diff --git a/docs/tutorials/aws-sd.md b/docs/tutorials/aws-sd.md index f68a9675a7..a454b9bbe0 100644 --- a/docs/tutorials/aws-sd.md +++ b/docs/tutorials/aws-sd.md @@ -74,7 +74,7 @@ Using tags, your `servicediscovery` policy can become: "ForAllValues:StringLike": { "route53:ChangeResourceRecordSetsNormalizedRecordNames": ["*example.com", "marketing.example.com", "*-beta.example.com"], "route53:ChangeResourceRecordSetsActions": ["CREATE", "UPSERT", "DELETE"], - "route53:ChangeResourceRecordSetsRecordTypes": ["A", "AAAA", "MX"] + "route53:ChangeResourceRecordSetsRecordTypes": ["A", "AAAA", "CNAME", "MX", "TXT"] } } }, diff --git a/docs/tutorials/aws.md b/docs/tutorials/aws.md index b1479ade3c..8b07469887 100644 --- a/docs/tutorials/aws.md +++ b/docs/tutorials/aws.md @@ -59,7 +59,7 @@ You can use Attribute-based access control(ABAC) for advanced deployments. "ForAllValues:StringLike": { "route53:ChangeResourceRecordSetsNormalizedRecordNames": ["*example.com", "marketing.example.com", "*-beta.example.com"], "route53:ChangeResourceRecordSetsActions": ["CREATE", "UPSERT", "DELETE"], - "route53:ChangeResourceRecordSetsRecordTypes": ["A", "AAAA", "MX"] + "route53:ChangeResourceRecordSetsRecordTypes": ["A", "AAAA", "CNAME", "MX", "TXT"] } } },