Skip to content

Commit 3aed422

Browse files
committed
Fix JSON syntax highlighting
Signed-off-by: Maciej Wal <[email protected]>
1 parent 049be36 commit 3aed422

File tree

1 file changed

+29
-29
lines changed

1 file changed

+29
-29
lines changed

_security-analytics/threat-intelligence/getting-started.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -67,45 +67,45 @@ When creating the role, customize the following settings:
6767

6868
- Add the following custom trust policy:
6969

70-
```bash
71-
{
72-
"Version": "2012-10-17",
73-
"Statement": [
74-
{
75-
"Effect": "Allow",
76-
"Principal": {
77-
"Service": [
78-
"opensearchservice.amazonaws.com"
79-
]
80-
},
81-
"Action": "sts:AssumeRole"
82-
}
83-
]
84-
}
85-
```
70+
```json
71+
{
72+
"Version": "2012-10-17",
73+
"Statement": [
74+
{
75+
"Effect": "Allow",
76+
"Principal": {
77+
"Service": [
78+
"opensearchservice.amazonaws.com"
79+
]
80+
},
81+
"Action": "sts:AssumeRole"
82+
}
83+
]
84+
}
85+
```
8686
8787
- On the Permissions policies page, add the `AmazonS3ReadOnlyAccess` permission.
88-
88+
8989

9090
#### Cross-account S3 bucket connection
9191

9292
Because the role ARN needs to be in the same account as the OpenSearch domain, a trust policy needs to be configured that allows the OpenSearch domain to download from S3 buckets from the same account.
9393

9494
To download from an S3 bucket in another account, the trust policy for that bucket needs to give the role ARN permission to read from the object, as shown in the following example:
9595

96-
```
96+
```json
9797
{
98-
"Version": "2012-10-17",
99-
"Statement": [
100-
{
101-
"Effect": "Allow",
102-
"Principal": {
103-
"AWS": "arn:aws:iam::123456789012:role/account-1-threat-intel-role"
104-
},
105-
"Action": "s3:*",
106-
"Resource": "arn:aws:s3:::account-2-threat-intel-bucket/*"
107-
}
108-
]
98+
"Version": "2012-10-17",
99+
"Statement": [
100+
{
101+
"Effect": "Allow",
102+
"Principal": {
103+
"AWS": "arn:aws:iam::123456789012:role/account-1-threat-intel-role"
104+
},
105+
"Action": "s3:*",
106+
"Resource": "arn:aws:s3:::account-2-threat-intel-bucket/*"
107+
}
108+
]
109109
}
110110
```
111111

0 commit comments

Comments
 (0)