...
Note: Logging resources we support are S3 Bucket, SQS, and CloudWatch log
Use case 1: Log Collection within same AWS account (Where LCP and logging resource are in the same AWS account)
Sign in to the AWS Management Console.
Open the AWS Identity and Access Management (IAM) console.
In the navigation pane, choose Roles.
Select Create role
For Select type of trusted entity, choose AWS service and EC2 from Choose a use case
...
6. Click Next: Permissions at the bottom
7. Choose Create policy
8. Choose the JSON tab
9. Type or paste below JSON policy. Make sure you are replacing the resource name.
Expand | ||
---|---|---|
| ||
|
Click Next: Tags at the bottom.
Add a tag to the policy (Optional)
Click Next: Review
Give appropriate name to policy, review it, and Click Create policy.
Search the same policy name into the Search text box under Attach permissions policies and select it and Click Next: Tags
Add tag to the role (Optional)
Give appropriate name to the Role, review it, and Click Create role.
Go back to AWS Management Console.
Open the EC2 Dashboard.
Go to Instances (running) if the LCP machine is running or else go to Instances, search for LCP instance and start it.
Select an LCP instance, go to Actions → Security → Modify IAM role
Search for the IAM role that you have created earlier and click Save
...