You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
That module also have the variable create_iam_service_linked_role; if it is set to true, it will create AWSServiceRoleForAmazonElasticsearchService with the attached AWS managed policy for ES
If it is set to false it will use existing AWSServiceRoleForAmazonElasticsearchService role and attach it to the created Domain
This module creates its own role that lacks ES-required capabilities.
And also creates a policy attached to the cloud watch log stream without principal,
so permissions should be set in the assumed role.
So terraform fails with an error.
ValidationException: The Resource Access Policy specified for the CloudWatch Logs log group dev-testnet-opensearch-cloudwatch does not grant sufficient permissions for Amazon OpenSearch Service to create a log stream. Please check the Resource Access Policy.
Expected Behavior
I want to be able to create a policy attached to the log stream like follow, (with the principal):
Should be possible to use these two modules together, without hacks.
Describe the Ideal Solution
Possibility to define own aws_iam_policy_document to attach to log stream
or add parametric values to an existing policy with the possibility to set principal
The text was updated successfully, but these errors were encountered:
vvchik
changed the title
Is it exist Easy way to use this module with cloudposse/elasticsearch/aws?
Is it exist an Easy way to use this module with cloudposse/elasticsearch/aws?
Apr 25, 2023
Have a question? Please checkout our Slack Community or visit our Slack Archive.
Describe the Feature
In
cloudposse/elasticsearch/aws
we have following variablesThat module also have the variable
create_iam_service_linked_role
; if it is set totrue
, it will createAWSServiceRoleForAmazonElasticsearchService
with the attached AWS managed policy for ESIf it is set to
false
it will use existingAWSServiceRoleForAmazonElasticsearchService
role and attach it to the created DomainThis module creates its own role that lacks ES-required capabilities.
And also creates a policy attached to the cloud watch log stream without principal,
so permissions should be set in the assumed role.
So terraform fails with an error.
Expected Behavior
I want to be able to create a policy attached to the log stream like follow, (with the principal):
So that gives a possibility to use the original ES role from another module.
A working example in plain teraform https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elasticsearch_domain#log-publishing-to-cloudwatch-logs
Use Case
Should be possible to use these two modules together, without hacks.
Describe the Ideal Solution
Possibility to define own
aws_iam_policy_document
to attach to log streamor add parametric values to an existing policy with the possibility to set principal
The text was updated successfully, but these errors were encountered: