docker.asciidoc 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829
  1. [[docker]]
  2. === Install {es} with Docker
  3. {es} is also available as Docker images. A list of all published Docker
  4. images and tags is available at
  5. https://www.docker.elastic.co[www.docker.elastic.co]. The source files are
  6. in
  7. https://github.com/elastic/elasticsearch/blob/{branch}/distribution/docker[Github].
  8. include::license.asciidoc[]
  9. Starting in {es} 8.0, security is enabled by default. With security enabled,
  10. {stack} {security-features} require TLS encryption for the transport networking
  11. layer, or your cluster will fail to start.
  12. ==== Install Docker Desktop or Docker Engine
  13. Install the appropriate https://docs.docker.com/get-docker/[Docker application]
  14. for your operating system.
  15. NOTE: Make sure that Docker is allotted at least 4GiB of memory. In Docker
  16. Desktop, you configure resource usage on the Advanced tab in Preference (macOS)
  17. or Settings (Windows).
  18. ==== Pull the {es} Docker image
  19. Obtaining {es} for Docker is as simple as issuing a `docker pull` command
  20. against the Elastic Docker registry.
  21. ifeval::["{release-state}"=="unreleased"]
  22. WARNING: Version {version} of {es} has not yet been released, so no
  23. Docker image is currently available for this version.
  24. endif::[]
  25. ifeval::["{release-state}"!="unreleased"]
  26. [source,sh,subs="attributes"]
  27. ----
  28. docker pull {docker-repo}:{version}
  29. ----
  30. endif::[]
  31. Now that you have the {es} Docker image, you can start a
  32. <<docker-cli-run-dev-mode,single-node>> or <<docker-compose-file,multi-node>>
  33. cluster.
  34. [[docker-cli-run-dev-mode]]
  35. ==== Start a single-node cluster with Docker
  36. ifeval::["{release-state}"=="unreleased"]
  37. WARNING: Version {version} of the {es} Docker image has not yet been released.
  38. endif::[]
  39. If you're starting a single-node {es} cluster in a Docker container, security
  40. will be automatically enabled and configured for you. When you start {es} for
  41. the first time, the following security configuration occurs automatically:
  42. * <<elasticsearch-security-certificates,Certificates and keys>> are generated
  43. for the transport and HTTP layers.
  44. * The Transport Layer Security (TLS) configuration settings are written to
  45. `elasticsearch.yml`.
  46. * A password is generated for the `elastic` user.
  47. * An enrollment token is generated for {kib}.
  48. You can then {kibana-ref}/docker.html[start {kib}] and enter the enrollment
  49. token, which is valid for 30 minutes. This token automatically applies the
  50. security settings from your {es} cluster, authenticates to {es} with the
  51. `kibana_system` user, and writes the security configuration to `kibana.yml`.
  52. The following command starts a single-node {es} cluster for development or
  53. testing.
  54. . Start {es} in Docker. A password is generated for the `elastic` user and
  55. output to the terminal, plus an enrollment token for enrolling {kib}.
  56. +
  57. --
  58. ifeval::["{release-state}"!="unreleased"]
  59. [source,sh,subs="attributes"]
  60. ----
  61. docker run --name es01 --net elastic -p 9200:9200 -p 9300:9300 -it {docker-image}
  62. ----
  63. endif::[]
  64. --
  65. +
  66. TIP: You might need to scroll back a bit in the terminal to view the password
  67. and enrollment token.
  68. . Copy the generated password and enrollment token and save them in a secure
  69. location. These values are shown only when you start {es} for the first time.
  70. +
  71. [NOTE]
  72. ====
  73. If you need to reset the password for the `elastic` user or other
  74. built-in users, run the <<reset-password,`elasticsearch-reset-password`>> tool.
  75. This tool is available in the {es} `/bin` directory of the Docker container.
  76. For example:
  77. [source,sh]
  78. ----
  79. docker exec -it es01 /usr/share/elasticsearch/bin/elasticsearch-reset-password
  80. ----
  81. ====
  82. . Copy the `http_ca.crt` security certificate from your Docker container to
  83. your local machine.
