Skip to content

Commit 1d19003

Browse files
authored
Merge pull request #8199 from wazuh/enhancement/14-AWS-security-lake-update
Update --aws-profile information for Security Lake
2 parents 6cbd704 + 52087a6 commit 1d19003

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

source/cloud-security/amazon/services/supported-services/security-lake.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -175,6 +175,7 @@ Authentication
175175

176176
- ``<iam_role_arn>``: Amazon Resource Name (ARN) for the corresponding IAM role to assume.
177177
- ``<external_id>``: External ID to use when assuming the role.
178+
- ``<aws_profile>``: A valid profile name from a Shared Credential File or AWS Config File with permissions to access the service. By default, the integration uses the settings found in the ``default`` profile. For this configuration, we use the ``dev`` profile. Replace it with the appropriate profile defined in your :ref:`credential file <aws_profile>`.
178179
- ``<iam_role_duration>`` - Optional: The session duration in seconds.
179180
- ``<sts_endpoint>`` - Optional: The URL of the VPC endpoint of the AWS Security Token Service.
180181

@@ -210,6 +211,7 @@ Configure Wazuh to process Amazon Security Lake logs
210211
<iam_role_arn>arn:aws:iam::xxxxxxxxxxx:role/ASL-Role</iam_role_arn>
211212
<iam_role_duration>1300</iam_role_duration>
212213
<external_id><WAZUH-EXTERNAL-ID-VALUE></external_id>
214+
<aws_profile>dev</aws_profile>
213215
<sts_endpoint>xxxxxx.sts.region.vpce.amazonaws.com</sts_endpoint>
214216
<service_endpoint>https://bucket.xxxxxx.s3.region.vpce.amazonaws.com</service_endpoint>
215217
</subscriber>

0 commit comments

Comments
 (0)