7 C
New York
Thursday, April 3, 2025

Take handbook snapshots and restore in a distinct area spanning throughout varied Areas and accounts in Amazon OpenSearch Service


Snapshots are essential for knowledge backup and catastrophe restoration in Amazon OpenSearch Service. These snapshots will let you generate backups of your area indexes and cluster state at particular moments and save them in a dependable storage location equivalent to Amazon Easy Storage Service (Amazon S3).

Snapshots play a important position in offering the supply, integrity and talent to get better knowledge in OpenSearch Service domains. By implementing a strong snapshot technique, you possibly can mitigate dangers related to knowledge loss, streamline catastrophe restoration processes and preserve compliance with knowledge administration finest practices.

This put up offers an in depth walkthrough about learn how to effectively seize and handle handbook snapshots in OpenSearch Service. It covers the important steps for taking snapshots of your knowledge, implementing protected switch throughout completely different AWS Areas and accounts, and restoring them in a brand new area. This information is designed that will help you preserve knowledge integrity and continuity whereas navigating complicated multi-Area and multi-account environments in OpenSearch Service.

Confer with this developer information to grasp extra about index snapshots

Understanding handbook snapshots

Handbook snapshots are point-in-time backups of your OpenSearch Service area which might be initiated by the consumer. Opposite to automated snapshots, that are taken frequently in accordance with the desired retention coverage by OpenSearch Service, handbook snapshots provide the capability to take backups at any time when required, whether or not for the total cluster or for particular person indices. That is significantly helpful once you need to protect a particular state of your knowledge for future reference or earlier than implementing vital adjustments to your area.

Snapshots will not be instantaneous. They take time to finish and don’t signify excellent point-in-time views of the area. Whereas a snapshot is in progress, you possibly can nonetheless index paperwork and make different requests to the area, however new paperwork and updates to current paperwork typically aren’t included within the snapshot. The snapshot consists of major shards as they existed once you provoke the snapshot course of.

The next are some situations the place handbook snapshots play an vital position:

  • Information restoration – The first goal of snapshots, whether or not handbook or automated, is to supply a way of knowledge restoration within the occasion of a failure or knowledge loss. If one thing goes unsuitable along with your area, you possibly can restore it to a earlier state utilizing a snapshot.
  • Migration – Handbook snapshots will be helpful once you need to migrate knowledge from one area to a different. You may create a snapshot of the supply area after which restore it on the goal area.
  • Testing and improvement – You should use snapshots to create copies of your knowledge for testing or improvement functions. This lets you experiment along with your knowledge with out affecting the manufacturing atmosphere.
  • Backup management – Handbook snapshots offer you extra management over your backup course of. You may select precisely when to create a snapshot, which will be helpful in case you have particular necessities that aren’t met by automated snapshots.
  • Lengthy-term archiving – Handbook snapshots will be stored for so long as you need, which will be helpful for long-term archiving of knowledge. Automated snapshots, then again, are sometimes deleted after a sure time frame.

Resolution overview

The next sections define the process for taking a handbook snapshot after which restoring it in a distinct area, spanning throughout varied Areas and accounts. The high-level steps are as follows:

  1. Create an AWS Identification and Entry Administration (IAM) position and consumer.
  2. Register a handbook snapshot repository.
  3. Take handbook snapshots.
  4. Arrange S3 bucket replication.
  5. Create an IAM position and consumer within the goal account.
  6. Add a bucket coverage.
  7. Register the repository and restore snapshots within the goal area.

Prerequisite

This put up assumes you could have the next sources arrange:

  • An lively and operating OpenSearch Service area.
  • An S3 bucket to retailer the handbook snapshots of your OpenSearch Service area. The bucket needs to be in the identical Area the place the OpenSearch Service area is hosted.

Create an IAM position and consumer

Full the next steps to create your IAM position and consumer:

  1. Create an IAM position to grant permissions to OpenSearch Service. For this put up, we identify the position TheSnapshotRole.
  2. Create a brand new coverage utilizing the next code and connect it to the position to permit entry to the S3 bucket.
{
  "Model": "2012-10-17",
  "Assertion": [
    {
      "Action": [
        "s3:ListBucket"
      ],
      "Impact": "Enable",
      "Useful resource": [
        "arn:aws:s3:::s3-bucket-name"
      ]
    },
    {
      "Motion": [
        "s3:GetObject",
        "s3:PutObject",
        "s3:DeleteObject",
        "iam:PassRole"
      ],
      "Impact": "Enable",
      "Useful resource": [
        "arn:aws:s3:::s3-bucket-name/*"
      ]
    }
  ]
}

  1. Edit the belief relationship of TheSnapshotRole to specify OpenSearch Service within the Principal assertion, as proven within the following instance. Below the Situation block, we suggest that you just use the aws:SourceAccount and aws:SourceArn situation keys to guard your self towards the confused deputy downside. The supply account is the proprietor and the supply ARN is the ARN of the OpenSearch Service area.
{
  "Model": "2012-10-17",
  "Assertion": [
    {
      "Sid": "",
      "Effect": "Allow",
      "Principal": {
        "Service": "es.amazonaws.com"
      },
      "Action": "sts:AssumeRole",
      "Condition": {
        "StringEquals": {
          "aws:SourceAccount": "account-id"
        },
        "ArnLike": {
          "aws:SourceArn": "arn:aws:es:region:account-id:domain/domain-name"
        }
      }
    }
  ]
}

  1. Generate an IAM consumer to register the snapshot repository. For this put up, we identify the consumer TheSnapUser.
  2. To register a snapshot repository, it’s essential cross TheSnapshotRole to OpenSearch Service. You additionally want entry to the es:ESHttpPut To grant each of those permissions, connect the next coverage to the IAM position whose credentials are getting used to signal the request.
{
  "Model": "2012-10-17",
  "Assertion": [
    {
      "Effect": "Allow",
      "Action": "iam:PassRole",
      "Resource": "arn:aws:iam::123456789012:role/TheSnapshotRole"
    },
    {
      "Effect": "Allow",
      "Action": "es:ESHttpPut",
      "Resource": "arn:aws:es:region:123456789012:domain/domain-name/*"
    }
  ]
}

Register a handbook snapshot repository

Full the next steps to map the snapshot position and the consumer in OpenSearch Dashboards (if utilizing fine-grained entry management):

  1. Navigate to the OpenSearch Dashboards endpoint related to your OpenSearch Service area.
  2. Sign up with the admin consumer or a consumer with the security_manager position
  3. From the principle menu, select Safety, Roles, and choose the manage_snapshots position
  4. Select Mapped customers, then select Handle mapping.
  5. Add the ARN of TheSnapshotRole for Backend position and the ARN of TheSnapUser for Person:
    1. arn:aws:iam::123456789123:position/TheSnapshotRole
    2. arn:aws:iam::123456789123:consumer/TheSnapUser
  6. Select Map and make sure the consumer and position reveals up beneath Mapped customers.
  7. To register a snapshot repository, ship a PUT request to the OpenSearch Service area endpoint by an API platform like Postman or Insomnia. For extra particulars, see Registering a handbook snapshot repository.

Notice: Whereas utilizing Postman or Insomnia to run the API calls talked about all through this weblog, select AWS IAM v4 because the authentication methodology and enter your IAM credentials within the Authorization part. Make sure you use the credentials of an OpenSearch consumer who has the ‘all_access’ OpenSearch position assigned on the area.

curl -XPUT domain-endpoint/_snapshot/my-snapshot-repo-name
{
  "kind": "s3",
  "settings": {
    "bucket": "s3-bucket-name",
    "area": "area",
    "role_arn": "arn:aws:iam::123456789012:position/TheSnapshotRole"
  }
}

In case your area resides inside a digital personal cloud (VPC), you have to be related to the VPC for the request to efficiently register the snapshot repository. Accessing a VPC varies by community configuration, however possible entails connecting to a VPN or company community. To test that you may attain the OpenSearch Service area, navigate to https://<your-vpc-domain.area>.es.amazonaws.com in an internet browser and confirm that you just obtain the default JSON response.

Take handbook snapshots

Taking a snapshot isn’t doable if one other snapshot is at the moment in progress. The Ultrawarm storage tier migration course of additionally makes use of snapshots to maneuver knowledge between sizzling and heat storage, operating this course of within the background. Moreover, automated snapshots are taken primarily based on the schedule configured for the cluster by the service. See Defending knowledge with encryption for shielding your Amazon S3 knowledge.

  1. To confirm, run the next command
curl -XGET 'domain-endpoint/_snapshot/_status

  1. After you verify no snapshot is operating, run the next command to take a handbook snapshot
curl -XPUT 'domain-endpoint/_snapshot/repository-name/snapshot-name

  1. Run the next command to confirm the state of all snapshots of your area
curl -XGET 'domain-endpoint/_snapshot/repository-name/_all?fairly

Arrange S3 bucket replication

Earlier than you begin, have the next in place:

  1. Find the vacation spot bucket the place the info shall be replicated. In the event you don’t have one, create a brand new S3 bucket in a definite area, separate from the area of the supply bucket.
  2. To permit entry to things on this bucket by different AWS accounts (as a result of the vacation spot OpenSearch Service area is in a distinct account), it’s essential allow entry management lists (ACLs) on the bucket. ACLs shall be used to specify and handle entry permissions for the bucket and its objects.

Full the next steps to arrange S3 bucket replication. For extra data, see Walkthroughs: Examples for configuring replication.

  1. On the Amazon S3 console, select Buckets within the navigation pane.
  2. Select the bucket you need to replicate (the supply bucket with snapshots).
  3. On the Administration tab, select Create replication rule.
  4. Replication requires versioning to be enabled for the supply bucket, so select Allow bucket versioning and allow versioning.
  5. Specify the next particulars:
    1. For Rule ID, enter a reputation to your rule.
    2. For Standing, select Enabled.
    3. For Rule scope, specify the info to be replicated.
    4. For Vacation spot S3 bucket, enter the goal bucket identify the place the info shall be replicated.
    5. For IAM position, select Create new position.
  6. Select Save.
  7. Within the Replicate current objects pop-up window, choose Sure, replicate current objects to start out replication.
  8. Select Submit.

You will notice a brand new lively replication rule within the replication desk on the Administration tab of the supply S3 bucket.

Create an IAM position and consumer within the goal account

Full the next steps to create your IAM position and consumer within the goal account.

  1. Create an IAM position to grant permissions to the goal OpenSearch Service. For this put up, identify the position DestinationSnapshotRole.
  2. Create a brand new coverage utilizing the next code and connect it to the position DestinationSnapshotRole to permit entry to the goal S3 bucket
{
  "Model": "2012-10-17",
  "Assertion": [
    {
      "Action": [
        "s3:ListBucket"
      ],
      "Impact": "Enable",
      "Useful resource": [
        "arn:aws:s3:::s3-bucket-name" -> Replicated s3 bucket
      ]
    },
    {
      "Motion": [
        "s3:GetObject",
        "s3:PutObject",
        "s3:DeleteObject",
        "iam:PassRole"
      ],
      "Impact": "Enable",
      "Useful resource": [
        "arn:aws:s3:::s3-bucket-name/*" -> Replicated s3 bucket 
      ]
    }
  ]
}

  1. Edit the belief relationship of DestinationSnapshotRole to specify OpenSearch Service within the Principal assertion as proven within the following instance.
{
  "Model":"2012-10-17",
  "Assertion":[
    {
      "Sid":"",
      "Effect":"Allow",
      "Principal":{
        "Service":"es.amazonaws.com"
      },
      "Action":"sts:AssumeRole",
      "Condition":{
        "StringEquals":{
          "aws:SourceAccount":"account-id" -> Target Account
        },
        "ArnLike":{
          "aws:SourceArn":"arn:aws:es:region:account-id:domain/domain-name/*" -> Target OpenSearch Domain
        }
      }
    }
  ]
}

  1. Generate an IAM consumer to register the snapshot repository. For this put up, identify the consumer DestinationSnapUser.
  2. To register a snapshot repository, it’s essential cross DestinationSnapshotRole to OpenSearch Service. You additionally want entry to the es:ESHttpPut To grant each of those permissions, connect the next coverage to the IAM position whose credentials are getting used to signal the request
{
  "Model":"2012-10-17",
  "Assertion":[
    {
      "Effect":"Allow",
      "Action":"iam:PassRole",
      "Resource":"arn:aws:iam::123456789012:role/DestinationSnapshotRole"
    },
    {
      "Effect":"Allow",
      "Action":"es:ESHttpPut",
      "Resource":"arn:aws:es:region:123456789012:domain/domain-name/*" -> Target OpenSearch Domain
    }
  ]
}

Full the next steps to map the snapshot position and consumer within the goal OpenSearch Dashboards (if utilizing fine-grained entry management).

  1. Navigate to the OpenSearch Dashboard’s endpoint related along with your OpenSearch Service area.
  2. Sign up with the admin consumer or a consumer with the security_manager position
  3. From the principle menu, select Safety, Roles, and select the manage_snapshots position
  4. Select Mapped customers, then select Handle mapping.
  5. Add the ARN of TheSnapshotRole for Backend position and the ARN of TheSnapUser for Person:
    1. arn:aws:iam::123456789123:position/DestinationSnapshotRole
    2. arn:aws:iam::123456789123:consumer/DestinationSnapUser
  6. Select Map and make sure the consumer and position reveals up beneath Mapped customers.

Add a bucket coverage

Within the vacation spot S3 bucket particulars web page, on the Permissions tab, select Edit, then add the next bucket coverage. This coverage permits the goal OpenSearch Service area from one other AWS account to entry the snapshot created by a distinct AWS account.

{
  "Model":"2012-10-17",
  "Id":"Policy1568001010746",
  "Assertion":[
    {
      "Sid":"Stmt1568000712531",
      "Effect":"Allow",
      "Principal":{
        "AWS":"arn:aws:iam::Account B:role/cross" -> DestinationSnapshotRole
      },
      "Action":"s3:*",
      "Resource":"arn:aws:s3:::snapshot"
    },
    {
      "Sid":"Stmt1568001007239",
      "Effect":"Allow",
      "Principal":{
        "AWS":"arn:aws:iam::Account B:role/cross" -> DestinationSnapshotRole
      },
      "Action":[
        "s3:GetObject",
        "s3:PutObject",
        "s3:DeleteObject"
      ],
      "Useful resource":"arn:aws:s3:::snapshot/*"
    }
  ]
}

Register the repository and restore snapshots within the goal area

To finish this step, you want an lively and operating OpenSearch Service area within the goal account.

Determine the snapshot you need to restore. Be certain that all settings for this index, equivalent to customized analyzer packages or allocation requirement settings, and knowledge are suitable with the area. Then full the next steps

  1. To register the repository within the goal OpenSearch Service area, run the next command.
curl -XPUT domain-endpoint/_snapshot/my-snapshot-repo-name
{
  "kind": "s3",
  "settings": {
    "bucket": "s3-bucket-name",
    "area": "area",
    "role_arn": "arn:aws:iam::123456789012:position/DestinationSnapshotRole"
  }
}

  1. After you register the repository, run the next command to see all snapshots.
curl -XGET 'domain-endpoint/_snapshot/repository-name/_all?fairly

  1. To revive a snapshot, run the next command.
curl -XPOST 'domain-endpoint/_snapshot/repository-name/snapshot-name/_restore

  1. Alternately, you may need to restore all indexes besides the dashboards and fine-grained entry management indexes.
curl -XPOST 'domain-endpoint/_snapshot/repository-name/snapshot-name/_restore' 
-d '{"indices": "-.kibana*,-.opendistro*"}' 
-H 'Content material-Kind: software/json'

  1. Sign up to OpenSearch Dashboards related to the goal OpenSearch Service area and run the next command to test if the info is getting restored.
curl -XGET _cat/indices?v

  1. Run the next restoration command to test the progress of the restore operation.
curl -XGET _cat/restoration?v

Troubleshooting

This re:Put up article addresses nearly all of widespread errors that come up when making an attempt to revive a handbook snapshot, together with efficient options to resolve them.

Conclusion

On this put up, we introduced a process for taking handbook snapshots and restoring them in OpenSearch Service. With handbook snapshots, you could have the facility to handle your knowledge backups, preserving key moments in time, confidently experimenting with area modifications, and defending towards any knowledge loss. Moreover, with the ability to restore snapshots throughout varied domains, Areas, and accounts allows a brand new diploma of knowledge portability and adaptability, supplying you with the liberty to raised handle and optimize your domains.

With nice knowledge safety comes nice innovation. Now that you just’re geared up with this information, you possibly can discover the infinite potentialities that OpenSearch Service affords, assured in your capability to safe, restore, and thrive within the dynamic world of cloud-based knowledge analytics and administration.

See weblog put up to grasp learn how to use snapshot administration insurance policies to handle automated snapshot in OpenSearch Service.

In case you have suggestions about this put up, submit it within the feedback part. In case you have questions on this put up, begin a brand new thread on the Amazon OpenSearch Service discussion board or contact AWS Help.

Keep tuned for extra thrilling updates and new options in Amazon OpenSearch Service.


In regards to the authors

Madhan Kumar Baskaran works as a Search Engineer at AWS, specializing in Amazon OpenSearch Service. His major focus entails aiding prospects in developing scalable search functions and analytics options. Based mostly in Bellevue, Washington, Madhan has a eager curiosity in knowledge engineering and DevOps.

Priyanshi Omer is a Buyer Success Engineer at AWS OpenSearch, primarily based in Bengaluru. Her major focus entails aiding prospects in developing scalable search functions and analytics options. She works carefully with prospects to assist them migrate their workloads and aids current prospects in fine-tuning their clusters to attain higher efficiency and price financial savings. Exterior of labor, she enjoys spending time together with her cats and taking part in video video games

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles