-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(elasticsearch): L2 for ElasticsearchDomain #8369
Conversation
Hi @stephanh - Thanks for submitting this! It looks good, definitely a good starting point. Before you continue though, i'd like to ask two things:
Looking forward to it :) |
I have updated the readme to provide more usage information (I haven't implemented the IAM permission management part yet). Advantages this will provide over CfnDomain:
I think having the fundamentals in place will also make it easier for others to incrementally add improvements later. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
First round. I think we are on the right track but there are still some API changes i'm thinking about towards the next round.
packages/@aws-cdk/aws-elasticsearch/lib/log-group-resource-policy.ts
Outdated
Show resolved
Hide resolved
575ef34
to
593c588
Compare
I have added some grant helper methods. I think the remaining 2 items are:
|
@iliapolo thanks to @adamelmore major contribution I think we now have everything and this PR is ready. |
@stephanh Awesome, love the cooperation :) I'll take a look this week. |
@iliapolo will you have a chance to review this week? |
Hi @adamelmore - Its definitely on my docket for this week, Appreciate the patience. |
With AdvancedSecurityOptions being in CFN now it would be great to add them here too. What do you think? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@stephanh Very cool, lots of potential here.
I did have quite a few comments on the API, specifically around the decision to make things required and not providing default values. Let me know if i'm missing some consideration you made.
Co-authored-by: Eli Polonsky <Eli.polonsky@gmail.com>
469aa28
to
841fa2b
Compare
Pull request has been modified.
* Use custom resource to updated domain access policy after the domain creation * Updated readme * Added integration test for basic unsigned auth
841fa2b
to
7505d7f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@stephanh Took the liberty to apply a couple of minor changes and approved it.
Thanks so much for all the work!
packages/@aws-cdk/aws-elasticsearch/test/integ.elasticsearch.unsignedbasicauth.expected.json
Show resolved
Hide resolved
Pull request has been modified.
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
I was using cdk to stand up an Elasticsearch domain and thought I might as well generalise the effort.
Can I please get some feedback on the current implementation and if it is something you are happy to accept?
This implementation is still missing tests, more documentation and features like importing the resource. I will add them once I know I'm on the right track.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license