Difference between revisions of "Rds-monitoring-role"
Jump to navigation
Jump to search
Line 26: | Line 26: | ||
== See also == | == See also == | ||
* {{RDS}} | * {{RDS}} | ||
+ | * {{IAM}} | ||
[[Category:AWS]] | [[Category:AWS]] |
Revision as of 11:02, 24 February 2022
rds-monitoring-role
"Path": "/", "RoleName": "rds-monitoring-role", "RoleId": "AROAZCTGOUKVSE62LUGAO", "Arn": "arn:aws:iam::123456789:role/rds-monitoring-role", "CreateDate": "2019-05-23T09:36:45+00:00", "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "Service": "monitoring.rds.amazonaws.com" }, "Action": "sts:AssumeRole" } ] }, "MaxSessionDuration": 3600
See also
- Amazon databases: AWS RDS, storage,
aws rds
, Amazon RDS Proxy, RDS FAQs, PostgreSQL, MySQL, SQL Server, AWS Outposts, Amazon Aurora, Amazon Aurora Serverless , Amazon DocumentDB, Amazon DynamoDB, Amazon Redshift, Amazon QLDB, Amazon RDS Performance Insights, DataFileRead, DMS, Amazon Neptune, Amazon MemoryDB for Redis, Amazon RDS query editor for Aurora Serverless, Amazon Redshift query editor, AWS RDS Snapshots, AWS RDS Instance Types,rds_superuser
, Authentication, autoscaling - IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer
Advertising: