Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In this article

Table of Contents
minLevel1
maxLevel2
absoluteUrltrue

...

You can use this account type to connect Snaps of Amazon SNS Snap Pack with data sources that use Amazon SNS accounts.

Prerequisites

None

Limitations

...

None.

and Known Issues

None.

Account Settings

...

Note

Field names marked with an asterisk ( * ) are mandatory.

Field Name

Field Dependency

Description

Label*

N/A

Specify a unique label for the account.

Default ValueN/A
ExampleAmazon SNS Account

Access-key IdID

N/A

Specify the access key ID of AWS authentication.

Default valueValue: N/A
ExampleLKIAIVKOR4AP72KVCWLA

Secret key

N/A

Specify the secret key of AWS authentication.

Default valueValue: N/A
Example7FTUHh7aMlBM5CX1ayyxy

Security token

N/A

Specify a security token that is part of AWS Security Token Service (STS) credentials.

Default valueValue: N/A

Examplez7PmG8F6DY5xblJHwN

IAM role

N/A

Select this checkbox to enable use the IAM role stored in the EC2 instance to access SNS. In this case, Access-key ID and Secret key are ignored. This feature is valid only in EC2-type Groundplex.

For more information on IAM Roles, see IAM roles for Amazon EC2.

Info

You can use an IAM role to manage temporary credentials for applications running on an EC2 instance and making AWS CLI or AWS API requests. This is preferable to storing access keys within the Amazon Elastic Compute Cloud EC2 (Amazon EC2) instance. To assign an AWS role to an EC2 instance and make it available to all of its applications, you create an instance profile attached to the instance. An instance profile contains the role and enables programs that are running on the EC2 instance to get temporary credentials. For more information, see Using an IAM role to grant permissions to applications running on Amazon EC2 instances in the IAM User Guide.

For more information on IAM Roles, see  IAM roles for Amazon EC2.

Default valueDefault ValueNot selected

Cross Account IAM Role

Use this field set to set up cross-account IAM role access. It consists of the following fields:

This field set consists of the following fields:

  • Role ARN

  • External ID

Role ARN

N/A

Specify the Amazon Resource Name of the role to assume.

Default valueValue: None
Examplearn:aws"iam:3443454566774:role/IAMRolewithaccess

External ID

N/A

Specify an optional external ID that might be required by the role to assume.

Default valueValue: None
Example: 795735

Troubleshooting

Error

Reason

Resolution

Invalid account configuration.

You might have entered empty or null values in Cross Account IAM Role fields.

Enter valid values for Cross Account IAM Role.

VALIDATE_ACCOUNT_WITH_EXPRESSION

One or more Pipeline parameters must be configured in the Pipeline. Validation is not applicable for Pipeline parameters.

Do not validate the account if you provide Pipeline parameters.

ACCOUNT_CREDENTIALS_MISSING

Either Access key and secret key might be empty.

You must provide valid credentials for SQS SNS if the IAM role is disabled.

...