Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Committer for AWS Elastic Search #27

Open
santhoshgit13 opened this issue Jan 25, 2018 · 4 comments
Open

Committer for AWS Elastic Search #27

santhoshgit13 opened this issue Jan 25, 2018 · 4 comments

Comments

@santhoshgit13
Copy link

Hi,

I am using the committer for my local elasticsearch instance and is working perfectly fine.
I am trying to commit to AWS ElasticSearch so now where should i give the AWS Key and Password to connect to AWS.

Is there any example or any documentation to use AWS ElasticSearch instead of a local instance.

Thanks

@essiembre
Copy link
Contributor

You should be able to commit to Elasticsearch on AWS without issues (we did it often). The configuration is the same as a local instance. However, you need to make sure that AWS Elasticsearch and the server where you crawl from are behind the same firewall and the crawler has access to AWS Elasticsearch.

@wolverline
Copy link

wolverline commented Feb 20, 2018

@essiembre If Elasticsearch is hosted in AWS, Norconex may not go through IAM role based authentication. AWS Elasticsearch usually accepts an Access/Secret Keys as you set in Amazon ClouldSearch committer.

<accessKey>...</accessKey>
<secretKey>...</secretKey>

In this case, do I need to extend the classes and add this? How do I go about this?

@essiembre
Copy link
Contributor

Prior to using the Committer, how were you accessing your Elasticsearch?

You can definitely extend the class or write a custom Committer, but I recommend a simpler approach. You can configure your IAM to restrict access to the originating IP instead. If you make it the IP of the server where you run the Collector from, you should be fine.

You can find more details about this option here: https://aws.amazon.com/blogs/security/how-to-control-access-to-your-amazon-elasticsearch-service-domain/

@jamieshiz
Copy link

Hi @essiembre,
I am having a similar issue. I am running the Norconex Collector locally on a docker container and trying to use the ElasticSearch committer to push the indexed files to AWS ElasticSearch.

The CloudSearch Committer has clear documentation that corresponds to AWS endpoints such as:

<!-- Mandatory: -->
<documentEndpoint>...</documentEndpoint>
 
<!-- Mandatory if not configured elsewhere: -->
<accessKey>...</accessKey>
<secretKey>...</secretKey>

I am not seeing similiar AWS endpints within the ElasticSearch committer. Any help is appreciated. Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants