Skip to content

Commit

Permalink
[STRATCONN-2814] - Fix role policies for AWS destinations
Browse files Browse the repository at this point in the history
  • Loading branch information
varadarajan-tw committed Aug 7, 2023
1 parent 4c62008 commit d3c237c
Show file tree
Hide file tree
Showing 4 changed files with 9 additions and 9 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -144,7 +144,7 @@ To attach multiple sources to your IAM role:
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::595280932656:root"
"AWS": "arn:aws:iam::595280932656:role/customer-firehose-access"
},
"Action": "sts:AssumeRole",
"Condition": {
Expand All @@ -166,7 +166,7 @@ To attach multiple sources to your IAM role:
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::595280932656:root"
"AWS": "arn:aws:iam::595280932656:role/customer-firehose-access"
},
"Action": "sts:AssumeRole",
"Condition": {
Expand Down Expand Up @@ -198,7 +198,7 @@ To set this value for a Secret ID:
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::595280932656:root"
"AWS": "arn:aws:iam::595280932656:role/customer-firehose-access"
},
"Action": "sts:AssumeRole",
"Condition": {
Expand Down
6 changes: 3 additions & 3 deletions src/connections/destinations/catalog/amazon-kinesis/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -155,7 +155,7 @@ To attach multiple sources to your IAM role:
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::595280932656:root"
"AWS": "arn:aws:iam::595280932656:role/customer-kinesis-access"
},
"Action": "sts:AssumeRole",
"Condition": {
Expand All @@ -175,7 +175,7 @@ To attach multiple sources to your IAM role:
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::595280932656:root"
"AWS": "arn:aws:iam::595280932656:role/customer-kinesis-access"
},
"Action": "sts:AssumeRole",
"Condition": {
Expand Down Expand Up @@ -228,7 +228,7 @@ If you have many sources using Kinesis that it's impractical to attach all of th
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::595280932656:root"
"AWS": "arn:aws:iam::595280932656:role/customer-kinesis-access"
},
"Action": "sts:AssumeRole",
"Condition": {
Expand Down
4 changes: 2 additions & 2 deletions src/connections/destinations/catalog/amazon-lambda/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -146,7 +146,7 @@ To create an IAM role:
![A screenshot of the AWS IAM home summary, with the Trust relationships tab selected.](images/LambdaTrustRelationship.png)

7. Copy and paste the following code into your trust relationship. You should replace `<your-source-id>` with either the Source ID of the attached Segment source (the default) or the External ID set in your AWS Lambda destination settings.
* `arn:aws:iam::595280932656:root` refers to Segment's AWS Account, and is what allows Segment's Destination to access the role to invoke your Lambda.
* `arn:aws:iam::595280932656:role/customer-lambda-prod-destination-access` refers to Segment's AWS Account, and is what allows Segment's Destination to access the role to invoke your Lambda.

> note ""
> **Note**: Source ID can be found by navigating to **Settings > API Keys** from your Segment source homepage.
Expand All @@ -158,7 +158,7 @@ To create an IAM role:
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::595280932656:root"
"AWS": "arn:aws:iam::595280932656:role/customer-lambda-prod-destination-access"
},
"Action": "sts:AssumeRole",
"Condition": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -691,7 +691,7 @@ To create an IAM role:
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::595280932656:root"
"AWS": "arn:aws:iam::595280932656:role/customer-personalize-prod-destination-access"
},
"Action": "sts:AssumeRole",
"Condition": {
Expand Down

0 comments on commit d3c237c

Please sign in to comment.