This is a terraform provider that lets you provision Elasticsearch and Opensearch resources, compatible with v6 and v7 of Elasticsearch and v1 of Opensearch. Based off of an original PR to Terraform.
This package is published on the official Terraform registry. Note, we currently test against the 1.x branch of Terraform - this should continue to work with >= 0.13 versions, however, compatibility is not tested in the >= 2.x version of this provider.
Or download a binary, and put it in a good spot on your system. Then update your ~/.terraformrc
to refer to the binary:
providers {
elasticsearch = "/path/to/terraform-provider-elasticsearch"
}
See the docs for more on manual installation.
With version 2.x of this provider, it uses version 2.x of the Terraform Plugin SDK which only supports Terraform 0.12 and higher. Please see the 1.x releases of this provider for Terraform 0.11 support.
provider "elasticsearch" {
url = "https://search-foo-bar-pqrhr4w3u4dzervg41frow4mmy.us-east-1.es.amazonaws.com" # Don't include port at the end for aws
aws_access_key = ""
aws_secret_key = ""
aws_token = "" # if necessary
insecure = true # to bypass certificate check
cacert_file = "/path/to/ca.crt" # when connecting to elastic with self-signed certificate
sign_aws_requests = true # only needs to be true if your domain access policy includes IAM users or roles
}
Examples of resources can be found in the examples directory. The resources currently supported from the: opensource Elasticsearch, XPack and OpenDistro/OpenSearch distributions are described below.
- Kibana Object
- Visualization
- Search
- Dashboard
- Kibana Alerts
- Cross cluster replication
- Enrich policies
- Index lifecycle management
- License management
- Rollup jobs
- Security (Role/Role Mapping/User)
- Snapshot lifecycle policy
- Watch
- Alerting (Destinations/Monitors)
- Security (Role/Role Mapping/User)
- Index State Management
- Kibana Tenant
- Anomaly Detection
resource "elasticsearch_index_template" "test" {
name = "terraform-test"
body = <<EOF
{
"template": "logstash-*",
"version": 50001,
"settings": {
"index.refresh_interval": "5s"
},
"mappings": {
"_default_": {
"_all": {"enabled": true, "norms": false},
"dynamic_templates": [ {
"message_field": {
"path_match": "message",
"match_mapping_type": "string",
"mapping": {
"type": "text",
"norms": false
}
}
}, {
"string_fields": {
"match": "*",
"match_mapping_type": "string",
"mapping": {
"type": "text", "norms": false,
"fields": {
"keyword": { "type": "keyword" }
}
}
}
} ],
"properties": {
"@timestamp": { "type": "date", "include_in_all": false },
"@version": { "type": "keyword", "include_in_all": false },
"geoip" : {
"dynamic": true,
"properties": {
"ip": { "type": "ip" },
"location": { "type": "geo_point" },
"latitude": { "type": "half_float" },
"longitude": { "type": "half_float" }
}
}
}
}
}
}
EOF
}
# A saved search, visualization or dashboard
resource "elasticsearch_kibana_object" "test_dashboard" {
body = "${file("dashboard_path.txt")}"
}
Example watches (target notification actions must be setup manually before hand)
# Monitor cluster status with auth being required
resource "elasticsearch_xpack_watch" "cluster-status-red" {
watch_id = "cluster-status-red"
body = <<EOF
{
"trigger": {
"schedule": {
"interval": "1m"
}
},
"input": {
"http": {
"request": {
"scheme": "http",
"host": "localhost",
"port": 9200,
"method": "get",
"path": "/_cluster/health",
"params": {},
"headers": {
"Authorization": "Basic ${base64encode('username:password')}"
}
}
}
},
"condition": {
"compare": {
"ctx.payload.status": {
"eq": "red"
}
}
},
"actions": {
"notify-slack": {
"throttle_period_in_millis": 300000,
"slack": {
"account": "monitoring",
"message": {
"from": "watcher",
"to": [
"#my-slack-channel"
],
"text": "Elasticsearch Monitoring",
"attachments": [
{
"color": "danger",
"title": "Cluster Health Warning - RED",
"text": "elasticsearch cluster health is RED"
}
]
}
}
}
},
"metadata": {
"xpack": {
"type": "json"
},
"name": "Cluster Health Red"
}
}
EOF
}
# Monitor JVM memory usage without auth required
resource "elasticsearch_xpack_watch" "jvm-memory-usage" {
watch_id = "jvm-memory-usage"
body = <<EOF
{
"trigger": {
"schedule": {
"interval": "10m"
}
},
"input": {
"http": {
"request": {
"scheme": "http",
"host": "localhost",
"port": 9200,
"method": "get",
"path": "/_nodes/stats/jvm",
"params": {
"filter_path": "nodes.*.jvm.mem.heap_used_percent"
},
"headers": {}
}
}
},
"condition": {
"script": {
"lang": "painless",
"source": "ctx.payload.nodes.values().stream().anyMatch(node -> node.jvm.mem.heap_used_percent > 75)"
}
},
"actions": {
"notify-slack": {
"throttle_period_in_millis": 600000,
"slack": {
"account": "monitoring",
"message": {
"from": "watcher",
"to": [
"#my-slack-channel"
],
"text": "Elasticsearch Monitoring",
"attachments": [
{
"color": "danger",
"title": "JVM Memory Pressure Warning",
"text": "JVM Memory Pressure has been > 75% on one or more nodes for the last 5 minutes."
}
]
}
}
}
},
"metadata": {
"xpack": {
"type": "json"
},
"name": "JVM Memory Pressure Warning"
}
}
EOF
}
Please see the documentation for details.
- Golang >= 1.13
go build -o /path/to/binary/terraform-provider-elasticsearch
See LICENSE.
- Fork it ( https://github.com/phillbaker/terraform-provider-elasticsearch/fork )
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Add some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create a new Pull Request