aws.glue.DataCatalogEncryptionSettings
Explore with Pulumi AI
Provides a Glue Data Catalog Encryption Settings resource.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";
const example = new aws.glue.DataCatalogEncryptionSettings("example", {dataCatalogEncryptionSettings: {
connectionPasswordEncryption: {
awsKmsKeyId: test.arn,
returnConnectionPasswordEncrypted: true,
},
encryptionAtRest: {
catalogEncryptionMode: "SSE-KMS",
catalogEncryptionServiceRole: role.test.arn,
sseAwsKmsKeyId: test.arn,
},
}});
import pulumi
import pulumi_aws as aws
example = aws.glue.DataCatalogEncryptionSettings("example", data_catalog_encryption_settings={
"connection_password_encryption": {
"aws_kms_key_id": test["arn"],
"return_connection_password_encrypted": True,
},
"encryption_at_rest": {
"catalog_encryption_mode": "SSE-KMS",
"catalog_encryption_service_role": role["test"]["arn"],
"sse_aws_kms_key_id": test["arn"],
},
})
package main
import (
"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/glue"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := glue.NewDataCatalogEncryptionSettings(ctx, "example", &glue.DataCatalogEncryptionSettingsArgs{
DataCatalogEncryptionSettings: &glue.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs{
ConnectionPasswordEncryption: &glue.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsConnectionPasswordEncryptionArgs{
AwsKmsKeyId: pulumi.Any(test.Arn),
ReturnConnectionPasswordEncrypted: pulumi.Bool(true),
},
EncryptionAtRest: &glue.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsEncryptionAtRestArgs{
CatalogEncryptionMode: pulumi.String("SSE-KMS"),
CatalogEncryptionServiceRole: pulumi.Any(role.Test.Arn),
SseAwsKmsKeyId: pulumi.Any(test.Arn),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Aws = Pulumi.Aws;
return await Deployment.RunAsync(() =>
{
var example = new Aws.Glue.DataCatalogEncryptionSettings("example", new()
{
DataCatalogEncryptionSettingsConfig = new Aws.Glue.Inputs.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs
{
ConnectionPasswordEncryption = new Aws.Glue.Inputs.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsConnectionPasswordEncryptionArgs
{
AwsKmsKeyId = test.Arn,
ReturnConnectionPasswordEncrypted = true,
},
EncryptionAtRest = new Aws.Glue.Inputs.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsEncryptionAtRestArgs
{
CatalogEncryptionMode = "SSE-KMS",
CatalogEncryptionServiceRole = role.Test.Arn,
SseAwsKmsKeyId = test.Arn,
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aws.glue.DataCatalogEncryptionSettings;
import com.pulumi.aws.glue.DataCatalogEncryptionSettingsArgs;
import com.pulumi.aws.glue.inputs.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs;
import com.pulumi.aws.glue.inputs.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsConnectionPasswordEncryptionArgs;
import com.pulumi.aws.glue.inputs.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsEncryptionAtRestArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new DataCatalogEncryptionSettings("example", DataCatalogEncryptionSettingsArgs.builder()
.dataCatalogEncryptionSettings(DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs.builder()
.connectionPasswordEncryption(DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsConnectionPasswordEncryptionArgs.builder()
.awsKmsKeyId(test.arn())
.returnConnectionPasswordEncrypted(true)
.build())
.encryptionAtRest(DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsEncryptionAtRestArgs.builder()
.catalogEncryptionMode("SSE-KMS")
.catalogEncryptionServiceRole(role.test().arn())
.sseAwsKmsKeyId(test.arn())
.build())
.build())
.build());
}
}
resources:
example:
type: aws:glue:DataCatalogEncryptionSettings
properties:
dataCatalogEncryptionSettings:
connectionPasswordEncryption:
awsKmsKeyId: ${test.arn}
returnConnectionPasswordEncrypted: true
encryptionAtRest:
catalogEncryptionMode: SSE-KMS
catalogEncryptionServiceRole: ${role.test.arn}
sseAwsKmsKeyId: ${test.arn}
Create DataCatalogEncryptionSettings Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new DataCatalogEncryptionSettings(name: string, args: DataCatalogEncryptionSettingsArgs, opts?: CustomResourceOptions);
@overload
def DataCatalogEncryptionSettings(resource_name: str,
args: DataCatalogEncryptionSettingsArgs,
opts: Optional[ResourceOptions] = None)
@overload
def DataCatalogEncryptionSettings(resource_name: str,
opts: Optional[ResourceOptions] = None,
data_catalog_encryption_settings: Optional[DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs] = None,
catalog_id: Optional[str] = None)
func NewDataCatalogEncryptionSettings(ctx *Context, name string, args DataCatalogEncryptionSettingsArgs, opts ...ResourceOption) (*DataCatalogEncryptionSettings, error)
public DataCatalogEncryptionSettings(string name, DataCatalogEncryptionSettingsArgs args, CustomResourceOptions? opts = null)
public DataCatalogEncryptionSettings(String name, DataCatalogEncryptionSettingsArgs args)
public DataCatalogEncryptionSettings(String name, DataCatalogEncryptionSettingsArgs args, CustomResourceOptions options)
type: aws:glue:DataCatalogEncryptionSettings
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args DataCatalogEncryptionSettingsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args DataCatalogEncryptionSettingsArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args DataCatalogEncryptionSettingsArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args DataCatalogEncryptionSettingsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args DataCatalogEncryptionSettingsArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var dataCatalogEncryptionSettingsResource = new Aws.Glue.DataCatalogEncryptionSettings("dataCatalogEncryptionSettingsResource", new()
{
DataCatalogEncryptionSettingsConfig = new Aws.Glue.Inputs.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs
{
ConnectionPasswordEncryption = new Aws.Glue.Inputs.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsConnectionPasswordEncryptionArgs
{
ReturnConnectionPasswordEncrypted = false,
AwsKmsKeyId = "string",
},
EncryptionAtRest = new Aws.Glue.Inputs.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsEncryptionAtRestArgs
{
CatalogEncryptionMode = "string",
CatalogEncryptionServiceRole = "string",
SseAwsKmsKeyId = "string",
},
},
CatalogId = "string",
});
example, err := glue.NewDataCatalogEncryptionSettings(ctx, "dataCatalogEncryptionSettingsResource", &glue.DataCatalogEncryptionSettingsArgs{
DataCatalogEncryptionSettings: &glue.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs{
ConnectionPasswordEncryption: &glue.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsConnectionPasswordEncryptionArgs{
ReturnConnectionPasswordEncrypted: pulumi.Bool(false),
AwsKmsKeyId: pulumi.String("string"),
},
EncryptionAtRest: &glue.DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsEncryptionAtRestArgs{
CatalogEncryptionMode: pulumi.String("string"),
CatalogEncryptionServiceRole: pulumi.String("string"),
SseAwsKmsKeyId: pulumi.String("string"),
},
},
CatalogId: pulumi.String("string"),
})
var dataCatalogEncryptionSettingsResource = new DataCatalogEncryptionSettings("dataCatalogEncryptionSettingsResource", DataCatalogEncryptionSettingsArgs.builder()
.dataCatalogEncryptionSettings(DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs.builder()
.connectionPasswordEncryption(DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsConnectionPasswordEncryptionArgs.builder()
.returnConnectionPasswordEncrypted(false)
.awsKmsKeyId("string")
.build())
.encryptionAtRest(DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsEncryptionAtRestArgs.builder()
.catalogEncryptionMode("string")
.catalogEncryptionServiceRole("string")
.sseAwsKmsKeyId("string")
.build())
.build())
.catalogId("string")
.build());
data_catalog_encryption_settings_resource = aws.glue.DataCatalogEncryptionSettings("dataCatalogEncryptionSettingsResource",
data_catalog_encryption_settings={
"connection_password_encryption": {
"return_connection_password_encrypted": False,
"aws_kms_key_id": "string",
},
"encryption_at_rest": {
"catalog_encryption_mode": "string",
"catalog_encryption_service_role": "string",
"sse_aws_kms_key_id": "string",
},
},
catalog_id="string")
const dataCatalogEncryptionSettingsResource = new aws.glue.DataCatalogEncryptionSettings("dataCatalogEncryptionSettingsResource", {
dataCatalogEncryptionSettings: {
connectionPasswordEncryption: {
returnConnectionPasswordEncrypted: false,
awsKmsKeyId: "string",
},
encryptionAtRest: {
catalogEncryptionMode: "string",
catalogEncryptionServiceRole: "string",
sseAwsKmsKeyId: "string",
},
},
catalogId: "string",
});
type: aws:glue:DataCatalogEncryptionSettings
properties:
catalogId: string
dataCatalogEncryptionSettings:
connectionPasswordEncryption:
awsKmsKeyId: string
returnConnectionPasswordEncrypted: false
encryptionAtRest:
catalogEncryptionMode: string
catalogEncryptionServiceRole: string
sseAwsKmsKeyId: string
DataCatalogEncryptionSettings Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The DataCatalogEncryptionSettings resource accepts the following input properties:
- Data
Catalog DataEncryption Settings Config Catalog Encryption Settings Data Catalog Encryption Settings - The security configuration to set. see Data Catalog Encryption Settings.
- Catalog
Id string - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- Data
Catalog DataEncryption Settings Catalog Encryption Settings Data Catalog Encryption Settings Args - The security configuration to set. see Data Catalog Encryption Settings.
- Catalog
Id string - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- data
Catalog DataEncryption Settings Catalog Encryption Settings Data Catalog Encryption Settings - The security configuration to set. see Data Catalog Encryption Settings.
- catalog
Id String - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- data
Catalog DataEncryption Settings Catalog Encryption Settings Data Catalog Encryption Settings - The security configuration to set. see Data Catalog Encryption Settings.
- catalog
Id string - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- data_
catalog_ Dataencryption_ settings Catalog Encryption Settings Data Catalog Encryption Settings Args - The security configuration to set. see Data Catalog Encryption Settings.
- catalog_
id str - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- data
Catalog Property MapEncryption Settings - The security configuration to set. see Data Catalog Encryption Settings.
- catalog
Id String - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
Outputs
All input properties are implicitly available as output properties. Additionally, the DataCatalogEncryptionSettings resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing DataCatalogEncryptionSettings Resource
Get an existing DataCatalogEncryptionSettings resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: DataCatalogEncryptionSettingsState, opts?: CustomResourceOptions): DataCatalogEncryptionSettings
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
catalog_id: Optional[str] = None,
data_catalog_encryption_settings: Optional[DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs] = None) -> DataCatalogEncryptionSettings
func GetDataCatalogEncryptionSettings(ctx *Context, name string, id IDInput, state *DataCatalogEncryptionSettingsState, opts ...ResourceOption) (*DataCatalogEncryptionSettings, error)
public static DataCatalogEncryptionSettings Get(string name, Input<string> id, DataCatalogEncryptionSettingsState? state, CustomResourceOptions? opts = null)
public static DataCatalogEncryptionSettings get(String name, Output<String> id, DataCatalogEncryptionSettingsState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Catalog
Id string - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- Data
Catalog DataEncryption Settings Config Catalog Encryption Settings Data Catalog Encryption Settings - The security configuration to set. see Data Catalog Encryption Settings.
- Catalog
Id string - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- Data
Catalog DataEncryption Settings Catalog Encryption Settings Data Catalog Encryption Settings Args - The security configuration to set. see Data Catalog Encryption Settings.
- catalog
Id String - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- data
Catalog DataEncryption Settings Catalog Encryption Settings Data Catalog Encryption Settings - The security configuration to set. see Data Catalog Encryption Settings.
- catalog
Id string - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- data
Catalog DataEncryption Settings Catalog Encryption Settings Data Catalog Encryption Settings - The security configuration to set. see Data Catalog Encryption Settings.
- catalog_
id str - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- data_
catalog_ Dataencryption_ settings Catalog Encryption Settings Data Catalog Encryption Settings Args - The security configuration to set. see Data Catalog Encryption Settings.
- catalog
Id String - The ID of the Data Catalog to set the security configuration for. If none is provided, the AWS account ID is used by default.
- data
Catalog Property MapEncryption Settings - The security configuration to set. see Data Catalog Encryption Settings.
Supporting Types
DataCatalogEncryptionSettingsDataCatalogEncryptionSettings, DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsArgs
- Connection
Password DataEncryption Catalog Encryption Settings Data Catalog Encryption Settings Connection Password Encryption - When connection password protection is enabled, the Data Catalog uses a customer-provided key to encrypt the password as part of CreateConnection or UpdateConnection and store it in the ENCRYPTED_PASSWORD field in the connection properties. You can enable catalog encryption or only password encryption. see Connection Password Encryption.
- Encryption
At DataRest Catalog Encryption Settings Data Catalog Encryption Settings Encryption At Rest - Specifies the encryption-at-rest configuration for the Data Catalog. see Encryption At Rest.
- Connection
Password DataEncryption Catalog Encryption Settings Data Catalog Encryption Settings Connection Password Encryption - When connection password protection is enabled, the Data Catalog uses a customer-provided key to encrypt the password as part of CreateConnection or UpdateConnection and store it in the ENCRYPTED_PASSWORD field in the connection properties. You can enable catalog encryption or only password encryption. see Connection Password Encryption.
- Encryption
At DataRest Catalog Encryption Settings Data Catalog Encryption Settings Encryption At Rest - Specifies the encryption-at-rest configuration for the Data Catalog. see Encryption At Rest.
- connection
Password DataEncryption Catalog Encryption Settings Data Catalog Encryption Settings Connection Password Encryption - When connection password protection is enabled, the Data Catalog uses a customer-provided key to encrypt the password as part of CreateConnection or UpdateConnection and store it in the ENCRYPTED_PASSWORD field in the connection properties. You can enable catalog encryption or only password encryption. see Connection Password Encryption.
- encryption
At DataRest Catalog Encryption Settings Data Catalog Encryption Settings Encryption At Rest - Specifies the encryption-at-rest configuration for the Data Catalog. see Encryption At Rest.
- connection
Password DataEncryption Catalog Encryption Settings Data Catalog Encryption Settings Connection Password Encryption - When connection password protection is enabled, the Data Catalog uses a customer-provided key to encrypt the password as part of CreateConnection or UpdateConnection and store it in the ENCRYPTED_PASSWORD field in the connection properties. You can enable catalog encryption or only password encryption. see Connection Password Encryption.
- encryption
At DataRest Catalog Encryption Settings Data Catalog Encryption Settings Encryption At Rest - Specifies the encryption-at-rest configuration for the Data Catalog. see Encryption At Rest.
- connection_
password_ Dataencryption Catalog Encryption Settings Data Catalog Encryption Settings Connection Password Encryption - When connection password protection is enabled, the Data Catalog uses a customer-provided key to encrypt the password as part of CreateConnection or UpdateConnection and store it in the ENCRYPTED_PASSWORD field in the connection properties. You can enable catalog encryption or only password encryption. see Connection Password Encryption.
- encryption_
at_ Datarest Catalog Encryption Settings Data Catalog Encryption Settings Encryption At Rest - Specifies the encryption-at-rest configuration for the Data Catalog. see Encryption At Rest.
- connection
Password Property MapEncryption - When connection password protection is enabled, the Data Catalog uses a customer-provided key to encrypt the password as part of CreateConnection or UpdateConnection and store it in the ENCRYPTED_PASSWORD field in the connection properties. You can enable catalog encryption or only password encryption. see Connection Password Encryption.
- encryption
At Property MapRest - Specifies the encryption-at-rest configuration for the Data Catalog. see Encryption At Rest.
DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsConnectionPasswordEncryption, DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsConnectionPasswordEncryptionArgs
- Return
Connection boolPassword Encrypted - When set to
true
, passwords remain encrypted in the responses of GetConnection and GetConnections. This encryption takes effect independently of the catalog encryption. - Aws
Kms stringKey Id - A KMS key ARN that is used to encrypt the connection password. If connection password protection is enabled, the caller of CreateConnection and UpdateConnection needs at least
kms:Encrypt
permission on the specified AWS KMS key, to encrypt passwords before storing them in the Data Catalog.
- Return
Connection boolPassword Encrypted - When set to
true
, passwords remain encrypted in the responses of GetConnection and GetConnections. This encryption takes effect independently of the catalog encryption. - Aws
Kms stringKey Id - A KMS key ARN that is used to encrypt the connection password. If connection password protection is enabled, the caller of CreateConnection and UpdateConnection needs at least
kms:Encrypt
permission on the specified AWS KMS key, to encrypt passwords before storing them in the Data Catalog.
- return
Connection BooleanPassword Encrypted - When set to
true
, passwords remain encrypted in the responses of GetConnection and GetConnections. This encryption takes effect independently of the catalog encryption. - aws
Kms StringKey Id - A KMS key ARN that is used to encrypt the connection password. If connection password protection is enabled, the caller of CreateConnection and UpdateConnection needs at least
kms:Encrypt
permission on the specified AWS KMS key, to encrypt passwords before storing them in the Data Catalog.
- return
Connection booleanPassword Encrypted - When set to
true
, passwords remain encrypted in the responses of GetConnection and GetConnections. This encryption takes effect independently of the catalog encryption. - aws
Kms stringKey Id - A KMS key ARN that is used to encrypt the connection password. If connection password protection is enabled, the caller of CreateConnection and UpdateConnection needs at least
kms:Encrypt
permission on the specified AWS KMS key, to encrypt passwords before storing them in the Data Catalog.
- return_
connection_ boolpassword_ encrypted - When set to
true
, passwords remain encrypted in the responses of GetConnection and GetConnections. This encryption takes effect independently of the catalog encryption. - aws_
kms_ strkey_ id - A KMS key ARN that is used to encrypt the connection password. If connection password protection is enabled, the caller of CreateConnection and UpdateConnection needs at least
kms:Encrypt
permission on the specified AWS KMS key, to encrypt passwords before storing them in the Data Catalog.
- return
Connection BooleanPassword Encrypted - When set to
true
, passwords remain encrypted in the responses of GetConnection and GetConnections. This encryption takes effect independently of the catalog encryption. - aws
Kms StringKey Id - A KMS key ARN that is used to encrypt the connection password. If connection password protection is enabled, the caller of CreateConnection and UpdateConnection needs at least
kms:Encrypt
permission on the specified AWS KMS key, to encrypt passwords before storing them in the Data Catalog.
DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsEncryptionAtRest, DataCatalogEncryptionSettingsDataCatalogEncryptionSettingsEncryptionAtRestArgs
- Catalog
Encryption stringMode - The encryption-at-rest mode for encrypting Data Catalog data. Valid values:
DISABLED
,SSE-KMS
,SSE-KMS-WITH-SERVICE-ROLE
. - Catalog
Encryption stringService Role - The ARN of the AWS IAM role used for accessing encrypted Data Catalog data.
- Sse
Aws stringKms Key Id - The ARN of the AWS KMS key to use for encryption at rest.
- Catalog
Encryption stringMode - The encryption-at-rest mode for encrypting Data Catalog data. Valid values:
DISABLED
,SSE-KMS
,SSE-KMS-WITH-SERVICE-ROLE
. - Catalog
Encryption stringService Role - The ARN of the AWS IAM role used for accessing encrypted Data Catalog data.
- Sse
Aws stringKms Key Id - The ARN of the AWS KMS key to use for encryption at rest.
- catalog
Encryption StringMode - The encryption-at-rest mode for encrypting Data Catalog data. Valid values:
DISABLED
,SSE-KMS
,SSE-KMS-WITH-SERVICE-ROLE
. - catalog
Encryption StringService Role - The ARN of the AWS IAM role used for accessing encrypted Data Catalog data.
- sse
Aws StringKms Key Id - The ARN of the AWS KMS key to use for encryption at rest.
- catalog
Encryption stringMode - The encryption-at-rest mode for encrypting Data Catalog data. Valid values:
DISABLED
,SSE-KMS
,SSE-KMS-WITH-SERVICE-ROLE
. - catalog
Encryption stringService Role - The ARN of the AWS IAM role used for accessing encrypted Data Catalog data.
- sse
Aws stringKms Key Id - The ARN of the AWS KMS key to use for encryption at rest.
- catalog_
encryption_ strmode - The encryption-at-rest mode for encrypting Data Catalog data. Valid values:
DISABLED
,SSE-KMS
,SSE-KMS-WITH-SERVICE-ROLE
. - catalog_
encryption_ strservice_ role - The ARN of the AWS IAM role used for accessing encrypted Data Catalog data.
- sse_
aws_ strkms_ key_ id - The ARN of the AWS KMS key to use for encryption at rest.
- catalog
Encryption StringMode - The encryption-at-rest mode for encrypting Data Catalog data. Valid values:
DISABLED
,SSE-KMS
,SSE-KMS-WITH-SERVICE-ROLE
. - catalog
Encryption StringService Role - The ARN of the AWS IAM role used for accessing encrypted Data Catalog data.
- sse
Aws StringKms Key Id - The ARN of the AWS KMS key to use for encryption at rest.
Import
Using pulumi import
, import Glue Data Catalog Encryption Settings using CATALOG-ID
(AWS account ID if not custom). For example:
$ pulumi import aws:glue/dataCatalogEncryptionSettings:DataCatalogEncryptionSettings example 123456789012
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- AWS Classic pulumi/pulumi-aws
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
aws
Terraform Provider.