From 228116c8ba00eec68c8495252cc894c3a4304e3a Mon Sep 17 00:00:00 2001 From: Igor Rodionov Date: Thu, 30 Jan 2020 11:33:00 +0600 Subject: [PATCH] Added IAM role session duration (#37) --- README.md | 148 +++++++++++++++++++++++++++++++--------------- docs/terraform.md | 7 ++- main.tf | 8 ++- output.tf | 2 +- variables.tf | 5 ++ 5 files changed, 115 insertions(+), 55 deletions(-) diff --git a/README.md b/README.md index 09eb71d..cfff9cf 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,43 @@ - + [![README Header][readme_header_img]][readme_header_link] [![Cloud Posse][logo]](https://cpco.io/homepage) @@ -55,6 +94,11 @@ If you don't enable zone awareness, Amazon ES places an endpoint into only one s ## Usage + +**IMPORTANT:** The `master` branch is used in `source` just as an example. In your code, do not pin to `master` because there may be breaking changes between releases. +Instead pin to the release tag (e.g. `?ref=tags/x.y.z`) of one of our [latest releases](https://github.com/cloudposse/terraform-aws-elasticsearch/releases). + + Basic [example](examples/basic) ```hcl @@ -97,7 +141,6 @@ Available targets: lint Lint terraform code ``` - ## Inputs | Name | Description | Type | Default | Required | @@ -115,12 +158,14 @@ Available targets: | ebs_iops | The baseline input/output (I/O) performance of EBS volumes attached to data nodes. Applicable only for the Provisioned IOPS EBS volume type | string | `0` | no | | ebs_volume_size | Optionally use EBS volumes for data storage by specifying volume size in GB | string | `0` | no | | ebs_volume_type | Storage type of EBS volumes | string | `gp2` | no | -| elasticsearch_version | Version of Elasticsearch to deploy | string | `6.2` | no | +| elasticsearch_version | Version of Elasticsearch to deploy | string | `6.5` | no | | enabled | Set to false to prevent the module from creating any resources | string | `true` | no | | encrypt_at_rest_enabled | Whether to enable encryption at rest | string | `true` | no | | encrypt_at_rest_kms_key_id | The KMS key id to encrypt the Elasticsearch domain with. If not specified, then it defaults to using the AWS/Elasticsearch service KMS key | string | `` | no | | iam_actions | List of actions to allow for the IAM roles, _e.g._ `es:ESHttpGet`, `es:ESHttpPut`, `es:ESHttpPost` | list | `` | no | +| iam_authorizing_role_arns | List of IAM role ARNs to permit to assume the Elasticsearch user role | list | `` | no | | iam_role_arns | List of IAM role ARNs to permit access to the Elasticsearch domain | list | `` | no | +| iam_role_max_session_duration | The maximum session duration (in seconds) for the user role. Can have a value from 1 hour to 12 hours | string | `3600` | no | | instance_count | Number of data nodes in the cluster | string | `4` | no | | instance_type | Elasticsearch instance type for data nodes in the cluster | string | `t2.small.elasticsearch` | no | | kibana_subdomain_name | The name of the subdomain for Kibana in the DNS zone (_e.g._ `kibana`, `ui`, `ui-es`, `search-ui`, `kibana.elasticsearch`) | string | `kibana` | no | @@ -148,6 +193,8 @@ Available targets: | domain_endpoint | Domain-specific endpoint used to submit index, search, and data upload requests | | domain_hostname | Elasticsearch domain hostname to submit index, search, and data upload requests | | domain_id | Unique identifier for the Elasticsearch domain | +| elasticsearch_user_iam_role_arn | The ARN of the IAM role to allow access to Elasticsearch cluster | +| elasticsearch_user_iam_role_name | The name of the IAM role to allow access to Elasticsearch cluster | | kibana_endpoint | Domain-specific endpoint for Kibana without https scheme | | kibana_hostname | Kibana hostname | | security_group_id | Security Group ID to control access to the Elasticsearch domain | @@ -173,34 +220,33 @@ For additional context, refer to some of these links. ## Help -**Got a question?** +**Got a question?** We got answers. File a GitHub [issue](https://github.com/cloudposse/terraform-aws-elasticsearch/issues), send us an [email][email] or join our [Slack Community][slack]. [![README Commercial Support][readme_commercial_support_img]][readme_commercial_support_link] -## Commercial Support - -Work directly with our team of DevOps experts via email, slack, and video conferencing. - -We provide [*commercial support*][commercial_support] for all of our [Open Source][github] projects. As a *Dedicated Support* customer, you have access to our team of subject matter experts at a fraction of the cost of a full-time engineer. - -[![E-Mail](https://img.shields.io/badge/email-hello@cloudposse.com-blue.svg)][email] +## DevOps Accelerator for Startups -- **Questions.