IAM Permissions¶
Access to Route53 and EC2 is required for dns53
to work. Your IAM persona must have the following permissions granted:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"route53:AssociateVPCWithHostedZone",
"route53:ChangeResourceRecordSets",
"route53:DeleteHostedZone",
"route53:DisassociateVPCFromHostedZone",
"route53:GetHostedZone"
],
"Resource": "arn:aws:route53:::hostedzone/*"
},
{
"Effect": "Allow",
"Action": [
"ec2:DescribeVpcs",
"route53:CreateHostedZone",
"route53:ListHostedZonesByName",
"route53:ListHostedZonesByVPC"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": ["ec2:ModifyInstanceMetadataOptions"],
"Resource": "arn:aws:ec2:<REGION>:<ACCOUNT>:instance/*" // (1)!
}
]
}
- Don't forget to replace the
<REGION>
and<ACCOUNT>
placeholders with your specific AWS details, e.g.arn:aws:ec2:eu-west-2:112233445566:instance/*
. You could also lock it down to a specific EC2 instance if you wanted
Aim for Least Privilege
It would be best if you fine-tuned this policy further to restrict access and adopt the mantra of "least privilege". You accept this policy at your own risk