forked from fiunchinho/ansible-aws-elasticsearch-module
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathec2_elasticsearch.py
298 lines (257 loc) · 10.5 KB
/
ec2_elasticsearch.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
#!/usr/bin/python
# encoding: utf-8
# (c) 2015, Jose Armesto <[email protected]>
#
# This file is part of Ansible
#
# This module is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This software is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this software. If not, see <http://www.gnu.org/licenses/>.
DOCUMENTATION = """
---
module: ec2_elasticsearch
short_description: Creates ElasticSearch cluster on Amazon
description:
- It depends on boto3
version_added: "2.1"
author: "Jose Armesto (@fiunchinho)"
options:
name:
description:
- Cluster name to be used.
required: true
elasticsearch_version:
description:
- Elasticsearch version to deploy. Default is '2.3'.
required: false
region:
description:
- The AWS region to use.
required: true
aliases: ['aws_region', 'ec2_region']
instance_type:
description:
- Type of the instances to use for the cluster. Valid types are: 'm3.medium.elasticsearch'|'m3.large.elasticsearch'|'m3.xlarge.elasticsearch'|'m3.2xlarge.elasticsearch'|'t2.micro.elasticsearch'|'t2.small.elasticsearch'|'t2.medium.elasticsearch'|'r3.large.elasticsearch'|'r3.xlarge.elasticsearch'|'r3.2xlarge.elasticsearch'|'r3.4xlarge.elasticsearch'|'r3.8xlarge.elasticsearch'|'i2.xlarge.elasticsearch'|'i2.2xlarge.elasticsearch'
required: true
instance_count:
description:
- Number of instances for the cluster.
required: true
dedicated_master:
description:
- A boolean value to indicate whether a dedicated master node is enabled.
required: true
zone_awareness:
description:
- A boolean value to indicate whether zone awareness is enabled.
required: true
ebs:
description:
- Specifies whether EBS-based storage is enabled.
required: true
dedicated_master_instance_type:
description:
- The instance type for a dedicated master node.
required: false
dedicated_master_instance_count:
description:
- Total number of dedicated master nodes, active and on standby, for the cluster.
required: false
volume_type:
description:
- Specifies the volume type for EBS-based storage.
required: true
volume_size:
description:
- Integer to specify the size of an EBS volume.
required: true
vpc_subnets:
description:
- Specifies the subnet ids for VPC endpoint.
required: false
vpc_security_groups:
description:
- Specifies the security group ids for VPC endpoint.
required: false
snapshot_hour:
description:
- Integer value from 0 to 23 specifying when the service takes a daily automated snapshot of the specified Elasticsearch domain.
required: true
access_policies:
description:
- IAM access policy as a JSON-formatted string.
required: true
profile:
description:
- What Boto profile use to connect to AWS.
required: false
encryption_at_rest_enabled:
description:
- Should data be encrypted while at rest.
required: false
encryption_at_rest_kms_key_id:
description:
- If encryption_at_rest_enabled is True, this identifies the encryption key to use
required: false
requirements:
- "python >= 2.6"
- boto3
"""
EXAMPLES = '''
- ec2_elasticsearch:
name: "my-cluster"
elasticsearch_version: "2.3"
region: "eu-west-1"
instance_type: "m3.medium.elasticsearch"
instance_count: 2
dedicated_master: True
zone_awareness: True
dedicated_master_instance_type: "t2.micro.elasticsearch"
dedicated_master_instance_count: 2
ebs: True
volume_type: "standard"
volume_size: 10
vpc_subnets: "subnet-e537d64a"
vpc_security_groups: "sg-dd2f13cb"
snapshot_hour: 13
access_policies: "{{ lookup('file', 'files/cluster_policies.json') | from_json }}"
profile: "myawsaccount"
'''
try:
import botocore
import boto3
import json
HAS_BOTO=True
except ImportError:
HAS_BOTO=False
def main():
argument_spec = ec2_argument_spec()
argument_spec.update(dict(
name = dict(required=True),
instance_type = dict(required=True),
instance_count = dict(required=True, type='int'),
dedicated_master = dict(required=True, type='bool'),
zone_awareness = dict(required=True, type='bool'),
dedicated_master_instance_type = dict(),
dedicated_master_instance_count = dict(type='int'),
ebs = dict(required=True, type='bool'),
volume_type = dict(required=True),
volume_size = dict(required=True, type='int'),
access_policies = dict(required=True, type='dict'),
vpc_subnets = dict(required=False, type='list'),
vpc_security_groups = dict(required=False, type='list'),
snapshot_hour = dict(required=True, type='int'),
elasticsearch_version = dict(default='2.3'),
encryption_at_rest_enabled = dict(default=False),
encryption_at_rest_kms_key_id = dict(required=False),
))
module = AnsibleModule(
argument_spec=argument_spec,
)
if not HAS_BOTO:
module.fail_json(msg='boto3 required for this module, install via pip or your package manager')
region, ec2_url, aws_connect_params = get_aws_connection_info(module, True)
client = boto3_conn(module=module, conn_type='client', resource='es', region=region, **aws_connect_params)
cluster_config = {
'InstanceType': module.params.get('instance_type'),
'InstanceCount': int(module.params.get('instance_count')),
'DedicatedMasterEnabled': module.params.get('dedicated_master'),
'ZoneAwarenessEnabled': module.params.get('zone_awareness')
}
ebs_options = {
'EBSEnabled': module.params.get('ebs')
}
encryption_at_rest_enabled = module.params.get('encryption_at_rest_enabled') == 'True'
encryption_at_rest_options = {
'Enabled': encryption_at_rest_enabled
}
if encryption_at_rest_enabled:
encryption_at_rest_options['KmsKeyId'] = module.params.get('encryption_at_rest_kms_key_id')
vpc_options = {}
if module.params.get('vpc_subnets'):
vpc_options['SubnetIds'] = [x.strip() for x in module.params.get('vpc_subnets')]
if module.params.get('vpc_security_groups'):
vpc_options['SecurityGroupIds'] = [x.strip() for x in module.params.get('vpc_security_groups')]
if cluster_config['DedicatedMasterEnabled']:
cluster_config['DedicatedMasterType'] = module.params.get('dedicated_master_instance_type')
cluster_config['DedicatedMasterCount'] = module.params.get('dedicated_master_instance_count')
if ebs_options['EBSEnabled']:
ebs_options['VolumeType'] = module.params.get('volume_type')
ebs_options['VolumeSize'] = module.params.get('volume_size')
snapshot_options = {
'AutomatedSnapshotStartHour': module.params.get('snapshot_hour')
}
changed = False
try:
pdoc = json.dumps(module.params.get('access_policies'))
except Exception as e:
module.fail_json(msg='Failed to convert the policy into valid JSON: %s' % str(e))
try:
response = client.describe_elasticsearch_domain(DomainName=module.params.get('name'))
status = response['DomainStatus']
# Modify the provided policy to provide reliable changed detection
policy_dict = module.params.get('access_policies')
for statement in policy_dict['Statement']:
if 'Resource' not in statement:
# The ES APIs will implicitly set this
statement['Resource'] = '%s/*' % status['ARN']
pdoc = json.dumps(policy_dict)
if status['ElasticsearchClusterConfig'] != cluster_config:
changed = True
if status['EBSOptions'] != ebs_options:
changed = True
if 'VPCOptions' in status:
if status['VPCOptions']['SubnetIds'] != vpc_options['SubnetIds']:
changed = True
if status['VPCOptions']['SecurityGroupIds'] != vpc_options['SecurityGroupIds']:
changed = True
if status['SnapshotOptions'] != snapshot_options:
changed = True
current_policy_dict = json.loads(status['AccessPolicies'])
if current_policy_dict != policy_dict:
changed = True
if changed:
keyword_args = {
'DomainName': module.params.get('name'),
'ElasticsearchClusterConfig': cluster_config,
'EBSOptions': ebs_options,
'SnapshotOptions': snapshot_options,
'AccessPolicies': pdoc,
}
if vpc_options['SubnetIds'] or vpc_options['SecurityGroupIds']:
keyword_args['VPCOptions'] = vpc_options
response = client.update_elasticsearch_domain_config(**keyword_args)
except botocore.exceptions.ClientError as e:
changed = True
if e.response['Error']['Code'] == 'ResourceNotFoundException':
keyword_args = {
'DomainName': module.params.get('name'),
'ElasticsearchVersion': module.params.get('elasticsearch_version'),
'EncryptionAtRestOptions': encryption_at_rest_options,
'ElasticsearchClusterConfig': cluster_config,
'EBSOptions': ebs_options,
'SnapshotOptions': snapshot_options,
'AccessPolicies': pdoc,
}
if vpc_options['SubnetIds'] or vpc_options['SecurityGroupIds']:
keyword_args['VPCOptions'] = vpc_options
response = client.create_elasticsearch_domain(**keyword_args)
else:
module.fail_json(msg='Error: %s %s' % (str(e.response['Error']['Code']), str(e.response['Error']['Message'])),)
# Retrieve response from describe, as create/update differ in their response format
response = client.describe_elasticsearch_domain(DomainName=module.params.get('name'))
module.exit_json(changed=changed, response=response)
# import module snippets
from ansible.module_utils.basic import *
from ansible.module_utils.ec2 import *
if __name__ == '__main__':
main()