** We'll use a Shared Slack channel between your team and ours. -- **Troubleshooting.** We'll help you triage why things aren't working. -- **Code Reviews.** We'll review your Pull Requests and provide constructive feedback. -- **Bug Fixes.** We'll rapidly work to fix any bugs in our projects. -- **Build New Terraform Modules.** We'll [develop original modules][module_development] to provision infrastructure. -- **Cloud Architecture.** We'll assist with your cloud strategy and design. -- **Implementation.** We'll provide hands-on support to implement our reference architectures. +We are a [**DevOps Accelerator**][commercial_support]. We'll help you build your cloud infrastructure from the ground up so you can own it. Then we'll show you how to operate it and stick around for as long as you need us. +[![Learn More](https://img.shields.io/badge/learn%20more-success.svg?style=for-the-badge)][commercial_support] -## Terraform Module Development +Work directly with our team of DevOps experts via email, slack, and video conferencing. -Are you interested in custom Terraform module development? Submit your inquiry using [our form][module_development] today and we'll get back to you ASAP. +We deliver 10x the value for a fraction of the cost of a full-time engineer. Our track record is not even funny. If you want things done right and you need it done FAST, then we're your best bet. +- **Reference Architecture.** You'll get everything you need from the ground up built using 100% infrastructure as code. +- **Release Engineering.** You'll have end-to-end CI/CD with unlimited staging environments. +- **Site Reliability Engineering.** You'll have total visibility into your apps and microservices. +- **Security Baseline.** You'll have built-in governance with accountability and audit logs for all changes. +- **GitOps.** You'll be able to operate your infrastructure via Pull Requests. +- **Training.** You'll receive hands-on training so your team can operate what we build. +- **Questions.** You'll have a direct line of communication between our teams via a Shared Slack channel. +- **Troubleshooting.** You'll get help to triage when things aren't working. +- **Code Reviews.** You'll receive constructive feedback on Pull Requests. +- **Bug Fixes.** We'll rapidly work with you to fix any bugs in our projects. ## Slack Community @@ -208,7 +254,13 @@ Join our [Open Source Community][slack] on Slack. It's **FREE** for everyone! Ou ## Newsletter -Signup for [our newsletter][newsletter] that covers everything on our technology radar. Receive updates on what we're up to on GitHub as well as awesome new projects we discover. +Sign up for [our newsletter][newsletter] that covers everything on our technology radar. Receive updates on what we're up to on GitHub as well as awesome new projects we discover. + +## Office Hours + +[Join us every Wednesday via Zoom][office_hours] for our weekly "Lunch & Learn" sessions. It's **FREE** for everyone! + +[![zoom](https://img.cloudposse.com/fit-in/200x200/https://cloudposse.com/wp-content/uploads/2019/08/Powered-by-Zoom.png")][office_hours] ## Contributing @@ -233,7 +285,7 @@ In general, PRs are welcome. We follow the typical "fork-and-pull" Git workflow. ## Copyright -Copyright © 2017-2018 [Cloud Posse, LLC](https://cpco.io/copyright) +Copyright © 2017-2020 [Cloud Posse, LLC](https://cpco.io/copyright) @@ -292,41 +344,39 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply |---|---|---|---| [osterman_homepage]: https://github.com/osterman - [osterman_avatar]: https://github.com/osterman.png?size=150 + [osterman_avatar]: https://img.cloudposse.com/150x150/https://github.com/osterman.png [aknysh_homepage]: https://github.com/aknysh - [aknysh_avatar]: https://github.com/aknysh.png?size=150 + [aknysh_avatar]: https://img.cloudposse.com/150x150/https://github.com/aknysh.png [goruha_homepage]: https://github.com/goruha - [goruha_avatar]: https://github.com/goruha.png?size=150 + [goruha_avatar]: https://img.cloudposse.com/150x150/https://github.com/goruha.png [sarkis_homepage]: https://github.com/sarkis - [sarkis_avatar]: https://github.com/sarkis.png?size=150 - - + [sarkis_avatar]: https://img.cloudposse.com/150x150/https://github.com/sarkis.png [![README Footer][readme_footer_img]][readme_footer_link] [![Beacon][beacon]][website] [logo]: https://cloudposse.com/logo-300x69.svg - [docs]: https://cpco.io/docs - [website]: https://cpco.io/homepage - [github]: https://cpco.io/github - [jobs]: https://cpco.io/jobs - [hire]: https://cpco.io/hire - [slack]: https://cpco.io/slack - [linkedin]: https://cpco.io/linkedin - [twitter]: https://cpco.io/twitter - [testimonial]: https://cpco.io/leave-testimonial - [newsletter]: https://cpco.io/newsletter - [email]: https://cpco.io/email - [commercial_support]: https://cpco.io/commercial-support - [we_love_open_source]: https://cpco.io/we-love-open-source - [module_development]: https://cpco.io/module-development - [terraform_modules]: https://cpco.io/terraform-modules - [readme_header_img]: https://cloudposse.com/readme/header/img?repo=cloudposse/terraform-aws-elasticsearch - [readme_header_link]: https://cloudposse.com/readme/header/link?repo=cloudposse/terraform-aws-elasticsearch - [readme_footer_img]: https://cloudposse.com/readme/footer/img?repo=cloudposse/terraform-aws-elasticsearch - [readme_footer_link]: https://cloudposse.com/readme/footer/link?repo=cloudposse/terraform-aws-elasticsearch - [readme_commercial_support_img]: https://cloudposse.com/readme/commercial-support/img?repo=cloudposse/terraform-aws-elasticsearch - [readme_commercial_support_link]: https://cloudposse.com/readme/commercial-support/link?repo=cloudposse/terraform-aws-elasticsearch + [docs]: https://cpco.io/docs?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=docs + [website]: https://cpco.io/homepage?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=website + [github]: https://cpco.io/github?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=github + [jobs]: https://cpco.io/jobs?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=jobs + [hire]: https://cpco.io/hire?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=hire + [slack]: https://cpco.io/slack?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=slack + [linkedin]: https://cpco.io/linkedin?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=linkedin + [twitter]: https://cpco.io/twitter?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=twitter + [testimonial]: https://cpco.io/leave-testimonial?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=testimonial + [office_hours]: https://cloudposse.com/office-hours?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=office_hours + [newsletter]: https://cpco.io/newsletter?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=newsletter + [email]: https://cpco.io/email?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=email + [commercial_support]: https://cpco.io/commercial-support?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=commercial_support + [we_love_open_source]: https://cpco.io/we-love-open-source?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=we_love_open_source + [terraform_modules]: https://cpco.io/terraform-modules?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=terraform_modules + [readme_header_img]: https://cloudposse.com/readme/header/img + [readme_header_link]: https://cloudposse.com/readme/header/link?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=readme_header_link + [readme_footer_img]: https://cloudposse.com/readme/footer/img + [readme_footer_link]: https://cloudposse.com/readme/footer/link?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=readme_footer_link + [readme_commercial_support_img]: https://cloudposse.com/readme/commercial-support/img + [readme_commercial_support_link]: https://cloudposse.com/readme/commercial-support/link?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-elasticsearch&utm_content=readme_commercial_support_link [share_twitter]: https://twitter.com/intent/tweet/?text=terraform-aws-elasticsearch&url=https://github.com/cloudposse/terraform-aws-elasticsearch [share_linkedin]: https://www.linkedin.com/shareArticle?mini=true&title=terraform-aws-elasticsearch&url=https://github.com/cloudposse/terraform-aws-elasticsearch [share_reddit]: https://reddit.com/submit/?url=https://github.com/cloudposse/terraform-aws-elasticsearch diff --git a/docs/terraform.md b/docs/terraform.md index bb01637..8e1b29b 100644 --- a/docs/terraform.md +++ b/docs/terraform.md @@ -1,4 +1,3 @@ - ## Inputs | Name | Description | Type | Default | Required | @@ -16,12 +15,14 @@ | ebs_iops | The baseline input/output (I/O) performance of EBS volumes attached to data nodes. Applicable only for the Provisioned IOPS EBS volume type | string | `0` | no | | ebs_volume_size | Optionally use EBS volumes for data storage by specifying volume size in GB | string | `0` | no | | ebs_volume_type | Storage type of EBS volumes | string | `gp2` | no | -| elasticsearch_version | Version of Elasticsearch to deploy | string | `6.2` | no | +| elasticsearch_version | Version of Elasticsearch to deploy | string | `6.5` | no | | enabled | Set to false to prevent the module from creating any resources | string | `true` | no | | encrypt_at_rest_enabled | Whether to enable encryption at rest | string | `true` | no | | encrypt_at_rest_kms_key_id | The KMS key id to encrypt the Elasticsearch domain with. If not specified, then it defaults to using the AWS/Elasticsearch service KMS key | string | `` | no | | iam_actions | List of actions to allow for the IAM roles, _e.g._ `es:ESHttpGet`, `es:ESHttpPut`, `es:ESHttpPost` | list | `` | no | +| iam_authorizing_role_arns | List of IAM role ARNs to permit to assume the Elasticsearch user role | list | `` | no | | iam_role_arns | List of IAM role ARNs to permit access to the Elasticsearch domain | list | `` | no | +| iam_role_max_session_duration | The maximum session duration (in seconds) for the user role. Can have a value from 1 hour to 12 hours | string | `3600` | no | | instance_count | Number of data nodes in the cluster | string | `4` | no | | instance_type | Elasticsearch instance type for data nodes in the cluster | string | `t2.small.elasticsearch` | no | | kibana_subdomain_name | The name of the subdomain for Kibana in the DNS zone (_e.g._ `kibana`, `ui`, `ui-es`, `search-ui`, `kibana.elasticsearch`) | string | `kibana` | no | @@ -49,6 +50,8 @@ | domain_endpoint | Domain-specific endpoint used to submit index, search, and data upload requests | | domain_hostname | Elasticsearch domain hostname to submit index, search, and data upload requests | | domain_id | Unique identifier for the Elasticsearch domain | +| elasticsearch_user_iam_role_arn | The ARN of the IAM role to allow access to Elasticsearch cluster | +| elasticsearch_user_iam_role_name | The name of the IAM role to allow access to Elasticsearch cluster | | kibana_endpoint | Domain-specific endpoint for Kibana without https scheme | | kibana_hostname | Kibana hostname | | security_group_id | Security Group ID to control access to the Elasticsearch domain | diff --git a/main.tf b/main.tf index e8ed158..39c28b1 100644 --- a/main.tf +++ b/main.tf @@ -75,6 +75,8 @@ resource "aws_iam_role" "elasticsearch_user" { assume_role_policy = "${data.aws_iam_policy_document.assume_role.json}" description = "IAM Role to assume to access the Elasticsearch ${module.label.id} cluster" tags = "${module.user_label.tags}" + + max_session_duration = "${var.iam_role_max_session_duration}" } data "aws_iam_policy_document" "assume_role" { @@ -141,19 +143,19 @@ resource "aws_elasticsearch_domain" "default" { } log_publishing_options { - enabled = "${var.log_publishing_index_enabled }" + enabled = "${var.log_publishing_index_enabled}" log_type = "INDEX_SLOW_LOGS" cloudwatch_log_group_arn = "${var.log_publishing_index_cloudwatch_log_group_arn}" } log_publishing_options { - enabled = "${var.log_publishing_search_enabled }" + enabled = "${var.log_publishing_search_enabled}" log_type = "SEARCH_SLOW_LOGS" cloudwatch_log_group_arn = "${var.log_publishing_search_cloudwatch_log_group_arn}" } log_publishing_options { - enabled = "${var.log_publishing_application_enabled }" + enabled = "${var.log_publishing_application_enabled}" log_type = "ES_APPLICATION_LOGS" cloudwatch_log_group_arn = "${var.log_publishing_application_cloudwatch_log_group_arn}" } diff --git a/output.tf b/output.tf index 43f7f7e..8ad24d9 100644 --- a/output.tf +++ b/output.tf @@ -39,6 +39,6 @@ output "elasticsearch_user_iam_role_name" { } output "elasticsearch_user_iam_role_arn" { - value = "${join(",",aws_iam_role.elasticsearch_user.*.arn)}" + value = "${join(",", aws_iam_role.elasticsearch_user.*.arn)}" description = "The ARN of the IAM role to allow access to Elasticsearch cluster" } diff --git a/variables.tf b/variables.tf index 14dd36e..8fbcb93 100644 --- a/variables.tf +++ b/variables.tf @@ -215,3 +215,8 @@ variable "node_to_node_encryption_enabled" { default = "false" description = "Whether to enable node-to-node encryption" } + +variable "iam_role_max_session_duration" { + default = 3600 + description = "The maximum session duration (in seconds) for the user role. Can have a value from 1 hour to 12 hours" +}