<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS IAM Role in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113022#M8282</link>
    <description>&lt;P&gt;You can create a user specifically for the purpose of handling the Splunk Enterprise connection, assign them to the IAM role, then use that set of credentials when you set up the add-on and configure the connection to the AWS account. &lt;/P&gt;</description>
    <pubDate>Fri, 10 Jul 2015 20:34:29 GMT</pubDate>
    <dc:creator>rpille_splunk</dc:creator>
    <dc:date>2015-07-10T20:34:29Z</dc:date>
    <item>
      <title>AWS IAM Role</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113019#M8279</link>
      <description>&lt;P&gt;Is it possible to have the Splunk Add-on for AWS use the IAM Role assigned to the splunk server instead of using AWS user credentials?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2015 15:24:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113019#M8279</guid>
      <dc:creator>davidhofmann</dc:creator>
      <dc:date>2015-07-10T15:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IAM Role</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113020#M8280</link>
      <description>&lt;P&gt;Yes, you can. That is in fact the recommended way to handle this. See &lt;A href="http://docs.splunk.com/Documentation/AddOns/latest/AWS/ConfigureAWSpermissions"&gt;http://docs.splunk.com/Documentation/AddOns/latest/AWS/ConfigureAWSpermissions&lt;/A&gt; for details about the permissions. The docs say: "You can use the AWS Policy Generator tool to collect all permissions into one centrally managed policy that you can apply to the IAM used by the Splunk Enterprise server."&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2015 19:26:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113020#M8280</guid>
      <dc:creator>rpille_splunk</dc:creator>
      <dc:date>2015-07-10T19:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IAM Role</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113021#M8281</link>
      <description>&lt;P&gt;Thanks. Policy wise I can set that up, but I'm not sure how to configure it on the splunk server side once I've assigned the IAM role to the server. &lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2015 19:58:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113021#M8281</guid>
      <dc:creator>davidhofmann</dc:creator>
      <dc:date>2015-07-10T19:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IAM Role</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113022#M8282</link>
      <description>&lt;P&gt;You can create a user specifically for the purpose of handling the Splunk Enterprise connection, assign them to the IAM role, then use that set of credentials when you set up the add-on and configure the connection to the AWS account. &lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2015 20:34:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113022#M8282</guid>
      <dc:creator>rpille_splunk</dc:creator>
      <dc:date>2015-07-10T20:34:29Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IAM Role</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113023#M8283</link>
      <description>&lt;P&gt;That's what I'm doing now. But I was wondering if it's possible to not use user creditals and instead use the Server assigned role. &lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2015 12:52:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113023#M8283</guid>
      <dc:creator>davidhofmann</dc:creator>
      <dc:date>2015-07-13T12:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IAM Role</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113024#M8284</link>
      <description>&lt;P&gt;I see what you mean. No, not at this time. As it is designed, the add-on's connection with AWS depends on an account key ID and secret key.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2015 17:20:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/AWS-IAM-Role/m-p/113024#M8284</guid>
      <dc:creator>rpille_splunk</dc:creator>
      <dc:date>2015-07-13T17:20:04Z</dc:date>
    </item>
  </channel>
</rss>

