diff --git a/README.md b/README.md
new file mode 100644
index 0000000..ab78358
--- /dev/null
+++ b/README.md
@@ -0,0 +1,293 @@
+
+[![README Header][readme_header_img]][readme_header_link]
+
+[![Cloud Posse][logo]](https://cpco.io/homepage)
+
+# terraform-aws-lambda-elasticsearch-cleanup
+
+ [](https://travis-ci.org/cloudposse/terraform-aws-lambda-elasticsearch-cleanup) [](https://github.com/cloudposse/terraform-aws-lambda-elasticsearch-cleanup/releases/latest) [](https://slack.cloudposse.com)
+
+
+Terraform module to provision a scheduled Lambda function which will
+delete old Elasticsearch indexes using [SigV4Auth](https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html) authentication. The
+lambda function can optionally send output to an SNS topic if the
+topic ARN is given. This module was largely inspired by
+[aws-lambda-es-cleanup](https://github.com/cloudreach/aws-lambda-es-cleanup)
+
+
+---
+
+This project is part of our comprehensive ["SweetOps"](https://cpco.io/sweetops) approach towards DevOps.
+[
][share_email]
+[
][share_googleplus]
+[
][share_facebook]
+[
][share_reddit]
+[
][share_linkedin]
+[
][share_twitter]
+
+
+[][terraform_modules]
+
+
+
+It's 100% Open Source and licensed under the [APACHE2](LICENSE).
+
+
+
+
+
+
+
+We literally have [*hundreds of terraform modules*][terraform_modules] that are Open Source and well-maintained. Check them out!
+
+
+
+
+
+
+
+## Usage
+
+```hcl
+module "elasticsearch_cleanup" {
+ source = "../"
+ es_endpoint = "${module.elasticsearch.domain_endpoint}"
+ es_domain_arn = "${module.elasticsearch.domain_arn}"
+ es_security_group_id = "${module.elasticsearch.security_group_id}"
+ vpc_id = "${module.vpc.vpc_id}"
+ namespace = "example"
+ stage = "dev"
+ schedule = "rate(5 minutes)"
+}
+```
+
+
+
+
+
+
+## Makefile Targets
+```
+Available targets:
+
+ build Build Lambda function zip
+ dependencies Install dependencies
+ help Help screen
+ help/all Display help for all targets
+ help/short This help short screen
+ lint Lint terraform code
+
+```
+## Module: cloudposse/terraform-aws-lambda-elasticsearch-cleanup
+
+This module creates a scheduled Lambda function which will delete old
+Elasticsearch indexes using SigV4Auth authentication. The lambda
+function can optionally send output to an SNS topic if the topic ARN
+is given
+
+## Inputs
+
+| Name | Description | Type | Default | Required |
+|------|-------------|:----:|:-----:|:-----:|
+| attributes | Additional attributes (e.g. `1`) | list | `` | no |
+| delete_after | Number of days to preserve | string | `15` | no |
+| delimiter | Delimiter to be used between `namespace`, `stage`, `name` and `attributes` | string | `-` | no |
+| es_domain_arn | The Elasticsearch domain ARN | string | - | yes |
+| es_endpoint | The Elasticsearch endpoint for the Lambda function to connect to | string | - | yes |
+| es_security_group_id | The Elasticsearch cluster security group ID | string | - | yes |
+| index | Index/indices to process. Use a comma-separated list. Specify `all` to match every index except for `.kibana` | string | `all` | no |
+| index_format | Combined with 'index' variable and is used to evaluate the index age | string | `%Y.%m.%d` | no |
+| name | Solution name, e.g. 'app' or 'cluster' | string | `app` | no |
+| namespace | Namespace, which could be your organization name, e.g. 'eg' or 'cp' | string | - | yes |
+| python_version | The Python version to use | string | `2.7` | no |
+| schedule | CloudWatch Events rule schedule using cron or rate expression | string | `cron(0 3 * * ? *)` | no |
+| sns_arn | SNS ARN to pusblish alerts | string | `` | no |
+| stage | Stage, e.g. 'prod', 'staging', 'dev', or 'test' | string | - | yes |
+| subnet_ids | Subnet ids | list | - | yes |
+| tags | Additional tags (e.g. `map('BusinessUnit','XYZ')` | map | `