Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG][DOCS] SSM QS Patching - Custom IAM Profile? #1228

Open
para0056 opened this issue Jun 17, 2024 · 0 comments
Open

[BUG][DOCS] SSM QS Patching - Custom IAM Profile? #1228

para0056 opened this issue Jun 17, 2024 · 0 comments
Assignees

Comments

@para0056
Copy link

Bug reports which fail to provide the required information will be closed without action.

Required Basic Info

Describe the bug
In the SSM Quick Setup Patching Patching guide, the post-deployment checks instruct you to create an EC2 instance and Ensure that the EC2-Default-SSM-AD-Role is selected as the IAM Profile.
Does this mean that SSM QS Patching in ASEA will only work with the EC2-Default-SSM-AD-Role?
What if customers want to use a custom IAM profile on their EC2 instances? Will they have to add the required policies and tags manually to this role?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants