@@ -87,7 +87,6 @@ These are the required permissions to collect AWS data:
8787* :ref: `Permissions for the CloudWatch API <aws-iam-policy-cw >`
8888* :ref: `Permissions for Metric Streams <aws-iam-policy-ms >`
8989* :ref: `Permissions for tag and properties collection <aws-iam-policy-services >`
90- * :ref: `Permissions for logs <aws-iam-policy-logs >`
9190* :ref: `Permissions for usage collection and reports <aws-iam-policy-reports >`
9291
9392.. _aws-iam-policy-required :
@@ -371,33 +370,6 @@ Add the ``"<service>:<permission>"`` pair relevant to each service in the ``Acti
371370 ]
372371 }
373372
374- .. _aws-iam-policy-logs :
375-
376- Permissions for log collection
377- ----------------------------------------
378-
379- These are the permissions to allow Splunk Observability Cloud to collect AWS logs. Include those related to your service in your IAM policy.
380-
381- - ``"cloudfront:GetDistributionConfig" ``
382- - ``"cloudfront:ListDistributions" ``
383- - ``"cloudfront:ListTagsForResource" ``
384- - ``"ec2:DescribeRegions" ``
385- - ``"elasticloadbalancing:DescribeLoadBalancerAttributes" ``
386- - ``"elasticloadbalancing:DescribeLoadBalancers" ``
387- - ``"elasticloadbalancing:DescribeTags" ``
388- - ``"elasticloadbalancing:DescribeTargetGroups" ``
389- - ``"logs:DeleteSubscriptionFilter" ``
390- - ``"logs:DescribeLogGroups" ``
391- - ``"logs:DescribeSubscriptionFilters" ``
392- - ``"redshift:DescribeClusters" ``
393- - ``"redshift:DescribeLoggingStatus" ``
394- - ``"s3:GetBucketLogging" ``
395- - ``"s3:GetBucketNotification" ``
396- - ``"s3:ListAllMyBuckets" ``
397- - ``"s3:ListBucket" ``
398- - ``"s3:PutBucketNotification" ``
399- - ``"tag:GetResources" ``
400-
401373 .. _aws-iam-policy-reports :
402374
403375Permissions for usage collection and reports
0 commit comments