Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for passwords in SSM Parameter Store #178

Open
IanMeyers opened this issue Nov 30, 2018 · 4 comments
Open

Add support for passwords in SSM Parameter Store #178

IanMeyers opened this issue Nov 30, 2018 · 4 comments

Comments

@IanMeyers
Copy link
Contributor

No description provided.

@bnusunny
Copy link

Hi Ian,

This is important for China regions because kms is not available there yet. I can work on this and send an PR.

If you already have an design in mind, please kindly share with me. :)

Harold

@bnusunny
Copy link

bnusunny commented Feb 1, 2019

We can actually use IAM role to allow Lambda to access RedShift. RedShift can also use IAM role to gain access to S3. Using IAM will avoid to store AK/SK and password in DynamoDB.

@IanMeyers , is there any issue preventing us to use IAM in this solution?

@IanMeyers
Copy link
Contributor Author

Hello - @bnusunny no issues preventing the use of Cluster IAM roles - you just need to add this information in the auth section.

@IanMeyers
Copy link
Contributor Author

But I still think having support SSM parameter store makes sense.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants