Attaches the specified managed policy to the specified IAM role.Show details from next link. https://docs.aws.amazon.com/ja_jp/cli/latest/reference/iam/attach-role-policy.html
aws iam attach-role-policy \ |
AWS IAM "ReadOnlyAccess" Managed Policy Is Too Permissive (For Us) - Alestic.com : http://alestic.com/2015/10/aws-iam-readonly-too-permissive/ |
aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/service-role/AWSLambdaSQSQueueExecutionRole --role-name arc-role |
arc : http://arc.codes/guides/upgrade |
aws iam attach-role-policy --role-name SSMServiceRole --policy-arn arn:aws:iam::aws:policy/AmazonSSMFullAccess |
' name='description'/> Blue21: 8月 2018 : http://blue21neo.blogspot.com/2018/08/ |
aws iam attach-role-policy --role-name |
AWS ECS Clustering Lab : http://clusterfrak.com/docker/labs/ecs_clustering/ |
aws iam attach-role-policy --role-name 'ConvoxRole- |
AWS Integration : http://convox.com/docs/aws-integration |
aws iam attach-role-policy \\\n --policy-arn arn:aws:iam::aws:policy/AdministratorAccess \\\n --role-name [my-role]" |
Backdooring an AWS account Cyber Free : http://danielgrzelak.com/backdooring-an-aws-account-da007d36f8f9 |
aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/ReadOnlyAccess --role-name ReadOnlyRole |
put-role-policy — AWS CLI 1.16.7 Command Reference : http://docs.aws.amazon.com/cli/latest/reference/iam/attach-role-policy.html |
aws iam attach-role-policy \ |
Amazon EC2 Container Registry (ECR) with Kubernetes — Heptio Docs : http://docs.heptio.com/content/private-registries/pr-ecr.html |
aws iam attach-role-policy --profile trusting --role-name cross-account-readonly --policy-arn |
Using the EC2 Integration with Sensu Enterprise - Sensu Docs : http://docs.uchiwa.io/sensu-enterprise/3.1/guides/using-ec2/ |
aws iam attach-role-policy --role-name StartEnvironmentRole --policy-arn |
Infrastructure Cost Optimization with Lambda - DZone Cloud : http://dzone.com/articles/infrastructure-cost-optimization-with-lambda |
aws iam attach-role-policy --role-name ROLE_NAME --policy-arn POLICY_ARN |
aws cli で Role を作成 - エセ技術者ブログ : http://engmng.blog.fc2.com/blog-entry-13.html@sp |
aws iam attach-role-policy --role-name admin --policy-arn arn:aws:iam::aws:policy/AdministratorAccess |
AWS IAM / CLI / MFA Notes 揃 GitHub : http://gist.github.com/davejamesmiller/90f292d2d9a21bac5f6116296fa64657 |
aws iam attach-role-policy --role-name gloo-contact-lambda-role --policy-arn |
Refactoring Monoliths with Microservices and Serverless - gloo : http://gloo.solo.io/tutorials/refactor_monolith/ |
aws iam attach-role-policy \\\n --role-name \" |
Serverless and Lambdaless Scalable CRUD Data API with AWS API Gateway and DynamoDB : http://hackernoon.com/serverless-and-lambdaless-scalable-crud-data-api-with-aws-api-gateway-and-dynamodb-626161008bb2 |
aws iam attach-role-policy --role-name supervise --policy-arn arn:aws:iam::aws:policy/IAMFullAccess" |
Use AWS Roles and Secure Your Access Keys with MFA Kaveh Mousavi Zamani Medium : http://medium.com/@kavehmz/use-aws-roles-and-secure-your-access-with-mfa-7a7babfd123a |
aws iam attach-role-policy --role-name CodeDeployServiceRole --policy-arn arn:aws:iam::aws:policy:/service-role/AWSCodeDeployRole |
AWS Tutorial wrangling, effort 2: HelloWorld via CodeDeploy – The rattled cough of Mike's imagination : http://mikethecanuck.wordpress.com/2017/01/13/aws-tutorial-wrangling-effort-2-helloworld-via-codedeploy/ |
aws iam attach-role-policy --role-name CodeDeployRole --policy-arn arn:aws:iam::aws:policy/service-role/AWSCodeDeployRole |
Example - Moonshot : http://moonshot.readthedocs.io/en/latest/example/ |
aws iam attach-role-policy --role-name LambdaServiceRole --policy-arn arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess |
Node | Serverless Node with AWS Lambda, API Gateway and DynamoDB : http://node.university/blog/1176932/aws-serverless |
aws iam attach-role-policy --role-name aws iam attach-role-policy --policy-arn [ARN ID] --role-name [IAM ROLE |
AWS CLIメモ: IAM ROLE作成 : http://qiita.com/suzukihi724/items/a03d279c846602ab48a9 |
aws iam attach-role-policy --role-name SSMRole --policy-arn arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM |
Organize hybrid compute resources with Amazon SSM agent : http://searchaws.techtarget.com/tip/Organize-hybrid-compute-resources-with-Amazon-SSM-agent |
aws iam attach-role-policy --role-name " |
amazon web services - AWS CLI retrieve the ARN of the newly created policy - Stack Overflow : http://stackoverflow.com/questions/45898665/aws-cli-retrieve-the-arn-of-the-newly-created-policy |
aws iam attach-role-policy --policy-arn arn:aws:iam::123456789012:policy/quotes-lambda-policy --role-name quotes-lambda-role |
Your First Python Lambda Function on AWS Using the AWS CLI Tools : http://sysadmins.co.za/your-first-python-lambda-function-on-aws-using-the-aws-cli-tools/ |
aws iam attach-role-policy --policy-arn |
Aaron Medacco | Cloud Architect & Software Developer : http://www.aaronmedacco.com/blog |
aws iam attach-role-policy --role-name lambda-books-executor \ |
How to build a Serverless API with Go and AWS Lambda : http://www.alexedwards.net/blog/serverless-api-with-go-and-aws-lambda |
aws iam attach-role-policy --role-name StartEnvironmentRole --policy-arn |
EC2 Archives - Mohamed Labouardy : http://www.blog.labouardy.com/category/ec2/ |
aws iam attach-role-policy --role-name jmeter-cw-logs --policy-arn arn:aws:iam::aws:policy/CloudWatchLogsFullAccess |
MANUAL STEPS - publish JMeter results to AWS CloudWatch and get ready for performance test automation. - Concurrency Labs : http://www.concurrencylabs.com/blog/publish-jmeter-test-results-to-cloudwatch-logs-manual-steps/ |
aws iam attach-role-policy --role-name iot-actions-role --policy-arn |
Plant Monitoring System using AWS IoT - Hackster.io : http://www.hackster.io/carmelito/plant-monitoring-system-using-aws-iot-6cb054 |
aws iam attach-role-policy --role-name iscWebsiteAdministrators --policy-arn arn:aws:iam::aws:policy/AdministratorAccess |
Enabling Penn Web Login for the Amazon Web Services console | UPenn ISC : http://www.isc.upenn.edu/enabling-penn-web-login-amazon-web-services-console |
aws iam attach-role-policy \ |
Accessing PostgreSQL databases from an AWS Python Lambda function and API gateway | LinkedIn : http://www.linkedin.com/pulse/accessing-postgresql-databases-from-aws-python-lambda-wang |
aws iam attach-role-policy --role-name ecsRole --policy-arn \ |
Single Instance ECS Setup - Rainer Hahnekamp : http://www.rainerhahnekamp.com/en/single-instance-ecs-setup/ |
aws iam attach-role-policy \ |
Power Data Ingestion into Splunk Using Amazon Kinesis Data Firehose : http://www.splunk.com/blog/2018/01/12/power-data-ingestion-into-splunk-using-amazon-kinesis-data-firehose.html |