Quickstart
editQuickstart
edit-
Apply the following specification to deploy Enterprise Search. ECK automatically configures the secured connection to an Elasticsearch cluster named
quickstart
, created in Elasticsearch quickstart.cat <<EOF | kubectl apply -f - apiVersion: enterprisesearch.k8s.elastic.co/v1beta1 kind: EnterpriseSearch metadata: name: enterprise-search-quickstart spec: version: 8.16.1 count: 1 elasticsearchRef: name: quickstart EOF
Workplace Search in versions 7.7 up to and including 7.8 required an Enterprise license on ECK. You can start with a 30-day trial license.
-
Monitor the Enterprise Search deployment.
Retrieve details about the Enterprise Search deployment:
kubectl get enterprisesearch
NAME HEALTH NODES VERSION AGE enterprise-search-quickstart green 1 8.16.1 8m
List all the Pods belonging to a given deployment:
kubectl get pods --selector='enterprisesearch.k8s.elastic.co/name=enterprise-search-quickstart'
NAME READY STATUS RESTARTS AGE enterprise-search-quickstart-ent-58b84db85-dl7c6 1/1 Running 0 2m50s
-
Access logs for that Pod:
kubectl logs -f enterprise-search-quickstart-ent-58b84db85-dl7c6
-
Access Enterprise Search
A ClusterIP Service is automatically created for the deployment, and can be used to access the Enterprise Search API from within the Kubernetes cluster:
kubectl get service enterprise-search-quickstart-ent-http
Use
kubectl port-forward
to access Enterprise Search from your local workstation:kubectl port-forward service/enterprise-search-quickstart-ent-http 3002
Open
https://localhost:3002
in your browser.Your browser will show a warning because the self-signed certificate configured by default is not verified by a known certificate authority and not trusted by your browser. Acknowledge the warning for the purposes of this quickstart but it is highly recommended that you configure valid certificates for any production deployments.
Login as the
elastic
user created with the Elasticsearch cluster. Its password can be obtained with:kubectl get secret quickstart-es-elastic-user -o=jsonpath='{.data.elastic}' | base64 --decode; echo