Quick Start
Static credentials are the fastest way to get Terrateam working with AWS. You’ll create an AWS IAM user with programmatic access and store the credentials as GitHub secrets.
Quick Start
Static credentials are the fastest way to get Terrateam working with AWS. You’ll create an AWS IAM user with programmatic access and store the credentials as GitHub secrets.
Create a dedicated IAM user for Terrateam in your AWS account:
aws iam create-user --user-name terrateam
Attach an IAM policy to give Terrateam the necessary permissions. We suggest PowerUserAccess
as a starting point:
aws iam attach-user-policy \--policy-arn arn:aws:iam::aws:policy/PowerUserAccess \--user-name terrateam
Generate access keys for the terrateam user:
aws iam create-access-key --user-name terrateam
This command will output something like:
{ "AccessKey": { "UserName": "terrateam", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "Status": "Active", "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY" }}
Add the AWS credentials as secrets to your GitHub repository:
# Set your repository (replace with your actual org/repo)export REPO="your-org/your-repo"
# Create the AWS Access Key ID secretgh secret --repo "$REPO" set AWS_ACCESS_KEY_ID
# Create the AWS Secret Access Key secretgh secret --repo "$REPO" set AWS_SECRET_ACCESS_KEY
When prompted, paste the corresponding values from step 3.
Now that you have AWS authentication configured, you are now able to use Terrateam for plan and apply operations against AWS resources.