コマンドオプションサンプル:aws iam attach-role-policy

コマンドサンプルを検索した結果です。

指定された管理ポリシーを指定されたIAMロールに関連付けます。 詳細は次のリンクを参照してください。 https://docs.aws.amazon.com/ja_jp/cli/latest/reference/iam/attach-role-policy.html

aws iam attach-role-policy \
    AWS IAM "ReadOnlyAccess" Managed Policy Is Too Permissive (For Us) - Alestic.com : http://alestic.com/2015/10/aws-iam-readonly-too-permissive/
aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/service-role/AWSLambdaSQSQueueExecutionRole --role-name arc-role
    arc : http://arc.codes/guides/upgrade
aws iam attach-role-policy --role-name SSMServiceRole --policy-arn arn:aws:iam::aws:policy/AmazonSSMFullAccess
 ' name='description'/>    Blue21: 8月 2018 : http://blue21neo.blogspot.com/2018/08/
aws iam attach-role-policy --role-name
    AWS ECS Clustering Lab  : http://clusterfrak.com/docker/labs/ecs_clustering/
aws iam attach-role-policy --role-name 'ConvoxRole-
    AWS Integration : http://convox.com/docs/aws-integration
aws iam attach-role-policy \\\n --policy-arn arn:aws:iam::aws:policy/AdministratorAccess \\\n --role-name [my-role]"
    Backdooring an AWS account Cyber Free : http://danielgrzelak.com/backdooring-an-aws-account-da007d36f8f9
aws iam attach-role-policy --role-name SSMServiceRole --policy-arn arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM
    Amazon LightsailをAWS Systems Managerに登録してみた #reinvent | Developers.IO : http://dev.classmethod.jp/cloud/aws/lightsail-avtivate-systemsmanager/
aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/ReadOnlyAccess --role-name ReadOnlyRole
    put-role-policy — AWS CLI 1.16.7 Command Reference : http://docs.aws.amazon.com/cli/latest/reference/iam/attach-role-policy.html
aws iam attach-role-policy \
    Amazon EC2 Container Registry (ECR) with Kubernetes — Heptio Docs : http://docs.heptio.com/content/private-registries/pr-ecr.html
aws iam attach-role-policy --profile trusting --role-name cross-account-readonly --policy-arn
    Using the EC2 Integration with Sensu Enterprise - Sensu Docs : http://docs.uchiwa.io/sensu-enterprise/3.1/guides/using-ec2/
aws iam attach-role-policy --role-name StartEnvironmentRole --policy-arn
    Infrastructure Cost Optimization with Lambda - DZone Cloud : http://dzone.com/articles/infrastructure-cost-optimization-with-lambda
aws iam attach-role-policy --role-name eks-service-role --policy-arn arn:aws:iam::aws:policy/AmazonEKSClusterPolicy
    Amazon EKSが一般公開されたので使ってみた | もばらぶエンジニアブログ : http://engineering.mobalab.net/2018/06/25/experiment-with-recently-released-amazon-eks/
aws iam attach-role-policy --role-name ROLE_NAME --policy-arn POLICY_ARN

     aws cli で Role を作成 - エセ技術者ブログ : http://engmng.blog.fc2.com/blog-entry-13.html@sp
aws iam attach-role-policy --role-name admin --policy-arn arn:aws:iam::aws:policy/AdministratorAccess
    AWS IAM / CLI / MFA Notes 揃 GitHub : http://gist.github.com/davejamesmiller/90f292d2d9a21bac5f6116296fa64657
aws iam attach-role-policy --role-name gloo-contact-lambda-role --policy-arn
    Refactoring Monoliths with Microservices and Serverless - gloo : http://gloo.solo.io/tutorials/refactor_monolith/
aws iam attach-role-policy \\\n --role-name \"
    Serverless and Lambdaless Scalable CRUD Data API with AWS API Gateway and DynamoDB : http://hackernoon.com/serverless-and-lambdaless-scalable-crud-data-api-with-aws-api-gateway-and-dynamodb-626161008bb2
aws iam attach-role-policy --role-name=
    IAM ユーザで STS を殴って一時的なアクセス権を取得する - 破棄されたブログ : http://hateda.hatenadiary.jp/entry/2015/09/10/001445
aws iam attach-role-policy --role-name
    EC2 IAMロールの作成と適用をCLIから行う | ことえりブログ : http://kter.jp/aws/2018/01/10/EC2IAM驛「%9D繝サ・ュ驛「%9D繝サ・シ驛「%9D繝サ・ォ驍オ・コ繝サ・ョ繝サ8F・エ繝サ87%88%88繝サ88%8C繝サ86%92鬯ゥ%95繝サ・ゥ繝サ80%95繝サ・ィ驛「・ァ髴趣スーLI驍オ・コ闕オ%9D繝サ%89繝サ99・ヲ陟・8C繝サ89・ァ.html
aws iam attach-role-policy --role-name supervise --policy-arn arn:aws:iam::aws:policy/IAMFullAccess"
    Use AWS Roles and Secure Your Access Keys with MFA Kaveh Mousavi Zamani Medium : http://medium.com/@kavehmz/use-aws-roles-and-secure-your-access-with-mfa-7a7babfd123a
aws iam attach-role-policy --role-name CodeDeployServiceRole --policy-arn arn:aws:iam::aws:policy:/service-role/AWSCodeDeployRole
    AWS Tutorial wrangling, effort 2: HelloWorld via CodeDeploy – The rattled cough of Mike's imagination : http://mikethecanuck.wordpress.com/2017/01/13/aws-tutorial-wrangling-effort-2-helloworld-via-codedeploy/
aws iam attach-role-policy --role-name CodeDeployRole --policy-arn arn:aws:iam::aws:policy/service-role/AWSCodeDeployRole
    Example - Moonshot : http://moonshot.readthedocs.io/en/latest/example/
aws iam attach-role-policy --role-name LambdaServiceRole --policy-arn arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess
    Node | Serverless Node with AWS Lambda, API Gateway and DynamoDB : http://node.university/blog/1176932/aws-serverless
aws iam attach-role-policy --role-name aws iam attach-role-policy --role-name foobar --policy-arn
    aws cli で IAM Instance Profile をつくってEC2に適用する - DRYな備忘録 : http://otiai10.hatenablog.com/entry/2018/06/04/183211
aws iam attach-role-policy \u003cspan class=\
    AWS CLI で IAM Role を作りつつ、「Assume」や「Principal」について考える : http://qiita.com/knaka/items/69724ee0b5aaf6108a55
aws iam attach-role-policy --role-name SSMRole --policy-arn arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM

    Organize hybrid compute resources with Amazon SSM agent : http://searchaws.techtarget.com/tip/Organize-hybrid-compute-resources-with-Amazon-SSM-agent
aws iam attach-role-policy --role-name "
    amazon web services - AWS CLI retrieve the ARN of the newly created policy - Stack Overflow : http://stackoverflow.com/questions/45898665/aws-cli-retrieve-the-arn-of-the-newly-created-policy
aws iam attach-role-policy --policy-arn arn:aws:iam::123456789012:policy/quotes-lambda-policy --role-name quotes-lambda-role
    Your First Python Lambda Function on AWS Using the AWS CLI Tools : http://sysadmins.co.za/your-first-python-lambda-function-on-aws-using-the-aws-cli-tools/
aws iam attach-role-policy --role-name ecs-redash --policy-arn
    AWS上のパスワードちゃんと管理できてますか?AWSパラメータストアで秘密情報を安全に管理する方法 · カウル Tech Blog : http://techblog.housmart.co.jp/2018/03/22/managing-secrets-with-parameter-store/
aws iam attach-role-policy --policy-arn
     Aaron Medacco | Cloud Architect & Software Developer : http://www.aaronmedacco.com/blog
aws iam attach-role-policy --role-name lambda-books-executor \
    How to build a Serverless API with Go and AWS Lambda : http://www.alexedwards.net/blog/serverless-api-with-go-and-aws-lambda
aws iam attach-role-policy --role-name StartEnvironmentRole --policy-arn
    EC2 Archives - Mohamed Labouardy : http://www.blog.labouardy.com/category/ec2/
aws iam attach-role-policy --role-name jmeter-cw-logs --policy-arn arn:aws:iam::aws:policy/CloudWatchLogsFullAccess
    MANUAL STEPS - publish JMeter results to AWS CloudWatch and get ready for performance test automation. - Concurrency Labs : http://www.concurrencylabs.com/blog/publish-jmeter-test-results-to-cloudwatch-logs-manual-steps/
aws iam attach-role-policy --role-name iot-actions-role --policy-arn
    Plant Monitoring System using AWS IoT - Hackster.io : http://www.hackster.io/carmelito/plant-monitoring-system-using-aws-iot-6cb054
aws iam attach-role-policy --role-name iscWebsiteAdministrators --policy-arn arn:aws:iam::aws:policy/AdministratorAccess
    Enabling Penn Web Login for the Amazon Web Services console | UPenn ISC : http://www.isc.upenn.edu/enabling-penn-web-login-amazon-web-services-console
aws iam attach-role-policy \
    Accessing PostgreSQL databases from an AWS Python Lambda function and API gateway | LinkedIn  : http://www.linkedin.com/pulse/accessing-postgresql-databases-from-aws-python-lambda-wang
aws iam attach-role-policy --role-name ecsRole --policy-arn \
    Single Instance ECS Setup - Rainer Hahnekamp : http://www.rainerhahnekamp.com/en/single-instance-ecs-setup/
aws iam attach-role-policy \
    Power Data Ingestion into Splunk Using Amazon Kinesis Data Firehose : http://www.splunk.com/blog/2018/01/12/power-data-ingestion-into-splunk-using-amazon-kinesis-data-firehose.html

aws のオプション一覧