Adds a statement to a topic's access control policy, granting accessfor the specified AWS accounts to the specified actions.Show details from next link. https://docs.aws.amazon.com/ja_jp/cli/latest/reference/sns/add-permission.html
aws sns add-permission \ |
Step 3: Set Up Cross-Account Permissions - AWS Lambda : http://docs.aws.amazon.com/lambda/latest/dg/with-sns-create-x-account-permissions.html |
aws sns add-permission --topic-arn arn:aws:sns:us-east-1:ACCOUNT_ID:NAME --label StmtLabel --aws-account-id NOTHINGWORKSHERFORCLOUDTRAIL --action-name Publish http://docs.aws.amazon.com/awscloudtra..." /> |
CloudTrail 2 SNS (topic policy) not possible with CLI / SDKs 揃 Issue #2515 揃 aws/aws-cli 揃 GitHub : http://github.com/aws/aws-cli/issues/2515 |
aws sns add-permission \ |
Linking together Lambda and SNS across AWS accounts – Jimmy Thompson - Software Engineer : http://jimmythompson.co.uk/blog/sns-and-lambda/ |
aws sns add-permission \\\n --topic-arn \"arn:aws:sns:us-east-1:999999999999:new-births\" \\\n --label \"some-unique-identifier\" \\\n --aws-account-id \"000000000000\" \\\n --action-name \"Receive\" \"Subscribe\"" |
Linking together Lambda and SNS across AWS accounts : http://medium.com/@jimmythompson/linking-together-lambda-and-sns-across-aws-accounts-f7ef1baca89e |
aws sns add-permission --topic-arn arn:aws:sns:us-west-2:123456789:test1234 --label 0987654321 --aws-account-id 0987654321 --action-name Publish |
Amazon AWS SES SNS integration for different aws accounts - Server Fault : http://serverfault.com/questions/742661/amazon-aws-ses-sns-integration-for-different-aws-accounts.1 |
aws sns add-permission --topic-arn arn:aws:..." /> |
amazon web services - An error occurred (InvalidParameter) when calling the AddPermission operation: Invalid parameter: Policy contains too many statements - Stack Overflow : http://stackoverflow.com/questions/42796850/an-error-occurred-invalidparameter-when-calling-the-addpermission-operation-i/42836587 |
aws sns add-permission --region eu-central-1 --topic-arn arn:aws:sns:eu-central-1:222222222222:test --label lambda-access --aws-account-id 111111111111 --action-name Subscribe ListSubscriptionsByTopic Receive |
Save EC2 Instance Cost on AWS using Roham : http://thebluenode.com/roham |
aws sns add-permission --topic-arn arn:aws:sns:eu-central-1:111111111111:SNSInfblx --label Infoblx-LambdaAccess --aws-account-id 222222222222--action-name Subscribe ListSubscriptionsByTopic Receive --region "eu-central-1" --profile "nonprod" There will be no response/blank. |