You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Only use fine-grained access control
Allow open access to the domain.
That's useful for instances that are deployed within a VPC, protected by Security Group rules and fine-grained controls. Today if we take away all IAM roles to be authorized (even if not used), an empty policy is created, essentially blacklisting any connection:
{"Message":"User: anonymous is not authorized to perform: es:ESHttpGet"}
I was thinking of introducing a flag that matches the behavior in the AWS Console to create a basic, permissive policy like the one automatically provisioned.
The text was updated successfully, but these errors were encountered:
From AWS Console, there's a way to set
That's useful for instances that are deployed within a VPC, protected by Security Group rules and fine-grained controls. Today if we take away all IAM roles to be authorized (even if not used), an empty policy is created, essentially blacklisting any connection:
terraform-aws-elasticsearch/main.tf
Lines 218 to 219 in 9f3dd59
I was thinking of introducing a flag that matches the behavior in the AWS Console to create a basic, permissive policy like the one automatically provisioned.
The text was updated successfully, but these errors were encountered: