Skip to content

Instantly share code, notes, and snippets.

@sid137
Created June 26, 2018 14:35
Show Gist options
  • Save sid137/0919a353e97c7286767eceeccb94af12 to your computer and use it in GitHub Desktop.
Save sid137/0919a353e97c7286767eceeccb94af12 to your computer and use it in GitHub Desktop.
Description: "\nCloudSpy CloudFormation Template: This installs the role and profile\
\ needed for CloudSpy to manage your backups\n"
Parameters:
CloudSpyTemplateId:
Description: ID assigned by cloudspy for this template
Type: String
ExternalId:
Description: Used to verify STS AssumeRole
Type: String
Resources:
CloudFormationProvisioningNotifications:
Properties:
AWSAccountId: !Ref 'AWS::AccountId'
AWSRegion: !Ref 'AWS::Region'
CloudSpyTemplateId: !Ref 'CloudSpyTemplateId'
ServiceToken: !Sub 'arn:aws:sns:${AWS::Region}:913074935093:cloudspy-cloudformation-provisioning'
StackName: !Ref 'AWS::StackName'
StackNotificationARNs: !Ref 'AWS::NotificationARNs'
Type: Custom::CloudformationNotifications
CloudSpySnapshotRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Condition:
StringEquals:
sts:ExternalId:
- !Ref 'ExternalId'
Effect: Allow
Principal:
AWS:
- arn:aws:iam::913074935093:root
Path: /CloudSpy/
Policies:
- PolicyDocument:
Statement:
- Action:
- ec2:CreateSnapshot
- ec2:CreateTags
- ec2:DescribeInstances
- ec2:DescribeRegions
Effect: Allow
Resource:
- '*'
PolicyName: CloudSpy-Create-Snapshot-Policy
RoleName: CloudSpy-Snapshot-Role
Type: AWS::IAM::Role
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment