Skip to content

Commit c864e34

Browse files
authored
Merge pull request #70926 from dfitzmau/OCPBUGS-26016
OCPBUGS-26016: Changed the s3:HeadBucket entry to s3:ListBucket
2 parents c347e5e + 2f04d9d commit c864e34

File tree

1 file changed

+35
-29
lines changed

1 file changed

+35
-29
lines changed

modules/installation-aws-permissions.adoc

Lines changed: 35 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ cluster, the IAM user requires the following permissions:
1919
.Required EC2 permissions for installation
2020
[%collapsible]
2121
====
22+
* `ec2:AttachNetworkInterface`
2223
* `ec2:AuthorizeSecurityGroupEgress`
2324
* `ec2:AuthorizeSecurityGroupIngress`
2425
* `ec2:CopyImage`
2526
* `ec2:CreateNetworkInterface`
26-
* `ec2:AttachNetworkInterface`
2727
* `ec2:CreateSecurityGroup`
2828
* `ec2:CreateTags`
2929
* `ec2:CreateVolume`
@@ -48,8 +48,8 @@ cluster, the IAM user requires the following permissions:
4848
* `ec2:DescribePrefixLists`
4949
* `ec2:DescribeRegions`
5050
* `ec2:DescribeRouteTables`
51-
* `ec2:DescribeSecurityGroups`
5251
* `ec2:DescribeSecurityGroupRules`
52+
* `ec2:DescribeSecurityGroups`
5353
* `ec2:DescribeSubnets`
5454
* `ec2:DescribeTags`
5555
* `ec2:DescribeVolumes`
@@ -88,7 +88,7 @@ cluster, the IAM user requires the following permissions:
8888
8989
[NOTE]
9090
=====
91-
If you use an existing VPC, your account does not require these permissions for creating network resources.
91+
If you use an existing Virtual Private Cloud (VPC), your account does not require these permissions for creating network resources.
9292
=====
9393
====
9494

@@ -99,37 +99,31 @@ If you use an existing VPC, your account does not require these permissions for
9999
* `elasticloadbalancing:ApplySecurityGroupsToLoadBalancer`
100100
* `elasticloadbalancing:AttachLoadBalancerToSubnets`
101101
* `elasticloadbalancing:ConfigureHealthCheck`
102-
* `elasticloadbalancing:CreateLoadBalancer`
103-
* `elasticloadbalancing:CreateLoadBalancerListeners`
104-
* `elasticloadbalancing:DeleteLoadBalancer`
105-
* `elasticloadbalancing:DeregisterInstancesFromLoadBalancer`
106-
* `elasticloadbalancing:DescribeInstanceHealth`
107-
* `elasticloadbalancing:DescribeLoadBalancerAttributes`
108-
* `elasticloadbalancing:DescribeLoadBalancers`
109-
* `elasticloadbalancing:DescribeTags`
110-
* `elasticloadbalancing:ModifyLoadBalancerAttributes`
111-
* `elasticloadbalancing:RegisterInstancesWithLoadBalancer`
112-
* `elasticloadbalancing:SetLoadBalancerPoliciesOfListener`
113-
====
114-
115-
.Required Elastic Load Balancing permissions (ELBv2) for installation
116-
[%collapsible]
117-
====
118-
* `elasticloadbalancing:AddTags`
119102
* `elasticloadbalancing:CreateListener`
120103
* `elasticloadbalancing:CreateLoadBalancer`
104+
* `elasticloadbalancing:CreateLoadBalancerListeners`
121105
* `elasticloadbalancing:CreateTargetGroup`
122106
* `elasticloadbalancing:DeleteLoadBalancer`
107+
* `elasticloadbalancing:DeregisterInstancesFromLoadBalancer`
123108
* `elasticloadbalancing:DeregisterTargets`
109+
* `elasticloadbalancing:DescribeInstanceHealth`
124110
* `elasticloadbalancing:DescribeListeners`
125111
* `elasticloadbalancing:DescribeLoadBalancerAttributes`
126112
* `elasticloadbalancing:DescribeLoadBalancers`
113+
* `elasticloadbalancing:DescribeTags`
127114
* `elasticloadbalancing:DescribeTargetGroupAttributes`
128115
* `elasticloadbalancing:DescribeTargetHealth`
129116
* `elasticloadbalancing:ModifyLoadBalancerAttributes`
130117
* `elasticloadbalancing:ModifyTargetGroup`
131118
* `elasticloadbalancing:ModifyTargetGroupAttributes`
119+
* `elasticloadbalancing:RegisterInstancesWithLoadBalancer`
132120
* `elasticloadbalancing:RegisterTargets`
121+
* `elasticloadbalancing:SetLoadBalancerPoliciesOfListener`
122+
123+
[IMPORTANT]
124+
=====
125+
{product-title} uses both the ELB and ELBv2 API services to provision load balancers. The permission list shows permissions required by both services. A known issue exists in the {aws-short} web console where both services use the same `elasticloadbalancing` action prefix but do not recognize the same actions. You can ignore the warnings about the service not recognizing certain `elasticloadbalancing` actions.
126+
=====
133127
====
134128

135129
.Required IAM permissions for installation
@@ -152,6 +146,7 @@ If you use an existing VPC, your account does not require these permissions for
152146
* `iam:PutRolePolicy`
153147
* `iam:RemoveRoleFromInstanceProfile`
154148
* `iam:SimulatePrincipalPolicy`
149+
* `iam:TagInstanceProfile`
155150
* `iam:TagRole`
156151
157152
[NOTE]
@@ -176,7 +171,7 @@ If you have not created a load balancer in your AWS account, the IAM user also r
176171
* `route53:UpdateHostedZoneComment`
177172
====
178173

179-
.Required S3 permissions for installation
174+
.Required Amazon Simple Storage Service (S3) permissions for installation
180175
[%collapsible]
181176
====
182177
* `s3:CreateBucket`
@@ -186,8 +181,8 @@ If you have not created a load balancer in your AWS account, the IAM user also r
186181
* `s3:GetBucketCors`
187182
* `s3:GetBucketLocation`
188183
* `s3:GetBucketLogging`
189-
* `s3:GetBucketPolicy`
190184
* `s3:GetBucketObjectLockConfiguration`
185+
* `s3:GetBucketPolicy`
191186
* `s3:GetBucketRequestPayment`
192187
* `s3:GetBucketTagging`
193188
* `s3:GetBucketVersioning`
@@ -218,13 +213,14 @@ If you have not created a load balancer in your AWS account, the IAM user also r
218213
[%collapsible]
219214
====
220215
* `autoscaling:DescribeAutoScalingGroups`
221-
* `ec2:DeletePlacementGroup`
222216
* `ec2:DeleteNetworkInterface`
217+
* `ec2:DeletePlacementGroup`
223218
* `ec2:DeleteVolume`
224219
* `elasticloadbalancing:DeleteTargetGroup`
225220
* `elasticloadbalancing:DescribeTargetGroups`
226221
* `iam:DeleteAccessKey`
227222
* `iam:DeleteUser`
223+
* `iam:DeleteUserPolicy`
228224
* `iam:ListAttachedRolePolicies`
229225
* `iam:ListInstanceProfiles`
230226
* `iam:ListRolePolicies`
@@ -256,6 +252,19 @@ If you use an existing VPC, your account does not require these permissions to d
256252
=====
257253
====
258254

255+
.Optional permissions for installing a cluster with a custom Key Management Service (KMS) key
256+
[%collapsible]
257+
====
258+
* `kms:CreateGrant`
259+
* `kms:Decrypt`
260+
* `kms:DescribeKey`
261+
* `kms:Encrypt`
262+
* `kms:GenerateDataKey`
263+
* `kms:GenerateDataKeyWithoutPlainText`
264+
* `kms:ListGrants`
265+
* `kms:RevokeGrant`
266+
====
267+
259268
.Required permissions to delete a cluster with shared instance roles
260269
[%collapsible]
261270
====
@@ -265,19 +274,16 @@ If you use an existing VPC, your account does not require these permissions to d
265274
.Additional IAM and S3 permissions that are required to create manifests
266275
[%collapsible]
267276
====
268-
* `iam:DeleteAccessKey`
269-
* `iam:DeleteUser`
270-
* `iam:DeleteUserPolicy`
271277
* `iam:GetUserPolicy`
272278
* `iam:ListAccessKeys`
273279
* `iam:PutUserPolicy`
274280
* `iam:TagUser`
275-
* `s3:PutBucketPublicAccessBlock`
281+
* `s3:AbortMultipartUpload`
276282
* `s3:GetBucketPublicAccessBlock`
277-
* `s3:PutLifecycleConfiguration`
278283
* `s3:ListBucket`
279284
* `s3:ListBucketMultipartUploads`
280-
* `s3:AbortMultipartUpload`
285+
* `s3:PutBucketPublicAccessBlock`
286+
* `s3:PutLifecycleConfiguration`
281287
282288
[NOTE]
283289
=====

0 commit comments

Comments
 (0)