|
@@ -83,3 +83,24 @@ resource "aws_iam_role_policy_attachment" "jira_server_ecr" {
|
|
|
role = aws_iam_role.jira_server.name
|
|
|
policy_arn = aws_iam_policy.jira_server_ecr_policy.arn
|
|
|
}
|
|
|
+
|
|
|
+resource "aws_iam_role_policy_attachment" "jira_splunk_sh_AmazonEC2RoleforSSM" {
|
|
|
+ role = aws_iam_role.jira_server.name
|
|
|
+ policy_arn = "arn:${var.aws_partition}:iam::aws:policy/service-role/AmazonEC2RoleforSSM"
|
|
|
+}
|
|
|
+
|
|
|
+resource "aws_iam_role_policy_attachment" "jira_splunk_sh_policy_attach_tag_read" {
|
|
|
+ role = aws_iam_role.jira_server.name
|
|
|
+ policy_arn = "arn:${var.aws_partition}:iam::${var.aws_account_id}:policy/launchroles/default_instance_tag_read"
|
|
|
+}
|
|
|
+
|
|
|
+resource "aws_iam_role_policy_attachment" "jira_splunk_sh_policy_attach_cloudwatch" {
|
|
|
+ role = aws_iam_role.jira_server.name
|
|
|
+ policy_arn = "arn:${var.aws_partition}:iam::${var.aws_account_id}:policy/cloudwatch_events"
|
|
|
+}
|
|
|
+
|
|
|
+#This policy needs to be create prior to creating the Salt Master
|
|
|
+resource "aws_iam_role_policy_attachment" "jira_splunk_sh_policy_attach_binaries" {
|
|
|
+ role = aws_iam_role.jira_server.name
|
|
|
+ policy_arn = "arn:${var.aws_partition}:iam::${var.aws_account_id}:policy/launchroles/default_instance_s3_binaries"
|
|
|
+}
|