Taskforce.sh
  • Documentation
  • Getting started
    • Direct Redis Connection
    • Taskforce connector
  • Account
    • Settings
  • Connections
    • Queues
    • Jobs
    • Workers
  • Metrics
  • Monitoring
    • Enable notifications
      • Slack
      • Pagerduty
    • Connection monitor
    • Failed jobs monitor
    • Missing workers monitor
    • Max Memory monitor
    • Backlog Monitor
  • Alerts
  • Organizations
  • BullMQ Pro
    • Connector Pro
  • On Premises
    • AWS
      • Launch AWS AMI.
      • Create role with SSM permissions
      • Assign SSM Role
      • Configure your instance
        • Create a PostgreSQL instance
        • Configure Auth0
          • Configure API
        • Configure Mailgun
      • Setup loadbalancer
      • Setup route 53
      • Monitors
      • Upgrading
      • Troubleshooting
    • Docker
      • Docker registry
      • Environment variables
      • Docker compose
    • Using the taskforce connector
  • Security primer
  • Troubleshooting
Powered by GitBook
On this page

Was this helpful?

  1. On Premises
  2. AWS

Assign SSM Role

PreviousCreate role with SSM permissionsNextConfigure your instance

Last updated 3 years ago

Was this helpful?

When the instance has been launched you will need to assign the role created in previous step

a) Go to the EC2 instance panel and choose your instance:

b) Go to Actions->Security->Modify IAM Role

If you are using the new EC2 Dashboard the menus will look like this instead:

c) Choose the IAM Role created in previous step and attach it to the instance (do not forget to "refresh" the table):

Save to complete the configuration.

For the instance to be able to use the new role you will need to reboot the instance: