You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/integrations/data-ingestion/clickpipes/secure-kinesis.md
+65-45Lines changed: 65 additions & 45 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,50 +49,70 @@ Using this approach, customers can manage all access to their Kinesis data strea
49
49
-2. Browse to IAM Service Console
50
50
-3. Create a new IAM role with Trusted Entity Type of `AWS account`. Note that the name of the IAM role **must start with**`ClickHouseAccessRole-` for this to work.
51
51
52
-
For the trust policy, please replace `{ClickHouse_IAM_ARN}` with the IAM Role arn belong to your ClickHouse instance.
53
-
For the IAM policy, please replace `{STREAM_NAME}` with your Kinesis stream name.
The trust policy allows the ClickHouse IAM role to assume this role. Replace `{ClickHouse_IAM_ARN}` with the IAM Role ARN from your ClickHouse service (obtained in the previous step).
55
+
56
+
```json
57
+
{
58
+
"Version": "2012-10-17",
59
+
"Statement": [
60
+
{
61
+
"Effect": "Allow",
62
+
"Principal": {
63
+
"AWS": "{ClickHouse_IAM_ARN}"
64
+
},
65
+
"Action": "sts:AssumeRole"
66
+
}
67
+
]
68
+
}
69
+
```
70
+
71
+
**ii. Configure the Permission Policy**
72
+
73
+
The permission policy grants access to your Kinesis stream. Replace the following placeholders:
0 commit comments