AWS::GroundStation::DataflowEndpointGroup SecurityDetails - Amazon CloudFormation
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

This is the new Amazon CloudFormation Template Reference Guide. Please update your bookmarks and links. For help getting started with CloudFormation, see the Amazon CloudFormation User Guide.

AWS::GroundStation::DataflowEndpointGroup SecurityDetails

Information about IAM roles, subnets, and security groups needed for this DataflowEndpointGroup.

Syntax

To declare this entity in your Amazon CloudFormation template, use the following syntax:

JSON

{ "RoleArn" : String, "SecurityGroupIds" : [ String, ... ], "SubnetIds" : [ String, ... ] }

YAML

RoleArn: String SecurityGroupIds: - String SubnetIds: - String

Properties

RoleArn

The ARN of a role which Ground Station has permission to assume, such as arn:aws:iam::1234567890:role/DataDeliveryServiceRole.

Ground Station will assume this role and create an ENI in your VPC on the specified subnet upon creation of a dataflow endpoint group. This ENI is used as the ingress/egress point for data streamed during a satellite contact.

Required: No

Type: String

Pattern: ^(arn:(aws[a-zA-Z-]*)?:[a-z0-9-.]+:.*)|()$

Update requires: Replacement

SecurityGroupIds

The security group Ids of the security role, such as sg-1234567890abcdef0.

Required: No

Type: Array of String

Update requires: Replacement

SubnetIds

The subnet Ids of the security details, such as subnet-12345678.

Required: No

Type: Array of String

Update requires: Replacement

Examples

Create SecurityDetails

The following example creates Ground Station SecurityDetails

JSON

{ "SecurityDetails": { "SubnetIds": [ "subnet-6782e71e" ], "SecurityGroupIds": [ "sg-6979fe18" ], "RoleArn": "arn:aws:iam::012345678910:role/groundstation-service-role-AWSServiceRoleForAmazonGroundStation-EXAMPLEBQ4PI" } }

YAML

SecurityDetails: SubnetIds: - subnet-12345678 SecurityGroupIds: - sg-87654321 RoleArn: arn:aws:iam::012345678910:role/groundstation-service-role-AWSServiceRoleForAmazonGroundStation-EXAMPLEABCDE