AWS CFN Resource to provision a Confluent Cloud Service account
Project description
ConfluentCloud::IAMv2::ServiceAccount
Allows to create a new Service Account into an organization in Confluent Cloud via API.
See the docs for properties
Install
Requirements
You need
- An account on Confluent Cloud Platform
- Have a Confluent Cloud API Key
- AWS Account, and for the following installation steps, aws cli
Confluent API Key
# Optionally create an API key via the CLI
confluent api-key create --resource cloud -o json
export API_KEY=<API KEY RETURNED>
export API_SECRET=<API SECRET RETURNED>
Create a secret in AWS Secrets Manager with the API key
aws cloudformation deploy --stack-name confluent-cloud-api-credentials --template confluent-secrets.template \
--parameter-overrides ConfluentApiKey=${API_KEY} ConfluentSecretKey=${API_SECRET}
Save the secret ARN into a variable
export SECRET_ARN=`aws cloudformation describe-stack-resources --stack-name confluent-cloud-api-credentials --logical-resource-id ConfluentSecret | jq -r .StackResources[0].PhysicalResourceId`
Activate the 3rd party CloudFormation resource
Option 1 - IAM and Resource together
Using the activate.template we create IAM roles and enable the resource in the account, all at once.
aws cloudformation deploy --stack cfn-resource--confluentcloud-iam-serviceaccount --template activate.template \
--capabilities CAPABILITY_IAM
This option offers the "extra security" to have a different IAM Execution role for that resource than others.
Option 2 - IAM first, resource separate
Most recommended if you consider enabling multiple ConfluentCloud:: resources published
We are going to use cfn-resources-iam-roles.template template to create the Execution and LoggingRole first, then use these in the activate.template as parameters.
aws cloudformation deploy --stack-name iam--cfn--confluentcloud-resources --template cfn-resources-iam-roles.template \
--capabilities CAPABILITY_IAM
Export the IAM Roles to env vars
EXEC_ROLE_ARN=`aws cloudformation describe-stacks --stack-name iam--cfn--confluentcloud-resources | jq -r '.Stacks[0].Outputs[] | select(.OutputKey=="ExecutionRoleArn")' | jq -r .OutputValue`
LOGGING_ROLE_ARN=`aws cloudformation describe-stacks --stack-name iam--cfn--confluentcloud-resources | jq -r '.Stacks[0].Outputs[] | select(.OutputKey=="CloudWatchRoleArn")' | jq -r .OutputValue`
Now, we activate the resource using these IAM Roles
aws cloudformation deploy --stack cfn-resource--confluentcloud-iam-serviceaccount --template activate.template \
--capabilities CAPABILITY_IAM \
--parameter-overrides ExecutionRoleArn=${EXEC_ROLE_ARN} LoggingRoleArn=${LOGGING_ROLE_ARN}
Create a new Service account
aws cloudformation deploy --stack-name my-first-service-account --template resource-test.template \
--parameter-overrides ConfluentCloudApiSecrets=${SECRET_ARN} ServiceAccountName=cfn-test-service-account
Troubleshooting
If you are getting errors with the resource, you can see in the logs what issues occurred that lead to this issue. With the template activate.template, you can see that there is a CloudWatch log group that will be logging the code execution and so you can open an issue on GitHub
If at any point in the logging you'd notice information that is not supposed to be there, please notify it immediately. With that said, as the "vendor" of that resource, we will never have access to these logs or anything in your account.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for confluentcloud-iam-serviceaccount-1.0.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | e215a044a3f976b139586f735a300bb533d7b23dace275f76008b23ea2aea064 |
|
MD5 | 0e007f4ed287e68fabebbdc4b15ffe47 |
|
BLAKE2b-256 | 1fee59e2aff716182e9c5c9f06d350bacf88bef43de2acedd519858a02f47cd4 |
Hashes for confluentcloud_iam_serviceaccount-1.0.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 5a04fa70ea93cdde7a973cbb59afedf19a7ae62369601853b1ef24df07381458 |
|
MD5 | 0ec5a8dab9efc41bee9331d36ee73541 |
|
BLAKE2b-256 | dd90ba9ebb12499cce5a9e12ba24963c9e9df4ec9b14156f619876047be9092f |