Actions, resources, and condition keys for CloudWatch Application Insights - Service Authorization Reference

Actions, resources, and condition keys for CloudWatch Application Insights

CloudWatch Application Insights (service prefix: applicationinsights) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.

References:

Actions defined by CloudWatch Application Insights

You can specify the following actions in the Action element of an IAM policy statement. Use policies to grant permissions to perform an operation in AWS. When you use an action in a policy, you usually allow or deny access to the API operation or CLI command with the same name. However, in some cases, a single action controls access to more than one operation. Alternatively, some operations require several different actions.

The Resource types column indicates whether each action supports resource-level permissions. If there is no value for this column, you must specify all resources ("*") in the Resource element of your policy statement. If the column includes a resource type, then you can specify an ARN of that type in a statement with that action. Required resources are indicated in the table with an asterisk (*). If you specify a resource-level permission ARN in a statement using this action, then it must be of this type. Some actions support multiple resource types. If the resource type is optional (not indicated as required), then you can choose to use one but not the other.

For details about the columns in the following table, see The actions table.

Actions Description Access level Resource types (*required) Condition keys Dependent actions
CreateApplication Grants permission to create an application from a resource group Write
CreateComponent Grants permission to create a component from a group of resources Write
CreateLogPattern Grants permission to create log a pattern Write
DeleteApplication Grants permission to delete an application Write
DeleteComponent Grants permission to delete a component Write
DeleteLogPattern Grants permission to delete a log pattern Write
DescribeApplication Grants permission to describe an application Read
DescribeComponent Grants permission to describe a component Read
DescribeComponentConfiguration Grants permission to describe a component's configuration Read
DescribeComponentConfigurationRecommendation Grants permission to describe the recommended application component configuration Read
DescribeLogPattern Grants permission to describe a log pattern Read
DescribeObservation Grants permission to describe an observation Read
DescribeProblem Grants permission to describe a problem Read
DescribeProblemObservations Grants permission to describe the observation in a problem Read
ListApplications Grants permission to list all applications List
ListComponents Grants permission to list an application's components List
ListConfigurationHistory Grants permission to list configuration history List
ListLogPatternSets Grants permission to list log pattern sets for an application List
ListLogPatterns Grants permission to list log patterns List
ListProblems Grants permission to list the problems in an application List
ListTagsForResource Grants permission to list tags for the resource List
TagResource Grants permission to tag a resource Tagging
UntagResource Grants permission to untag a resource Tagging
UpdateApplication Grants permission to update an application Write
UpdateComponent Grants permission to update a component Write
UpdateComponentConfiguration Grants permission to update a component's configuration Write
UpdateLogPattern Grants permission to update a log pattern Write

Resource types defined by CloudWatch Application Insights

CloudWatch Application Insights does not support specifying a resource ARN in the Resource element of an IAM policy statement. To allow access to CloudWatch Application Insights, specify “Resource”: “*” in your policy.

Condition keys for CloudWatch Application Insights

CloudWatch Application Insights has no service-specific context keys that can be used in the Condition element of policy statements. For the list of the global context keys that are available to all services, see Available keys for conditions.