Skip to content

Commit edefb26

Browse files
authored
doc: Updates README with details on AWS Secrets Manager profile naming for CloudFormation (#1307)
1 parent 9ccfdae commit edefb26

File tree

5 files changed

+3
-7
lines changed

5 files changed

+3
-7
lines changed

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@ SecretValue: {"PublicKey": "YourPublicKey", "PrivateKey": "YourPrivateKey"}
5050
```
5151

5252
To create a new secret for a default profile, use the [PROFILE SECRET TEMPLATE](/examples/profile-secret.yaml) file provided in this repository.
53+
The secret must exist in the same AWS account and AWS region where the Cloudformation stack is run.
5354

5455
Here are some examples of how to use this template:
5556

cfn-resources/cloud-backup-snapshot-export-bucket/resource-role.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ Resources:
2424
- Effect: Allow
2525
Action:
2626
- "secretsmanager:CreateSecret"
27-
- "secretsmanager:CreateSecretInput"
2827
- "secretsmanager:DescribeSecret"
2928
- "secretsmanager:GetSecretValue"
3029
- "secretsmanager:PutSecretValue"

cfn-resources/custom-db-role/resource-role.yaml

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,6 @@ Resources:
3030
Statement:
3131
- Effect: Allow
3232
Action:
33-
- "initech:CreateReport"
34-
- "initech:DeleteReport"
35-
- "initech:DescribeReport"
36-
- "initech:ListReports"
37-
- "initech:UpdateReport"
3833
- "secretsmanager:GetSecretValue"
3934
Resource: "*"
4035
Outputs:

cfn-resources/global-cluster-config/resource-role.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ Resources:
2424
- Effect: Allow
2525
Action:
2626
- "secretsmanager:CreateSecret"
27-
- "secretsmanager:CreateSecretInput"
2827
- "secretsmanager:DescribeSecret"
2928
- "secretsmanager:GetSecretValue"
3029
- "secretsmanager:PutSecretValue"

examples/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ You must [configure API keys](https://www.mongodb.com/docs/atlas/configure-api-a
1313
### CloudFormation Profile
1414
You should create a profile in the AWS Secrets Manager that contains the MongoDB Atlas Programmatic API Key.
1515

16+
The secret must be named `cfn/atlas/profile/{ProfileName}` and exist in the same AWS account and AWS region where the Cloudformation stack is run.
17+
1618
Use [this template](profile-secret.yaml) to create a [new CloudFormation stack](https://console.aws.amazon.com/cloudformation/home#/stacks/create) for the default profile that all resources attempt to use unless you specify a different profile.
1719

1820
### Configure the IAM Execution Role

0 commit comments

Comments
 (0)