Skip to content

Commit

Permalink
update-parameter-name in sample configs (#597)
Browse files Browse the repository at this point in the history
* update-parameter-name

* missed files
  • Loading branch information
Brian969 authored Feb 4, 2021
1 parent 23f3017 commit f13b7c0
Show file tree
Hide file tree
Showing 6 changed files with 61 additions and 54 deletions.
22 changes: 11 additions & 11 deletions reference-artifacts/SAMPLE_CONFIGS/config.example.json
Original file line number Diff line number Diff line change
Expand Up @@ -918,7 +918,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -1118,7 +1118,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand All @@ -1129,7 +1129,7 @@
{
"role": "PBMMAccel-RDGW-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand All @@ -1141,7 +1141,7 @@
{
"role": "PBMMAccel-Rsyslog-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": ["AmazonSSMManagedInstanceCore", "CloudWatchAgentServerPolicy", "AmazonS3ReadOnlyAccess"],
"boundary-policy": "Default-Boundary-Policy"
}
Expand Down Expand Up @@ -1470,7 +1470,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -2544,7 +2544,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -3127,7 +3127,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -3710,7 +3710,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -4293,7 +4293,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -4843,7 +4843,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -5329,7 +5329,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down
20 changes: 10 additions & 10 deletions reference-artifacts/SAMPLE_CONFIGS/config.lite-example.json
Original file line number Diff line number Diff line change
Expand Up @@ -918,7 +918,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -1058,7 +1058,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand All @@ -1069,7 +1069,7 @@
{
"role": "PBMMAccel-RDGW-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand All @@ -1081,7 +1081,7 @@
{
"role": "PBMMAccel-Rsyslog-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": ["AmazonSSMManagedInstanceCore", "CloudWatchAgentServerPolicy", "AmazonS3ReadOnlyAccess"],
"boundary-policy": "Default-Boundary-Policy"
}
Expand Down Expand Up @@ -1410,7 +1410,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -2481,7 +2481,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -3064,7 +3064,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -3647,7 +3647,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -4230,7 +4230,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -4716,7 +4716,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down
22 changes: 11 additions & 11 deletions reference-artifacts/SAMPLE_CONFIGS/config.multi-region-example.json
Original file line number Diff line number Diff line change
Expand Up @@ -922,7 +922,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -1326,7 +1326,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand All @@ -1337,7 +1337,7 @@
{
"role": "PBMMAccel-RDGW-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand All @@ -1349,7 +1349,7 @@
{
"role": "PBMMAccel-Rsyslog-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": ["AmazonSSMManagedInstanceCore", "CloudWatchAgentServerPolicy", "AmazonS3ReadOnlyAccess"],
"boundary-policy": "Default-Boundary-Policy"
}
Expand Down Expand Up @@ -1679,7 +1679,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -3035,7 +3035,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -3618,7 +3618,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -4201,7 +4201,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -4784,7 +4784,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -5605,7 +5605,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down Expand Up @@ -6091,7 +6091,7 @@
{
"role": "EC2-Default-SSM-AD-Role",
"type": "ec2",
"ssm-log-archive-access": true,
"ssm-log-archive-write-access": true,
"policies": [
"AmazonSSMManagedInstanceCore",
"AmazonSSMDirectoryServiceAccess",
Expand Down
7 changes: 7 additions & 0 deletions reference-artifacts/SAMPLE_CONFIGS/sample_snippets.md
Original file line number Diff line number Diff line change
Expand Up @@ -73,6 +73,13 @@

---

- Add a policy to a role in the account to enable RO access to the Log Archive bucket

```
"ssm-log-archive-read-only-access": true
```

---
- CloudWatch Metric Filters and Alarms

```
Expand Down
Loading

0 comments on commit f13b7c0

Please sign in to comment.