  84. +
  85. [source,sh]
  86. ----
  87. docker cp es01:/usr/share/elasticsearch/config/tls_auto_config_*/http_ca.crt .
  88. ----
  89. . Open a new terminal and verify that you can connect to your {es} cluster by
  90. making an authenticated call, using the `http_ca.crt` file that you copied from
  91. your Docker container. Enter the password for the `elastic` user when prompted.
  92. +
  93. [source,sh]
  94. ----
  95. curl --cacert http_ca.crt -u elastic https://localhost:9200
  96. ----
  97. // NOTCONSOLE
  98. ==== Enroll additional nodes
  99. When you start {es} for the first time, the installation process configures a single-node cluster by default. This process also generates an enrollment token
  100. and prints it to your terminal. If you want a node to join an existing cluster,
  101. start the new node with the generated enrollment token.
  102. --
  103. .Generating enrollment tokens
  104. ****
  105. The enrollment token is valid for 30 minutes. If you need to generate a
  106. new enrollment token, run the
  107. <<create-enrollment-token,`elasticsearch-create-enrollment-token`>> tool on your
  108. existing node. This tool is available in the {es} `bin` directory of the Docker
  109. container.
  110. For example, run the following command on the existing `es01` node to
  111. generate an enrollment token for new {es} nodes:
  112. [source,sh]
  113. ----
  114. docker exec -it es01 /usr/share/elasticsearch/bin/elasticsearch-create-enrollment-token -s node
  115. ----
  116. ****
  117. --
  118. . In the terminal where you started your first node, copy the generated
  119. enrollment token for adding new {es} nodes.
  120. . On your new node, start {es} and include the generated enrollment token.
  121. +
  122. [source,sh,subs="attributes"]
  123. ----
  124. docker run -e ENROLLMENT_TOKEN="<token>" --name es02 --net elastic -it docker.elastic.co/elasticsearch/elasticsearch:{docker-image}
  125. ----
  126. +
  127. {es} is now configured to join the existing cluster.
  128. If you experience issues where the container where your first node is running
  129. exits when your second node starts, explicitly set values for the JVM heap size.
  130. To <<set-jvm-heap-size,manually configure the heap size>>, include the
  131. `ES_JAVA_OPTS` variable and set values for `-Xms` and `-Xmx` when starting each
  132. node. For example, the following command starts node `es02` and sets the
  133. minimum and maximum JVM heap size to 1 GB:
  134. [source,sh,subs="attributes"]
  135. ----
  136. docker run -e ES_JAVA_OPTS="-Xms1g -Xmx1g" -e ENROLLMENT_TOKEN="<token>" --name es02 -p 9201:9200 --net elastic -it docker.elastic.co/elasticsearch/elasticsearch:{docker-image}
  137. ----
  138. ===== Next steps
  139. You now have a test {es} environment set up. Before you start
  140. serious development or go into production with {es}, review the
  141. <<docker-prod-prerequisites,requirements and recommendations>> to apply when running {es} in Docker in production.
  142. [[elasticsearch-security-certificates]]
  143. ===== Security certificates and keys
  144. When you start {es} for the first time, the following certificates and keys are
  145. generated in the
  146. `/usr/share/elasticsearch/config/tls_auto_config_initial_node_<timestamp>`
  147. directory in the Docker container, and allow you to connect a {kib} instance
  148. to your secured {es} cluster and encrypt internode communication. The files are
  149. listed here for reference.
  150. `http_ca.crt`::
  151. The CA certificate that is used to sign the certificates for the HTTP layer of
  152. this {es} cluster.
  153. `http_keystore_local_node.p12`::
  154. Keystore that contains the key and certificate for the HTTP layer for this node.
  155. `transport_keystore_all_nodes.p12`::
  156. Keystore that contains the key and certificate for the transport layer for all
  157. the nodes in your cluster.
  158. [[docker-compose-file]]
  159. ==== Start a multi-node cluster with Docker Compose
  160. When defining multiple nodes in a `docker-compose.yml` file, you'll need to
  161. explicitly enable and configure security so that {es} doesn't try to generate a
  162. password for the `elastic` user on every node.
  163. ===== Prepare the environment
  164. The following example uses Docker Compose to start a three-node {es} cluster.
  165. Create each of the following files inside of a new directory. Copy and paste the
  166. contents of each example into the appropriate file as described in the
  167. following sections:
  168. * <<docker-instances-yml,`instances.yml`>>
  169. * <<docker-env,`.env`>>
  170. * <<docker-create-certs,`create-certs.yml`>>
  171. * <<docker-docker-compose,`docker-compose.yml`>>
  172. [[docker-instances-yml]]
  173. [discrete]
  174. ===== `instances.yml`
  175. When you run the example, {es} uses this file to create a three-node cluster.
  176. The nodes are named `es01`, `es02`,and `es03`.
  177. ifeval::["{release-state}"=="unreleased"]
  178. --
  179. WARNING: Version {version} of {es} has not yet been released, so a
  180. `docker-compose.yml` is not available for this version.
  181. endif::[]
  182. ifeval::["{release-state}"!="unreleased"]
  183. [source,yaml,subs="attributes"]
  184. ----
  185. include::instances.yml[]
  186. ----
  187. endif::[]
  188. --
  189. [[docker-env]]
  190. [discrete]
  191. ===== `.env`
  192. The `.env` file sets environment variables that are used when you run the
  193. example. Ensure that you specify a strong password for the `elastic` user with
  194. the `ELASTIC_PASSWORD` variable. This variable is referenced by the
  195. `docker-compose.yml` file.
  196. ifeval::["{release-state}"=="unreleased"]
  197. --
  198. WARNING: Version {version} of {es} has not yet been released, so a
  199. `docker-compose.yml` is not available for this version.
  200. endif::[]
  201. ifeval::["{release-state}"!="unreleased"]
  202. [source,yaml,subs="attributes"]
  203. ----
  204. include::.env[]
  205. ----
  206. endif::[]
  207. --
  208. `COMPOSE_PROJECT_NAME`:: Adds an `es_` prefix for all volumes and networks
  209. created by `docker-compose`.
  210. `CERTS_DIR`:: Specifies the path inside the Docker image where {es} expects the
  211. security certificates.
  212. `ELASTIC_PASSWORD`:: Sets the initial password for the `elastic` user.
  213. [discrete]
  214. [[docker-create-certs]]
  215. ===== `create-certs.yml`
  216. The `create-certs.yml` file includes a script that generates node certificates
  217. and a certificate authority (CA) certificate and key where {es} expects them.
  218. These certificates and key are placed in a Docker volume named `es_certs`.
  219. ifeval::["{release-state}"=="unreleased"]
  220. --
  221. WARNING: Version {version} of {es} has not yet been released, so a
  222. `docker-compose.yml` is not available for this version.
  223. endif::[]
  224. ifeval::["{release-state}"!="unreleased"]
  225. [source,yaml,subs="attributes"]
  226. ----
  227. include::create-certs.yml[]
  228. ----
  229. endif::[]
  230. --
  231. [[docker-docker-compose]]
  232. [discrete]
  233. ===== `docker-compose.yml`
  234. The `docker-compose.yml` file defines configuration settings for each of your
  235. {es} nodes.
  236. NOTE: This sample `docker-compose.yml` file uses the `ES_JAVA_OPTS`
  237. environment variable to manually set the heap size to 512MB. We do not recommend
  238. using `ES_JAVA_OPTS` in production.
  239. See <<docker-set-heap-size,manually set the heap size>>.
  240. This configuration exposes port `9200` on all network interfaces. Given how
  241. Docker manipulates `iptables` on Linux, this means that your {es} cluster is
  242. publicly accessible, potentially ignoring any firewall settings. If you don't
  243. want to expose port `9200` and instead use a reverse proxy, replace `9200:9200`
  244. with `127.0.0.1:9200:9200` in the `docker-compose.yml` file. {es} will then only
  245. be accessible from the host machine itself.
  246. ifeval::["{release-state}"=="unreleased"]
  247. --
  248. WARNING: Version {version} of {es} has not yet been released, so a
  249. `docker-compose.yml` is not available for this version.
  250. endif::[]
  251. ifeval::["{release-state}"!="unreleased"]
  252. [source,yaml,subs="attributes"]
  253. ----
  254. include::docker-compose.yml[]
  255. ----
  256. endif::[]
  257. --
  258. ===== Start your cluster with security enabled and configured
  259. This sample Docker Compose file starts a three-node {es} cluster.
  260. The https://docs.docker.com/storage/volumes[Docker named volumes]
  261. `data01`, `data02`, and `data03` store the node data directories so that the
  262. data persists across restarts. If they don't already exist, running
  263. `docker-compose` creates these volumes.
  264. [[docker-generate-certificates]]
  265. . Generate the certificates. You only need to run this command one time:
  266. +
  267. ["source","sh"]
  268. ----
  269. docker-compose -f create-certs.yml run --rm create_certs
  270. ----
  271. . Start your {es} nodes with TLS configured on the transport layer:
  272. +
  273. ["source","sh"]
  274. ----
  275. docker-compose up -d
  276. ----
  277. +
  278. Node `es01` listens on `localhost:9200` and `es02` and `es03` talk to `es01`
  279. over a Docker network.
  280. . Access the {es} API over TLS using the bootstrapped password for the `elastic`
  281. user that you specified in the `.env` file:
  282. +
  283. ["source","sh",subs="attributes"]
  284. ----
  285. docker run --rm -v es_certs:/certs --network=es_default {docker-image} curl --cacert /certs/ca/ca.crt -u elastic:<password> https://es01:9200
  286. ----
  287. // NOTCONSOLE
  288. +
  289. --
  290. `es_certs`:: The name of the volume that the script in `create-certs.yml`
  291. creates to hold your certificates.
  292. `<password>`:: The password for the `elastic` user, defined by the
  293. `ELASTIC_PASSWORD` variable in the `.env` file.
  294. --
  295. . Submit a `_cat/nodes` request to check that the nodes are up and running:
  296. +
  297. [source,sh]
  298. ----
  299. curl -X GET "https://localhost:9200/_cat/nodes?v=true&pretty"
  300. ----
  301. // NOTCONSOLE
  302. Log messages go to the console and are handled by the configured Docker logging
  303. driver. By default, you can access logs with `docker logs`. If you prefer that
  304. the {es} container write logs to disk, set the `ES_LOG_STYLE` environment
  305. variable to `file`. This causes {es} to use the same logging configuration as
  306. other {es} distribution formats.
  307. If you need to generate a new password for the `elastic` user or any of the
  308. built-in users, use the `elasticsearch-reset-password` tool:
  309. WARNING: Windows users not running PowerShell must remove all backslashes (`\`)
  310. and join lines in the following command.
  311. ["source","sh"]
  312. ----
  313. docker exec es01 /bin/bash -c "bin/elasticsearch-reset-password \
  314. auto --batch \
  315. --url https://localhost:9200"
  316. ----
  317. ===== Stop the cluster
  318. To stop the cluster, run `docker-compose down`. The data in the Docker volumes
  319. is preserved and loaded when you restart the cluster with `docker-compose up`.
  320. --
  321. ["source","sh"]
  322. ----
  323. docker-compose down
  324. ----
  325. --
  326. To **delete the data volumes** when you stop the cluster, specify the `-v`
  327. option:
  328. ["source","sh"]
  329. ----
  330. docker-compose down -v
  331. ----
  332. WARNING: Deleting data volumes will remove the generated security certificates
  333. for your nodes. You will need to run `docker-compose` and
  334. <<docker-generate-certificates,regenerate the security certificates>> before
  335. starting your cluster.
  336. ===== Next steps
  337. You now have a test {es} environment set up. Before you start
  338. serious development or go into production with {es}, review the
  339. <<docker-prod-prerequisites,requirements and recommendations>> to apply when running {es} in Docker in production.
  340. [[docker-prod-prerequisites]]
  341. ==== Using the Docker images in production
  342. The following requirements and recommendations apply when running {es} in Docker in production.
  343. ===== Set `vm.max_map_count` to at least `262144`
  344. The `vm.max_map_count` kernel setting must be set to at least `262144` for production use.
  345. How you set `vm.max_map_count` depends on your platform:
  346. * Linux
  347. +
  348. --
  349. The `vm.max_map_count` setting should be set permanently in `/etc/sysctl.conf`:
  350. [source,sh]
  351. --------------------------------------------
  352. grep vm.max_map_count /etc/sysctl.conf
  353. vm.max_map_count=262144
  354. --------------------------------------------
  355. To apply the setting on a live system, run:
  356. [source,sh]
  357. --------------------------------------------
  358. sysctl -w vm.max_map_count=262144
  359. --------------------------------------------
  360. --
  361. * macOS with https://docs.docker.com/docker-for-mac[Docker for Mac]
  362. +
  363. --
  364. The `vm.max_map_count` setting must be set within the xhyve virtual machine:
  365. . From the command line, run:
  366. +
  367. [source,sh]
  368. --------------------------------------------
  369. screen ~/Library/Containers/com.docker.docker/Data/vms/0/tty
  370. --------------------------------------------
  371. . Press enter and use`sysctl` to configure `vm.max_map_count`:
  372. +
  373. [source,sh]
  374. --------------------------------------------
  375. sysctl -w vm.max_map_count=262144
  376. --------------------------------------------
  377. . To exit the `screen` session, type `Ctrl a d`.
  378. --
  379. * Windows and macOS with https://www.docker.com/products/docker-desktop[Docker Desktop]
  380. +
  381. --
  382. The `vm.max_map_count` setting must be set via docker-machine:
  383. [source,sh]
  384. --------------------------------------------
  385. docker-machine ssh
  386. sudo sysctl -w vm.max_map_count=262144
  387. --------------------------------------------
  388. --
  389. * Windows with https://docs.docker.com/docker-for-windows/wsl[Docker Desktop WSL 2 backend]
  390. +
  391. --
  392. The `vm.max_map_count` setting must be set in the docker-desktop container:
  393. [source,sh]
  394. --------------------------------------------
  395. wsl -d docker-desktop
  396. sysctl -w vm.max_map_count=262144
  397. --------------------------------------------
  398. --
  399. ===== Configuration files must be readable by the `elasticsearch` user
  400. By default, {es} runs inside the container as user `elasticsearch` using
  401. uid:gid `1000:0`.
  402. IMPORTANT: One exception is https://docs.openshift.com/container-platform/3.6/creating_images/guidelines.html#openshift-specific-guidelines[Openshift],
  403. which runs containers using an arbitrarily assigned user ID.
  404. Openshift presents persistent volumes with the gid set to `0`, which works without any adjustments.
  405. If you are bind-mounting a local directory or file, it must be readable by the `elasticsearch` user.
  406. In addition, this user must have write access to the <<path-settings,config, data and log dirs>>
  407. ({es} needs write access to the `config` directory so that it can generate a keystore).
  408. A good strategy is to grant group access to gid `0` for the local directory.
  409. For example, to prepare a local directory for storing data through a bind-mount:
  410. [source,sh]
  411. --------------------------------------------
  412. mkdir esdatadir
  413. chmod g+rwx esdatadir
  414. chgrp 0 esdatadir
  415. --------------------------------------------
  416. You can also run an {es} container using both a custom UID and GID. Unless you
  417. bind-mount each of the `config`, `data` and `logs` directories, you must pass
  418. the command line option `--group-add 0` to `docker run`. This ensures that the user
  419. under which {es} is running is also a member of the `root` (GID 0) group inside the
  420. container.
  421. ===== Increase ulimits for nofile and nproc
  422. Increased ulimits for <<setting-system-settings,nofile>> and <<max-number-threads-check,nproc>>
  423. must be available for the {es} containers.
  424. Verify the https://github.com/moby/moby/tree/ea4d1243953e6b652082305a9c3cda8656edab26/contrib/init[init system]
  425. for the Docker daemon sets them to acceptable values.
  426. To check the Docker daemon defaults for ulimits, run:
  427. [source,sh]
  428. --------------------------------------------
  429. docker run --rm docker.elastic.co/elasticsearch/elasticsearch:{version} /bin/bash -c 'ulimit -Hn && ulimit -Sn && ulimit -Hu && ulimit -Su'
  430. --------------------------------------------
  431. If needed, adjust them in the Daemon or override them per container.
  432. For example, when using `docker run`, set:
  433. [source,sh]
  434. --------------------------------------------
  435. --ulimit nofile=65535:65535
  436. --------------------------------------------
  437. ===== Disable swapping
  438. Swapping needs to be disabled for performance and node stability.
  439. For information about ways to do this, see <<setup-configuration-memory>>.
  440. If you opt for the `bootstrap.memory_lock: true` approach,
  441. you also need to define the `memlock: true` ulimit in the
  442. https://docs.docker.com/engine/reference/commandline/dockerd/#default-ulimits[Docker Daemon],
  443. or explicitly set for the container as shown in the <<docker-compose-file, sample compose file>>.
  444. When using `docker run`, you can specify:
  445. [source,sh]
  446. ----
  447. -e "bootstrap.memory_lock=true" --ulimit memlock=-1:-1
  448. ----
  449. ===== Randomize published ports
  450. The image https://docs.docker.com/engine/reference/builder/#/expose[exposes]
  451. TCP ports 9200 and 9300. For production clusters, randomizing the
  452. published ports with `--publish-all` is recommended,
  453. unless you are pinning one container per host.
  454. [[docker-set-heap-size]]
  455. ===== Manually set the heap size
  456. By default, {es} automatically sizes JVM heap based on a nodes's
  457. <<node-roles,roles>> and the total memory available to the node's container. We
  458. recommend this default sizing for most production environments. If needed, you
  459. can override default sizing by manually setting JVM heap size.
  460. To manually set the heap size in production, bind mount a <<set-jvm-options,JVM
  461. options>> file under `/usr/share/elasticsearch/config/jvm.options.d` that
  462. includes your desired <<set-jvm-heap-size,heap size>> settings.
  463. For testing, you can also manually set the heap size using the `ES_JAVA_OPTS`
  464. environment variable. For example, to use 16GB, specify `-e
  465. ES_JAVA_OPTS="-Xms16g -Xmx16g"` with `docker run`. The `ES_JAVA_OPTS` variable
  466. overrides all other JVM options. The `ES_JAVA_OPTS` variable overrides all other
  467. JVM options. We do not recommend using `ES_JAVA_OPTS` in production. The
  468. `docker-compose.yml` file above sets the heap size to 512MB.
  469. ===== Pin deployments to a specific image version
  470. Pin your deployments to a specific version of the {es} Docker image. For
  471. example +docker.elastic.co/elasticsearch/elasticsearch:{version}+.
  472. ===== Always bind data volumes
  473. You should use a volume bound on `/usr/share/elasticsearch/data` for the following reasons:
  474. . The data of your {es} node won't be lost if the container is killed
  475. . {es} is I/O sensitive and the Docker storage driver is not ideal for fast I/O
  476. . It allows the use of advanced
  477. https://docs.docker.com/engine/extend/plugins/#volume-plugins[Docker volume plugins]
  478. ===== Avoid using `loop-lvm` mode
  479. If you are using the devicemapper storage driver, do not use the default `loop-lvm` mode.
  480. Configure docker-engine to use
  481. https://docs.docker.com/engine/userguide/storagedriver/device-mapper-driver/#configure-docker-with-devicemapper[direct-lvm].
  482. ===== Centralize your logs
  483. Consider centralizing your logs by using a different
  484. https://docs.docker.com/engine/admin/logging/overview/[logging driver]. Also
  485. note that the default json-file logging driver is not ideally suited for
  486. production use.
  487. [[docker-configuration-methods]]
  488. ==== Configuring {es} with Docker
  489. When you run in Docker, the <<config-files-location,{es} configuration files>> are loaded from
  490. `/usr/share/elasticsearch/config/`.
  491. To use custom configuration files, you <<docker-config-bind-mount, bind-mount the files>>
  492. over the configuration files in the image.
