Skip to content

Commit

Permalink
updates
Browse files Browse the repository at this point in the history
  • Loading branch information
aknysh committed Apr 29, 2024
1 parent 7115962 commit d9bc1b9
Showing 1 changed file with 3 additions and 4 deletions.
7 changes: 3 additions & 4 deletions website/docs/core-concepts/components/remote-state-backend.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ terraform:
Let's say we also have a read-only IAM role, and we want to use it to access the remote state instead of the read-write
role, because accessing remote state is a read-only operation, and we don't want to give the role more permissions than
it requires - this is the principle of least privileges.
it requires - this is the [principle of least privilege](https://en.wikipedia.org/wiki/Principle_of_least_privilege).
We can add the `remote_state_backend` and `remote_state_backend_type` to override the required attributes from the
`backend` section:
Expand All @@ -75,7 +75,7 @@ terraform:
remote_state_backend:
s3:
role_arn: "arn:aws:iam::xxxxxxxx:role/terraform-backend-read-only"
# Override the other attributes as needed
# Override the other attributes from the `backend.s3` section as needed
```

<br/>
Expand All @@ -85,8 +85,7 @@ accessing the remote state of all components. All other attributes will be taken
deep-merges the `remote_state_backend` section with the `backend` section).

When working with Terraform backends and writing/updating the state, the `terraform-backend-read-write` role will be
used.
But when reading the remote state of components, the `terraform-backend-read-only` role will be used.
used. But when reading the remote state of components, the `terraform-backend-read-only` role will be used.

## Brownfield Development

Expand Down

0 comments on commit d9bc1b9

Please sign in to comment.