-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[New Resource]: OpenSearch Ingestion Pipeline #31364
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
|
I am waiting for available on hashicorp/aws provider. |
I do not recommend the “awscc_osis_pipeline” resource. The awscc provider is pretty inflexible. If you use awscc_osis_pipeline, you will feel compelled to use awscc_iam_role_policy and awscc_iam_role, for example. awscc_iam_role doesn’t work like aws_iam_role with regards to tags, the outputs are named differently and worst of all the awscc_iam_role_policy only accepts a policy document as a map of strings, so you cannot pass it a json string, which makes it unsuitable for workloads where you want to create reusable modules and pass policies as json strings. |
Any progress? |
I echo @DanielViglione's opinion on not recommending Access control to AWS resources through the AWS Cloud Control API is very crude (pun intended) - while you can restrict actions based on Create / Read / Update / Delete or List, this access is not granular and is given to all resources within the AWS account, AWS CC does not currently support resource-level permissions or conditions. Reference: https://docs.aws.amazon.com/cloudcontrolapi/latest/userguide/security.html To me, creating resources with AWS Cloud Control API is like sudo vim'ing a config file as root.
^ as @cameronattard pointed out this is something else that cannot substitute AWS Ingestion Pipeline. |
FYI that is for a totally separate thing from AWS OpenSearch Ingestion Pipelines - https://opensearch.org/docs/latest/ingest-pipelines/create-ingest/ |
Any updates on this? |
Just curious if there are updates on this. Thanks! |
hi folks, i'll be raising the PR for this tomorrow. |
Will this be included in the next release of terraform provider for aws ? |
This functionality has been released in v5.36.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
Amazon OpenSearch Ingestion is a fully managed, serverless data collector that delivers real-time log, metric, and trace data to Amazon OpenSearch Service domains and OpenSearch Serverless collections.
Requested Resource(s) and/or Data Source(s)
Potential Terraform Configuration
References
https://pkg.go.dev/github.com/aws/[email protected]/service/osis
Would you like to implement a fix?
Yes
The text was updated successfully, but these errors were encountered: