AWS Identity and Access Management
User Guide

Actions, Resources, and Condition Keys for Amazon Elasticsearch Service

Amazon Elasticsearch Service (service prefix: es) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.

References:

Actions Defined by Amazon Elasticsearch Service

You can specify the following actions in the Action element of an IAM policy statement. By using policies, you define the permissions for anyone performing an operation in AWS. When you use an action in a policy, you usually allow or deny access to the API operation or CLI command with the same name. However, in some cases, a single action controls access to more than one operation. Alternatively, some operations require several different actions. For details about the columns in the following table, see The Actions Table.

Actions Description Access Level Resource Types (*required) Condition Keys Dependent Actions
AddTags Grants permission to attach resource tags to an Amazon ES domain. Tagging

domain*

CreateElasticsearchDomain Grants permission to create an Amazon ES domain. Write

domain

DeleteElasticsearchDomain Grants permission to delete an Amazon ES domain and all of its data. Write

domain*

DeleteElasticsearchServiceRole Grants permission to delete the service-linked role required for Amazon ES domains that use VPC access. Write
DescribeElasticsearchDomain Grants permission to view a description of the domain configuration for the specified Amazon ES domain, including the domain ID, domain service endpoint, and domain ARN. Read

domain*

DescribeElasticsearchDomainConfig Grants permission to view a description of the configuration options and status of an Amazon ES domain. Read

domain*

DescribeElasticsearchDomains Grants permission to view a description of the domain configuration for up to five specified Amazon ES domains. List

domain*

DescribeElasticsearchInstanceTypeLimits Grants permission to view the instance count, storage, and master node limits for a given Elasticsearch version and instance type. List
ESHttpDelete Grants permission to send HTTP DELETE requests to the Elasticsearch APIs. Write

domain

ESHttpGet Grants permission to send HTTP GET requests to the Elasticsearch APIs. Read

domain

ESHttpHead Grants permission to send HTTP HEAD requests to the Elasticsearch APIs. Read

domain

ESHttpPost Grants permission to send HTTP POST requests to the Elasticsearch APIs. Write

domain

ESHttpPut Grants permission to send HTTP PUT requests to the Elasticsearch APIs. Write

domain

ListDomainNames Grants permission to display the names of all Amazon ES domains that the current user owns. List
ListElasticsearchInstanceTypes Grants permission to list all Elasticsearch instance types that are supported for a given Elasticsearch version. List
ListElasticsearchVersions Grants permission to list all supported Elasticsearch versions on Amazon ES. List
ListTags Grants permission to display all of the tags for an Amazon ES domain. Read

domain*

RemoveTags Grants permission to remove tags from Amazon ES domains. Tagging

domain*

UpdateElasticsearchDomainConfig Grants permission to modify the configuration of an Amazon ES domain, such as the instance type or number of instances. Write

domain*

Resources Defined by Elasticsearch Service

The following resource types are defined by this service and can be used in the Resource element of IAM permission policy statements. Each action in the Actions table identifies the resource types that can be specified with that action. A resource type can also define which condition keys you can include in a policy. These keys are displayed in the last column of the table. For details about the columns in the following table, see The Resource Types Table.

Resource Types ARN Condition Keys
domain arn:${Partition}:es:${Region}:${Account}:domain/${DomainName}

Condition Keys for Amazon Elasticsearch Service

Elasticsearch Service has no service-specific context keys that can be used in the Condition element of policy statements. For the list of the global context keys that are available to all services, see Available Keys for Conditions in the IAM Policy Reference.