Reputation: 974
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Resource": "*",
"Action": [
"cloudwatch:ListMetrics",
"cloudwatch:GetMetricData",
"cloudwatch:GetMetricStatistics"
],
"Condition": {
"StringEquals": {
"cloudwatch:namespace":
[
"AWS/EC2/Per-Instance Metrics",
"EBS"
]
}
}
}
]
}
I have created above policy but it is not working, its showing me error if I am using above condition. Can anyone please help how to restrict console level permission just fo EBS and EC2 metrics.
Upvotes: 0
Views: 472
Reputation: 269101
Based on the information presented in Actions, resources, and condition keys for Amazon CloudWatch - Service Authorization Reference, the ListMetrics
, GetMetricData
and GetMetricStatistics
commands do not accept any Condition keys.
Therefore, it would not be possible to restrict the data returned by these commands.
Upvotes: 2
Reputation: 154
Use ForAllValues as below. Also do check your namespace names. They are not correct namespace names. It should be AWS/EC2. Sorry for formatting issue, just typing this on phone.
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Resource": "*",
"Action": [
"cloudwatch:ListMetrics",
"cloudwatch:GetMetricData",
"cloudwatch:GetMetricStatistics"
],
"Condition": {
"ForAllValues:StringEquals": {
"cloudwatch:namespace":
[
"AWS/EC2",
"AWS/EBS"
]
}
}
}
]
Upvotes: 0