Configuration
Upgrade the Enterprise Search specification ¶
You can upgrade the Enterprise Search version or change settings by editing the YAML specification. ECK will apply the changes by performing a rolling restart of Enterprise Search pods.
Customize Enterprise Search configuration ¶
ECK sets up a default Enterprise Search configuration. To customize it, use the config
element in the specification.
At a minimum, you must set both ent_search.external_url
and kibana.host
to the desired URLs.
apiVersion: enterprisesearch.k8s.elastic.co/v1
kind: EnterpriseSearch
metadata:
name: enterprise-search-quickstart
spec:
version: 8.16.1
count: 1
elasticsearchRef:
name: quickstart
config:
# define the exposed URL at which users will reach Enterprise Search
ent_search.external_url: https://my-custom-domain:3002
# define the exposed URL at which users will reach Kibana
kibana.host: https://kibana.my-custom-domain:5601
# configure app search document size limit
app_search.engine.document_size.limit: 100kb
Reference Kubernetes Secrets for sensitive settings ¶
Sensitive settings are best stored in Kubernetes Secrets, referenced in the Enterprise Search specification.
This example sets up a Secret with SMTP credentials:
apiVersion: enterprisesearch.k8s.elastic.co/v1
kind: EnterpriseSearch
metadata:
name: enterprise-search-quickstart
spec:
version: 8.16.1
count: 1
elasticsearchRef:
name: quickstart
config:
ent_search.external_url: https://my-custom-domain:3002
kibana.host: https://kibana.my-custom-domain:5601
configRef:
secretName: smtp-credentials
---
kind: Secret
apiVersion: v1
metadata:
name: smtp-credentials
stringData:
enterprise-search.yml: |-
email.account.enabled: true
email.account.smtp.auth: plain
email.account.smtp.starttls.enable: false
email.account.smtp.host: 127.0.0.1
email.account.smtp.port: 25
email.account.smtp.user: myuser
email.account.smtp.password: mypassword
email.account.email_defaults.from: my@email.com
ECK merges the content of config
and configRef
into a single internal Secret. In case of duplicate settings, the configRef
secret has precedence.
Customize the Pod template ¶
You can override the Enterprise Search Pod’s specification through the podTemplate
element.
This example overrides the default 4Gi deployment to use 8Gi instead, and makes the deployment highly-available with 3 Pods:
apiVersion: enterprisesearch.k8s.elastic.co/v1
kind: EnterpriseSearch
metadata:
name: enterprise-search-quickstart
spec:
version: 8.16.1
count: 3
elasticsearchRef:
name: quickstart
podTemplate:
spec:
containers:
- name: enterprise-search
resources:
requests:
cpu: 3
memory: 8Gi
limits:
memory: 8Gi
env:
- name: JAVA_OPTS
value: -Xms7500m -Xmx7500m
Customize the Pod template security context ¶
The Enterprise Search Pod’s security context can be customized through the podTemplate
element. However, if readOnlyRootFilesystem
is set to true
without additional configuration, the Pod will fail to start. This happens because Enterprise Search (a Ruby service) requires write access to certain directories within /usr/share/enterprise-search
, which include WAR files and configurations.
To work around this, use an init container to copy the necessary WAR files to a temporary writable location, before starting the Enterprise Search container with mounted writable volumes. Having the temporary directories (/tmp
) in-memory also ensures Ruby has a temporary directory to work with during startup.
This example demonstrates the workaround:
apiVersion: enterprisesearch.k8s.elastic.co/v1
kind: EnterpriseSearch
metadata:
name: testing
spec:
version: 8.16.1
image: docker.elastic.co/enterprise-search/enterprise-search:8.16.1
count: 1
elasticsearchRef:
name: testing
podTemplate:
spec:
containers:
- name: enterprise-search
image: docker.elastic.co/enterprise-search/enterprise-search:8.16.1
securityContext: 1
readOnlyRootFilesystem: true
runAsNonRoot: true
allowPrivilegeEscalation: false
runAsUser: 1000 2
volumeMounts: 3
- name: search-tmp
mountPath: /usr/share/enterprise-search/tmp
- name: tmp
mountPath: /tmp
- name: filebeat-data
mountPath: /usr/share/enterprise-search/filebeat/data
- name: war-files
mountPath: /usr/share/enterprise-search/lib/war
resources:
requests:
cpu: 3
memory: 8Gi
limits:
memory: 8Gi
env: 4
- name: JAVA_OPTS
value: -Xms7500m -Xmx7500m
initContainers: 5
- name: init-war-dir
image: docker.elastic.co/enterprise-search/enterprise-search:8.16.1
command: ['sh', '-c', 'cp --verbose -r /usr/share/enterprise-search/lib/war/. /usr/share/enterprise-search-war-tmp']
volumeMounts:
- name: war-files
mountPath: /usr/share/enterprise-search-war-tmp
volumes: 6
- name: war-files
emptyDir: {}
- name: filebeat-data
emptyDir: {}
- name: search-tmp
emptyDir:
medium: Memory
- name: tmp
emptyDir:
medium: Memory
- Adds a security context to define permissions and access control settings for the
enterprise-search
container. - Sets the user to random UID
1000
to run the container as a non-root user. - Adds volume mounts for
search-tmp
,tmp
,filebeat-data
, andwar-files
to theenterprise-search
container. - Adds the variable
JAVA_OPTS
to pass options and configurations to the Java Virtual Machine (JVM). - Adds an init container to copy WAR files to a temporary location.
- Adds volumes for WAR files and adds volumes with in-memory storage for
search-tmp
andtmp
.
Expose Enterprise Search ¶
By default ECK manages self-signed TLS certificates to secure the connection to Enterprise Search. It also restricts the Kubernetes service to ClusterIP
type that cannot be accessed publicly.
Check how to access Elastic Stack services to customize TLS settings and expose the service.
Note
When exposed outside the scope of localhost
, make sure to set both ent_search.external_url
, and kibana.host
accordingly in the Enterprise Search configuration.
Customize the connection to an Elasticsearch cluster ¶
The elasticsearchRef
element allows ECK to automatically configure Enterprise Search to establish a secured connection to a managed Elasticsearch cluster. By default it targets all nodes in your cluster. If you want to direct traffic to specific nodes of your Elasticsearch cluster, refer to Traffic Splitting for more information and examples.
Connect to an external Elasticsearch cluster ¶
Automatically ¶
Refer to Connect to external Elastic resources to automatically configure Enterprise Search using connection settings from a Secret
.
Manually ¶
If you do not want to use the elasticsearchRef
mechanism you can manually configure Enterprise Search to access any available Elasticsearch cluster:
apiVersion: enterprisesearch.k8s.elastic.co/v1
kind: EnterpriseSearch
metadata:
name: enterprise-search-quickstart
spec:
version: 8.16.1
count: 1
configRef:
secretName: elasticsearch-credentials
---
kind: Secret
apiVersion: v1
metadata:
name: elasticsearch-credentials
stringData:
enterprise-search.yml: |-
elasticsearch.host: [https://elasticsearch-url:9200](https://elasticsearch-url:9200)
elasticsearch.username: elastic
elasticsearch.password: my-password
elasticsearch.ssl.enabled: true