Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in

Next challenges

Recent achievements

Recognition

  • Give kudos
  • My kudos

Leaderboard

  • Global

Trophy case

Kudos (beta program)

Kudos logo

You've been invited into the Kudos (beta program) private group. Chat with others in the program, or give feedback to Atlassian.

View group

It's not the same without you

Join the community to find out what other Atlassian users are discussing, debating and creating.

Atlassian Community Hero Image Collage

Where is the documentation for IAM Role required for SSM Action

Trying to configure a action channel to AWS SSM action. 

The link to create cloudformation stack is not working, as we use federation users only.

The documentation link to https://docs.opsgenie.com/v1.0/docs/opsgenie-actions#section-action-channels is broken and goes to a different page with now IAM role definition.

 

Can someone please share how the role needs to be defined ?

 

Thanks

2 answers

0 votes
Connor Eyles Atlassian Team Sep 28, 2020

Hi Ricardo,

Here are are some links:

https://docs.opsgenie.com/docs/aws-systems-manager-channel

It mentions "To configure AWS Role for an AWS Action channel, you may use CloudFormation Template created by the link on AWS Role input. If you would like to create an IAM role without this template, please make sure that your role satisfies all of the permissions and trusted relationship configurations given by the CloudFormation template.

Note that, AWS role name should include opsgenie-automation-action- prefix to execute actions on AWS SSM Automation documents."

When you do click on the button here which launches a cloud formation script. This action will automatically create a IAMRole for you with the following Permissions policies

  • Ec2AllPolicy

  • SystemManagerPolicy

Let me know if this answers your question :)

Thanks,
Connor

As I mentioned in the email the link to launch the cloudformation doesn't work for users logged in through Federation which is the case of my company.

I think that having the information of the policies is not enough, as I for sure need to issue a trust to one of your accounts but can't see which..

Please advise.

Connor Eyles Atlassian Team Sep 28, 2020

Hey Ricardo,

It seems like you are logging into a federated account that has restrictions. What you should do here is go to your Federation Services Admin (in your org) and request access to roles with higher permissions.

Thanks,
Connor

Would like to confirm that indeed it was my problem. The link is opened on the console for a specific region and I had SCPs in place blocking that region. Even so I think you could simply display the role & policy that you need created so that customers deploy it the way they want: force the console login just to show your trusted account seems unnecessary.

Suggest an answer

Log in or Sign up to answer
DEPLOYMENT TYPE
CLOUD
PERMISSIONS LEVEL
Site Admin
TAGS
Community showcase
Published in Opsgenie

New! Investigate and re-deploy stable deployments from the Incident Investigation view in Opsgenie

We’re excited to announce the latest enhancement to Opsgenie’s Incident Investigation view. Now when an incident occurs users can select the previous stable deployment, and begin the redeployment pro...

198 views 0 3
Read article

Community Events

Connect with like-minded Atlassian users at free events near you!

Find an event

Connect with like-minded Atlassian users at free events near you!

Unfortunately there are no Community Events near you at the moment.

Host an event

You're one step closer to meeting fellow Atlassian users at your local event. Learn more about Community Events

Events near you