-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support AWS IAM Access Analyzer #11102
Comments
Reference: #11102 Output from acceptance testing: ``` --- PASS: TestAccAWSAccessAnalyzer (62.76s) --- PASS: TestAccAWSAccessAnalyzer/Analyzer (62.76s) --- PASS: TestAccAWSAccessAnalyzer/Analyzer/disappears (12.93s) --- PASS: TestAccAWSAccessAnalyzer/Analyzer/Tags (34.06s) --- PASS: TestAccAWSAccessAnalyzer/Analyzer/basic (15.77s) ```
Submitted the I agree with keeping the archive rules as a separate resource even though the analyzers do support inline archive rules as we do not need more security group vs security group rule confusion/trouble. 😄 |
I know I always appreciate having an option to enforce an exclusive configuration of something, where terraform removes anything not specified in the config... Not sure how that would work with separate resources, but maybe a consideration. |
@lorengordon noted! We could not enforce exclusive management given Terraform's available functionality. We typically will want to lean towards being flexible for organizational/workflow boundaries (e.g. where rules may get defined in downstream Terraform modules with their associated resources) with API implementations that allow it, but we can certainly support both the separate and inline methods if its desirable for the community, by including the warnings about incompatibilities for managing them multiple ways. |
I was thinking the rule resource could be plural, |
Reference: #11102 Output from acceptance testing: ``` --- PASS: TestAccAWSAccessAnalyzer (62.76s) --- PASS: TestAccAWSAccessAnalyzer/Analyzer (62.76s) --- PASS: TestAccAWSAccessAnalyzer/Analyzer/disappears (12.93s) --- PASS: TestAccAWSAccessAnalyzer/Analyzer/Tags (34.06s) --- PASS: TestAccAWSAccessAnalyzer/Analyzer/basic (15.77s) ```
Support for the new |
@ewbankkit @bflad Any example usage available for aws_accessanalyzer_archive_rule resource in Terraform ? |
It would also be very useful to be able to create delegated administrators for Access Analyzer from terraform, c.f. https://aws.amazon.com/blogs/aws/new-use-aws-iam-access-analyzer-in-aws-organizations/ |
Hey all - thank you for adding the IAM Access Analyzer. I was wondering (if my understanding is correct, the Thanks in advance! |
@ina-stoyanova you can do it via aws_cli command via shell script with for loop to add archive rules + you can call that shell script with Terraform null resource. |
Thank you @Sutharshansharma 👍 |
Adding another vote for supporting the |
Access Analyzer recently released some new functionality to analyze AWS IAM policies: https://aws.amazon.com/blogs/aws/iam-access-analyzer-update-policy-validation/ It would be interesting if this API could be wired into and exposed during plans for the |
This functionality has been released in v4.21.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
IAM Access Analyzer announced.
New or Affected Resource(s)
It looks like an initial set of resources could be:
aws_accessanalyzer_analyzer
aws_accessanalyzer_organization_admin_account
aws_accessanalyzer_archive_rule
References
Announcement.
Blog post.
User guide.
API reference.
Requires AWS SDK v1.25.45:
The text was updated successfully, but these errors were encountered: