3.0.0 | docker pull icr.io/ibmz/opensearch@sha256:de8d554f60b38ba422fa186d9355fc556ff011dc8f25335fef3e8d9280a974b5 | Vulnerability Report | 01-04-2023 | 2.16.0 | docker pull icr.io/ibmz/opensearch@sha256:019567f0497a83998658ee586c61f1c8da496cd7788f0a80074db07e29a17d3a | Vulnerability Report | 09-27-2024 | 2.6.0 | docker pull icr.io/ibmz/opensearch@sha256:68d498b4a702e343476b48c62c67c13b23c586d2310b81c719aa4595529edf1d | Vulnerability Report | 05-10-2023 |
Version | Pull String | Security (IBM Cloud) | Created |
---|---|---|---|
discovery.type: single-node
enabled.
Exposed Ports:
9200 9300 9600 9650
Start an opensearch container:
docker run --name opensearch -d -p 9200:9200 icr.io/ibmz/opensearch:[version]
Verify that the cluster is running by querying your host-ip at port 9200:
curl -XGET --insecure -u 'admin:admin' 'https://[host-ip]:9200'
Create a sample index:
curl -XPUT --insecure -u 'admin:admin' 'https://[host-ip]:9200/my-first-index'
Add sample data to index:
curl -XPUT --insecure -u 'admin:admin' 'https://[host-ip]:9200/my-first-index/_doc/1' -H 'Content-Type: application/json' -d '{"Description": "To be or not to be, that is the question."}'
Fetch sample data:
curl -XGET --insecure -u 'admin:admin' 'https://[host-ip]:9200/my-first-index/_doc/1'
Delete the document:
curl -XDELETE --insecure -u 'admin:admin' 'https://[host-ip]:9200/my-first-index/_doc/1'
Then delete the index:
curl -XDELETE --insecure -u 'admin:admin' 'https://[host-ip]:9200/my-first-index/'