AliyunDmsMlopsManageRolePolicy 是专用于服务角色的授权策略,通常会在创建对应的服务角色时同步完成授权,以允许服务角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务角色之外的 RAM 身份使用。
策略详情
类型:系统策略
创建时间:2025-01-13 19:33:08
更新时间:2025-07-01 01:57:47
当前版本:v5
策略内容
{
"Statement": [
{
"Action": [
"dms:AddInstance",
"dms:GetInstance",
"dms:ModifyInstance"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"gpdb:CreateAccount",
"gpdb:CreateDBInstance",
"gpdb:Describe*",
"gpdb:ModifyDBInstanceDescription",
"gpdb:ModifySecurityIps",
"gpdb:ResetAccountPassword",
"gpdb:TagResources",
"gpdb:UntagResources"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"kvstore:AllocateDirectConnection",
"kvstore:AllocateInstancePublicConnection",
"kvstore:CreateAccount",
"kvstore:CreateInstances",
"kvstore:CreateInstance",
"kvstore:CreateTairInstance",
"kvstore:Describe*",
"kvstore:GrantAccountPrivilege",
"kvstore:ModifyAccountDescription",
"kvstore:ModifyDBInstanceConnectionString",
"kvstore:ModifyInstanceAttribute",
"kvstore:ModifyInstanceConfig",
"kvstore:ModifyInstanceSSL",
"kvstore:ModifyInstanceSpec",
"kvstore:ModifyInstanceVpcAuthMode",
"kvstore:ModifySecurityGroupConfiguration",
"kvstore:ModifySecurityIps",
"kvstore:ResetAccountPassword",
"kvstore:TagResources",
"kvstore:UntagResources"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"rds:AllocateInstancePublicConnection",
"rds:CreateAccount",
"rds:CreateDBInstance",
"rds:CreateDatabase",
"rds:Describe*",
"rds:GrantAccountPrivilege",
"rds:ListTagResources",
"rds:ModifyDBDescription",
"rds:ModifyDBInstanceConnectionString",
"rds:ModifyDBInstanceDeletionProtection",
"rds:ModifyDBInstanceSSL",
"rds:ModifyDBInstanceSpec",
"rds:ModifySQLCollectorPolicy",
"rds:ModifySecurityGroupConfiguration",
"rds:ModifySecurityIps",
"rds:QueryPrice",
"rds:ResetAccountPassword",
"rds:TagResources",
"rds:UntagResources"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"vpc:Describe*",
"vpc:Get*",
"vpc:List*",
"vpc:AllocateEipAddress",
"vpc:AssociateEipAddress",
"vpc:ModifyEipAddressAttribute",
"vpc:CreateNatGateway",
"vpc:CreateSnatEntry"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ram:ListApplications",
"ram:CreateApplication"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ram:GetApplication",
"ram:GetAppSecret",
"ram:ListAppSecretIds",
"ram:CreateAppSecret",
"ram:UpdateApplication"
],
"Resource": "acs:ram::*:application/dms_dify*"
},
{
"Effect": "Allow",
"Action": [
"pvtz:DescribeZones",
"pvtz:BindZoneVpc",
"pvtz:DescribeZoneInfo",
"pvtz:AddZoneRecord",
"pvtz:DeleteZoneRecord",
"pvtz:DescribeZoneRecords",
"pvtz:DescribeZoneRecord",
"pvtz:UpdateZoneRecord",
"pvtz:SetZoneRecordStatus",
"pvtz:AddZone"
],
"Resource": "*"
},
{
"Action": [
"polardb:DescribeDBClusterAttribute",
"polardb:ModifyDBClusterAccessWhitelist"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"computenest:Get*",
"computenest:List*",
"computenest:CreateServiceInstance",
"computenest:ContinueDeployServiceInstance",
"computenest:DeleteServiceInstances",
"ros:CreateStack",
"ros:Get*",
"ros:UpdateStack",
"ros:List*",
"ros:DeleteStack",
"ram:GetRole"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": "ram:CreateServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "user.computenest.aliyuncs.com"
}
}
},
{
"Action": "ram:CreateServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "nat.aliyuncs.com"
}
}
}
],
"Version": "1"
}
相关文档
该文章对您有帮助吗?