Merge pull request #320 from sata/add-bucket-iam-role-policy-example
Add IAM role S3 bucket policy example to documentation
This commit is contained in:
commit
bfdee9b383
|
@ -204,6 +204,28 @@ spec:
|
|||
> **Note:** that on EKS you have to create an IAM role for the source-controller
|
||||
> service account that grants access to the bucket.
|
||||
|
||||
### AWS IAM bucket policy example
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Sid": "",
|
||||
"Effect": "Allow",
|
||||
"Action": "s3:GetObject",
|
||||
"Resource": "arn:aws:s3:::podinfo/*"
|
||||
},
|
||||
{
|
||||
"Sid": "",
|
||||
"Effect": "Allow",
|
||||
"Action": "s3:ListBucket",
|
||||
"Resource": "arn:aws:s3:::podinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
## Status examples
|
||||
|
||||
Successful download:
|
||||
|
|
Loading…
Reference in New Issue