IAM policy for Start/Stop Instance in region

We can use an EC2 ARN with the StartInstances and StopInstances actions.  
The policy will look like this:

{
"Version": "2012-10-17", "Statement": [ { "Action": ["cloudwatch:*","ec2:Describe*"], "Effect": "Allow", "Resource": "*" }, { "Action": ["ec2:StartInstances","ec2:StopInstances"], "Effect": "Allow", "Resource": "arn:aws:ec2:us-east-1:123456789012:instance/*" } ] }

Popular posts from this blog

cognos content store database tables

How to fix: User, group, or role '*' already exists in the current database. (Microsoft SQL Server, Error: 15023)