Permission necessary for AWS Watchman to do all the things.
- Create An IAM user for Watchman
- Allow access with key and secret. Take note of those, you will use them on the commandline or in a profile
- Add the following as inline policies to the user (You may want to replace
"Resource": [ "*" ]
with something more specific to the account).
The values you will have to subsitute in are:
<region>
The AWS region, eg.eu-west1
<watchman bucket>
The name of the S3 bucket to use. The bucket must already exist.<account-id>
The id of your AWS account.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cloudwatch:PutMetricAlarm",
"cloudwatch:DeleteAlarms",
"cloudwatch:DescribeAlarms",
"cloudwatch:GetMetricData",
"cloudwatch:GetMetricStatistics",
"cloudwatch:ListMetrics"
],
"Resource": [
"*"
]
}
]
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"sns:ListTopics",
"sns:CreateTopic",
"sns:ListSubscriptionsByTopic",
"sns:Subscribe",
"sns:DeleteTopic",
"sns:GetTopicAttributes",
"sns:SetTopicAttributes",
"sns:Subscribe",
"sns:Unsubscribe"
],
"Resource": [
"arn:aws:sns:<region>:<account-id>:*"
]
}
]
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cloudformation:ListStacks",
"cloudformation:DescribeStacks",
"cloudformation:CreateStack"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"cloudformation:UpdateStack"
],
"Resource": [
"arn:aws:cloudformation:<region>:<account-id>:stack/Watchman*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject"
],
"Resource": [
"arn:aws:s3:::<watchman bucket>/*"
]
}
]
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"autoscaling:DescribeAutoScalingGroups",
"ec2:DescribeSubnets",
"elasticloadbalancing:DescribeLoadBalancers",
"dynamodb:DescribeTable",
"dynamodb:ListTables",
"lambda:ListFunctions",
"rds:DescribeDBInstances",
"sqs:GetQueueAttributes",
"states:ListStateMachines"
],
"Resource": [
"*"
]
}
]
}