es-peek


Namees-peek JSON
Version 0.4.0 PyPI version JSON
download
home_pageNone
SummaryPeek into elasticsearch clusters
upload_time2024-01-25 04:18:59
maintainerNone
docs_urlNone
authorNone
requires_python>=3.8
licenseNone
keywords cli elasticsearch peek
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ====
Peek
====

.. image:: https://github.com/ywangd/peek/workflows/Peek/badge.svg
        :target: https://github.com/ywangd/peek

Peek is an interactive CLI tool for working with Elasticsearch clusters.
It is like `Kibana Console <https://www.elastic.co/guide/en/kibana/current/console-kibana.html>`_
running in terminal with additional features for tinkers.


Installation
------------

Please note the project requires Python 3.8+. It is recommended to install from PyPI with:

.. code-block:: bash

  pip install es-peek

The tool is now available as the ``peek`` command. Peek will ask permission to access system keyring
for storing credentials.
This can be disabled  temporarily by invoking the command as ``peek -e use_keyring=False``
or permanently by setting ``use_keyring = False`` in `peekrc <peek/peekrc>`_ file

Besides HTTP calls to Elasticsearch clusters, type ``help`` to see a list of builtin functions.
To **enable auto-completions** for APIs, run the ``_download_api_specs`` builtin function
(note the leading underscore) to download API spec file from the
`Elasticsearch Specification project <https://github.com/elastic/elasticsearch-specification>`_.

Alternatively, peek can also be installed from source with:

.. code-block:: bash

    python setup.py install

Features
--------

Peek supports most editing features offered by
`Kibana Console <https://www.elastic.co/guide/en/kibana/current/console-kibana.html>`_,
e.g. auto-completion, syntax highlighting, auto-formatting, auto-indent,
par-editing, triple-quotes, etc. It also offers following additional features:

* Lightweight CLI tool
* Multiplex a single terminal session to multiple Elasticsearch clusters or multiple connections to a single cluster
* Flexible usages of quotes, comma, comments for the JSON payload, case-insensitive http method names
* Multiple authentication schemes, including UserPass, API key, Token, SAML, OIDC, Kerberos, PKI
* Support run-as, x-opaque-id and arbitrary request headers
* Load JSON payload from external files
* Run file input in batch mode
* Readline editing features, e.g. ``Ctrl-_`` for undo, ``Ctrl-r`` for reverse search, etc.
* History management
* Capture terminal input and output into file
* Connect to `Elastic Cloud <https://cloud.elastic.co/>`_ with Cloud ID
* Shell out for system commands
* Minimal scripting support
* Extensible via external scripts

Sample Usages
-------------

Assuming a locally running Elasticsearch cluster, start a Peek session with:

.. code-block:: bash

  peek --hosts localhost:9200 --username elastic

The following sample is a quick guide on Peek usages:

.. code-block:: javascript

  // Download the API schema from the elasticsearch-specification project to enable auto-completion
  // If the output says the schema file already exists, you can safely proceed to the next command.
  _download_api_specs

  // NOTE a blank line is needed to trigger API execution, or type "ESC + Enter" to execute regardlessly
  // Exit the interactive session any time by pressing Ctrl-d or type exit
  GET /_cluster/health  // comment is allowed almost anywhere

  // Index a single document
  POST /my-index/_doc
  {'foo': "bar"}  // both single and double quotes are acceptable

  // Bulk indexing
  // Press <F3> to switch between pretty and compact formatting for the JSON payload
  PUT _bulk
  {"index":{"_index":"test","_id":"1"}}
  {"value":"1","category":"click"}
  {"index":{"_index":"test","_id":"2"}}
  {"value":"2","category":"click"}

  // Auto encoding for date math expression
  // The following is encoded automatically into "PUT /%3Cmy-index-%7Bnow%2Fd%7D%3E" on the background
  PUT /<my-index-{now/d}>

  // Shell out to download the EQL threat hunting demo file
  !curl -o normalized-T1117-AtomicRed-regsvr32.json https://raw.githubusercontent.com/elastic/elasticsearch/master/docs/src/test/resources/normalized-T1117-AtomicRed-regsvr32.json

  // Bulk indexing the above downloaded file
  POST my-index-000001/_bulk
  @normalized-T1117-AtomicRed-regsvr32.json

  // Execute an EQL query (triple quotes can be either ''' or """)
  GET /my-index-000001/_eql/search?filter_path=-hits.events
  {
    "query": """
      any where process.name == "regsvr32.exe"
    """,
    "size": 200
  }

  // Create an API key
  PUT _security/api_key
  {
    "name": "key-1",  // extra comma is OK, and this comment is ok as well
  }

  // Connect using the above generated API key
  // The dot notation is used to index into JSON object and array
  connect api_key=_.'id' + ":" + _.'api_key' hosts='localhost:9200'  // Quotes are necessary for strings

  // Connect to Elastic Cloud with Cloud ID
  connect cloud_id='YOUR_CLOUD_ID' username='elastic'

  // Issue a call to the cloud cluster
  get /  // HTTP method is case-insensitive
  get / conn=0  // send the request to the first connection (zero-based index) with the conn option

  // Check configuration location and values
  config

  // List available connections
  connection
  connection @info  // check details
  connection rename='my-cloud-cluster'  // give a friendly name to the current connection
  connection 0  // switch to the first connection
  connection remove=0  // remove the first connection
  connection 'my-cloud-cluster'  // switch to the cloud cluster connection

  // Save the connections we have so far. Session is also auto-saved on exit.
  session @save  // it can be loaded later with "session @load"

  // Session auto-load on start up can be enabled by set "auto_load_session = True" in peekrc file.
  // This helps preserving connections across restart.

  // Builtin help
  help  // list available functions
  help session  // a bit more detailed info about the "session" builtin function

  // Capture the terminal I/O
  capture @start
  capture  // show capture status

  // Run-AS and other headers
  GET _security/_authenticate runas='foo' xoid='my-x-opaque-id' headers={'some-other-header': 'blah'}

  // Show only the first role from previous response
  echo _."roles".0

  // If the cluster has SAML integration configured, authenticate with saml
  // Note this opens a web browser to perform the front-channel flow
  saml_authenticate

  // Load and run an external script
  run 'my-setup.es'

  // Stop the capture
  capture @stop

  // Minimal scripting for populating an index
  let tags = range(0, 100)
  for i in tags {
    PUT ("my-index/_doc/" + i)
    { 'tag': i, "value": i * i }
  }

  // Or with bulk index
  for i in range(1, 100) {  // first prepare the payload file
    echo {"index":{"_index":"test","_id":"" + i}} file='payload.json'
    echo {"value":i,"category":"click"} file='payload.json'
  }
  // Now bulk indexing with the above generated file
  PUT _bulk
  @payload.json

The tool can also run in batch mode. Assuming above commands are saved in a file called ``script.es``,
it can be executed as:

.. code-block:: bash

  # Positional argument
  peek script.es

  # Pipe
  cat script.es | peek

  # Or with heredoc
  peek << EOF
  GET /_cluster/health
  // etc
  EOF

External scripts can used to provide extra functions. They are simple Python scripts that define
and expose callabes under a variable named ``EXPORTS``. Please refer `natives.py <peek/natives.py>`_
for examples.

Please also read `Usages <docs/usage.rst>`_ for more details.

Credits
-------
`Pgcli <https://github.com/dbcli/pgcli>`_ has been a great reference of learning how to use
`prompt-toolkit <https://github.com/prompt-toolkit/python-prompt-toolkit>`_, which is a critical
dependency of this project.

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "es-peek",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": "cli,elasticsearch,peek",
    "author": null,
    "author_email": "Yang Wang <ywangd@gmail.com>",
    "download_url": "https://files.pythonhosted.org/packages/82/07/44907c28bf0b1c9f6ecc3f47cbb4eb4f223cd55e34cb4794520a5ab550d7/es_peek-0.4.0.tar.gz",
    "platform": null,
    "description": "====\nPeek\n====\n\n.. image:: https://github.com/ywangd/peek/workflows/Peek/badge.svg\n        :target: https://github.com/ywangd/peek\n\nPeek is an interactive CLI tool for working with Elasticsearch clusters.\nIt is like `Kibana Console <https://www.elastic.co/guide/en/kibana/current/console-kibana.html>`_\nrunning in terminal with additional features for tinkers.\n\n\nInstallation\n------------\n\nPlease note the project requires Python 3.8+. It is recommended to install from PyPI with:\n\n.. code-block:: bash\n\n  pip install es-peek\n\nThe tool is now available as the ``peek`` command. Peek will ask permission to access system keyring\nfor storing credentials.\nThis can be disabled  temporarily by invoking the command as ``peek -e use_keyring=False``\nor permanently by setting ``use_keyring = False`` in `peekrc <peek/peekrc>`_ file\n\nBesides HTTP calls to Elasticsearch clusters, type ``help`` to see a list of builtin functions.\nTo **enable auto-completions** for APIs, run the ``_download_api_specs`` builtin function\n(note the leading underscore) to download API spec file from the\n`Elasticsearch Specification project <https://github.com/elastic/elasticsearch-specification>`_.\n\nAlternatively, peek can also be installed from source with:\n\n.. code-block:: bash\n\n    python setup.py install\n\nFeatures\n--------\n\nPeek supports most editing features offered by\n`Kibana Console <https://www.elastic.co/guide/en/kibana/current/console-kibana.html>`_,\ne.g. auto-completion, syntax highlighting, auto-formatting, auto-indent,\npar-editing, triple-quotes, etc. It also offers following additional features:\n\n* Lightweight CLI tool\n* Multiplex a single terminal session to multiple Elasticsearch clusters or multiple connections to a single cluster\n* Flexible usages of quotes, comma, comments for the JSON payload, case-insensitive http method names\n* Multiple authentication schemes, including UserPass, API key, Token, SAML, OIDC, Kerberos, PKI\n* Support run-as, x-opaque-id and arbitrary request headers\n* Load JSON payload from external files\n* Run file input in batch mode\n* Readline editing features, e.g. ``Ctrl-_`` for undo, ``Ctrl-r`` for reverse search, etc.\n* History management\n* Capture terminal input and output into file\n* Connect to `Elastic Cloud <https://cloud.elastic.co/>`_ with Cloud ID\n* Shell out for system commands\n* Minimal scripting support\n* Extensible via external scripts\n\nSample Usages\n-------------\n\nAssuming a locally running Elasticsearch cluster, start a Peek session with:\n\n.. code-block:: bash\n\n  peek --hosts localhost:9200 --username elastic\n\nThe following sample is a quick guide on Peek usages:\n\n.. code-block:: javascript\n\n  // Download the API schema from the elasticsearch-specification project to enable auto-completion\n  // If the output says the schema file already exists, you can safely proceed to the next command.\n  _download_api_specs\n\n  // NOTE a blank line is needed to trigger API execution, or type \"ESC + Enter\" to execute regardlessly\n  // Exit the interactive session any time by pressing Ctrl-d or type exit\n  GET /_cluster/health  // comment is allowed almost anywhere\n\n  // Index a single document\n  POST /my-index/_doc\n  {'foo': \"bar\"}  // both single and double quotes are acceptable\n\n  // Bulk indexing\n  // Press <F3> to switch between pretty and compact formatting for the JSON payload\n  PUT _bulk\n  {\"index\":{\"_index\":\"test\",\"_id\":\"1\"}}\n  {\"value\":\"1\",\"category\":\"click\"}\n  {\"index\":{\"_index\":\"test\",\"_id\":\"2\"}}\n  {\"value\":\"2\",\"category\":\"click\"}\n\n  // Auto encoding for date math expression\n  // The following is encoded automatically into \"PUT /%3Cmy-index-%7Bnow%2Fd%7D%3E\" on the background\n  PUT /<my-index-{now/d}>\n\n  // Shell out to download the EQL threat hunting demo file\n  !curl -o normalized-T1117-AtomicRed-regsvr32.json https://raw.githubusercontent.com/elastic/elasticsearch/master/docs/src/test/resources/normalized-T1117-AtomicRed-regsvr32.json\n\n  // Bulk indexing the above downloaded file\n  POST my-index-000001/_bulk\n  @normalized-T1117-AtomicRed-regsvr32.json\n\n  // Execute an EQL query (triple quotes can be either ''' or \"\"\")\n  GET /my-index-000001/_eql/search?filter_path=-hits.events\n  {\n    \"query\": \"\"\"\n      any where process.name == \"regsvr32.exe\"\n    \"\"\",\n    \"size\": 200\n  }\n\n  // Create an API key\n  PUT _security/api_key\n  {\n    \"name\": \"key-1\",  // extra comma is OK, and this comment is ok as well\n  }\n\n  // Connect using the above generated API key\n  // The dot notation is used to index into JSON object and array\n  connect api_key=_.'id' + \":\" + _.'api_key' hosts='localhost:9200'  // Quotes are necessary for strings\n\n  // Connect to Elastic Cloud with Cloud ID\n  connect cloud_id='YOUR_CLOUD_ID' username='elastic'\n\n  // Issue a call to the cloud cluster\n  get /  // HTTP method is case-insensitive\n  get / conn=0  // send the request to the first connection (zero-based index) with the conn option\n\n  // Check configuration location and values\n  config\n\n  // List available connections\n  connection\n  connection @info  // check details\n  connection rename='my-cloud-cluster'  // give a friendly name to the current connection\n  connection 0  // switch to the first connection\n  connection remove=0  // remove the first connection\n  connection 'my-cloud-cluster'  // switch to the cloud cluster connection\n\n  // Save the connections we have so far. Session is also auto-saved on exit.\n  session @save  // it can be loaded later with \"session @load\"\n\n  // Session auto-load on start up can be enabled by set \"auto_load_session = True\" in peekrc file.\n  // This helps preserving connections across restart.\n\n  // Builtin help\n  help  // list available functions\n  help session  // a bit more detailed info about the \"session\" builtin function\n\n  // Capture the terminal I/O\n  capture @start\n  capture  // show capture status\n\n  // Run-AS and other headers\n  GET _security/_authenticate runas='foo' xoid='my-x-opaque-id' headers={'some-other-header': 'blah'}\n\n  // Show only the first role from previous response\n  echo _.\"roles\".0\n\n  // If the cluster has SAML integration configured, authenticate with saml\n  // Note this opens a web browser to perform the front-channel flow\n  saml_authenticate\n\n  // Load and run an external script\n  run 'my-setup.es'\n\n  // Stop the capture\n  capture @stop\n\n  // Minimal scripting for populating an index\n  let tags = range(0, 100)\n  for i in tags {\n    PUT (\"my-index/_doc/\" + i)\n    { 'tag': i, \"value\": i * i }\n  }\n\n  // Or with bulk index\n  for i in range(1, 100) {  // first prepare the payload file\n    echo {\"index\":{\"_index\":\"test\",\"_id\":\"\" + i}} file='payload.json'\n    echo {\"value\":i,\"category\":\"click\"} file='payload.json'\n  }\n  // Now bulk indexing with the above generated file\n  PUT _bulk\n  @payload.json\n\nThe tool can also run in batch mode. Assuming above commands are saved in a file called ``script.es``,\nit can be executed as:\n\n.. code-block:: bash\n\n  # Positional argument\n  peek script.es\n\n  # Pipe\n  cat script.es | peek\n\n  # Or with heredoc\n  peek << EOF\n  GET /_cluster/health\n  // etc\n  EOF\n\nExternal scripts can used to provide extra functions. They are simple Python scripts that define\nand expose callabes under a variable named ``EXPORTS``. Please refer `natives.py <peek/natives.py>`_\nfor examples.\n\nPlease also read `Usages <docs/usage.rst>`_ for more details.\n\nCredits\n-------\n`Pgcli <https://github.com/dbcli/pgcli>`_ has been a great reference of learning how to use\n`prompt-toolkit <https://github.com/prompt-toolkit/python-prompt-toolkit>`_, which is a critical\ndependency of this project.\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Peek into elasticsearch clusters",
    "version": "0.4.0",
    "project_urls": {
        "Homepage": "https://github.com/ywangd/peek"
    },
    "split_keywords": [
        "cli",
        "elasticsearch",
        "peek"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "820744907c28bf0b1c9f6ecc3f47cbb4eb4f223cd55e34cb4794520a5ab550d7",
                "md5": "08300edbe8040e490b0ff3e76cea8fa5",
                "sha256": "0ff0dd822283919a5a68ccc0400986c5bfd5148b547be6faaa2788b2242907ad"
            },
            "downloads": -1,
            "filename": "es_peek-0.4.0.tar.gz",
            "has_sig": false,
            "md5_digest": "08300edbe8040e490b0ff3e76cea8fa5",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 62165,
            "upload_time": "2024-01-25T04:18:59",
            "upload_time_iso_8601": "2024-01-25T04:18:59.757800Z",
            "url": "https://files.pythonhosted.org/packages/82/07/44907c28bf0b1c9f6ecc3f47cbb4eb4f223cd55e34cb4794520a5ab550d7/es_peek-0.4.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-01-25 04:18:59",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "ywangd",
    "github_project": "peek",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "requirements": [],
    "tox": true,
    "lcname": "es-peek"
}
        
Elapsed time: 0.23239s