Quick Start
Static credentials are the fastest way to get Terrateam working with AWS. You’ll create an AWS IAM user with programmatic access and store the credentials as GitHub secrets.
Quick Start
Static credentials are the fastest way to get Terrateam working with AWS. You’ll create an AWS IAM user with programmatic access and store the credentials as GitHub secrets.
Create a dedicated IAM user for Terrateam in your AWS account:
aws iam create-user --user-name terrateamAttach an IAM policy to give Terrateam the necessary permissions. We suggest PowerUserAccess as a starting point:
aws iam attach-user-policy \--policy-arn arn:aws:iam::aws:policy/PowerUserAccess \--user-name terrateamGenerate access keys for the terrateam user:
aws iam create-access-key --user-name terrateamThis command will output something like:
{ "AccessKey": { "UserName": "terrateam", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "Status": "Active", "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY" }}Add the AWS credentials as secrets to your GitHub repository:
# Set your repository (replace with your actual org/repo)export REPO="your-org/your-repo"
# Create the AWS Access Key ID secretgh secret --repo "$REPO" set AWS_ACCESS_KEY_ID
# Create the AWS Secret Access Key secretgh secret --repo "$REPO" set AWS_SECRET_ACCESS_KEYWhen prompted, paste the corresponding values from step 3.
Now that you have AWS authentication configured, you are now able to use Terrateam for plan and apply operations against AWS resources.