Module: elasticsearch
Terraform module to provision an Elasticsearch cluster with built-in integrations with Kibana and Logstash.
Introduction
This module will create:
- Elasticsearch cluster with the specified node count in the provided subnets in a VPC
- Elasticsearch domain policy that accepts a list of IAM role ARNs from which to permit management traffic to the cluster
- Security Group to control access to the Elasticsearch domain (inputs to the Security Group are other Security Groups or CIDRs blocks to be allowed to connect to the cluster)
- DNS hostname record for Elasticsearch cluster (if DNS Zone ID is provided)
- DNS hostname record for Kibana (if DNS Zone ID is provided)
NOTE: To enable zone awareness to deploy Elasticsearch nodes into two different Availability Zones, you need to set zone_awareness_enabled to true and provide two different subnets in subnet_ids.
If you enable zone awareness for your domain, Amazon ES places an endpoint into two subnets.
The subnets must be in different Availability Zones in the same region.
If you don't enable zone awareness, Amazon ES places an endpoint into only one subnet. You also need to set availability_zone_count to 1.
Usage
module "elasticsearch" {
source = "cloudposse/elasticsearch/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"
namespace = "eg"
stage = "dev"
name = "es"
dns_zone_id = "Z14EN2YD427LRQ"
security_groups = ["sg-XXXXXXXXX", "sg-YYYYYYYY"]
vpc_id = "vpc-XXXXXXXXX"
subnet_ids = ["subnet-XXXXXXXXX", "subnet-YYYYYYYY"]
zone_awareness_enabled = true
elasticsearch_version = "6.5"
instance_type = "t2.small.elasticsearch"
instance_count = 4
ebs_volume_size = 10
iam_role_arns = ["arn:aws:iam::XXXXXXXXX:role/ops", "arn:aws:iam::XXXXXXXXX:role/dev"]
iam_actions = ["es:ESHttpGet", "es:ESHttpPut", "es:ESHttpPost"]
encrypt_at_rest_enabled = true
kibana_subdomain_name = "kibana-es"
advanced_options = {
"rest.action.multi.allow_explicit_index" = "true"
}
}
Examples
Here is a working example of using this module:
Here are automated tests for the complete example using bats and Terratest (which tests and deploys the example on AWS):
Variables
Required Variables
Optional Variables
access_policies(string) optionalJSON string for the IAM policy document specifying the access policies for the domain.
Default value:
""advanced_options(map(string)) optionalKey-value string pairs to specify advanced configuration options
Default value:
{ }advanced_security_options_anonymous_auth_enabled(bool) optionalWhether Anonymous auth is enabled. Enables fine-grained access control on an existing domain
Default value:
falseadvanced_security_options_enabled(bool) optionalAWS Elasticsearch Kibana enchanced security plugin enabling (forces new resource)
Default value:
falseadvanced_security_options_internal_user_database_enabled(bool) optionalWhether to enable or not internal Kibana user database for ELK OpenDistro security plugin
Default value:
falseadvanced_security_options_master_user_arn(string) optionalARN of IAM user who is to be mapped to be Kibana master user (applicable if advanced_security_options_internal_user_database_enabled set to false)
Default value:
""advanced_security_options_master_user_name(string) optionalMaster user username (applicable if advanced_security_options_internal_user_database_enabled set to true)
Default value:
""advanced_security_options_master_user_password(string) optionalMaster user password (applicable if advanced_security_options_internal_user_database_enabled set to true)
Default value:
""allowed_cidr_blocks(list(string)) optionalList of CIDR blocks to be allowed to connect to the cluster
Default value:
[ ]anonymous_iam_actions(list(string)) optionalList of actions to allow for the anonymous (
*) IAM roles, e.g.es:ESHttpGet,es:ESHttpPut,es:ESHttpPostDefault value:
[ ]auto_tuneoptionalThis object represents the auto_tune configuration. It contains the following filed:
- enabled - Whether to enable autotune.
- rollback_on_disable - Whether to roll back to default Auto-Tune settings when disabling Auto-Tune.
- starting_time - Date and time at which to start the Auto-Tune maintenance schedule in RFC3339 format. Time should be in the future.
- cron_schedule - A cron expression specifying the recurrence pattern for an Auto-Tune maintenance schedule.
- duration - Autotune maintanance window duration time in hours.
Type:
object({
enabled = bool
rollback_on_disable = string
starting_time = string
cron_schedule = string
duration = number
})Default value:
{
"cron_schedule": null,
"duration": null,
"enabled": false,
"rollback_on_disable": "NO_ROLLBACK",
"starting_time": null
}- enabled - Whether to enable autotune.
automated_snapshot_start_hour(number) optionalHour at which automated snapshots are taken, in UTC
Default value:
0availability_zone_count(number) optionalNumber of Availability Zones for the domain to use.
Default value:
2aws_ec2_service_name(list(string)) optionalAWS EC2 Service Name
Default value:
[
"ec2.amazonaws.com"
]aws_service_type(string) optionalThe type of AWS service to deploy (
elasticsearchoropensearch).Default value:
"elasticsearch"cognito_authentication_enabled(bool) optionalWhether to enable Amazon Cognito authentication with Kibana
Default value:
falsecognito_iam_role_arn(string) optionalARN of the IAM role that has the AmazonESCognitoAccess policy attached
Default value:
""cognito_identity_pool_id(string) optionalThe ID of the Cognito Identity Pool to use
Default value:
""cognito_user_pool_id(string) optionalThe ID of the Cognito User Pool to use
Default value:
""cold_storage_enabled(bool) optionalEnables cold storage support.
Default value:
falsecreate_elasticsearch_user_role(bool) optionalWhether to create an IAM role for Users/EC2 to assume to access the Elasticsearch domain. Set it to
falseif you already manage access through other means.Default value:
truecreate_iam_service_linked_role(bool) optionalWhether to create
AWSServiceRoleForAmazonElasticsearchServiceservice-linked role. Set it tofalseif you already have an ElasticSearch cluster created in the AWS account and AWSServiceRoleForAmazonElasticsearchService already exists. See https://github.com/terraform-providers/terraform-provider-aws/issues/5218 for more infoDefault value:
truecreate_security_group(bool) optionalWhether to create a dedicated security group for the Elasticsearch domain. Set it to
falseif you already have security groups that you want to attach to the domain and specify them in thesecurity_groupsvariable.Default value:
truecustom_endpoint(string) optionalFully qualified domain for custom endpoint.
Default value:
""custom_endpoint_certificate_arn(string) optionalACM certificate ARN for custom endpoint.
Default value:
""custom_endpoint_enabled(bool) optionalWhether to enable custom endpoint for the Elasticsearch domain.
Default value:
falsededicated_master_count(number) optionalNumber of dedicated master nodes in the cluster
Default value:
0dedicated_master_enabled(bool) optionalIndicates whether dedicated master nodes are enabled for the cluster
Default value:
falsededicated_master_type(string) optionalInstance type of the dedicated master nodes in the cluster
Default value:
"t2.small.elasticsearch"dns_zone_id(string) optionalRoute53 DNS Zone ID to add hostname records for Elasticsearch domain and Kibana
Default value:
""domain_endpoint_options_enforce_https(bool) optionalWhether or not to require HTTPS
Default value:
truedomain_endpoint_options_tls_security_policy(string) optionalThe name of the TLS security policy that needs to be applied to the HTTPS endpoint
Default value:
"Policy-Min-TLS-1-0-2019-07"domain_hostname_enabled(bool) optionalExplicit flag to enable creating a DNS hostname for ES. If
true, thenvar.dns_zone_idis required.Default value:
falseebs_iops(number) optionalThe baseline input/output (I/O) performance of EBS volumes attached to data nodes. Applicable only for the Provisioned IOPS EBS volume type
Default value:
0ebs_throughput(number) optionalSpecifies the throughput (in MiB/s) of the EBS volumes attached to data nodes. Applicable only for the gp3 volume type. Valid values are between 125 and 1000.
Default value:
nullebs_volume_size(number) optionalEBS volumes for data storage in GB
Default value:
0ebs_volume_type(string) optionalStorage type of EBS volumes
Default value:
"gp2"elasticsearch_domain_name(string) optionalThe name of the Elasticsearch domain. Must be at least 3 and no more than 28 characters long. Valid characters are a-z (lowercase letters), 0-9, and - (hyphen).
Default value:
""elasticsearch_subdomain_name(string) optionalThe name of the subdomain for Elasticsearch in the DNS zone (e.g.
elasticsearch,ui,ui-es,search-ui)Default value:
""elasticsearch_version(string) optionalVersion of Elasticsearch to deploy (e.g.
7.4,7.1,6.8,6.7,6.5,6.4,6.3,6.2,6.0,5.6,5.5,5.3,5.1,2.3,1.5Default value:
"7.4"encrypt_at_rest_enabled(bool) optionalWhether to enable encryption at rest
Default value:
trueencrypt_at_rest_kms_key_id(string) optionalThe KMS key ID to encrypt the Elasticsearch domain with. If not specified, then it defaults to using the AWS/Elasticsearch service KMS key
Default value:
""iam_actions(list(string)) optionalList of actions to allow for the user IAM roles, e.g.
es:ESHttpGet,es:ESHttpPut,es:ESHttpPostDefault value:
[ ]iam_authorizing_role_arns(list(string)) optionalList of IAM role ARNs to permit to assume the Elasticsearch user role
Default value:
[ ]iam_irsa_openid_connect_provider_arn(string) optionalARN of the OpenID connect provider to allow usage of IRSA
Default value:
""iam_irsa_openid_connect_provider_url(string) optionalURL of the OpenID connect provider to allow usage of IRSA
Default value:
""iam_irsa_service_account(string) optionalKubernetes ServiceAccount to allow to access the Elastic Domain via IRSA
Default value:
"system:serviceaccount:default:*"iam_role_arns(list(string)) optionalList of IAM role ARNs to permit access to the Elasticsearch domain
Default value:
[ ]iam_role_max_session_duration(number) optionalThe maximum session duration (in seconds) for the user role. Can have a value from 1 hour to 12 hours
Default value:
3600iam_role_permissions_boundary(string) optionalThe ARN of the permissions boundary policy which will be attached to the Elasticsearch user role
Default value:
nullingress_port_range_end(number) optionalEnd number for allowed port range. (e.g.
443)Default value:
65535ingress_port_range_start(number) optionalStart number for allowed port range. (e.g.
443)Default value:
0instance_count(number) optionalNumber of data nodes in the cluster
Default value:
4instance_type(string) optionalElasticsearch instance type for data nodes in the cluster
Default value:
"t2.small.elasticsearch"kibana_hostname_enabled(bool) optionalExplicit flag to enable creating a DNS hostname for Kibana. If
true, thenvar.dns_zone_idis required.Default value:
falsekibana_subdomain_name(string) optionalThe name of the subdomain for Kibana in the DNS zone (e.g.
kibana,ui,ui-es,search-ui,kibana.elasticsearch)Default value:
""log_publishing_application_cloudwatch_log_group_arn(string) optionalARN of the CloudWatch log group to which log for ES_APPLICATION_LOGS needs to be published
Default value:
""log_publishing_application_enabled(bool) optionalSpecifies whether log publishing option for ES_APPLICATION_LOGS is enabled or not
Default value:
falselog_publishing_audit_cloudwatch_log_group_arn(string) optionalARN of the CloudWatch log group to which log for AUDIT_LOGS needs to be published
Default value:
""log_publishing_audit_enabled(bool) optionalSpecifies whether log publishing option for AUDIT_LOGS is enabled or not
Default value:
falselog_publishing_index_cloudwatch_log_group_arn(string) optionalARN of the CloudWatch log group to which log for INDEX_SLOW_LOGS needs to be published
Default value:
""log_publishing_index_enabled(bool) optionalSpecifies whether log publishing option for INDEX_SLOW_LOGS is enabled or not
Default value:
falselog_publishing_search_cloudwatch_log_group_arn(string) optionalARN of the CloudWatch log group to which log for SEARCH_SLOW_LOGS needs to be published
Default value:
""log_publishing_search_enabled(bool) optionalSpecifies whether log publishing option for SEARCH_SLOW_LOGS is enabled or not
Default value:
falsemulti_az_with_standby_enabled(bool) optionalEnable domain with standby for OpenSearch cluster
Default value:
falsenode_to_node_encryption_enabled(bool) optionalWhether to enable node-to-node encryption
Default value:
falsesecurity_groups(list(string)) optionalList of security group IDs to be allowed to connect to the cluster or the security group IDs to apply to the cluster when the
create_security_groupvariable is set to false.Default value:
[ ]subnet_ids(list(string)) optionalVPC Subnet IDs
Default value:
[ ]vpc_enabled(bool) optionalSet to false if ES should be deployed outside of VPC.
Default value:
truevpc_id(string) optionalVPC ID
Default value:
nullwarm_count(number) optionalNumber of UltraWarm nodes
Default value:
2warm_enabled(bool) optionalWhether AWS UltraWarm is enabled
Default value:
falsewarm_type(string) optionalType of UltraWarm nodes
Default value:
"ultrawarm1.medium.elasticsearch"zone_awareness_enabled(bool) optionalEnable zone awareness for Elasticsearch cluster
Default value:
true
Context Variables
The following variables are defined in the context.tf file of this module and part of the terraform-null-label pattern.
context.tf file of this module and part of the terraform-null-label pattern.additional_tag_map(map(string)) optionalAdditional key-value pairs to add to each map in
tags_as_list_of_maps. Not added totagsorid.
This is for some rare cases where resources want additional configuration of tags
and therefore take a list of maps with tag key, value, and additional configuration.Required: No
Default value:
{ }attributes(list(string)) optionalID element. Additional attributes (e.g.
workersorcluster) to add toid,
in the order they appear in the list. New attributes are appended to the
end of the list. The elements of the list are joined by thedelimiter
and treated as a single ID element.Required: No
Default value:
[ ]context(any) optionalSingle object for setting entire context at once.
See description of individual variables for details.
Leave string and numeric variables asnullto use default value.
Individual variable settings (non-null) override settings in context object,
except for attributes, tags, and additional_tag_map, which are merged.Required: No
Default value:
{
"additional_tag_map": {},
"attributes": [],
"delimiter": null,
"descriptor_formats": {},
"enabled": true,
"environment": null,
"id_length_limit": null,
"label_key_case": null,
"label_order": [],
"label_value_case": null,
"labels_as_tags": [
"unset"
],
"name": null,
"namespace": null,
"regex_replace_chars": null,
"stage": null,
"tags": {},
"tenant": null
}delimiter(string) optionalDelimiter to be used between ID elements.
Defaults to-(hyphen). Set to""to use no delimiter at all.Required: No
Default value:
nulldescriptor_formats(any) optionalDescribe additional descriptors to be output in the
descriptorsoutput map.
Map of maps. Keys are names of descriptors. Values are maps of the form
\{<br/> format = string<br/> labels = list(string)<br/> \}
(Type isanyso the map values can later be enhanced to provide additional options.)
formatis a Terraform format string to be passed to theformat()function.
labelsis a list of labels, in order, to pass toformat()function.
Label values will be normalized before being passed toformat()so they will be
identical to how they appear inid.
Default is{}(descriptorsoutput will be empty).Required: No
Default value:
{ }enabled(bool) optionalSet to false to prevent the module from creating any resources
Required: NoDefault value:
nullenvironment(string) optionalID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT'
Required: NoDefault value:
nullid_length_limit(number) optionalLimit
idto this many characters (minimum 6).
Set to0for unlimited length.
Set tonullfor keep the existing setting, which defaults to0.
Does not affectid_full.Required: No
Default value:
nulllabel_key_case(string) optionalControls the letter case of the
tagskeys (label names) for tags generated by this module.
