I have been using the documentation, but AWS user permissions, groups and policies are confusing enough, to add the documentation doesn't seem very clear to me.
So on my event collector where I do all the configurations, I have the autodiscovered ec2 role for the eventcollector machine configured so it can access information in that account for the AWS app. I want to add more AWS accounts and have been following this page. http://docs.splunk.com/Documentation/AddOns/released/AWS/ConfigureAWSpermissions
It states "If the user is in a different account than the role, then the user's administrator must attach a policy that allows the user to call AssumeRole on the ARN of the role in the other account."
So if account A is the account that is working with the ec2 role tied to the event collector, do I create a user on account B and set
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "arn:aws:iam::ACCOUNTA:role/eventcollector"
}
]
}
Then on the A Account set the role to
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::ACCOUNTB:user/splunkcollectinguser"
},
"Action": "sts:AssumeRole"
}
]
}
... View more