Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add SSM policy to enable all cluster roles to access SSM #66

Merged
merged 3 commits into from
Jun 10, 2019

Conversation

MikeTheCanuck
Copy link
Collaborator

Resolves hackoregon/civic-devops#241

SSM parameters were only accessible to the one ECS cluster running a manually-enhanced Role that includes ssm:GetParameters and kms:Decrypt actions for the existing resources.

I've hard-coded those values for now in the ecs-cluster.yaml template to ensure we have a working cluster. Separate ticket will be filed to refactor this into parameters that are injected through the master.yaml so that this stack configuration could be re-used for different environments.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

AccessDeniedException for containers trying to access SSM parameters
1 participant