Commit 95913bfc authored by Evan Read's avatar Evan Read Committed by Marcel Amirault

Ensure code sample is indented properly

parent fdf3eda2
...@@ -262,55 +262,55 @@ new Kubernetes cluster to your project: ...@@ -262,55 +262,55 @@ new Kubernetes cluster to your project:
1. Click **Create Policy**, which will open a new window. 1. Click **Create Policy**, which will open a new window.
1. Select the **JSON** tab, and paste in the following snippet in place of the existing content: 1. Select the **JSON** tab, and paste in the following snippet in place of the existing content:
```json ```json
{ {
"Version": "2012-10-17", "Version": "2012-10-17",
"Statement": [ "Statement": [
{ {
"Effect": "Allow", "Effect": "Allow",
"Action": [ "Action": [
"autoscaling:CreateAutoScalingGroup", "autoscaling:CreateAutoScalingGroup",
"autoscaling:DescribeAutoScalingGroups", "autoscaling:DescribeAutoScalingGroups",
"autoscaling:DescribeScalingActivities", "autoscaling:DescribeScalingActivities",
"autoscaling:UpdateAutoScalingGroup", "autoscaling:UpdateAutoScalingGroup",
"autoscaling:CreateLaunchConfiguration", "autoscaling:CreateLaunchConfiguration",
"autoscaling:DescribeLaunchConfigurations", "autoscaling:DescribeLaunchConfigurations",
"cloudformation:CreateStack", "cloudformation:CreateStack",
"cloudformation:DescribeStacks", "cloudformation:DescribeStacks",
"ec2:AuthorizeSecurityGroupEgress", "ec2:AuthorizeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress", "ec2:AuthorizeSecurityGroupIngress",
"ec2:RevokeSecurityGroupEgress", "ec2:RevokeSecurityGroupEgress",
"ec2:RevokeSecurityGroupIngress", "ec2:RevokeSecurityGroupIngress",
"ec2:CreateSecurityGroup", "ec2:CreateSecurityGroup",
"ec2:createTags", "ec2:createTags",
"ec2:DescribeImages", "ec2:DescribeImages",
"ec2:DescribeKeyPairs", "ec2:DescribeKeyPairs",
"ec2:DescribeRegions", "ec2:DescribeRegions",
"ec2:DescribeSecurityGroups", "ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets", "ec2:DescribeSubnets",
"ec2:DescribeVpcs", "ec2:DescribeVpcs",
"eks:CreateCluster", "eks:CreateCluster",
"eks:DescribeCluster", "eks:DescribeCluster",
"iam:AddRoleToInstanceProfile", "iam:AddRoleToInstanceProfile",
"iam:AttachRolePolicy", "iam:AttachRolePolicy",
"iam:CreateRole", "iam:CreateRole",
"iam:CreateInstanceProfile", "iam:CreateInstanceProfile",
"iam:GetRole", "iam:GetRole",
"iam:ListRoles", "iam:ListRoles",
"iam:PassRole", "iam:PassRole",
"ssm:GetParameters" "ssm:GetParameters"
], ],
"Resource": "*" "Resource": "*"
} }
] ]
} }
``` ```
NOTE: **Note:** NOTE: **Note:**
These permissions give GitLab the ability to create resources, but not delete them. These permissions give GitLab the ability to create resources, but not delete them.
This means that if an error is encountered during the creation process, changes will This means that if an error is encountered during the creation process, changes will
not be rolled back and you must remove resources manually. You can do this by deleting not be rolled back and you must remove resources manually. You can do this by deleting
the relevant [CloudFormation stack](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-console-delete-stack.html) the relevant [CloudFormation stack](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-console-delete-stack.html)
1. Click **Review policy**. 1. Click **Review policy**.
1. Enter a suitable name for this policy, and click **Create Policy**. You can now close this window. 1. Enter a suitable name for this policy, and click **Create Policy**. You can now close this window.
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment