小编Ran*_*uru的帖子

如何使用 role_arn 向 terraform 提供 s3 后端和 ec2 的不同 aws 凭证

我想将 terraform 状态文件存储在一个 aws 账户的 s3 存储桶中,并使用 role_arn 使用在另一个 aws 账户中部署实例更改。\n这是我的配置:
\ nproviders.tf

\n
terraform {\n  backend "s3" {\n    bucket = "bucket"\n    key = "tf/terraform.tfstate"\n    encrypt = "false"\n    region = "us-east-1"\n    profile = "s3"\n    role_arn = "arn:aws:iam::1111111111111:role/s3-role"\n    dynamodb_table = "name"\n  }\n}\n\nprovider "aws" {\n  profile = "ec2"\n  region = "eu-north-1"\n  assume_role {\n    role_arn = "arn:aws:iam::2222222222222:role/ec2-role"\n  }\n}\n
Run Code Online (Sandbox Code Playgroud)\n

〜/.aws/凭证

\n
[s3-def]\naws_access_key_id = aaaaaaaaaa\naws_secret_access_key = sssssssss\n[ec2-def]\naws_access_key_id = aaaaaaa\naws_secret_access_key = sssss\n[s3]\nrole_arn = arn:aws:iam::1111111111:role/s3-role\nregion = us-east-1\nsource_profile = s3-def\n[ec2]\nrole_arn = arn:aws:iam::22222222222:role/ec2-role\nregion = eu-north-1\nsource_profile = ec2-def\n
Run Code Online (Sandbox Code Playgroud)\n …

amazon-s3 amazon-ec2 amazon-web-services terraform terraform-provider-aws

6
推荐指数
1
解决办法
1809
查看次数