Signing requests to Amazon Elasticsearch service¶
When using Amazon Elasticsearch service, you need to secure your Elasticsearch from the outside. Currently, there is no way to secure your Elasticsearch using network firewall rules, so the only way is to signing the requests using the access key and secret key for a role or user with permissions on the Elasticsearch service.
You can sign requests to AWS using any of the standard AWS methods of providing
credentials.
- Environment Variables, AWS_ACCESS_KEY_ID
and AWS_SECRET_ACCESS_KEY
- AWS Config or Credential Files, ~/.aws/config
and ~/.aws/credentials
- AWS Instance Profiles, uses the EC2 Metadata service
Using an Instance Profile¶
Typically, you’ll deploy ElastAlert on a running EC2 instance on AWS. You can
assign a role to this instance that gives it permissions to read from and write
to the Elasticsearch service. When using an Instance Profile, you will need to
specify the aws_region
in the configuration file or set the
AWS_DEFAULT_REGION
environment variable.
Using AWS profiles¶
You can also create a user with permissions on the Elasticsearch service and tell ElastAlert to authenticate itself using that user. First, create an AWS profile in the machine where you’d like to run ElastAlert for the user with permissions.
You can use the environment variables AWS_DEFAULT_PROFILE
and
AWS_DEFAULT_REGION
or add two options to the configuration file:
- aws_region
: The AWS region where you want to operate.
- profile
: The name of the AWS profile to use to sign the requests.