Skip to content

Commit 39d830a

Browse files
committed
Add missing policy for CfnCluster user profile
"ec2:CreatePlacementGroup" and "ec2:DeletePlacementGroup" used when setting the placement group config to be DYNAMIC "iam:GetRole" and "iam:SimulatePrincipalPolicy" used when setting a custom instance role Signed-off-by: Luca Carrogu <[email protected]>
1 parent b68b29b commit 39d830a

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

docs/source/iam.rst

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ IAM in CfnCluster
88

99

1010
CfnCluster utilizes multiple AWS services to deploy and operate a cluster. The services used are listed in the :ref:`AWS Services used in CfnCluster <aws_services>` section of the documentation.
11-
11+
1212
CfnCluster uses EC2 IAM roles to enable instances access to AWS services for the deployment and operation of the cluster. By default the EC2 IAM role is created as part of the cluster creation by CloudFormation. This means that the user creating the cluster must have the appropriate level of permissions
1313

1414
Defaults
@@ -176,7 +176,9 @@ CfnClusterUserPolicy
176176
"ec2:DeleteSecurityGroup",
177177
"ec2:DisassociateAddress",
178178
"ec2:RevokeSecurityGroupIngress",
179-
"ec2:ReleaseAddress"
179+
"ec2:ReleaseAddress",
180+
"ec2:CreatePlacementGroup",
181+
"ec2:DeletePlacementGroup"
180182
],
181183
"Effect": "Allow",
182184
"Resource": "*"
@@ -308,7 +310,9 @@ CfnClusterUserPolicy
308310
"Action": [
309311
"iam:PassRole",
310312
"iam:CreateRole",
311-
"iam:DeleteRole"
313+
"iam:DeleteRole",
314+
"iam:GetRole",
315+
"iam:SimulatePrincipalPolicy"
312316
],
313317
"Effect": "Allow",
314318
"Resource": "arn:aws:iam::<AWS ACCOUNT ID>:role/<CFNCLUSTER EC2 ROLE NAME>"

0 commit comments

Comments
 (0)