-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS::Elasticsearch::Domain-AdvancedSecurityOptions #384
Comments
Duplicate of #201 |
Support for |
Hi, any news on the release of this feature, fine grained access is an important feature which skyrockets the use cases of Amazon Elasticsearch Service. Depending on custom resources is a decision which creates maintenance difficulties. |
Three years have passed, still no actions. Any workaround for me to be able to still use Cloudformation? |
@valentine-calabrio yes. You can resort to a custom resource. Here's what I have. I think this is full featured (eg: All the !Ref's are accounted for in the code).
|
@natefox have you confirmed this works because Advanced Security Options like FGAC cannot be added other than at creation time. Other options like Logging Options I’ve done with custom resources like you suggested but the Advanced Security ones don’t allow for Update so this won’t work. |
@natefox you cannot update Advanced Securiy options after creation Time.
|
You know what, I missed that |
Would like to see this build at we rely on CF template. We will end up custom resource only to throw it away. Any idea on timing of this ? |
We need to re-write an entire existing resource ouselves as a custom resource , that creates an entire E ES because of this one missing functionality that MUST be done at CREATION time. This product can not be used by enterprise like this. |
Any update on this functionality? |
Please implement this. Fine grained access controls finally makes AWS Elasticsearch a real viable solution for our security minded ELK stack. However, the inability to launch it using an infrastructure as code approach goes against our principles. Making our own custom resource is just painful and a big waste of effort. |
I am implementing this using Amazon CloudFormation Custom Resource at: Will notify when I finish. |
Here is my implementation using custom resource + lambda function + node.js: |
Shipped on Aug 11 :) |
2. Scope of request
Cloudformation support for the newly released Fine-Grained Access Control feature
3. Expected behavior
Requires that Node to Node encryption, encryption at rest, and HTTPS only endpoint be enabled. HTTPS only endpoint is also raised as an issue which has not yet been delivered.
AWS::Elasticsearch::Domain-DomainEndpointOptions
5. Helpful Links to speed up research and evaluation
Updated API docs at https://docs.aws.amazon.com/elasticsearch-service/latest/developerguide/es-configuration-api.html#es-configuration-api-datatypes-advancedsec
6. Category
Analytics
The text was updated successfully, but these errors were encountered: