Skip to content

Commit 1219988

Browse files
committed
Update with iam:SimulatePrincipalPolicy
1 parent 6e220d9 commit 1219988

File tree

1 file changed

+9
-5
lines changed
  • src/connections/destinations/catalog/amazon-kinesis

1 file changed

+9
-5
lines changed

src/connections/destinations/catalog/amazon-kinesis/index.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,16 +24,18 @@ This document was last updated on February 05, 2020. If you notice any gaps, out
2424
"Effect": "Allow",
2525
"Action": [
2626
"kinesis:PutRecord",
27-
"kinesis:PutRecords"
27+
"kinesis:PutRecords",
28+
"iam:SimulatePrincipalPolicy"
2829
],
2930
"Resource": [
30-
"arn:aws:kinesis:{region}:{account-id}:stream/{stream-name}"
31+
"arn:aws:kinesis:{region}:{account-id}:stream/{stream-name}",
32+
"arn:aws:iam::{account-id}:role/{role-name}"
3133
]
3234
}
3335
]
3436
}
3537
```
36-
**Note:** A previous version of this policy document only granted `PutRecord` access, which could slow down Kinesis write times by disallowing file batching. Substitute the updated policy document above to grant Kinesis `PutRecords` (plural) and allow batching.
38+
**Note:** A previous version of this policy document only granted `PutRecord` access, which could slow down Kinesis write times by disallowing file batching. Substitute the updated policy document above to grant Kinesis `PutRecords` (plural) and allow batching. We've also requested `iam:SimulatePrincipalPolicy`, which will allow us to verify that the IAM Role has the appropriate Kinesis permissions without invoking the Kinesis API.
3739

3840
3. Create an IAM role.
3941
Follow these instructions to [Create an IAM role](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html#roles-creatingrole-user-console) to allow Segment permission to write to your Kinesis Stream. When prompted to enter an Account ID, enter "595280932656". Make sure to enable 'Require External ID' and enter your Segment Source ID as the External ID*. This can be found by navigating to Settings > API Keys from your Segment source homepage. When adding permissions to your new role, find the policy you created above and attach it.
@@ -189,10 +191,12 @@ The Kinesis destination defaults to use PutRecords. A previous version of the IA
189191
"Effect": "Allow",
190192
"Action": [
191193
"kinesis:PutRecord",
192-
"kinesis:PutRecords"
194+
"kinesis:PutRecords",
195+
"iam:SimulatePrincipalPolicy"
193196
],
194197
"Resource": [
195-
"arn:aws:kinesis:{region}:{account-id}:stream/{stream-name}"
198+
"arn:aws:kinesis:{region}:{account-id}:stream/{stream-name}",
199+
"arn:aws:iam::{account-id}:role/{role-name}"
196200
]
197201
}
198202
]

0 commit comments

Comments
 (0)