Difference between revisions of "Aws iam attach-role-policy"
Jump to navigation
Jump to search
Line 2: | Line 2: | ||
* <code>[[aws iam]] attach-role-[[policy]]</code> | * <code>[[aws iam]] attach-role-[[policy]]</code> | ||
− | [[aws iam]] attach-role-policy --role-name YOUR_ROLE_NAME [[--policy-arn]] 'arn:aws:iam::aws:policy/[[AmazonS3FullAccess]]' | + | [[aws iam]] attach-role-policy --role-name YOUR_ROLE_NAME [[--policy-arn]] '[[arn:aws:iam::aws:policy/]][[AmazonS3FullAccess]]' |
(no output) | (no output) | ||
Revision as of 15:35, 24 October 2023
aws iam attach-role-policy --role-name YOUR_ROLE_NAME --policy-arn 'arn:aws:iam::aws:policy/AmazonS3FullAccess' (no output)
aws iam attach-role-policy --role-name eksctl-YOUR_CLUSTER-NAME-nodegroup-standar-NodeInstanceRole-KOHNsadE2Zx --policy-arn 'arn:aws:iam::aws:policy/AmazonS3FullAccess' (no output)
An error occurred (NoSuchEntity) when calling the AttachRolePolicy operation: Policy arn:aws:iam::123421434:policy/your-backup-policy does not exist or is not attachable.
Related
See also
- AWS IAM role, AWS service roles, AWS IAM Roles Anywhere: [
list-roles | get-role | create-role | put-role-policy | create-service-linked-role | attach-role-policy | update-role | add-role-to-instance-profile ], aws ec2 describe-iam-instance-profile-associations ]
, IAM roles for EC2 instances,AWSServiceRoleForAutoScaling
aws iam [ list-policies | list-attached-user-policies | list-group-policies | list-role-policies | put-group-policy | put-role-policy | put-user-policy | create-policy | attach-role-policy ]
- AWS managed policies:
ReadOnlyAccess, ViewOnlyAccess, AdministratorAccess, SecurityAudit, ViewBilling, AmazonEKSClusterPolicy
, List of AWS policies
Advertising: