Skip to content

karuppiah7890/aws-tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

aws-tools

allow-ip

To use this action, you could create a IAM user with just enough access to do this action

In my case I created an IAM user and attached policy directly with the following actions (permissions)

  • ec2:AuthorizeSecurityGroupIngress
  • ec2:CreateTags - This was shown as a dependent action in warning when adding ec2:AuthorizeSecurityGroupIngress
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "ec2:AuthorizeSecurityGroupIngress",
                "ec2:CreateTags"
            ],
            "Resource": "arn:aws:ec2:us-east-1:123456789012:security-group/sg-11223344556677889"
        }
    ]
}

About

Some set of AWS tools

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published