I created Amazon elasticsearch service and populated data into it using logstash, which has been installed on an EC2 instance. On the Amazon elasticservice console page, there will be a link to access Kibana.
search-cluster_name-XXXXXXXXXXXXXXXXXXX.region_name.es.amazonaws.com/_plugin/kibana/
when I click the link, browser is throwing the following error.
{"Message":"User: anonymous is not authorized to perform: es:ESHttpGet on resource: arn:aws:es:region_name:account_id:domain/cluster_name/_plugin/kibana/"}
I'm sure that this has something related with access policy of ES domain.How should I modify my access policy so that I can access Kibana from a click on the link specified ?
You have to configure an access policy for your elasticsearch cluster. there are two options:
Option 1, using IAM based access is the better option:
kibana_user
with programmatic access. Save the accessKeyId and the secretAccessKey. Also copy the user's ARN.kibana_user
.kibana_user
I seriously recommend against the second option with IP-based access. Even if you have a static IP,
The only case where this makes sense is if you are running your own proxy server with its own authentication method and a static IP.
You may need to have IP-based policy and allow access to your domain from specific IP (Kibana's).
Other option (aside from changing access policy to be completely open) would be signing requests - IIRC this helped a friend of mine with similar message.
http://docs.aws.amazon.com/elasticsearch-service/latest/developerguide/es-managedomains.html#es-managedomains-signing-service-requests
See also "Connecting a Local Kibana Server to Amazon Elasticsearch Service" on the same page.
You can setup an Access Policy with both IAM and IP-address based access. See my answer here. In short:
arn:aws:iam::aws:policy/AmazonESFullAccess
policyHere's an example policy (statement order is important!)
I used for that purpose proxy tool called aws-es-kibana. It signs all your requests sent to aws kibana.
IAM configuration:
I created new IAM user "elasticsearch_user" with programmatic access (and I got accessKeyId and secretAccessKey associated with that account).
Elasticsearch configuration:
I created elasticsearch policy that enables access for the new created IAM user:
Connect to kibana from your local station:
To connect from my local station (windows) to kibana I just need to type in console:
After that you should have proxied access to your kibana under: http://127.0.0.1:9200/_plugin/kibana
In my case, I had an nginx server running which already had access to the elasticsearch service. So all I had to do was to add a proxy on this nginx. No changes in AWS IAM required.
Add this to /etc/nginx/sites-enabled/elasticsearch
and restart nginx. Then you can access kibana at:
The file
/etc/nginx/.elasticsearch_htpasswd
is a standard apache2 htaccess file. You can find more about basic auth for nginx here.NOTE: Basic auth is NOT a recommended way to secure anything. Definitely don't use this in production.