Check for Required IAM Permissions
GigaVUE‑FM validates whether the policy attached to theGigaVUE‑FM using EC2 Instance Role or Access Credential has the required IAM permissions and notifies users about missing permissions. While creating the Monitoring Domain and deploying GigaVUE Fabric Components using GigaVUE‑FM, you can check permissions. To check, select the Check Permissions button on the Monitoring Domain Configuration page and AWS Fabric Launch Configuration page. The GigaVUE‑FM displays the minimum required IAM permissions.
Prerequisites to deploy GigaVUE Cloud Suite for AWS
- IAM permissions: Check whether the GigaVUE-FM instance has the minimum required permissions. For details on how to configure the required permissions in AWS, refer to Permissions and Privileges (AWS).
- Access to public cloud end points: Check for access to the AWS cloud end point APIs.
- Subscription to the GigaVUE Cloud Suite for AWS: Before deploying the solution, subscribe to the GigaVUE Cloud Suite components from the AWS marketplace. It checks whether whether you have subscribed to the required components in the marketplace. For details, refer to Subscribe to GigaVUE Products.
- Security Group: Checks whether the required ports are configured in the security group. For more information, see Security Group Network Security Groups
Note: Security group rules validation does not validate prefix List and user groups. For a successful validation, update the ports and CIDR range in the Security Group.
After you press the Check Permissions button, GigaVUE‑FM verifies the minimum required permissions. Any missing permission is highlighted with the respective message against the permission in a dialog box. You can use the displayed IAM Policy JSON as a reference and update the policy that is attached to the GigaVUE‑FM.
Refer to the following sections for more detailed information: