AliyunDmsMlopsManageRolePolicy

AliyunDmsMlopsManageRolePolicy 是专用于服务角色的授权策略,通常会在创建对应的服务角色时同步完成授权,以允许服务角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务角色之外的 RAM 身份使用。

策略详情

  • 类型:系统策略

  • 创建时间:2025-01-13 19:33:08

  • 更新时间:2025-07-01 01:57:47

  • 当前版本:v5

策略内容

{
  "Statement": [
    {
      "Action": [
        "dms:AddInstance",
        "dms:GetInstance",
        "dms:ModifyInstance"
      ],
      "Effect": "Allow",
      "Resource": "*"
    },
    {
      "Action": [
        "gpdb:CreateAccount",
        "gpdb:CreateDBInstance",
        "gpdb:Describe*",
        "gpdb:ModifyDBInstanceDescription",
        "gpdb:ModifySecurityIps",
        "gpdb:ResetAccountPassword",
        "gpdb:TagResources",
        "gpdb:UntagResources"
      ],
      "Effect": "Allow",
      "Resource": "*"
    },
    {
      "Action": [
        "kvstore:AllocateDirectConnection",
        "kvstore:AllocateInstancePublicConnection",
        "kvstore:CreateAccount",
        "kvstore:CreateInstances",
        "kvstore:CreateInstance",
        "kvstore:CreateTairInstance",
        "kvstore:Describe*",
        "kvstore:GrantAccountPrivilege",
        "kvstore:ModifyAccountDescription",
        "kvstore:ModifyDBInstanceConnectionString",
        "kvstore:ModifyInstanceAttribute",
        "kvstore:ModifyInstanceConfig",
        "kvstore:ModifyInstanceSSL",
        "kvstore:ModifyInstanceSpec",
        "kvstore:ModifyInstanceVpcAuthMode",
        "kvstore:ModifySecurityGroupConfiguration",
        "kvstore:ModifySecurityIps",
        "kvstore:ResetAccountPassword",
        "kvstore:TagResources",
        "kvstore:UntagResources"
      ],
      "Effect": "Allow",
      "Resource": "*"
    },
    {
      "Action": [
        "rds:AllocateInstancePublicConnection",
        "rds:CreateAccount",
        "rds:CreateDBInstance",
        "rds:CreateDatabase",
        "rds:Describe*",
        "rds:GrantAccountPrivilege",
        "rds:ListTagResources",
        "rds:ModifyDBDescription",
        "rds:ModifyDBInstanceConnectionString",
        "rds:ModifyDBInstanceDeletionProtection",
        "rds:ModifyDBInstanceSSL",
        "rds:ModifyDBInstanceSpec",
        "rds:ModifySQLCollectorPolicy",
        "rds:ModifySecurityGroupConfiguration",
        "rds:ModifySecurityIps",
        "rds:QueryPrice",
        "rds:ResetAccountPassword",
        "rds:TagResources",
        "rds:UntagResources"
      ],
      "Effect": "Allow",
      "Resource": "*"
    },
    {
      "Action": [
        "vpc:Describe*",
        "vpc:Get*",
        "vpc:List*",
        "vpc:AllocateEipAddress",
        "vpc:AssociateEipAddress",
        "vpc:ModifyEipAddressAttribute",
        "vpc:CreateNatGateway",
        "vpc:CreateSnatEntry"
      ],
      "Effect": "Allow",
      "Resource": "*"
    },
    {
      "Effect": "Allow",
      "Action": [
        "ram:ListApplications",
        "ram:CreateApplication"
      ],
      "Resource": "*"
    },
    {
      "Effect": "Allow",
      "Action": [
        "ram:GetApplication",
        "ram:GetAppSecret",
        "ram:ListAppSecretIds",
        "ram:CreateAppSecret",
        "ram:UpdateApplication"
      ],
      "Resource": "acs:ram::*:application/dms_dify*"
    },
    {
      "Effect": "Allow",
      "Action": [
        "pvtz:DescribeZones",
        "pvtz:BindZoneVpc",
        "pvtz:DescribeZoneInfo",
        "pvtz:AddZoneRecord",
        "pvtz:DeleteZoneRecord",
        "pvtz:DescribeZoneRecords",
        "pvtz:DescribeZoneRecord",
        "pvtz:UpdateZoneRecord",
        "pvtz:SetZoneRecordStatus",
        "pvtz:AddZone"
      ],
      "Resource": "*"
    },
    {
      "Action": [
        "polardb:DescribeDBClusterAttribute",
        "polardb:ModifyDBClusterAccessWhitelist"
      ],
      "Effect": "Allow",
      "Resource": "*"
    },
    {
      "Action": [
        "computenest:Get*",
        "computenest:List*",
        "computenest:CreateServiceInstance",
        "computenest:ContinueDeployServiceInstance",
        "computenest:DeleteServiceInstances",
        "ros:CreateStack",
        "ros:Get*",
        "ros:UpdateStack",
        "ros:List*",
        "ros:DeleteStack",
        "ram:GetRole"
      ],
      "Effect": "Allow",
      "Resource": "*"
    },
    {
      "Action": "ram:CreateServiceLinkedRole",
      "Resource": "*",
      "Effect": "Allow",
      "Condition": {
        "StringEquals": {
          "ram:ServiceName": "user.computenest.aliyuncs.com"
        }
      }
    },
    {
      "Action": "ram:CreateServiceLinkedRole",
      "Resource": "*",
      "Effect": "Allow",
      "Condition": {
        "StringEquals": {
          "ram:ServiceName": "nat.aliyuncs.com"
        }
      }
    }
  ],
  "Version": "1"
}

相关文档