Creating the ELB IAM Policy

AWS Identity & Access Management (IAM) manages credentials for the ATC Manager and its nodes by assigning IAM roles to them when they are launched. Attaching policies to these roles grant the associated instances permissions such as starting, stopping, and terminating instances in EC2, updating records in the Route 53 service,or associating IAM roles with a new instance.

The ELB IAM policy allows the Cluster Manager to assign its instance to an existing Elastic Load Balancer. The Cluster Manager only requires this policy if you are using an internal ELB for the cluster to connect back to the manager. For instructions on creating an internal ELB, see Creating an Internal Elastic Load Balancer in AWS. The following instructions describe how to create the ELB IAM policy:
  1. From the AWS console, go to Security & Identity > Identity & Access Management and select Policies from the Details sidebar.
  2. Click Create Policy. Select the Create Your Own Policy option.
  3. Name the new policy atc-elb-policy.
  4. Enter the following policy into the Policy Document field.
    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Effect": "Allow",
                "Action": "elasticloadbalancing:*",
                "Resource": "arn:aws:elasticloadbalancing:your_ami_region:your_aws_account_number:loadbalancer/your_load_balancer_name"
            },
            {
                "Effect": "Allow",
                "Action": "elasticloadbalancing:DescribeLoadBalancers",
                "Resource": "*"
            }
        ]
    }
    For example, if your AMI region is us-west-2, AWS account ID is 123456789012, and the load balancer name is lb-aspera.example.com, then the Resource object is the following:
    "Resource": "arn:aws:elasticloadbalancing:us-west-2:123456789012:loadbalancer/lb-aspera.example.com"
  5. Click Validate Policy to check for formatting issues. The policy must be well-formed JSON text.
  6. Click Create Policy.