

# Provision access for alert ingestion to Incident Detection and Response
<a name="idr-gs-access-prov"></a>

To allow AWS Incident Detection and Response to ingest alarms from your account, install the `AWSServiceRoleForHealth_EventProcessor` service-linked role (SLR). AWS assumes the SLR to create an Amazon EventBridge-managed rule. The managed rule sends notifications from your accounts to AWS Incident Detection and Response. For information about this SLR, including the associated AWS managed policy, see [Using service-linked roles](https://docs.aws.amazon.com/health/latest/ug/using-service-linked-roles.html) in the *AWS Health User Guide*.

You can install this service-linked role in your account by following the instructions in [Create service-linked role](https://docs.aws.amazon.com/IAM/latest/UserGuide/using-service-linked-roles.html#create-service-linked-role) in the *AWS Identity and Access Management User Guide*. Or, you can use the following AWS Command Line Interface (AWS CLI) command:

```
aws iam create-service-linked-role --aws-service-name event-processor.health.amazonaws.com
```

**Key outputs**
+ Successful installation of the service-linked role in your account.

**Related information**

For more information, see the following topics:
+ [Using service-linked roles for AWS Health](https://docs.aws.amazon.com/health/latest/ug/using-service-linked-roles.html)
+ [Creating a service-linked role](https://docs.aws.amazon.com/IAM/latest/UserGuide/using-service-linked-roles.html#create-service-linked-role)
+ [AWS managed policy: AWSHealth\$1EventProcessorServiceRolePolicy](https://docs.aws.amazon.com/health/latest/ug/security-iam-awsmanpol.html#security-iam-awsmanpol-Health_EventProcessorServiceRolePolicy)