将AWS ElasticSearch访问权限限制为自动缩放组

编程入门 行业动态 更新时间:2024-10-11 03:20:22
本文介绍了将AWS ElasticSearch访问权限限制为自动缩放组的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧! 问题描述

我有一个AutoScaling组,该组必须有权访问AWS ElasticSearch Service, 但是,正如您所知,在这种情况下,将IP地址用作访问策略将不起作用(IP每次都会更改). 我想知道是否有一种方法可以使用IAM角色或安全组来限制对自动伸缩组的访问. 如果可以,请给我一个例子吗?

I have an AutoScaling group who must have the access to the AWS ElasticSearch Service, But as you know, using IP address as access policies will not work in this case (The ip change every time). I wonder if there is a way to use IAM Roles or Security groups to limit the access to the auto scaling group. If there is can you give me an example?

提前谢谢

推荐答案

您指定哪些IAM用户或角色应有权访问您的 领域.对域的所有请求都必须使用AWS Signature签名 版本4签名.当请求到达域时,将转发该请求 IAM进行签名验证和访问控制.

You specify which IAM users or roles should have access to your domain. All requests to the domain must be signed with AWS Signature Version 4 signing. When a request reaches the domain, it is forwarded to IAM for signature verification and access control.

政策,例如:

{ "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::123456789012:user/susan" }, "Action": "es:*", "Resource": "arn:aws:es:us-west-2:123456789012:domain/mydomain/*" } ] }

用生成的策略中的用户ARN和域ARN替换为红色.

Replace the user ARN and domain ARN in red with those from the generated policy.

请参阅 AWS博客

更多推荐

将AWS ElasticSearch访问权限限制为自动缩放组

本文发布于:2023-11-28 11:56:55,感谢您对本站的认可!
本文链接:https://www.elefans.com/category/jswz/34/1642309.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
本文标签:缩放   访问权限   AWS   ElasticSearch

发布评论

评论列表 (有 0 条评论)
草根站长

>www.elefans.com

编程频道|电子爱好者 - 技术资讯及电子产品介绍!