Creating the Route 53 IAM Role

AWS Identity & Access Management (IAM) manages credentials for the Cluster Manager and its nodes by assigning IAM roles to them when they are launched. Attaching policies to these roles grant the associated instances permissions such as starting, stopping, and terminating instances in EC2, associating IAM roles with a new instance, or updating records in the Route 53 service.

AWS uses IAM roles and policies to grant permissions to launch EC2 instances and update records in Route 53. The IAM roles for the cluster manager and transfer nodes require you to first configure policies, which are later attached to the role to manage permissions for the role. The following describes how to create an IAM role to grant the Cluster Manager the permissions to access EC2 and Route 53.
Important: If Route 53 is on a separate AWS account from your Cluster Manager, follow the instructions below on the account with Route 53.

This IAM role requires that the following policy has already been configured: atc-route53-policy. For more information about the atc-route53-policy, see Creating the Route 53 IAM Policy.

  1. From the AWS console, go to Security & Identity > Identity & Access Management and select Roles from the Details sidebar.
  2. Click Create New Role.
  3. Name the role atc-route53.
  4. Select Amazon EC2 for the Role Type.
  5. Select the following policy and attach it to the role:
    • atc-route53-policy
  6. Click Next Step, then Create Role.
The AWS Console redirects you to the Roles page. The new atc-route53-policy role appears in the list of roles.