Security News
38% of CISOs Fear They’re Not Moving Fast Enough on AI
CISOs are racing to adopt AI for cybersecurity, but hurdles in budgets and governance may leave some falling behind in the fight against cyber threats.
@aws-solutions-constructs/aws-lambda-elasticsearch-kibana
Advanced tools
CDK Constructs for AWS Lambda to AWS Elasticsearch with Kibana integration
All classes are under active development and subject to non-backward compatible changes or removal in any future version. These are not subject to the Semantic Versioning model. This means that while you may use them, you may need to update your source code when upgrading to a newer version of this package.
Reference Documentation: | https://docs.aws.amazon.com/solutions/latest/constructs/ |
---|
Language | Package |
---|---|
Python | aws_solutions_constructs.aws_lambda_elasticsearch_kibana |
Typescript | @aws-solutions-constructs/aws-lambda-elasticsearch-kibana |
Java | software.amazon.awsconstructs.services.lambdaelasticsearchkibana |
This AWS Solutions Construct implements an AWS Lambda function and Amazon Elasticsearch Service with the least privileged permissions.
Some cluster configurations (e.g VPC access) require the existence of the AWSServiceRoleForAmazonElasticsearchService
Service-Linked Role in your account.
You will need to create the service-linked role using the AWS CLI once in any account using this construct (it may have already been run to support other stacks):
aws iam create-service-linked-role --aws-service-name es.amazonaws.com
Here is a minimal deployable pattern definition:
Typescript
import { Construct } from 'constructs';
import { Stack, StackProps, Aws } from 'aws-cdk-lib';
import { LambdaToElasticSearchAndKibana } from '@aws-solutions-constructs/aws-lambda-elasticsearch-kibana';
import * as lambda from "aws-cdk-lib/aws-lambda";
const lambdaProps: lambda.FunctionProps = {
code: lambda.Code.fromAsset(`lambda`),
runtime: lambda.Runtime.NODEJS_16_X,
handler: 'index.handler'
};
new LambdaToElasticSearchAndKibana(this, 'sample', {
lambdaFunctionProps: lambdaProps,
domainName: 'testdomain',
// TODO: Ensure the Cognito domain name is globally unique
cognitoDomainName: 'globallyuniquedomain' + Aws.ACCOUNT_ID
});
Python
from aws_solutions_constructs.aws_lambda_elasticsearch_kibana import LambdaToElasticSearchAndKibana
from aws_cdk import (
aws_lambda as _lambda,
Aws,
Stack
)
from constructs import Construct
lambda_props = _lambda.FunctionProps(
code=_lambda.Code.from_asset('lambda'),
runtime=_lambda.Runtime.PYTHON_3_9,
handler='index.handler'
)
LambdaToElasticSearchAndKibana(self, 'sample',
lambda_function_props=lambda_props,
domain_name='testdomain',
# TODO: Ensure the Cognito domain name is globally unique
cognito_domain_name='globallyuniquedomain' + Aws.ACCOUNT_ID
)
Java
import software.constructs.Construct;
import software.amazon.awscdk.Stack;
import software.amazon.awscdk.StackProps;
import software.amazon.awscdk.Aws;
import software.amazon.awscdk.services.lambda.*;
import software.amazon.awscdk.services.lambda.Runtime;
import software.amazon.awsconstructs.services.lambdaelasticsearchkibana.*;
new LambdaToElasticSearchAndKibana(this, "sample",
new LambdaToElasticSearchAndKibanaProps.Builder()
.lambdaFunctionProps(new FunctionProps.Builder()
.runtime(Runtime.NODEJS_16_X)
.code(Code.fromAsset("lambda"))
.handler("index.handler")
.build())
.domainName("testdomain")
// TODO: Ensure the Cognito domain name is globally unique
.cognitoDomainName("globallyuniquedomain" + Aws.ACCOUNT_ID)
.build());
Name | Type | Description |
---|---|---|
existingLambdaObj? | lambda.Function | Existing instance of Lambda Function object, providing both this and lambdaFunctionProps will cause an error. |
lambdaFunctionProps? | lambda.FunctionProps | User provided props to override the default props for the Lambda function. |
esDomainProps? | elasticsearch.CfnDomainProps | Optional user provided props to override the default props for the Elasticsearch Service |
domainName | string | Domain name for the Cognito and the Elasticsearch Service |
cognitoDomainName? | string | Optional Cognito Domain Name, if provided it will be used for Cognito Domain, and domainName will be used for the Elasticsearch Domain |
createCloudWatchAlarms? | boolean | Whether to create recommended CloudWatch alarms |
domainEndpointEnvironmentVariableName? | string | Optional Name for the ElasticSearch domain endpoint environment variable set for the Lambda function. |
existingVpc? | ec2.IVpc | An optional, existing VPC into which this pattern should be deployed. When deployed in a VPC, the Lambda function will use ENIs in the VPC to access network resources. If an existing VPC is provided, the deployVpc property cannot be true . This uses ec2.IVpc to allow clients to supply VPCs that exist outside the stack using the ec2.Vpc.fromLookup() method. |
vpcProps? | ec2.VpcProps | Optional user provided properties to override the default properties for the new VPC. enableDnsHostnames , enableDnsSupport , natGateways and subnetConfiguration are set by the pattern, so any values for those properties supplied here will be overrriden. If deployVpc is not true then this property will be ignored. |
deployVpc? | boolean | Whether to create a new VPC based on vpcProps into which to deploy this pattern. Setting this to true will deploy the minimal, most private VPC to run the pattern:
true then existingVpc cannot be specified. Defaults to false . |
Name | Type | Description |
---|---|---|
lambdaFunction | lambda.Function | Returns an instance of lambda.Function created by the construct |
userPool | cognito.UserPool | Returns an instance of cognito.UserPool created by the construct |
userPoolClient | cognito.UserPoolClient | Returns an instance of cognito.UserPoolClient created by the construct |
identityPool | cognito.CfnIdentityPool | Returns an instance of cognito.CfnIdentityPool created by the construct |
elasticsearchDomain | elasticsearch.CfnDomain | Returns an instance of elasticsearch.CfnDomain created by the construct |
elasticsearchRole | iam.Role | Returns an instance of iam.Role created by the construct for elasticsearch.CfnDomain |
cloudwatchAlarms? | cloudwatch.Alarm[] | Returns a list of cloudwatch.Alarm created by the construct |
vpc? | ec2.IVpc | Returns an interface on the VPC used by the pattern (if any). This may be a VPC created by the pattern or the VPC supplied to the pattern constructor. |
This pattern requires a lambda function that can post data into the Elasticsearch. A sample function is provided here.
Out of the box implementation of the Construct without any overrides will set the following defaults:
© Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
FAQs
CDK Constructs for AWS Lambda to AWS Elasticsearch with Kibana integration
The npm package @aws-solutions-constructs/aws-lambda-elasticsearch-kibana receives a total of 373 weekly downloads. As such, @aws-solutions-constructs/aws-lambda-elasticsearch-kibana popularity was classified as not popular.
We found that @aws-solutions-constructs/aws-lambda-elasticsearch-kibana demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
CISOs are racing to adopt AI for cybersecurity, but hurdles in budgets and governance may leave some falling behind in the fight against cyber threats.
Research
Security News
Socket researchers uncovered a backdoored typosquat of BoltDB in the Go ecosystem, exploiting Go Module Proxy caching to persist undetected for years.
Security News
Company News
Socket is joining TC54 to help develop standards for software supply chain security, contributing to the evolution of SBOMs, CycloneDX, and Package URL specifications.