1. Packages
  2. AWS Classic
  3. API Docs
  4. elb
  5. getServiceAccount

Try AWS Native preview for resources not in the classic version.

AWS Classic v6.42.0 published on Wednesday, Jun 26, 2024 by Pulumi

aws.elb.getServiceAccount

Explore with Pulumi AI

aws logo

Try AWS Native preview for resources not in the classic version.

AWS Classic v6.42.0 published on Wednesday, Jun 26, 2024 by Pulumi

    Use this data source to get the Account ID of the AWS Elastic Load Balancing Service Account in a given region for the purpose of permitting in S3 bucket policy.

    Note: For AWS Regions opened since Jakarta (ap-southeast-3) in December 2021, AWS documents that a service principal name should be used instead of an AWS account ID in any relevant IAM policy.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as aws from "@pulumi/aws";
    
    const main = aws.elb.getServiceAccount({});
    const elbLogs = new aws.s3.BucketV2("elb_logs", {bucket: "my-elb-tf-test-bucket"});
    const elbLogsAcl = new aws.s3.BucketAclV2("elb_logs_acl", {
        bucket: elbLogs.id,
        acl: "private",
    });
    const allowElbLogging = pulumi.all([main, elbLogs.arn]).apply(([main, arn]) => aws.iam.getPolicyDocumentOutput({
        statements: [{
            effect: "Allow",
            principals: [{
                type: "AWS",
                identifiers: [main.arn],
            }],
            actions: ["s3:PutObject"],
            resources: [`${arn}/AWSLogs/*`],
        }],
    }));
    const allowElbLoggingBucketPolicy = new aws.s3.BucketPolicy("allow_elb_logging", {
        bucket: elbLogs.id,
        policy: allowElbLogging.apply(allowElbLogging => allowElbLogging.json),
    });
    const bar = new aws.elb.LoadBalancer("bar", {
        name: "my-foobar-elb",
        availabilityZones: ["us-west-2a"],
        accessLogs: {
            bucket: elbLogs.id,
            interval: 5,
        },
        listeners: [{
            instancePort: 8000,
            instanceProtocol: "http",
            lbPort: 80,
            lbProtocol: "http",
        }],
    });
    
    import pulumi
    import pulumi_aws as aws
    
    main = aws.elb.get_service_account()
    elb_logs = aws.s3.BucketV2("elb_logs", bucket="my-elb-tf-test-bucket")
    elb_logs_acl = aws.s3.BucketAclV2("elb_logs_acl",
        bucket=elb_logs.id,
        acl="private")
    allow_elb_logging = elb_logs.arn.apply(lambda arn: aws.iam.get_policy_document_output(statements=[{
        "effect": "Allow",
        "principals": [{
            "type": "AWS",
            "identifiers": [main.arn],
        }],
        "actions": ["s3:PutObject"],
        "resources": [f"{arn}/AWSLogs/*"],
    }]))
    allow_elb_logging_bucket_policy = aws.s3.BucketPolicy("allow_elb_logging",
        bucket=elb_logs.id,
        policy=allow_elb_logging.json)
    bar = aws.elb.LoadBalancer("bar",
        name="my-foobar-elb",
        availability_zones=["us-west-2a"],
        access_logs={
            "bucket": elb_logs.id,
            "interval": 5,
        },
        listeners=[{
            "instancePort": 8000,
            "instanceProtocol": "http",
            "lbPort": 80,
            "lbProtocol": "http",
        }])
    
    package main
    
    import (
    	"fmt"
    
    	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/elb"
    	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/iam"
    	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/s3"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    func main() {
    pulumi.Run(func(ctx *pulumi.Context) error {
    main, err := elb.GetServiceAccount(ctx, nil, nil);
    if err != nil {
    return err
    }
    elbLogs, err := s3.NewBucketV2(ctx, "elb_logs", &s3.BucketV2Args{
    Bucket: pulumi.String("my-elb-tf-test-bucket"),
    })
    if err != nil {
    return err
    }
    _, err = s3.NewBucketAclV2(ctx, "elb_logs_acl", &s3.BucketAclV2Args{
    Bucket: elbLogs.ID(),
    Acl: pulumi.String("private"),
    })
    if err != nil {
    return err
    }
    allowElbLogging := elbLogs.Arn.ApplyT(func(arn string) (iam.GetPolicyDocumentResult, error) {
    return iam.GetPolicyDocumentOutput(ctx, iam.GetPolicyDocumentOutputArgs{
    Statements: []iam.GetPolicyDocumentStatement{
    {
    Effect: "Allow",
    Principals: []iam.GetPolicyDocumentStatementPrincipal{
    {
    Type: "AWS",
    Identifiers: interface{}{
    main.Arn,
    },
    },
    },
    Actions: []string{
    "s3:PutObject",
    },
    Resources: []string{
    fmt.Sprintf("%v/AWSLogs/*", arn),
    },
    },
    },
    }, nil), nil
    }).(iam.GetPolicyDocumentResultOutput)
    _, err = s3.NewBucketPolicy(ctx, "allow_elb_logging", &s3.BucketPolicyArgs{
    Bucket: elbLogs.ID(),
    Policy: allowElbLogging.ApplyT(func(allowElbLogging iam.GetPolicyDocumentResult) (*string, error) {
    return &allowElbLogging.Json, nil
    }).(pulumi.StringPtrOutput),
    })
    if err != nil {
    return err
    }
    _, err = elb.NewLoadBalancer(ctx, "bar", &elb.LoadBalancerArgs{
    Name: pulumi.String("my-foobar-elb"),
    AvailabilityZones: pulumi.StringArray{
    pulumi.String("us-west-2a"),
    },
    AccessLogs: &elb.LoadBalancerAccessLogsArgs{
    Bucket: elbLogs.ID(),
    Interval: pulumi.Int(5),
    },
    Listeners: elb.LoadBalancerListenerArray{
    &elb.LoadBalancerListenerArgs{
    InstancePort: pulumi.Int(8000),
    InstanceProtocol: pulumi.String("http"),
    LbPort: pulumi.Int(80),
    LbProtocol: pulumi.String("http"),
    },
    },
    })
    if err != nil {
    return err
    }
    return nil
    })
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Aws = Pulumi.Aws;
    
    return await Deployment.RunAsync(() => 
    {
        var main = Aws.Elb.GetServiceAccount.Invoke();
    
        var elbLogs = new Aws.S3.BucketV2("elb_logs", new()
        {
            Bucket = "my-elb-tf-test-bucket",
        });
    
        var elbLogsAcl = new Aws.S3.BucketAclV2("elb_logs_acl", new()
        {
            Bucket = elbLogs.Id,
            Acl = "private",
        });
    
        var allowElbLogging = Aws.Iam.GetPolicyDocument.Invoke(new()
        {
            Statements = new[]
            {
                new Aws.Iam.Inputs.GetPolicyDocumentStatementInputArgs
                {
                    Effect = "Allow",
                    Principals = new[]
                    {
                        new Aws.Iam.Inputs.GetPolicyDocumentStatementPrincipalInputArgs
                        {
                            Type = "AWS",
                            Identifiers = new[]
                            {
                                main.Apply(getServiceAccountResult => getServiceAccountResult.Arn),
                            },
                        },
                    },
                    Actions = new[]
                    {
                        "s3:PutObject",
                    },
                    Resources = new[]
                    {
                        $"{elbLogs.Arn}/AWSLogs/*",
                    },
                },
            },
        });
    
        var allowElbLoggingBucketPolicy = new Aws.S3.BucketPolicy("allow_elb_logging", new()
        {
            Bucket = elbLogs.Id,
            Policy = allowElbLogging.Apply(getPolicyDocumentResult => getPolicyDocumentResult.Json),
        });
    
        var bar = new Aws.Elb.LoadBalancer("bar", new()
        {
            Name = "my-foobar-elb",
            AvailabilityZones = new[]
            {
                "us-west-2a",
            },
            AccessLogs = new Aws.Elb.Inputs.LoadBalancerAccessLogsArgs
            {
                Bucket = elbLogs.Id,
                Interval = 5,
            },
            Listeners = new[]
            {
                new Aws.Elb.Inputs.LoadBalancerListenerArgs
                {
                    InstancePort = 8000,
                    InstanceProtocol = "http",
                    LbPort = 80,
                    LbProtocol = "http",
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.aws.elb.ElbFunctions;
    import com.pulumi.aws.elb.inputs.GetServiceAccountArgs;
    import com.pulumi.aws.s3.BucketV2;
    import com.pulumi.aws.s3.BucketV2Args;
    import com.pulumi.aws.s3.BucketAclV2;
    import com.pulumi.aws.s3.BucketAclV2Args;
    import com.pulumi.aws.iam.IamFunctions;
    import com.pulumi.aws.iam.inputs.GetPolicyDocumentArgs;
    import com.pulumi.aws.s3.BucketPolicy;
    import com.pulumi.aws.s3.BucketPolicyArgs;
    import com.pulumi.aws.elb.LoadBalancer;
    import com.pulumi.aws.elb.LoadBalancerArgs;
    import com.pulumi.aws.elb.inputs.LoadBalancerAccessLogsArgs;
    import com.pulumi.aws.elb.inputs.LoadBalancerListenerArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var main = ElbFunctions.getServiceAccount();
    
            var elbLogs = new BucketV2("elbLogs", BucketV2Args.builder()
                .bucket("my-elb-tf-test-bucket")
                .build());
    
            var elbLogsAcl = new BucketAclV2("elbLogsAcl", BucketAclV2Args.builder()
                .bucket(elbLogs.id())
                .acl("private")
                .build());
    
            final var allowElbLogging = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()
                .statements(GetPolicyDocumentStatementArgs.builder()
                    .effect("Allow")
                    .principals(GetPolicyDocumentStatementPrincipalArgs.builder()
                        .type("AWS")
                        .identifiers(main.applyValue(getServiceAccountResult -> getServiceAccountResult.arn()))
                        .build())
                    .actions("s3:PutObject")
                    .resources(elbLogs.arn().applyValue(arn -> String.format("%s/AWSLogs/*", arn)))
                    .build())
                .build());
    
            var allowElbLoggingBucketPolicy = new BucketPolicy("allowElbLoggingBucketPolicy", BucketPolicyArgs.builder()
                .bucket(elbLogs.id())
                .policy(allowElbLogging.applyValue(getPolicyDocumentResult -> getPolicyDocumentResult).applyValue(allowElbLogging -> allowElbLogging.applyValue(getPolicyDocumentResult -> getPolicyDocumentResult.json())))
                .build());
    
            var bar = new LoadBalancer("bar", LoadBalancerArgs.builder()
                .name("my-foobar-elb")
                .availabilityZones("us-west-2a")
                .accessLogs(LoadBalancerAccessLogsArgs.builder()
                    .bucket(elbLogs.id())
                    .interval(5)
                    .build())
                .listeners(LoadBalancerListenerArgs.builder()
                    .instancePort(8000)
                    .instanceProtocol("http")
                    .lbPort(80)
                    .lbProtocol("http")
                    .build())
                .build());
    
        }
    }
    
    resources:
      elbLogs:
        type: aws:s3:BucketV2
        name: elb_logs
        properties:
          bucket: my-elb-tf-test-bucket
      elbLogsAcl:
        type: aws:s3:BucketAclV2
        name: elb_logs_acl
        properties:
          bucket: ${elbLogs.id}
          acl: private
      allowElbLoggingBucketPolicy:
        type: aws:s3:BucketPolicy
        name: allow_elb_logging
        properties:
          bucket: ${elbLogs.id}
          policy: ${allowElbLogging.json}
      bar:
        type: aws:elb:LoadBalancer
        properties:
          name: my-foobar-elb
          availabilityZones:
            - us-west-2a
          accessLogs:
            bucket: ${elbLogs.id}
            interval: 5
          listeners:
            - instancePort: 8000
              instanceProtocol: http
              lbPort: 80
              lbProtocol: http
    variables:
      main:
        fn::invoke:
          Function: aws:elb:getServiceAccount
          Arguments: {}
      allowElbLogging:
        fn::invoke:
          Function: aws:iam:getPolicyDocument
          Arguments:
            statements:
              - effect: Allow
                principals:
                  - type: AWS
                    identifiers:
                      - ${main.arn}
                actions:
                  - s3:PutObject
                resources:
                  - ${elbLogs.arn}/AWSLogs/*
    

    Using getServiceAccount

    Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

    function getServiceAccount(args: GetServiceAccountArgs, opts?: InvokeOptions): Promise<GetServiceAccountResult>
    function getServiceAccountOutput(args: GetServiceAccountOutputArgs, opts?: InvokeOptions): Output<GetServiceAccountResult>
    def get_service_account(region: Optional[str] = None,
                            opts: Optional[InvokeOptions] = None) -> GetServiceAccountResult
    def get_service_account_output(region: Optional[pulumi.Input[str]] = None,
                            opts: Optional[InvokeOptions] = None) -> Output[GetServiceAccountResult]
    func GetServiceAccount(ctx *Context, args *GetServiceAccountArgs, opts ...InvokeOption) (*GetServiceAccountResult, error)
    func GetServiceAccountOutput(ctx *Context, args *GetServiceAccountOutputArgs, opts ...InvokeOption) GetServiceAccountResultOutput

    > Note: This function is named GetServiceAccount in the Go SDK.

    public static class GetServiceAccount 
    {
        public static Task<GetServiceAccountResult> InvokeAsync(GetServiceAccountArgs args, InvokeOptions? opts = null)
        public static Output<GetServiceAccountResult> Invoke(GetServiceAccountInvokeArgs args, InvokeOptions? opts = null)
    }
    public static CompletableFuture<GetServiceAccountResult> getServiceAccount(GetServiceAccountArgs args, InvokeOptions options)
    // Output-based functions aren't available in Java yet
    
    fn::invoke:
      function: aws:elb/getServiceAccount:getServiceAccount
      arguments:
        # arguments dictionary

    The following arguments are supported:

    Region string
    Name of the region whose AWS ELB account ID is desired. Defaults to the region from the AWS provider configuration.
    Region string
    Name of the region whose AWS ELB account ID is desired. Defaults to the region from the AWS provider configuration.
    region String
    Name of the region whose AWS ELB account ID is desired. Defaults to the region from the AWS provider configuration.
    region string
    Name of the region whose AWS ELB account ID is desired. Defaults to the region from the AWS provider configuration.
    region str
    Name of the region whose AWS ELB account ID is desired. Defaults to the region from the AWS provider configuration.
    region String
    Name of the region whose AWS ELB account ID is desired. Defaults to the region from the AWS provider configuration.

    getServiceAccount Result

    The following output properties are available:

    Arn string
    ARN of the AWS ELB service account in the selected region.
    Id string
    The provider-assigned unique ID for this managed resource.
    Region string
    Arn string
    ARN of the AWS ELB service account in the selected region.
    Id string
    The provider-assigned unique ID for this managed resource.
    Region string
    arn String
    ARN of the AWS ELB service account in the selected region.
    id String
    The provider-assigned unique ID for this managed resource.
    region String
    arn string
    ARN of the AWS ELB service account in the selected region.
    id string
    The provider-assigned unique ID for this managed resource.
    region string
    arn str
    ARN of the AWS ELB service account in the selected region.
    id str
    The provider-assigned unique ID for this managed resource.
    region str
    arn String
    ARN of the AWS ELB service account in the selected region.
    id String
    The provider-assigned unique ID for this managed resource.
    region String

    Package Details

    Repository
    AWS Classic pulumi/pulumi-aws
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the aws Terraform Provider.
    aws logo

    Try AWS Native preview for resources not in the classic version.

    AWS Classic v6.42.0 published on Wednesday, Jun 26, 2024 by Pulumi