Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitcff6e1a

Browse files
authored
Merge pull requestsegmentio#5137 from segmentio/fix-entire-role-account-in-aws-policy
[STRATCONN-2814]: Fix role policies for AWS destinations
2 parentsf4b58c1 +d3c237c commitcff6e1a

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

‎src/connections/destinations/catalog/amazon-kinesis-firehose/index.md‎

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ To attach multiple sources to your IAM role:
144144
{
145145
"Effect":"Allow",
146146
"Principal": {
147-
"AWS":"arn:aws:iam::595280932656:root"
147+
"AWS":"arn:aws:iam::595280932656:role/customer-firehose-access"
148148
},
149149
"Action":"sts:AssumeRole",
150150
"Condition": {
@@ -166,7 +166,7 @@ To attach multiple sources to your IAM role:
166166
{
167167
"Effect":"Allow",
168168
"Principal": {
169-
"AWS":"arn:aws:iam::595280932656:root"
169+
"AWS":"arn:aws:iam::595280932656:role/customer-firehose-access"
170170
},
171171
"Action":"sts:AssumeRole",
172172
"Condition": {
@@ -198,7 +198,7 @@ To set this value for a Secret ID:
198198
{
199199
"Effect":"Allow",
200200
"Principal": {
201-
"AWS":"arn:aws:iam::595280932656:root"
201+
"AWS":"arn:aws:iam::595280932656:role/customer-firehose-access"
202202
},
203203
"Action":"sts:AssumeRole",
204204
"Condition": {

‎src/connections/destinations/catalog/amazon-kinesis/index.md‎

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ To attach multiple sources to your IAM role:
155155
{
156156
"Effect":"Allow",
157157
"Principal": {
158-
"AWS":"arn:aws:iam::595280932656:root"
158+
"AWS":"arn:aws:iam::595280932656:role/customer-kinesis-access"
159159
},
160160
"Action":"sts:AssumeRole",
161161
"Condition": {
@@ -175,7 +175,7 @@ To attach multiple sources to your IAM role:
175175
{
176176
"Effect":"Allow",
177177
"Principal": {
178-
"AWS":"arn:aws:iam::595280932656:root"
178+
"AWS":"arn:aws:iam::595280932656:role/customer-kinesis-access"
179179
},
180180
"Action":"sts:AssumeRole",
181181
"Condition": {
@@ -228,7 +228,7 @@ If you have many sources using Kinesis that it's impractical to attach all of th
228228
{
229229
"Effect":"Allow",
230230
"Principal": {
231-
"AWS":"arn:aws:iam::595280932656:root"
231+
"AWS":"arn:aws:iam::595280932656:role/customer-kinesis-access"
232232
},
233233
"Action":"sts:AssumeRole",
234234
"Condition": {

‎src/connections/destinations/catalog/amazon-lambda/index.md‎

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ To create an IAM role:
146146
![A screenshot of the AWS IAM home summary, with the Trust relationships tab selected.](images/LambdaTrustRelationship.png)
147147

148148
7. Copy and paste the following code into your trust relationship. You should replace`<your-source-id>` with either the Source ID of the attached Segment source (the default) or the External ID set in your AWS Lambda destination settings.
149-
*`arn:aws:iam::595280932656:root` refers to Segment's AWS Account, and is what allows Segment's Destination to access the role to invoke your Lambda.
149+
*`arn:aws:iam::595280932656:role/customer-lambda-prod-destination-access` refers to Segment's AWS Account, and is what allows Segment's Destination to access the role to invoke your Lambda.
150150

151151
>note ""
152152
>**Note**: Source ID can be found by navigating to**Settings > API Keys** from your Segment source homepage.
@@ -158,7 +158,7 @@ To create an IAM role:
158158
{
159159
"Effect": "Allow",
160160
"Principal": {
161-
"AWS": "arn:aws:iam::595280932656:root"
161+
"AWS": "arn:aws:iam::595280932656:role/customer-lambda-prod-destination-access"
162162
},
163163
"Action": "sts:AssumeRole",
164164
"Condition": {

‎src/connections/destinations/catalog/amazon-personalize/index.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -691,7 +691,7 @@ To create an IAM role:
691691
{
692692
"Effect":"Allow",
693693
"Principal": {
694-
"AWS":"arn:aws:iam::595280932656:root"
694+
"AWS":"arn:aws:iam::595280932656:role/customer-personalize-prod-destination-access"
695695
},
696696
"Action":"sts:AssumeRole",
697697
"Condition": {

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp