Open iwasnobody opened 6 years ago
you have to enable cognito_options
, try this:
cognito_options {
enabled = true
user_pool_id = "${aws_cognito_user_pool.kibana_pool.id}"
identity_pool_id = "${aws_cognito_identity_pool.kibana_identity.id}"
role_arn = "${aws_iam_role.es_cognitoaccess_role.arn}"
}
Community Note
Terraform Version
Terraform v0.11.7
Affected Resource(s)
Terraform Configuration Files
Debug Output
Panic Output
Expected Behavior
automatic created user pool id and app id in cognito identity pool.
Actual Behavior
https://aws.amazon.com/cn/blogs/database/get-started-with-amazon-elasticsearch-service-use-amazon-cognito-for-kibana-access-control/ "At the top of the page, choose Federated Identities to view your identity pools. Choose your identity pool (kibana_identities) to edit. In the upper-right corner of the page, choose Edit identity pool. Scroll down and choose the down arrow to reveal the Authentication providers settings. Under Authenticated role selection, open the drop-down list and select Choose role from token."
According to the above aws blog, enable cognito auth in elasticsearch console. There will be automatic created user pool id and app id in identity pool. But it is empty in my case.
terraform apply
Important Factoids
References
0000