{"type": "server", "timestamp": "2021-12-17T19:45:21,865Z", "level": "WARN", "component": "o.e.h.AbstractHttpServerTransport", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "caught exception while handling client http traffic, closing connection Netty4HttpChannel{localAddress=/192.168.137.234:9200, remoteAddress=/192.168.189.0:56454}", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" ,
{"type": "server", "timestamp": "2021-12-21T03:35:06,081Z", "level": "INFO", "component": "o.e.l.LicenseService", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "license [9dec2a3f-c213-4fa5-8516-7bcb0f591fde] mode [basic] - valid" }
{"type": "server", "timestamp": "2021-12-21T03:35:06,082Z", "level": "INFO", "component": "o.e.x.s.a.Realms", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "license mode is [basic], currently licensed security realms are [reserved/reserved,file/file1,native/native1]" }
{"type": "server", "timestamp": "2021-12-21T03:35:06,083Z", "level": "INFO", "component": "o.e.x.s.s.SecurityStatusChangeListener", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "Active license is now [BASIC]; Security is enabled" }
{"type": "server", "timestamp": "2021-12-21T03:35:06,101Z", "level": "INFO", "component": "o.e.h.AbstractHttpServerTransport", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "publish_address {dev-es-data-node-hot-0.dev-es-data-node-hot.dev-elk.svc/192.168.137.226:9200}, bound_addresses {0.0.0.0:9200}", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" }
{"type": "server", "timestamp": "2021-12-21T03:35:06,102Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "started", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" }
{"type": "server", "timestamp": "2021-12-21T03:35:07,966Z", "level": "INFO", "component": "o.e.c.s.ClusterSettings", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "updating [cluster.routing.allocation.enable] from [primaries] to [all]", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" }
{"type": "server", "timestamp": "2021-12-21T03:35:07,967Z", "level": "INFO", "component": "o.e.c.s.ClusterSettings", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "updating [cluster.routing.allocation.enable] from [primaries] to [all]", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" }
{"type": "deprecation.elasticsearch", "timestamp": "2021-12-21T03:35:49,945Z", "level": "WARN", "component": "o.e.d.x.s.a.s.CompositeRolesStore", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "The role [reporting_user] is deprecated and will be removed in a future version of Elasticsearch. Please use Kibana feature privileges instead", "x-opaque-id": "51b1f9df-8bad-411e-ab83-f9c51d4686fd", "key": "deprecated_role-reporting_user", "category": "security", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" }
{"type": "deprecation.elasticsearch", "timestamp": "2021-12-21T03:35:49,961Z", "level": "WARN", "component": "o.e.d.x.s.a.s.DeprecationRoleDescriptorConsumer", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "Role [developer] contains index privileges covering the [logback-log-tx-new] alias but which do not cover some of the indices that it points to [shrink-qbec-logback-log-tx-new-2021.09.12-000026, shrink-x2ih-logback-log-tx-new-2021.09.05-000025]. Granting privileges over an alias and hence granting privileges over all the indices that the alias points to is deprecated and will be removed in a future version of Elasticsearch. Instead define permissions exclusively on index names or index name patterns.", "x-opaque-id": "51b1f9df-8bad-411e-ab83-f9c51d4686fd", "key": "index_permissions_on_alias", "category": "security", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" }
{"type": "server", "timestamp": "2021-12-21T03:39:05,157Z", "level": "WARN", "component": "o.e.h.AbstractHttpServerTransport", "cluster.name": "dev", "node.name": "dev-es-data-node-hot-0", "message": "caught exception while handling client http traffic, closing connection Netty4HttpChannel{localAddress=/192.168.137.226:9200, remoteAddress=/192.168.189.0:29431}", "cluster.uuid": "QLe8A3BCQDCakdsf1MplIA", "node.id": "6b1q03rCQEqEce5FOvVN4g" ,
"stacktrace": ["io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate",
"at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:477) ~[netty-codec-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276) ~[netty-codec-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:620) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:583) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:986) [netty-common-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.66.Final.jar:4.1.66.Final]",
"at java.lang.Thread.run(Thread.java:833) [?:?]",
"Caused by: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate",
"at sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[?:?]",
"at sun.security.ssl.Alert.createSSLException(Alert.java:117) ~[?:?]",
"at sun.security.ssl.TransportContext.fatal(TransportContext.java:357) ~[?:?]",
"at sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293) ~[?:?]",
"at sun.security.ssl.TransportContext.dispatch(TransportContext.java:203) ~[?:?]",
"at sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[?:?]",
"at sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:736) ~[?:?]",
"at sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:691) ~[?:?]",
"at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:506) ~[?:?]",
"at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:482) ~[?:?]",
"at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:679) ~[?:?]",
"at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:298) ~[netty-handler-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1344) ~[netty-handler-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1237) ~[netty-handler-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1286) ~[netty-handler-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:507) ~[netty-codec-4.1.66.Final.jar:4.1.66.Final]",
"at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:446) ~[netty-codec-4.1.66.Final.jar:4.1.66.Final]",
I can only provide the current log of es, the log of this field has been appearing crazily