Difference between revisions of "Rds-monitoring-role"
Jump to navigation
Jump to search
Line 2: | Line 2: | ||
<code>rds-monitoring-[[AWS IAM role|role]]</code> | <code>rds-monitoring-[[AWS IAM role|role]]</code> | ||
− | |||
"Path": "/", | "Path": "/", |
Latest revision as of 04:18, 26 February 2022
rds-monitoring-role
"Path": "/", "RoleName": "rds-monitoring-role", "RoleId": "AROAZCTGOUKVSE62LUGAO", "Arn": "arn:aws:iam::123456789:role/rds-monitoring-role", "CreateDate": "2019-05-23T09:36:45+00:00", "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "Service": "monitoring.rds.amazonaws.com" }, "Action": "sts:AssumeRole" } ] }, "MaxSessionDuration": 3600
See also[edit]
- Amazon databases: AWS RDS, storage,
aws rds
, Amazon RDS Proxy, RDS FAQs, PostgreSQL, MySQL, SQL Server, AWS Outposts, Amazon Aurora, Amazon Aurora Serverless , Amazon DocumentDB, Amazon DynamoDB, Amazon Redshift, Amazon QLDB, Amazon RDS Performance Insights, DataFileRead, DMS, Amazon Neptune, Amazon MemoryDB for Redis, Amazon RDS query editor for Aurora Serverless, Amazon Redshift query editor, AWS RDS Snapshots, AWS RDS Instance Types,rds_superuser
, Authentication, autoscaling - IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer
Advertising: