OpenSearch Command Line Interface (opensearch-cli) is an open source tool that lets you manage your OpenSearch cluster from the command line and automate tasks. In addition to standard OpenSearch operations, you can configure, manage, and use the plugins, such as Alerting, Anomaly Detection, and SQL
opensearch-cli is best suited for situations in which you want to quickly combine a few commands, possibly adding them to a script for easy access or automation. This example moves a detector "ecommerce-count-qualtity" from staging to prod cluster, provided both profiles are available in config file.
opensearch-cli ad get ecommerce-count-qualtity --profile stg > ecommerce-count-qualtity.json
opensearch-cli ad create ecommerce-count-qualtity.json --profile prod
opensearch-cli ad start ecommerce-count-qualtity.json --profile prod
opensearch-cli ad stop ecommerce-count-qualtity --profile stg
opensearch-cli ad delete ecommerce-count-qualtity --profile stg
You can download the binaries directly from the downloads page or from the releases section.
OpenSearch CLI | OpenSearch |
---|---|
1.0.0 | 1.0.0 |
1.1.0 | 1.x |
1.1.0 | 2.0.0 |
opensearch-cli shares minimum requirements as Go and docker to run integration tests.
- Install Go > = 1.16
- Clone the repository:
cd $GOPATH/src git clone git@github.com:opensearch-project/opensearch-cli.git
- Run build from source directory to generate binary:
cd opensearch-cli go build .
- Make binary executable:
chmod +x ./opensearch-cli
Go has a simple tool for running tests. To run every unit test, use this command:
go test ./...
However, often when writing tests, you may want to run your new test as below
cd folder-path/to/test;
go test -v -run TestName;
In order to test opensearch-cli end-to-end, we need a running OpenSearch cluster. We can use Docker to accomplish this. The Docker Compose file supports the ability to run integration tests for the project in local environments respectively. If you have not installed docker-compose, you can install it from this link
Integration tests are often slower, so you may want to only run them after the unit test. In order to differentiate unit tests from integration tests, Go has a built-in mechanism for allowing you to logically separate your tests
with build tags. The build tag needs to be placed as close to the top of the file as possible, and must have a blank line beneath it.
We recommend you to create all integration tests inside this folder with build tag 'integration'.
- Run docker compose to start containers, by default it will launch latest OpenSearch cluster.
docker-compose up -d;
- Run all integration tests with build tag 'integration'
go test -tags=integration ./it/...
$ opensearch-cli --help
opensearch-cli is a unified command line interface for managing OpenSearch clusters
Usage:
opensearch-cli [command]
Available Commands:
ad Manage the Anomaly Detection plugin
completion Generate completion script for your shell
curl Manage OpenSearch core features
help Help about any command
knn Manage the k-NN plugin
profile Manage a collection of settings and credentials that you can apply to an opensearch-cli command
Flags:
-c, --config string Configuration file for opensearch-cli, default is /Users/balasvij/.opensearch-cli/config.yaml
-h, --help Help for opensearch-cli
-p, --profile string Use a specific profile from your configuration file
-v, --version Version for opensearch-cli
A profile is a collection of credentials that will be applied to the opensearch-cli command. When a user specifies a profile, the settings and credentials of that profile will be used to execute the command. Users can create one profile with the name "default", and is used when no profile is explicitly referenced.
- Create default profile where the cluster's security uses HTTP basic authentication.
$ opensearch-cli profile create --auth-type "basic" \
--name "default" \
--endpoint "https://localhost:9200"
Username: admin
Password: *******
Profile created successfully.
- Create default profile where the cluster's security uses AWS IAM ARNs as users. AWS credentials can be provided either by specifying aws profile name or using environment variables. You can find details about creating aws profiles here.
$ opensearch-cli profile create --auth-type "aws-iam" \
--name "default" \
--endpoint "https://localhost:9200"
AWS profile name (leave blank if you want to provide credentials using environment variables): readonly
AWS service name where your cluster is deployed (for Amazon Elasticsearch Service, use 'es'. For EC2, use 'ec2'): es
Profile created successfully.
- Create default profile where the cluster's security plugin is disabled.
$ opensearch-cli profile create --auth-type "disabled" \
--name "default" \
--endpoint "https://cloud-service-endpoint:9200"
Profile created successfully.
$ opensearch-cli profile list -l
Name UserName Endpoint-url
---- -------- ------------
default admin https://localhost:9200
prod admin https://node1:9200
You can specify profiles in two ways.
-
The first way is to add the --profile option:
$ opensearch-cli ad stop-detector invalid-logins --profile prod
This example stops the invalid-logins detector using the credentials and settings in the prod profile.
-
The second way is to use an environment variable.
On Linux or macOS :
$ export OPENSEARCH_PROFILE=prod
Windows
C:\> setx OPENSEARCH_PROFILE prod
These variables last for the duration of your shell session, but you can add them to .zshenv or .bash_profile for a more permanent option.
See CONTRIBUTING for more information.
This project is licensed under the Apache-2.0 License.
Copyright OpenSearch Contributors. See NOTICE for details.