Does not affect keys of tags passed in via thetagsinput.
Possible values:lower,title,upper.
Default value:title.Required: No
Default value:
nulllabel_order(list(string)) optionalThe order in which the labels (ID elements) appear in the
id.
Defaults to ["namespace", "environment", "stage", "name", "attributes"].
You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present.Required: No
Default value:
nulllabel_value_case(string) optionalControls the letter case of ID elements (labels) as included in
id,
set as tag values, and output by this module individually.
Does not affect values of tags passed in via thetagsinput.
Possible values:lower,title,upperandnone(no transformation).
Set this totitleand setdelimiterto""to yield Pascal Case IDs.
Default value:lower.Required: No
Default value:
nulllabels_as_tags(set(string)) optionalSet of labels (ID elements) to include as tags in the
tagsoutput.
Default is to include all labels.
Tags with empty values will not be included in thetagsoutput.
Set to[]to suppress all generated tags.
Notes:
The value of thenametag, if included, will be theid, not thename.
Unlike othernull-labelinputs, the initial setting oflabels_as_tagscannot be
changed in later chained modules. Attempts to change it will be silently ignored.Required: No
Default value:
[
"default"
]name(string) optionalID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as atag.
The "name" tag is set to the fullidstring. There is no tag with the value of thenameinput.Required: No
Default value:
nullnamespace(string) optionalID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique
Required: NoDefault value:
nullregex_replace_chars(string) optionalTerraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set,"/[^a-zA-Z0-9-]/"is used to remove all characters other than hyphens, letters and digits.Required: No
Default value:
nullstage(string) optionalID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release'
Required: NoDefault value:
nulltags(map(string)) optionalAdditional tags (e.g.
{'BusinessUnit': 'XYZ'}).
Neither the tag keys nor the tag values will be modified by this module.Required: No
Default value:
{ }tenant(string) optionalID element (Rarely used, not included by default). A customer identifier, indicating who this instance of a resource is for
Required: NoDefault value:
null
Outputs
domain_arnARN of the Elasticsearch domain
domain_endpointDomain-specific endpoint used to submit index, search, and data upload requests
domain_hostnameElasticsearch domain hostname to submit index, search, and data upload requests
domain_idUnique identifier for the Elasticsearch domain
domain_nameName of the Elasticsearch domain
elasticsearch_user_iam_role_arnThe ARN of the IAM role to allow access to Elasticsearch cluster
elasticsearch_user_iam_role_nameThe name of the IAM role to allow access to Elasticsearch cluster
kibana_endpointDomain-specific endpoint for Kibana without https scheme
kibana_hostnameKibana hostname
security_group_idSecurity Group ID to control access to the Elasticsearch domain
Dependencies
Requirements
terraform, version:>= 1.3aws, version:>= 5.15.0
Providers
aws, version:>= 5.15.0
Modules
| Name | Version | Source | Description |
|---|---|---|---|
domain_hostname | 0.13.0 | cloudposse/route53-cluster-hostname/aws | n/a |
kibana_hostname | 0.13.0 | cloudposse/route53-cluster-hostname/aws | n/a |
kibana_label | 0.25.0 | cloudposse/label/null | n/a |
this | 0.25.0 | cloudposse/label/null | n/a |
user_label | 0.25.0 | cloudposse/label/null | n/a |
Resources
The following resources are used by this module:
aws_elasticsearch_domain.default(resource)aws_elasticsearch_domain_policy.default(resource)aws_iam_role.elasticsearch_user(resource)aws_iam_service_linked_role.default(resource)aws_opensearch_domain.default(resource)aws_opensearch_domain_policy.default(resource)aws_security_group.default(resource)aws_security_group_rule.egress(resource)aws_security_group_rule.ingress_cidr_blocks(resource)aws_security_group_rule.ingress_security_groups(resource)
Data Sources
The following data sources are used by this module:
aws_iam_policy_document.assume_role(data source)aws_iam_policy_document.default(data source)