iam_splunk_sh.tf 1.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344
  1. # Creates an IAM role so that splunk can trigger creation of audit reports
  2. resource "aws_iam_role" "run_audit_report_role" {
  3. name = "run_audit_report_role"
  4. path = "/service/"
  5. assume_role_policy = jsonencode(
  6. {
  7. "Version" : "2012-10-17",
  8. "Statement" : [
  9. {
  10. "Effect" : "Allow",
  11. "Principal" : {
  12. "AWS" : "arn:${var.aws_partition}:iam::${var.c2_accounts[var.aws_partition]}:role/instance/moose-splunk-sh-instance-role"
  13. },
  14. "Action" : "sts:AssumeRole"
  15. }
  16. ]
  17. })
  18. tags = merge(local.standard_tags, var.tags)
  19. }
  20. data "aws_iam_policy_document" "run_audit_report_policy_doc" {
  21. statement {
  22. sid = ""
  23. effect = "Allow"
  24. resources = ["*"]
  25. actions = [
  26. "acm-pca:CreateCertificateAuthorityAuditReport"
  27. ]
  28. }
  29. }
  30. resource "aws_iam_policy" "run_audit_report_policy" {
  31. name = "run_audit_report_policy"
  32. path = "/"
  33. policy = data.aws_iam_policy_document.run_audit_report_policy_doc.json
  34. }
  35. resource "aws_iam_role_policy_attachment" "run_audit_report_policy_attach" {
  36. role = aws_iam_role.run_audit_report_role.name
  37. policy_arn = aws_iam_policy.run_audit_report_policy.arn
  38. }