  493. You can set individual {es} configuration parameters using Docker environment variables.
  494. The <<docker-compose-file, sample compose file>> and the
  495. <<docker-cli-run-dev-mode, single-node example>> use this method. You can
  496. use the setting name directly as the environment variable name. If
  497. you cannot do this, for example because your orchestration platform forbids
  498. periods in environment variable names, then you can use an alternative
  499. style by converting the setting name as follows.
  500. . Change the setting name to uppercase
  501. . Prefix it with `ES_SETTING_`
  502. . Escape any underscores (`_`) by duplicating them
  503. . Convert all periods (`.`) to underscores (`_`)
  504. For example, `-e bootstrap.memory_lock=true` becomes
  505. `-e ES_SETTING_BOOTSTRAP_MEMORY__LOCK=true`.
  506. You can use the contents of a file to set the value of the
  507. `ELASTIC_PASSWORD` or `KEYSTORE_PASSWORD` environment variables, by
  508. suffixing the environment variable name with `_FILE`. This is useful for
  509. passing secrets such as passwords to {es} without specifying them directly.
  510. For example, to set the {es} bootstrap password from a file, you can bind mount the
  511. file and set the `ELASTIC_PASSWORD_FILE` environment variable to the mount location.
  512. If you mount the password file to `/run/secrets/bootstrapPassword.txt`, specify:
  513. [source,sh]
  514. --------------------------------------------
  515. -e ELASTIC_PASSWORD_FILE=/run/secrets/bootstrapPassword.txt
  516. --------------------------------------------
  517. You can override the default command for the image to pass {es} configuration
  518. parameters as command line options. For example:
  519. [source,sh]
  520. --------------------------------------------
  521. docker run <various parameters> bin/elasticsearch -Ecluster.name=mynewclustername
  522. --------------------------------------------
  523. While bind-mounting your configuration files is usually the preferred method in production,
  524. you can also <<_c_customized_image, create a custom Docker image>>
  525. that contains your configuration.
  526. [[docker-config-bind-mount]]
  527. ===== Mounting {es} configuration files
  528. Create custom config files and bind-mount them over the corresponding files in the Docker image.
  529. For example, to bind-mount `custom_elasticsearch.yml` with `docker run`, specify:
  530. [source,sh]
  531. --------------------------------------------
  532. -v full_path_to/custom_elasticsearch.yml:/usr/share/elasticsearch/config/elasticsearch.yml
  533. --------------------------------------------
  534. If you bind-mount a custom `elasticsearch.yml` file, ensure it includes the
  535. `network.host: 0.0.0.0` setting. This setting ensures the node is reachable for
  536. HTTP and transport traffic, provided its ports are exposed. The Docker image's
  537. built-in `elasticsearch.yml` file includes this setting by default.
  538. IMPORTANT: The container **runs {es} as user `elasticsearch` using
  539. uid:gid `1000:0`**. Bind mounted host directories and files must be accessible by this user,
  540. and the data and log directories must be writable by this user.
  541. [[docker-keystore-bind-mount]]
  542. ===== Create an encrypted {es} keystore
  543. By default, {es} will auto-generate a keystore file for <<secure-settings,secure
  544. settings>>. This file is obfuscated but not encrypted.
  545. To encrypt your secure settings with a password and have them persist outside
  546. the container, use a `docker run` command to manually create the keystore
  547. instead. The command must:
  548. * Bind-mount the `config` directory. The command will create an
  549. `elasticsearch.keystore` file in this directory. To avoid errors, do
  550. not directly bind-mount the `elasticsearch.keystore` file.
  551. * Use the `elasticsearch-keystore` tool with the `create -p` option. You'll be
  552. prompted to enter a password for the keystore.
  553. ifeval::["{release-state}"!="unreleased"]
  554. For example:
  555. [source,sh,subs="attributes"]
  556. ----
  557. docker run -it --rm \
  558. -v full_path_to/config:/usr/share/elasticsearch/config \
  559. docker.elastic.co/elasticsearch/elasticsearch:{version} \
  560. bin/elasticsearch-keystore create -p
  561. ----
  562. You can also use a `docker run` command to add or update secure settings in the
  563. keystore. You'll be prompted to enter the setting values. If the keystore is
  564. encrypted, you'll also be prompted to enter the keystore password.
  565. [source,sh,subs="attributes"]
  566. ----
  567. docker run -it --rm \
  568. -v full_path_to/config:/usr/share/elasticsearch/config \
  569. docker.elastic.co/elasticsearch/elasticsearch:{version} \
  570. bin/elasticsearch-keystore \
  571. add my.secure.setting \
  572. my.other.secure.setting
  573. ----
  574. endif::[]
  575. If you've already created the keystore and don't need to update it, you can
  576. bind-mount the `elasticsearch.keystore` file directly. You can use the
  577. `KEYSTORE_PASSWORD` environment variable to provide the keystore password to the
  578. container at startup. For example, a `docker run` command might have the
  579. following options:
  580. [source,sh]
  581. ----
  582. -v full_path_to/config/elasticsearch.keystore:/usr/share/elasticsearch/config/elasticsearch.keystore
  583. -e KEYSTORE_PASSWORD=mypassword
  584. ----
  585. [[_c_customized_image]]
  586. ===== Using custom Docker images
  587. In some environments, it might make more sense to prepare a custom image that contains
  588. your configuration. A `Dockerfile` to achieve this might be as simple as:
  589. [source,sh,subs="attributes"]
  590. --------------------------------------------
  591. FROM docker.elastic.co/elasticsearch/elasticsearch:{version}
  592. COPY --chown=elasticsearch:elasticsearch elasticsearch.yml /usr/share/elasticsearch/config/
  593. --------------------------------------------
  594. You could then build and run the image with:
  595. [source,sh]
  596. --------------------------------------------
  597. docker build --tag=elasticsearch-custom .
  598. docker run -ti -v /usr/share/elasticsearch/data elasticsearch-custom
  599. --------------------------------------------
  600. Some plugins require additional security permissions.
  601. You must explicitly accept them either by:
  602. * Attaching a `tty` when you run the Docker image and allowing the permissions when prompted.
  603. * Inspecting the security permissions and accepting them (if appropriate) by adding the `--batch` flag to the plugin install command.
  604. See {plugins}/_other_command_line_parameters.html[Plugin management]
  605. for more information.
  606. [discrete]
  607. [[troubleshoot-docker-errors]]
  608. ==== Troubleshoot Docker errors for {es}
  609. Here’s how to resolve common errors when running {es} with Docker.
  610. ===== elasticsearch.keystore is a directory
  611. [source,txt]
  612. ----
  613. Exception in thread "main" org.elasticsearch.bootstrap.BootstrapException: java.io.IOException: Is a directory: SimpleFSIndexInput(path="/usr/share/elasticsearch/config/elasticsearch.keystore") Likely root cause: java.io.IOException: Is a directory
  614. ----
  615. A <<docker-keystore-bind-mount,keystore-related>> `docker run` command attempted
  616. to directly bind-mount an `elasticsearch.keystore` file that doesn't exist. If
  617. you use the `-v` or `--volume` flag to mount a file that doesn't exist, Docker
  618. instead creates a directory with the same name.
  619. To resolve this error:
  620. . Delete the `elasticsearch.keystore` directory in the `config` directory.
  621. . Update the `-v` or `--volume` flag to point to the `config` directory path
  622. rather than the keystore file's path. For an example, see
  623. <<docker-keystore-bind-mount>>.
  624. . Retry the command.
  625. ===== elasticsearch.keystore: Device or resource busy
  626. [source,txt]
  627. ----
  628. Exception in thread "main" java.nio.file.FileSystemException: /usr/share/elasticsearch/config/elasticsearch.keystore.tmp -> /usr/share/elasticsearch/config/elasticsearch.keystore: Device or resource busy
  629. ----
  630. A `docker run` command attempted to <<docker-keystore-bind-mount,update the
  631. keystore>> while directly bind-mounting the `elasticsearch.keystore` file. To
  632. update the keystore, the container requires access to other files in the
  633. `config` directory, such as `keystore.tmp`.
  634. To resolve this error:
  635. . Update the `-v` or `--volume` flag to point to the `config` directory
  636. path rather than the keystore file's path. For an example, see
  637. <<docker-keystore-bind-mount>>.
  638. . Retry the command.