Open JohnTigue opened 1 year ago
For example, one imaginable role is Automatic1111User.
This role should have permissions with regards to braintrust_hosting_automatic1111 instances:
If instances running braintrust_hosting_automatic1111
are tagged EC2InstancePurpose
: Automatic1111
, then the IAM policy for the above will look something like:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:Describe*",
"ec2:GetConsole*"
],
"Resource": "*"
},
{
"Sid": "StartStopIfTags",
"Effect": "Allow",
"Action": [
"ec2:StartInstances",
"ec2:StopInstances",
"ec2:RebootInstances",
"ec2-instance-connect:SendSSHPublicKey"
],
"Resource": "arn:aws:ec2:us-west-2:123456789012:instance/*",
"Condition": {
"StringEquals": {
"aws:ResourceTag/EC2InstancePurpose": "Automatic1111"
}
}
}
]
}
There should be multiple roles for users within a BrainTrust deployment.