amazon-elasticsearch

How to talk to aws elasticsearch service using elastic java client?

|▌冷眼眸甩不掉的悲伤 提交于 2019-11-29 07:07:37
问题 I have set up a elasticsearch server using AWS elasticsearch service (Not EC2). It gave me an endpoint https://xxx-xxxxxxxx.us-west-2.es.amazonaws.com/ and if I click this endpoint(Note that there is no port specified) I can get the expected { status: 200, name: "Mastermind", cluster_name: "xxxx", version: { number: "1.5.2", build_hash: "yyyyyy", build_timestamp: "2015-04-27T09:21:06Z", build_snapshot: false, lucene_version: "4.10.4" }, tagline: "You Know, for Search" } The question is how do

How to access Kibana from Amazon elasticsearch service?

可紊 提交于 2019-11-28 17:47:18
I created Amazon elasticsearch service and populated data into it using logstash, which has been installed on an EC2 instance. On the Amazon elasticservice console page, there will be a link to access Kibana. search-cluster_name-XXXXXXXXXXXXXXXXXXX.region_name.es.amazonaws.com/_plugin/kibana/ when I click the link, browser is throwing the following error. {"Message":"User: anonymous is not authorized to perform: es:ESHttpGet on resource: arn:aws:es:region_name:account_id:domain/cluster_name/_plugin/kibana/"} I'm sure that this has something related with access policy of ES domain.How should I

Proper access policy for Amazon Elastic Search Cluster

僤鯓⒐⒋嵵緔 提交于 2019-11-27 06:17:29
I've recently started using the new Amazon Elasticsearch Service and I can't seem to figure out the access policy I need so that I can only access the services from my EC2 instances that have a specific IAM role assigned to them. Here's an example of the access policy I currently have assigned for the ES domain: { "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "AWS": [ "arn:aws:iam::[ACCOUNT_ID]:role/my_es_role", ] }, "Action": "es:*", "Resource": "arn:aws:es:us-east-1:[ACCOUNT_ID]:domain/[ES_DOMAIN]/*" } ] } But as I said, this doesn't work. I log into

Proper access policy for Amazon Elastic Search Cluster

牧云@^-^@ 提交于 2019-11-26 11:56:41
问题 I\'ve recently started using the new Amazon Elasticsearch Service and I can\'t seem to figure out the access policy I need so that I can only access the services from my EC2 instances that have a specific IAM role assigned to them. Here\'s an example of the access policy I currently have assigned for the ES domain: { \"Version\": \"2012-10-17\", \"Statement\": [ { \"Sid\": \"\", \"Effect\": \"Allow\", \"Principal\": { \"AWS\": [ \"arn:aws:iam::[ACCOUNT_ID]:role/my_es_role\", ] }, \"Action\":