8pU7U/zSBIt3PL5NR7v4Lr9emArj9xk+o360pU&lt;BR /&gt;6cBQ//R9B05FtxnX+7796+JI7wedCoNKWwgAqJ+bFg0x1oXLYviQqCX/CzMizDdg&lt;BR /&gt;ep21ME+APRziGd+PLyV9Xb0CAwEAAaOBqTCBpjAdBgNVHQ4EFgQURVyLI6JZta3q&lt;BR /&gt;hWm5fWuZOOGmiV4wgYQGA1UdEQR9MHuCCXN2aS5sb2NhbIIJc3ZpLmxvY2Fsgglz&lt;BR /&gt;dmkubG9jYWyCCXN2aS5sb2NhbIIDc3ZpggsqLnN2aS5sb2NhbIILKi5zdmkubG9j&lt;BR /&gt;YWyCBSouc3Zpgglsb2NhbGhvc3SHBH8AAAGHEAAAAAAAAAAAAAAAAAAAAAGHBAq2&lt;BR /&gt;wN0wDQYJKoZIhvcNAQELBQADggEBAHh+cM/cdXwJsMbck7vPRkRBdLm3MTjcC6TG&lt;BR /&gt;Lu6lcoQpWip8GR3LjIUi8dLnMN4a2pvknCoKmABk3O+tkY3Vkvel/iwTzzYSwBl/&lt;BR /&gt;3eQuEYsyAD6LjbxLEk0VYHync5YVmj62zM3v6YweSWK68KNrf8fIZNQklkOKycXS&lt;BR /&gt;Rdlvyx+IvKivybOq667HvsoZUWizC95Xcr2udr20KQylTGAORkI+7jG4meqlYWBd&lt;BR /&gt;glvnRpSe9sYAK5uc1Hadsd1vm5FEikoQ5dLCwxDjBGuKS7/akI7rIYpTOj1gKTu/&lt;BR /&gt;W4MzIFkABa/MJvyGj1TOip2kjoawhoX+oqCqop9E7mr6M+DAirI=&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;subject=/C=US/O=Self-Signed Certificate/CN=svi.local&lt;BR /&gt;issuer=/C=US/O=Self-Signed Certificate/CN=svi.local&lt;BR /&gt;---&lt;BR /&gt;No client certificate CA names sent&lt;BR /&gt;Server Temp Key: ECDH, prime256v1, 256 bits&lt;BR /&gt;---&lt;BR /&gt;SSL handshake has read 1641 bytes and written 375 bytes&lt;BR /&gt;---&lt;BR /&gt;New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Server public key is 2048 bit&lt;BR /&gt;Secure Renegotiation IS supported&lt;BR /&gt;Compression: NONE&lt;BR /&gt;Expansion: NONE&lt;BR /&gt;SSL-Session:&lt;BR /&gt;Protocol : TLSv1.2&lt;BR /&gt;Cipher : ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Session-ID: BE7ABAD54AAEF08BF04A04998793150F64CBC345FE58E05CDFC11B5843695BFE&lt;BR /&gt;Session-ID-ctx:&lt;BR /&gt;Master-Key: F1727AB92A4BE35AA765E6D0D17A37080569EE6D56F33DCD610AFDD9EDE47B8155AD6736158B74EBE9F417B6A8B802B6&lt;BR /&gt;Key-Arg : None&lt;BR /&gt;Krb5 Principal: None&lt;BR /&gt;PSK identity: None&lt;BR /&gt;PSK identity hint: None&lt;BR /&gt;TLS session ticket lifetime hint: 300 (seconds)&lt;BR /&gt;TLS session ticket:&lt;BR /&gt;0000 - 51 a7 c7 7e 49 12 6e 97-43 1c b2 a1 1b 09 a7 f1 Q..~I.n.C.......&lt;BR /&gt;0010 - 2c af 04 21 c1 f0 f8 b8-11 1e 69 d1 30 76 1c c5 ,..!......i.0v..&lt;BR /&gt;0020 - 93 a3 b4 66 94 47 26 c3-b5 5f 01 17 c6 c8 61 67 ...f.G&amp;amp;.._....ag&lt;BR /&gt;0030 - e2 55 23 dc 68 f6 44 66-39 6b f9 52 05 4d 2d 6d .U#.h.Df9k.R.M-m&lt;BR /&gt;0040 - be 48 5b 18 e4 43 0e aa-ea 63 63 bb 47 2f 1b 36 .H[..C...cc.G/.6&lt;BR /&gt;0050 - ac 25 5b a6 f5 e7 d2 0a-8f a2 6c da 49 77 31 ef .%[.......l.Iw1.&lt;BR /&gt;0060 - f8 62 45 f5 18 c4 b2 a5-d6 c8 61 b5 98 5c 3a d9 .bE.......a..\:.&lt;BR /&gt;0070 - fe f7 cf 9c 62 73 83 b5-46 4c 3a 30 13 bf 82 0d ....bs..FL:0....&lt;BR /&gt;0080 - 59 b3 38 3f 16 83 49 c9-4a 71 39 1e bc 3d 1d 13 Y.8?..I.Jq9..=..&lt;BR /&gt;0090 - fe 43 b6 ff 39 ac 8f 43-af 67 66 0b f6 ba be 77 .C..9..C.gf....w&lt;BR /&gt;00a0 - a7 aa d3 5e 21 58 c4 ea-4d 2e c3 c8 b6 ea bf 7c ...^!X..M......|&lt;BR /&gt;00b0 - e5 f1 4f 65 ae a7 0a 48-b9 4a d1 ef be ca 87 a6 ..Oe...H.J......&lt;/P&gt;&lt;P&gt;Start Time: 1576808860&lt;BR /&gt;Timeout : 300 (sec)&lt;BR /&gt;Verify return code: 0 (ok)&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's another thing, the environment has two Java environments, one is java-1.8.0-openjdk-1.8.0.45-35.b13.el6.x86_64 installed by yum. Another is jdk-8u231-linux-x64.tar.gz&amp;nbsp;downloaded straight from official website. I modified java parameters under vars.yml :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# deployment and set the path to Java in sasenv_java_home.&lt;BR /&gt;sas_install_java: false&lt;/P&gt;&lt;P&gt;# User specific location of where Java resides on the host.&lt;BR /&gt;# If not set, the deployment will use the Java defined on the host.&lt;BR /&gt;# This is an optional setting.&lt;BR /&gt;# Example:&lt;BR /&gt;# sasenv_java_home: /usr/lib/jvm/java-1.8.0-openjdk-1.8.0.101-3.b13.el6_8.x86_64/jre&lt;BR /&gt;sasenv_java_home: /home/java/javatgz/jdk1.8.0_231/jre&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wonder if that has any effect to this situation.&lt;/P&gt;&lt;P&gt;Should I change soft links for java under /usr/bin and /etc/alternatives?&lt;/P&gt;&lt;P&gt;Also I've already emailed SAS TS with attachments of logs and yml files, still waiting for reply.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 02:53:37 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/613183#M17889</guid>
      <dc:creator>Symphony</dc:creator>
      <dc:date>2019-12-20T02:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: Elasticsearch failed to start during deployment</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/613193#M17891</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/52993"&gt;@AnandVyas&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Is there a way to config Elasticsearch not to use TLS before deployment?&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; I tried to change&amp;nbsp;searchguard.ssl.http.enabled to false under elsticsearch.yml but it seems to be reset to true automatically when I rerun the ansible-playbook command.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 07:22:54 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Elasticsearch-failed-to-start-during-deployment/m-p/613193#M17891</guid>
      <dc:creator>Symphony</dc:creator>
      <dc:date>2019-12-20T07:22:54Z</dc:date>
    </item>
  </channel>
</rss>

