instance_profile.tf 957 B

12345678910111213141516171819202122232425262728293031323334
  1. module "instance_profile" {
  2. source = "../../../submodules/iam/base_instance_profile"
  3. prefix = "xdr-custsh"
  4. aws_partition = var.aws_partition
  5. aws_account_id = var.aws_account_id
  6. }
  7. # Customer SH Specific Policy
  8. resource "aws_iam_policy" "instance_policy" {
  9. name = "custsh_instance_policy"
  10. path = "/launchroles/"
  11. description = "This policy allows custsh-specific functions"
  12. policy = data.aws_iam_policy_document.instance_policy_doc.json
  13. }
  14. data "aws_iam_policy_document" "instance_policy_doc" {
  15. statement {
  16. sid = "AllowAssumeRoleToSplunkApps"
  17. effect = "Allow"
  18. actions = [
  19. "sts:AssumeRole"
  20. ]
  21. resources = [
  22. "arn:${var.aws_partition}:iam::${var.aws_account_id}:role/service/splunk-apps-s3"
  23. ]
  24. }
  25. }
  26. resource "aws_iam_role_policy_attachment" "instance_policy_attach" {
  27. role = module.instance_profile.role_id
  28. policy_arn = aws_iam_policy.instance_policy.arn
  29. }