AWS

API Gateway as S3 proxy

Overview of the task Here is the official tutorial page. Here is an overview of the tasks. Create a role contains two policies. AmazonAPIGatewayPushToCloudWatchLogs AmazonS3ReadOnlyAccess Create paths with {} braces. This part is regarded as variable. E.g. {folder}. Create method request for the paths. Authorization: using AWS_IAM. request path: {folder} Pre-setting up You should make your own IAM Role which contains two policies below. AmazonAPIGatewayPushToCloudWatchLogs AmazonS3ReadOnlyAccess AmazonAPIGatewayPushToCloudWatchLogs { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "logs:CreateLogGroup", "logs:CreateLogStream", "logs:DescribeLogGroups", "logs:DescribeLogStreams", "logs:PutLogEvents", "logs:GetLogEvents", "logs:FilterLogEvents" ], "Resource": "*" } ] } AmazonS3ReadOnlyAccess

Manage AWS Route53 with Ansible

I need to automate AWS Route 53 operation with Ansible, and here is a note. (As Ansible always does, most useful informations are in the official document.) Set up environment Install boto According to the Ansible official document, We need to install boto (AWS SDK for Python). pip install -U boto Get AWS API keys and export it boto uses two keys in order to use AWS API under the hood.