You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{product-title} uses both the ELB and ELBv2 API services to provision load balancers. The permission list shows permissions required by both services. A known issue exists in the {aws-short} web console where both services use the same `elasticloadbalancing` action prefix but do not recognize the same actions. You can ignore the warnings about the service not recognizing certain `elasticloadbalancing` actions.
126
+
=====
133
127
====
134
128
135
129
.Required IAM permissions for installation
@@ -152,6 +146,7 @@ If you use an existing VPC, your account does not require these permissions for
152
146
* `iam:PutRolePolicy`
153
147
* `iam:RemoveRoleFromInstanceProfile`
154
148
* `iam:SimulatePrincipalPolicy`
149
+
* `iam:TagInstanceProfile`
155
150
* `iam:TagRole`
156
151
157
152
[NOTE]
@@ -176,7 +171,7 @@ If you have not created a load balancer in your AWS account, the IAM user also r
176
171
* `route53:UpdateHostedZoneComment`
177
172
====
178
173
179
-
.Required S3 permissions for installation
174
+
.Required Amazon Simple Storage Service (S3) permissions for installation
180
175
[%collapsible]
181
176
====
182
177
* `s3:CreateBucket`
@@ -186,8 +181,8 @@ If you have not created a load balancer in your AWS account, the IAM user also r
186
181
* `s3:GetBucketCors`
187
182
* `s3:GetBucketLocation`
188
183
* `s3:GetBucketLogging`
189
-
* `s3:GetBucketPolicy`
190
184
* `s3:GetBucketObjectLockConfiguration`
185
+
* `s3:GetBucketPolicy`
191
186
* `s3:GetBucketRequestPayment`
192
187
* `s3:GetBucketTagging`
193
188
* `s3:GetBucketVersioning`
@@ -218,13 +213,14 @@ If you have not created a load balancer in your AWS account, the IAM user also r
218
213
[%collapsible]
219
214
====
220
215
* `autoscaling:DescribeAutoScalingGroups`
221
-
* `ec2:DeletePlacementGroup`
222
216
* `ec2:DeleteNetworkInterface`
217
+
* `ec2:DeletePlacementGroup`
223
218
* `ec2:DeleteVolume`
224
219
* `elasticloadbalancing:DeleteTargetGroup`
225
220
* `elasticloadbalancing:DescribeTargetGroups`
226
221
* `iam:DeleteAccessKey`
227
222
* `iam:DeleteUser`
223
+
* `iam:DeleteUserPolicy`
228
224
* `iam:ListAttachedRolePolicies`
229
225
* `iam:ListInstanceProfiles`
230
226
* `iam:ListRolePolicies`
@@ -256,6 +252,19 @@ If you use an existing VPC, your account does not require these permissions to d
256
252
=====
257
253
====
258
254
255
+
.Optional permissions for installing a cluster with a custom Key Management Service (KMS) key
256
+
[%collapsible]
257
+
====
258
+
* `kms:CreateGrant`
259
+
* `kms:Decrypt`
260
+
* `kms:DescribeKey`
261
+
* `kms:Encrypt`
262
+
* `kms:GenerateDataKey`
263
+
* `kms:GenerateDataKeyWithoutPlainText`
264
+
* `kms:ListGrants`
265
+
* `kms:RevokeGrant`
266
+
====
267
+
259
268
.Required permissions to delete a cluster with shared instance roles
260
269
[%collapsible]
261
270
====
@@ -265,19 +274,16 @@ If you use an existing VPC, your account does not require these permissions to d
265
274
.Additional IAM and S3 permissions that are required to create manifests
0 commit comments