You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+40-14Lines changed: 40 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,16 +102,29 @@ From the `Iam -> Users` console, create a new user.
102
102
- Review the confiirmation page, and click `Create user`.
103
103
- On the next page, capture the `Console sign-in URL`, `username`, and `password`. You will need these to log in as the `daylily-service` user.
104
104
105
-
### Attach Permissiong & Policies To The `daylily-service` User
105
+
### Attach Permissions & Policies via an IAM Group (recommended)
106
106
_still as the admin user_
107
107
108
+
Daylily now prefers using an IAM *group* (default: `daylily-ephemeral-cluster`) and
109
+
making the `daylily-service` user (and any other operators) members of that group.
110
+
108
111
#### Permissions
109
112
110
-
- Navigate to the `IAM -> Users` console, click on the `daylily-service` user.
111
-
- Click on the `Add permissions` button, then select `Add permission`, `Attach policies directly`.
112
-
- Search for `AmazonQDeveloperAccess` , select and add.
113
-
- Search for `AmazonEC2SpotFleetAutoscaleRole`, select and add.
114
-
- Search for `AmazonEC2SpotFleetTaggingRole`, select and add.
113
+
- Navigate to `IAM -> User groups` and create a group named `daylily-ephemeral-cluster`.
114
+
- Attach the following AWS managed policies to the **group**:
115
+
-`AmazonQDeveloperAccess`
116
+
-`AmazonEC2SpotFleetAutoscaleRole`
117
+
-`AmazonEC2SpotFleetTaggingRole`
118
+
- Add the `daylily-service` user to the group.
119
+
120
+
> Legacy note: attaching policies directly to the user still works, but is discouraged.
121
+
122
+
Migration (recommended):
123
+
- Ensure `daylily-ephemeral-cluster` group exists and has the required policies attached.
124
+
- Add `daylily-service` (and any other operators) to the group.
125
+
- Optionally remove old direct user attachments once verified:
126
+
- Managed policies: `aws iam list-attached-user-policies --user-name daylily-service` then `aws iam detach-user-policy ...`
127
+
- Inline policies: `aws iam list-user-policies --user-name daylily-service` then `aws iam delete-user-policy ...`
115
128
116
129
#### Create Service Linked Role `VERY IMPORTANT`
117
130
@@ -131,8 +144,8 @@ aws iam create-service-linked-role --aws-service-name spot.amazonaws.com
131
144
132
145
#### Inline Policy
133
146
__**note:**__[please consult the parallel cluster docs for fine grained permissions control, the below is a broad approach](https://docs.aws.amazon.com/parallelcluster/latest/ug/iam-roles-in-parallelcluster-v3.html).
134
-
- Navigate to the `IAM -> Users` console, click on the `daylily-service` user.
135
-
- Click on the `Add permissions`button, then select `create inline policy`.
147
+
- Navigate to the `IAM -> User groups` console, click on the `daylily-ephemeral-cluster` group.
148
+
- Click on `Add permissions`and select `Create inline policy`.
136
149
- Click on the `JSON` bubble button.
137
150
- Delete the auto-populated json in the editor window, and paste this json into the editor (replace 3 instances of <AWS_ACCOUNT_ID> with your new account number, an integer found in the upper right dropdown).
138
151
@@ -141,6 +154,10 @@ __**note:**__ [please consult the parallel cluster docs for fine grained permiss
141
154
-`click next`
142
155
- Name the policy `daylily-service-cluster-policy` (not formally mandatory, but advised to bypass various warnings in future steps), then click `Create policy`.
143
156
157
+
Alternative (preferred): use the provided admin scripts to create/attach the Daylily policies to your group:
0 commit comments