List of IAM permissions for your scoutflo IAM user on AWS
You can copy paste the below JSON for adding all the mentioned roles and permissions as an IAM policy to your newly created AWS IAM user:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"application-autoscaling:*",
"tag:GetResources",
"rds:*",
"logs:*",
"events:PutRule",
"dynamodb:*",
"es:CreateElasticsearchDomain",
"es:ListTags",
"autoscaling:*",
"es:AddTags",
"events:ListRuleNamesByTarget",
"es:DeleteElasticsearchDomain",
"es:DescribeElasticsearchDomain",
"kms:*",
"events:RemoveTargets",
"events:ListTargetsByRule",
"cloudtrail:LookupEvents",
"events:DescribeRule",
"s3:*",
"elasticloadbalancing:*",
"iam:*",
"events:DeleteRule",
"events:PutTargets",
"es:RemoveTags",
"cloudwatch:*",
"ecs:*",
"route53:*",
"ecr:*",
"ec2:*",
"eks:*",
"elasticache:*"
],
"Resource": "*"
}
]
}
Last updated