You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,8 @@
1
+
## 6.9.0
2
+
3
+
IMPROVEMENTS:
4
+
* resource/signalfx_aws_integration: Add support for AWS metric streams and AWS logs synchronization [#351](https://github.com/splunk-terraform/terraform-provider-signalfx/pull/351)[#353](https://github.com/splunk-terraform/terraform-provider-signalfx/pull/353)
To also run the AWS integration tests for Cloudwatch Metric Streams synchronization, you must create an actual AWS IAM user with an access key and secret that SignalFx can use to manage AWS Cloudwatch Metric Streams resources, and define the `SFX_TEST_AWS_ACCESS_KEY_ID` and `SFX_TEST_AWS_SECRET_ACCESS_KEY` environment variables:
68
+
To also run the AWS integration tests for CloudWatch Metric Streams and AWS logs synchronization, you must create an actual AWS IAM user with an access key and secret that SignalFx can use to manage AWS resources, and define the `SFX_TEST_AWS_ACCESS_KEY_ID` and `SFX_TEST_AWS_SECRET_ACCESS_KEY` environment variables:
69
69
70
70
```sh
71
71
export SFX_TEST_AWS_ACCESS_KEY_ID=AKIAXXXXXX
72
72
export SFX_TEST_AWS_SECRET_ACCESS_KEY=XXXXXX
73
73
```
74
74
75
-
The policies that this user must be granted are:
75
+
The following permissions must be granted. Additional permissions may be required to capture logs from specific AWS services.
76
76
77
77
```
78
-
"cloudwatch:ListMetricStreams",
78
+
"cloudwatch:DeleteMetricStream",
79
79
"cloudwatch:GetMetricStream",
80
+
"cloudwatch:ListMetricStreams",
80
81
"cloudwatch:PutMetricStream",
81
-
"cloudwatch:DeleteMetricStream",
82
82
"cloudwatch:StartMetricStreams",
83
83
"cloudwatch:StopMetricStreams",
84
-
"iam:PassRole"
84
+
"iam:PassRole",
85
+
86
+
"logs:DeleteSubscriptionFilter",
87
+
"logs:DescribeLogGroups",
88
+
"logs:DescribeSubscriptionFilters",
89
+
"logs:PutSubscriptionFilter",
90
+
"s3:GetBucketLogging",
91
+
"s3:GetBucketNotification",
92
+
"s3:PutBucketNotification"
85
93
```
86
94
87
95
See [Connect to AWS using the guided setup in Splunk Observability Cloud](https://docs.splunk.com/Observability/gdi/get-data-in/connect/aws/aws-wizardconfig.html) and [Enable CloudWatch Metric Streams](https://docs.splunk.com/Observability/gdi/get-data-in/connect/aws/aws-apiconfig.html#enable-cloudwatch-metric-streams) in Splunk documentation for more details about creating that IAM policy.
0 commit comments