Docker image
You can pull the Open Distro for Elasticsearch Docker image just like any other image:
docker pull amazon/opendistro-for-elasticsearch:0.9.0
docker pull amazon/opendistro-for-elasticsearch-kibana:0.9.0
Open Distro for Elasticsearch images use centos:7
as the base image.
Table of contents
- Run the image
- Start a cluster
- Configure Elasticsearch
- Bash access to containers
- Important settings
- Run with custom plugins
Run the image
To run the image for local development:
docker run -p 9200:9200 -p 9600:9600 -e "discovery.type=single-node" amazon/opendistro-for-elasticsearch:0.9.0
Then send requests to the server to verify that Elasticsearch is up and running:
curl -XGET https://localhost:9200 -u admin:admin --insecure
curl -XGET https://localhost:9200/_cat/nodes?v -u admin:admin --insecure
curl -XGET https://localhost:9200/_cat/plugins?v -u admin:admin --insecure
To find the container ID:
docker ps
Then you can stop the container using:
docker stop <container-id>
Start a cluster
To deploy the image across multiple nodes for a production workload, create a docker-compose.yml
file appropriate for your environment and run:
docker-compose up
To stop the cluster, run:
docker-compose down
To stop the cluster and delete all data volumes, run:
docker-compose down -v
Sample Docker Compose file
This sample file starts two data nodes and Kibana. If you’re running Docker locally, we recommend allowing Docker to use at least 4 GB of RAM in Preferences > Advanced.
version: '3'
services:
odfe-node1:
image: amazon/opendistro-for-elasticsearch:0.9.0
container_name: odfe-node1
environment:
- cluster.name=odfe-cluster
- bootstrap.memory_lock=true # along with the memlock settings below, disables swapping
- "ES_JAVA_OPTS=-Xms512m -Xmx512m" # minimum and maximum Java heap size, recommend setting both to 50% of system RAM
ulimits:
memlock:
soft: -1
hard: -1
volumes:
- odfe-data1:/usr/share/elasticsearch/data
ports:
- 9200:9200
- 9600:9600 # required for Performance Analyzer
networks:
- odfe-net
odfe-node2:
image: amazon/opendistro-for-elasticsearch:0.9.0
container_name: odfe-node2
environment:
- cluster.name=odfe-cluster
- bootstrap.memory_lock=true
- "ES_JAVA_OPTS=-Xms512m -Xmx512m"
- discovery.zen.ping.unicast.hosts=odfe-node1
ulimits:
memlock:
soft: -1
hard: -1
volumes:
- odfe-data2:/usr/share/elasticsearch/data
networks:
- odfe-net
kibana:
image: amazon/opendistro-for-elasticsearch-kibana:0.9.0
container_name: odfe-kibana
ports:
- 5601:5601
expose:
- "5601"
environment:
ELASTICSEARCH_URL: https://odfe-node1:9200
ELASTICSEARCH_HOSTS: https://odfe-node1:9200
networks:
- odfe-net
volumes:
odfe-data1:
odfe-data2:
networks:
odfe-net:
If you override kibana.yml
settings using environment variables, as seen above, use all uppercase letters and periods in place of underscores (e.g. for elasticsearch.url
, specify ELASTICSEARCH_URL
).
Configure Elasticsearch
You can pass a custom elasticsearch.yml
file to the Docker container using the -v
flag for docker run
:
docker run \
-p 9200:9200 -p 9600:9600 \
-e "discovery.type=single-node" \
-v /<full-path-to>/custom-elasticsearch.yml:/usr/share/elasticsearch/config/elasticsearch.yml \
amazon/opendistro-for-elasticsearch:0.9.0
You can perform the same operation in docker-compose.yml
using a relative path:
services:
odfe-node1:
volumes:
- odfe-data1:/usr/share/elasticsearch/data
- ./custom-elasticsearch.yml:/usr/share/elasticsearch/config/elasticsearch.yml
odfe-node2:
volumes:
- odfe-data2:/usr/share/elasticsearch/data
- ./custom-elasticsearch.yml:/usr/share/elasticsearch/config/elasticsearch.yml
kibana:
volumes:
- ./custom-kibana.yml:/usr/share/kibana/config/kibana.yml
You can use this same method to pass your own certificates for use with the Security plugin.
Bash access to containers
To create an interactive Bash session in a container, run docker ps
to find the container ID. Then run:
docker exec -it <container-id> /bin/bash
Important settings
For production workloads, make sure the Linux setting vm.max_map_count
is set to at least 262144. On the Open Distro for Elasticsearch Docker image, this setting is the default. To verify, start a Bash session in the container and run:
cat /proc/sys/vm/max_map_count
To increase this value, you have to modify the Docker image. On the RPM install, you can add this setting to the host machine’s /etc/sysctl.conf
file by adding the following line:
vm.max_map_count=262144
Then run sudo sysctl -p
to reload.
The docker-compose.yml
file above also contains several key settings: bootstrap.memory_lock=true
, ES_JAVA_OPTS=-Xms512m -Xmx512m
, and 9600:9600
. Respectively, these settings disable memory swapping (along with memlock
), set the size of the Java heap (we recommend half of system RAM), and allow you to access Performance Analyzer on port 9600.
Run with custom plugins
To run the image with a custom plugin, first create a Dockerfile
:
FROM amazon/opendistro-for-elasticsearch:0.9.0
RUN /usr/share/elasticsearch/bin/elasticsearch-plugin install --batch <plugin-name-or-url>
Then run the following commands:
docker build --tag=odfe-custom-plugin .
docker run -p 9200:9200 -p 9600:9600 -v /usr/share/elasticsearch/data odfe-custom-plugin
You can also use a Dockerfile
to pass your own certificates for use with the Security plugin, similar to the -v
argument in Configure Elasticsearch:
FROM amazon/opendistro-for-elasticsearch:0.9.0
COPY --chown=elasticsearch:elasticsearch elasticsearch.yml /usr/share/elasticsearch/config/
COPY --chown=elasticsearch:elasticsearch my-key-file.pem /usr/share/elasticsearch/config/
COPY --chown=elasticsearch:elasticsearch my-certificate-chain.pem /usr/share/elasticsearch/config/
COPY --chown=elasticsearch:elasticsearch my-root-cas.pem /usr/share/elasticsearch/config/