From e45d2644e1fb6578bf876550554e530749b15895 Mon Sep 17 00:00:00 2001 From: Nicolaj Vinholt Date: Fri, 30 Aug 2024 13:43:34 +0200 Subject: [PATCH] Fix Cloudwatch documentation suggesting invalid conditions Signed-off-by: Nicolaj Vinholt --- content/docs/1.4/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/1.5/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.0/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.1/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.10/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.11/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.12/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.13/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.14/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.15/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.16/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.2/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.3/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.4/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.5/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.6/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.7/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.8/scalers/aws-cloudwatch.md | 21 --------------------- content/docs/2.9/scalers/aws-cloudwatch.md | 21 --------------------- 19 files changed, 399 deletions(-) diff --git a/content/docs/1.4/scalers/aws-cloudwatch.md b/content/docs/1.4/scalers/aws-cloudwatch.md index 080fe1fb3..39a7bd5c5 100644 --- a/content/docs/1.4/scalers/aws-cloudwatch.md +++ b/content/docs/1.4/scalers/aws-cloudwatch.md @@ -77,27 +77,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/1.5/scalers/aws-cloudwatch.md b/content/docs/1.5/scalers/aws-cloudwatch.md index 12c33d162..62e8b5cdf 100644 --- a/content/docs/1.5/scalers/aws-cloudwatch.md +++ b/content/docs/1.5/scalers/aws-cloudwatch.md @@ -76,27 +76,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.0/scalers/aws-cloudwatch.md b/content/docs/2.0/scalers/aws-cloudwatch.md index da8f4cc5f..eb6307f48 100644 --- a/content/docs/2.0/scalers/aws-cloudwatch.md +++ b/content/docs/2.0/scalers/aws-cloudwatch.md @@ -76,27 +76,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.1/scalers/aws-cloudwatch.md b/content/docs/2.1/scalers/aws-cloudwatch.md index 0cf14f428..b7ad3c97c 100644 --- a/content/docs/2.1/scalers/aws-cloudwatch.md +++ b/content/docs/2.1/scalers/aws-cloudwatch.md @@ -88,27 +88,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.10/scalers/aws-cloudwatch.md b/content/docs/2.10/scalers/aws-cloudwatch.md index 754b1b874..39394421a 100644 --- a/content/docs/2.10/scalers/aws-cloudwatch.md +++ b/content/docs/2.10/scalers/aws-cloudwatch.md @@ -110,27 +110,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.11/scalers/aws-cloudwatch.md b/content/docs/2.11/scalers/aws-cloudwatch.md index 754b1b874..39394421a 100644 --- a/content/docs/2.11/scalers/aws-cloudwatch.md +++ b/content/docs/2.11/scalers/aws-cloudwatch.md @@ -110,27 +110,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.12/scalers/aws-cloudwatch.md b/content/docs/2.12/scalers/aws-cloudwatch.md index 754b1b874..39394421a 100644 --- a/content/docs/2.12/scalers/aws-cloudwatch.md +++ b/content/docs/2.12/scalers/aws-cloudwatch.md @@ -110,27 +110,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.13/scalers/aws-cloudwatch.md b/content/docs/2.13/scalers/aws-cloudwatch.md index d17a2645c..31d965526 100644 --- a/content/docs/2.13/scalers/aws-cloudwatch.md +++ b/content/docs/2.13/scalers/aws-cloudwatch.md @@ -108,27 +108,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.14/scalers/aws-cloudwatch.md b/content/docs/2.14/scalers/aws-cloudwatch.md index 60596d4fc..256a7008a 100644 --- a/content/docs/2.14/scalers/aws-cloudwatch.md +++ b/content/docs/2.14/scalers/aws-cloudwatch.md @@ -110,27 +110,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.15/scalers/aws-cloudwatch.md b/content/docs/2.15/scalers/aws-cloudwatch.md index 3b433225e..eea4249d4 100644 --- a/content/docs/2.15/scalers/aws-cloudwatch.md +++ b/content/docs/2.15/scalers/aws-cloudwatch.md @@ -110,27 +110,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.16/scalers/aws-cloudwatch.md b/content/docs/2.16/scalers/aws-cloudwatch.md index b0532b72c..05f448157 100644 --- a/content/docs/2.16/scalers/aws-cloudwatch.md +++ b/content/docs/2.16/scalers/aws-cloudwatch.md @@ -116,27 +116,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.2/scalers/aws-cloudwatch.md b/content/docs/2.2/scalers/aws-cloudwatch.md index 0cf14f428..b7ad3c97c 100644 --- a/content/docs/2.2/scalers/aws-cloudwatch.md +++ b/content/docs/2.2/scalers/aws-cloudwatch.md @@ -88,27 +88,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.3/scalers/aws-cloudwatch.md b/content/docs/2.3/scalers/aws-cloudwatch.md index 0cf14f428..b7ad3c97c 100644 --- a/content/docs/2.3/scalers/aws-cloudwatch.md +++ b/content/docs/2.3/scalers/aws-cloudwatch.md @@ -88,27 +88,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.4/scalers/aws-cloudwatch.md b/content/docs/2.4/scalers/aws-cloudwatch.md index 0cf14f428..b7ad3c97c 100644 --- a/content/docs/2.4/scalers/aws-cloudwatch.md +++ b/content/docs/2.4/scalers/aws-cloudwatch.md @@ -88,27 +88,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.5/scalers/aws-cloudwatch.md b/content/docs/2.5/scalers/aws-cloudwatch.md index 10c49a440..03daeab22 100644 --- a/content/docs/2.5/scalers/aws-cloudwatch.md +++ b/content/docs/2.5/scalers/aws-cloudwatch.md @@ -94,27 +94,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.6/scalers/aws-cloudwatch.md b/content/docs/2.6/scalers/aws-cloudwatch.md index 557e01a39..110111a80 100644 --- a/content/docs/2.6/scalers/aws-cloudwatch.md +++ b/content/docs/2.6/scalers/aws-cloudwatch.md @@ -95,27 +95,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.7/scalers/aws-cloudwatch.md b/content/docs/2.7/scalers/aws-cloudwatch.md index 541ea3e87..aad8a57bc 100644 --- a/content/docs/2.7/scalers/aws-cloudwatch.md +++ b/content/docs/2.7/scalers/aws-cloudwatch.md @@ -101,27 +101,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.8/scalers/aws-cloudwatch.md b/content/docs/2.8/scalers/aws-cloudwatch.md index 03f8eb696..c62be6936 100644 --- a/content/docs/2.8/scalers/aws-cloudwatch.md +++ b/content/docs/2.8/scalers/aws-cloudwatch.md @@ -103,27 +103,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example diff --git a/content/docs/2.9/scalers/aws-cloudwatch.md b/content/docs/2.9/scalers/aws-cloudwatch.md index 90364fc5c..edc064014 100644 --- a/content/docs/2.9/scalers/aws-cloudwatch.md +++ b/content/docs/2.9/scalers/aws-cloudwatch.md @@ -107,27 +107,6 @@ The user or role used to authenticate with AWS CloudWatch must have the `cloudwa } ``` -This can be further scoped to specific namespaces, by using the `cloudwatch:namespace` condition key. For example, to only allow access to the `AWS/EC2` metric namespace: - -```json -{ - "Version": "2012-10-17", - "Statement": [ - { - "Sid": "AllowCloudWatchGetMetricData", - "Effect": "Allow", - "Action": "cloudwatch:GetMetricData", - "Resource": "*", - "Condition": { - "StringEquals": { - "cloudwatch:namespace": "AWS/EC2" - } - } - } - ] -} -``` - For more information, see the [AWS CloudWatch IAM documentation](https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html). ### Example