diff --git a/website/source/docs/providers/aws/r/iam_access_key.html.markdown b/website/source/docs/providers/aws/r/iam_access_key.html.markdown index 0040c260c..c07d811dc 100644 --- a/website/source/docs/providers/aws/r/iam_access_key.html.markdown +++ b/website/source/docs/providers/aws/r/iam_access_key.html.markdown @@ -13,16 +13,16 @@ Provides an IAM access key. This is a set of credentials that allow API requests ## Example Usage ``` -resource "aws_iam_user" "lb" { - name = "loadbalancer" - path = "/system/" -} - resource "aws_iam_access_key" "lb" { user = "${aws_iam_user.lb.name}" status = "Active" } +resource "aws_iam_user" "lb" { + name = "loadbalancer" + path = "/system/" +} + resource "aws_iam_user_policy" "lb_ro" { name = "test" user = "${aws_iam_user.lb.name}" diff --git a/website/source/docs/providers/aws/r/iam_group_policy.html.markdown b/website/source/docs/providers/aws/r/iam_group_policy.html.markdown index 18603a662..e6df69e35 100644 --- a/website/source/docs/providers/aws/r/iam_group_policy.html.markdown +++ b/website/source/docs/providers/aws/r/iam_group_policy.html.markdown @@ -13,11 +13,6 @@ Provides an IAM policy attached to a group. ## Example Usage ``` -resource "aws_iam_group" "my_developers" { - name = "developers" - path = "/users/" -} - resource "iam_group_policy" "my_developer_policy" { name = "my_developer_policy" group = "${aws_iam_group.my_developers.id}" @@ -36,6 +31,11 @@ resource "iam_group_policy" "my_developer_policy" { } EOF } + +resource "aws_iam_group" "my_developers" { + name = "developers" + path = "/users/" +} ``` ## Argument Reference diff --git a/website/source/docs/providers/aws/r/iam_instance_profile.html.markdown b/website/source/docs/providers/aws/r/iam_instance_profile.html.markdown index 79d4e32ed..580cb3dca 100644 --- a/website/source/docs/providers/aws/r/iam_instance_profile.html.markdown +++ b/website/source/docs/providers/aws/r/iam_instance_profile.html.markdown @@ -13,10 +13,15 @@ Provides an IAM instance profile. ## Example Usage ``` +resource "aws_iam_instance_profile" "test_profile" { + name = "test_profile" + roles = ["${aws_iam_role.role.name}"] +} + resource "aws_iam_role" "role" { name = "test_role" path = "/" - policy = <aws_iam_policy + > + aws_iam_role + + > aws_iam_role_policy