README
¶
terraform-provider-elasticsearch
This is a terraform provider that lets you provision elasticsearch resources, compatible with v5, v6 and v7 of elasticsearch. Based off of an original PR to Terraform.
Installation
This package is published on the official Terraform registry.
Or download a binary, and put it in a good spot on your system. Then update your ~/.terraformrc
to refer to the binary:
providers {
elasticsearch = "/path/to/terraform-provider-elasticsearch"
}
See the docs for more on manual installation.
Usage
provider "elasticsearch" {
url = "https://search-foo-bar-pqrhr4w3u4dzervg41frow4mmy.us-east-1.es.amazonaws.com" # Don't include port at the end for aws
aws_access_key = ""
aws_secret_key = ""
aws_token = "" # if necessary
insecure = true # to bypass certificate check
cacert_file = "/path/to/ca.crt" # when connecting to elastic with self-signed certificate
sign_aws_requests = true # only needs to be true if your domain access policy includes IAM users or roles
}
API Coverage
Examples of resources can be found in the examples directory. The resources currently supported from the: opensource Elasticsearch, XPack and OpenDistro distributions are described below.
Elasticsearch
Kibana
- Kibana Object
- Visualization
- Search
- Dashboard
- Kibana Alerts
XPack
- Cross cluster replication
- Enrich policies
- Index lifecycle management
- License management
- Rollup jobs
- Security (Role/Role Mapping/User)
- Snapshot lifecycle policy
- Watch
OpenDistro
- Alerting (Destinations/Monitors)
- Security (Role/Role Mapping/User)
- Index State Management
- Kibana Tenant
- Anomaly Detection
Examples
resource "elasticsearch_index_template" "test" {
name = "terraform-test"
body = <<EOF
{
"template": "logstash-*",
"version": 50001,
"settings": {
"index.refresh_interval": "5s"
},
"mappings": {
"_default_": {
"_all": {"enabled": true, "norms": false},
"dynamic_templates": [ {
"message_field": {
"path_match": "message",
"match_mapping_type": "string",
"mapping": {
"type": "text",
"norms": false
}
}
}, {
"string_fields": {
"match": "*",
"match_mapping_type": "string",
"mapping": {
"type": "text", "norms": false,
"fields": {
"keyword": { "type": "keyword" }
}
}
}
} ],
"properties": {
"@timestamp": { "type": "date", "include_in_all": false },
"@version": { "type": "keyword", "include_in_all": false },
"geoip" : {
"dynamic": true,
"properties": {
"ip": { "type": "ip" },
"location": { "type": "geo_point" },
"latitude": { "type": "half_float" },
"longitude": { "type": "half_float" }
}
}
}
}
}
}
EOF
}
# A saved search, visualization or dashboard
resource "elasticsearch_kibana_object" "test_dashboard" {
body = "${file("dashboard_path.txt")}"
}
Example watches (target notification actions must be setup manually before hand)
# Monitor cluster status with auth being required
resource "elasticsearch_xpack_watch" "cluster-status-red" {
watch_id = "cluster-status-red"
body = <<EOF
{
"trigger": {
"schedule": {
"interval": "1m"
}
},
"input": {
"http": {
"request": {
"scheme": "http",
"host": "localhost",
"port": 9200,
"method": "get",
"path": "/_cluster/health",
"params": {},
"headers": {
"Authorization": "Basic ${base64encode('username:password')}"
}
}
}
},
"condition": {
"compare": {
"ctx.payload.status": {
"eq": "red"
}
}
},
"actions": {
"notify-slack": {
"throttle_period_in_millis": 300000,
"slack": {
"account": "monitoring",
"message": {
"from": "watcher",
"to": [
"#my-slack-channel"
],
"text": "Elasticsearch Monitoring",
"attachments": [
{
"color": "danger",
"title": "Cluster Health Warning - RED",
"text": "elasticsearch cluster health is RED"
}
]
}
}
}
},
"metadata": {
"xpack": {
"type": "json"
},
"name": "Cluster Health Red"
}
}
EOF
}
# Monitor JVM memory usage without auth required
resource "elasticsearch_xpack_watch" "jvm-memory-usage" {
watch_id = "jvm-memory-usage"
body = <<EOF
{
"trigger": {
"schedule": {
"interval": "10m"
}
},
"input": {
"http": {
"request": {
"scheme": "http",
"host": "localhost",
"port": 9200,
"method": "get",
"path": "/_nodes/stats/jvm",
"params": {
"filter_path": "nodes.*.jvm.mem.heap_used_percent"
},
"headers": {}
}
}
},
"condition": {
"script": {
"lang": "painless",
"source": "ctx.payload.nodes.values().stream().anyMatch(node -> node.jvm.mem.heap_used_percent > 75)"
}
},
"actions": {
"notify-slack": {
"throttle_period_in_millis": 600000,
"slack": {
"account": "monitoring",
"message": {
"from": "watcher",
"to": [
"#my-slack-channel"
],
"text": "Elasticsearch Monitoring",
"attachments": [
{
"color": "danger",
"title": "JVM Memory Pressure Warning",
"text": "JVM Memory Pressure has been > 75% on one or more nodes for the last 5 minutes."
}
]
}
}
}
},
"metadata": {
"xpack": {
"type": "json"
},
"name": "JVM Memory Pressure Warning"
}
}
EOF
}
For use with AWS Elasticsearch domains
Please see the documentation for details.
Development
Requirements
- Golang >= 1.11
go build -o /path/to/binary/terraform-provider-elasticsearch
Licence
See LICENSE.
Contributing
- Fork it ( https://github.com/phillbaker/terraform-provider-elasticsearch/fork )
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Add some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create a new Pull Request
Documentation
¶
There is no documentation for this package.