Connector Management
What's an Apono Connector?
Last updated
Was this helpful?
What's an Apono Connector?
Last updated
Was this helpful?
The Apono Connector is an on-prem connection that can be used to connect resources to Apono and separate the Apono web app from the environment for .
You can view the recommended ,, or.
Using AWS CloudFormation or GCP Deployment Manager, the Connector is seamlessly installed in the environment.
You can also choose to install the Connector on an or a cluster yourself.
Just getting started? Read more about:
These are the required permissions for the Connector to function in AWS
{
"Statement": [
{
"Action": [
"s3:GetBucketTagging",
"s3:ListAllMyBuckets",
"s3:ListBucket",
"s3:GetBucketLocation"
],
"Effect": "Allow",
"Resource": "arn:aws:s3:::*"
}
],
"Version": "2012-10-17"
}
{
"Statement": [
{
"Action": [
"iam:ListPolicies",
"iam:CreateInstanceProfile"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"iam:CreateInstanceProfile",
"iam:GetRole",
"iam:ListRoleTags",
"iam:TagRole",
"iam:CreateRole",
"iam:DeleteRole",
"iam:AttachRolePolicy",
"iam:PutRolePolicy",
"iam:AddRoleToInstanceProfile",
"iam:ListInstanceProfilesForRole",
"iam:DetachRolePolicy",
"iam:ListAttachedRolePolicies",
"iam:DeleteRolePolicy",
"iam:ListRolePolicies",
"iam:GetRolePolicy",
"iam:UpdateAssumeRolePolicy"
],
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::*",
"arn:aws:iam::*:role/*",
"arn:aws:iam::*:instance-profile/*"
]
}
],
"Version": "2012-10-17"
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "tag:GetResources",
"Resource": "*"
}
]
}
{
"Statement": [
{
"Action": [
"ssm:GetParameters*"
],
"Effect": "Allow",
"Resource": "arn:aws:ssm:*:*:parameter/*"
},
{
"Action": [
"ssm:DescribeParameters"
],
"Effect": "Allow",
"Resource": "*"
}
],
"Version": "2012-10-17"
}
{
"Statement": [
{
"Action": [
"iam:ListPolicies",
"iam:CreateInstanceProfile"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"iam:CreateInstanceProfile",
"iam:GetRole",
"iam:ListRoleTags",
"iam:TagRole",
"iam:CreateRole",
"iam:DeleteRole",
"iam:AttachRolePolicy",
"iam:PutRolePolicy",
"iam:AddRoleToInstanceProfile",
"iam:ListInstanceProfilesForRole",
"iam:DetachRolePolicy",
"iam:ListAttachedRolePolicies",
"iam:DeleteRolePolicy",
"iam:ListRolePolicies",
"iam:GetRolePolicy",
"iam:UpdateAssumeRolePolicy"
],
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::*",
"arn:aws:iam::*:role/*",
"arn:aws:iam::*:instance-profile/*"
]
}
],
"Version": "2012-10-17"
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "tag:GetResources",
"Resource": "*"
}
]
}
{
"Statement": [
{
"Action": [
"iam:ListPolicies",
"iam:CreateInstanceProfile"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"iam:CreateInstanceProfile",
"iam:GetRole",
"iam:ListRoleTags",
"iam:TagRole",
"iam:CreateRole",
"iam:DeleteRole",
"iam:AttachRolePolicy",
"iam:PutRolePolicy",
"iam:AddRoleToInstanceProfile",
"iam:ListInstanceProfilesForRole",
"iam:DetachRolePolicy",
"iam:ListAttachedRolePolicies",
"iam:DeleteRolePolicy",
"iam:ListRolePolicies",
"iam:GetRolePolicy",
"iam:UpdateAssumeRolePolicy"
],
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::*",
"arn:aws:iam::*:role/*",
"arn:aws:iam::*:instance-profile/*"
]
}
],
"Version": "2012-10-17"
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "tag:GetResources",
"Resource": "*"
}
]
}