You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Allow provider to use the external ID when assuming the role in the p… (#357)
* Allow provider to use the external ID when assuming the role in the provider configuration set up
* Update the provider documentation
* copy pasta no good
---------
Co-authored-by: mannai2 <[email protected]>
Copy file name to clipboardExpand all lines: docs/index.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,6 +63,7 @@ The following arguments are supported:
63
63
*`username` (Optional) - Username to use to connect to elasticsearch using basic auth. Defaults to `ELASTICSEARCH_USERNAME` from the environment
64
64
*`password` (Optional) - Password to use to connect to elasticsearch using basic auth. Defaults to `ELASTICSEARCH_PASSWORD` from the environment
65
65
*`aws_assume_role_arn` (Optional) - ARN of role to assume when using AWS Elasticsearch Service domains.
66
+
*`aws_assume_role_external_id` (Optional) - External ID configured in the IAM policy of the IAM Role to assume prior to using AWS Elasticsearch Service domains.
66
67
*`aws_assume_role_session_name` - AWS IAM session name to use when assuming a role.
67
68
*`aws_access_key` (Optional) - The access key for use with AWS Elasticsearch Service domains. It can also be sourced from the `AWS_ACCESS_KEY_ID` environment variable.
68
69
*`aws_secret_key` (Optional) - The secret key for use with AWS Elasticsearch Service domains. It can also be sourced from the `AWS_SECRET_ACCESS_KEY` environment variable.
@@ -109,13 +110,15 @@ provider "elasticsearch" {
109
110
#### Assume role configuration
110
111
111
112
You can instruct the provider to assume a role in AWS before interacting with the cluster by setting the `aws_assume_role_arn` variable.
113
+
Optionnaly, you can configure the [External ID](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html) of IAM role trust policy by setting the `aws_assume_role_external_id` variable.
0 commit comments