AliyunServiceRolePolicyForMongoDB 是专用于服务关联角色的授权策略,会在创建服务关联角色 AliyunServiceRoleForMongoDB 时自动授权,以允许服务关联角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务关联角色之外的 RAM 身份使用。
策略详情
类型:系统策略
创建时间:2020-10-12 18:06:05
更新时间:2026-04-22 02:55:59
当前版本:v10
策略内容
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Resource": "acs:log:*:*:project/nosql-*",
"Action": [
"log:GetLogstoreLogs",
"log:ListLogStores",
"log:GetLogStore",
"log:GetIndex",
"log:GetLogstoreHistogram",
"log:GetConfig",
"log:ListConfig",
"log:GetDashboard",
"log:ListDashboard",
"log:CreateLogStore",
"log:CreateIndex",
"log:UpdateIndex",
"log:CreateDashboard",
"log:UpdateDashboard",
"log:CreateSavedSearch",
"log:UpdateSavedSearch",
"log:CreateProject",
"log:UpdateLogStore"
]
},
{
"Action": [
"kms:ListKeys",
"kms:ListKeyVersions",
"kms:ListAliases",
"kms:ListAliasesByKeyId",
"kms:ListResourceTags",
"kms:DescribeKey",
"kms:TagResource",
"kms:UntagResource",
"kms:OpenKmsService",
"kms:DescribeAccountKmsStatus"
],
"Resource": "acs:kms:*:*:*",
"Effect": "Allow"
},
{
"Action": [
"kms:Encrypt",
"kms:Decrypt",
"kms:GenerateDataKey",
"kms:CreateAlias"
],
"Resource": "acs:kms:*:*:*",
"Effect": "Allow",
"Condition": {
"StringEqualsIgnoreCase": {
"kms:tag/acs:rds:instance-encryption": "true"
}
}
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "mongodb.aliyuncs.com"
}
}
},
{
"Action": [
"hdm:DescribeSqlLogConfig",
"hdm:ModifySqlLogConfig"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Effect": "Allow",
"Action": [
"dms:ListInstances",
"dms:ListDatabases",
"dms:ListTables",
"dms:AddInstance",
"dts:DescribeDtsJobs"
],
"Resource": "*"
},
{
"Action": "vpc:DescribeVSwitchAttributes",
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"ecs:CreateNetworkInterface",
"ecs:DeleteNetworkInterface",
"ecs:DescribeNetworkInterfaces",
"ecs:CreateNetworkInterfacePermission",
"ecs:DescribeNetworkInterfacePermissions",
"ecs:DeleteNetworkInterfacePermission",
"ecs:DescribeImages",
"ecs:ModifyImageSharePermission",
"ecs:CreateSecurityGroup",
"ecs:DeleteSecurityGroup",
"ecs:DescribeSecurityGroupAttribute",
"ecs:DescribeSecurityGroups",
"ecs:ModifySecurityGroupAttribute",
"ecs:AuthorizeSecurityGroup",
"ecs:AuthorizeSecurityGroupEgress",
"ecs:RevokeSecurityGroup",
"ecs:RevokeSecurityGroupEgress"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"vpc:DescribeVSwitches",
"vpc:DescribeVpcs",
"vpc:AssociateEipAddress",
"vpc:UnassociateEipAddress",
"vpc:DescribeEipAddresses"
],
"Resource": "*",
"Effect": "Allow"
}
]
}相关文档
该文章对您有帮助吗?