AliyunServiceRolePolicyForPaiEas 是专用于服务关联角色的授权策略,会在创建服务关联角色 AliyunServiceRoleForPaiEas 时自动授权,以允许服务关联角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务关联角色之外的 RAM 身份使用。
策略详情
类型:系统策略
创建时间:2025-12-09 13:53:27
更新时间:2025-12-16 08:04:03
当前版本:v33
策略内容
{
"Version": "1",
"Statement": [
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "eas.pai.aliyuncs.com"
}
}
},
{
"Action": [
"log:CreateConfig",
"log:GetConfig",
"log:UpdateConfig",
"log:DeleteConfig",
"log:CreateMachineGroup",
"log:GetMachineGroup",
"log:DeleteMachineGroup",
"log:ApplyConfigToGroup",
"log:ListProject",
"log:ListLogStores",
"log:CreateLogStore",
"log:ListSavedSearch",
"log:ListDashboard",
"log:GetLogStoreLogs",
"log:GetLogStore",
"log:GetIndex",
"log:PostLogStoreLogs"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"log:OpenProductDataCollection",
"log:CloseProductDataCollection",
"log:GetProductDataCollection",
"log:CreateTicket"
],
"Resource": [
"acs:log:*:*:project/pai-eas-o11y-*/*/*",
"acs:log:*:*:ticket/*"
],
"Effect": "Allow"
},
{
"Action": [
"oss:GetObject",
"oss:PutObject",
"oss:DeleteObject",
"oss:ListParts",
"oss:AbortMultipartUpload",
"oss:ListObjects",
"oss:ListBuckets",
"oss:PutBucketCors",
"oss:GetBucketCors",
"oss:DeleteBucketCors",
"oss:GetBucketStat"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"nas:DescribeFileSystems",
"nas:DescribeMountTargets",
"nas:DescribeProtocolMountTarget"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"vpc:DescribeVSwitchAttributes",
"vpc:DescribeVpcs",
"vpc:DescribeVSwitches",
"vpc:DescribeVpcAttribute"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"rai:GetPolicyData"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"ecs:CreateNetworkInterface",
"ecs:DeleteNetworkInterface",
"ecs:DescribeNetworkInterfaces",
"ecs:CreateNetworkInterfacePermission",
"ecs:DescribeNetworkInterfacePermissions",
"ecs:DeleteNetworkInterfacePermission",
"ecs:DescribeSecurityGroups",
"ecs:DescribeSecurityGroupAttribute",
"ecs:AttachNetworkInterface",
"ecs:DetachNetworkInterface",
"ecs:CreateSecurityGroup",
"ecs:DeleteSecurityGroup",
"ecs:AuthorizeSecurityGroup",
"ecs:RevokeSecurityGroup"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"arms:ListCmsInstances",
"arms:OpenVCluster",
"arms:CheckCommercialStatus",
"arms:DescribeTraceLicenseKey",
"arms:SearchTraceAppByName",
"arms:DeleteTraceApp"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Effect": "Allow",
"Action": [
"cr:GetAuthorizationToken",
"cr:CreateRepository",
"cr:PullRepository",
"cr:PushRepository",
"cr:ListInstance",
"cr:GetRepository",
"cr:ListRepository",
"cr:ListArtifactTag",
"cr:GetRepoTag",
"cr:ListRepositoryTag"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"acc:DisassociateResourceQuota",
"acc:AssociateResourceQuota",
"acc:DescribeResourceQuotas",
"acc:DescribeResourceQuotaDetail"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"odps:ActOnBehalfOfAnotherUser"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"pvtz:AddZone",
"pvtz:BindZoneVpc",
"pvtz:AddZoneRecord",
"pvtz:DeleteZone",
"pvtz:DescribeZoneInfo",
"pvtz:DescribeZones"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"yundun-cert:GetUserCertificateDetail"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"privatelink:OpenPrivateLinkService",
"privatelink:CheckProductOpen",
"privatelink:ListVpcEndpointServices",
"privatelink:CreateVpcEndpoint",
"privatelink:ListVpcEndpoints",
"privatelink:UpdateVpcEndpointAttribute",
"privatelink:GetVpcEndpointAttribute",
"privatelink:ListVpcEndpointSecurityGroups",
"privatelink:AttachSecurityGroupToVpcEndpoint",
"privatelink:DetachSecurityGroupFromVpcEndpoint",
"privatelink:AddZoneToVpcEndpoint",
"privatelink:RemoveZoneFromVpcEndpoint",
"privatelink:ListVpcEndpointZones",
"privatelink:DeleteVpcEndpoint"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"kms:List*",
"kms:DescribeKey",
"kms:GenerateDataKey",
"kms:Decrypt"
],
"Resource": "*"
},
{
"Action": [
"nlb:GetListenerAttribute",
"nlb:CreateListener",
"nlb:StartListener",
"nlb:DeleteListener",
"nlb:CreateServerGroup",
"nlb:DeleteServerGroup",
"nlb:ListServerGroups",
"nlb:AddServersToServerGroup",
"nlb:RemoveServersFromServerGroup",
"nlb:ListServerGroupServers",
"nlb:ListListeners",
"nlb:GetLoadBalancerAttribute",
"nlb:ListLoadBalancers",
"nlb:CreateLoadBalancer",
"nlb:DeleteLoadBalancer",
"nlb:AssociateResources",
"nlb:GetAssociatedResources",
"nlb:UpdateLoadBalancerZones",
"nlb:UpdateListenerAttribute",
"nlb:UpdateServerGroupServersAttribute"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"mse:CreateNacosService",
"mse:DeleteNacosService",
"mse:ListAnsServices",
"mse:CreateEngineNamespace",
"mse:DeleteEngineNamespace",
"mse:ListEngineNamespaces",
"mse:CreateNacosInstance",
"mse:DeleteNacosInstance",
"mse:ListAnsInstances",
"mse:UpdateNacosCluster",
"mse:GetServiceListeners",
"mse:QueryClusterDetail"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"kvstore:CreateTairInstance",
"kvstore:CreateInstance",
"kvstore:CreateInstances",
"kvstore:DeleteInstance",
"kvstore:DescribeInstances",
"kvstore:DescribeSecurityGroupConfiguration",
"kvstore:DescribeInstanceAttribute",
"kvstore:DescribeInstancesOverview",
"kvstore:ModifySecurityGroupConfiguration",
"kvstore:ModifyInstanceVpcAuthMode"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"alb:GetLoadBalancerAttribute",
"alb:DescribeZones"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Effect": "Allow",
"Resource": "*",
"Action": [
"pai:AssumeUser"
]
},
{
"Action": "ram:CreateServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": [
"privatelink.aliyuncs.com",
"middlewarelens.log.aliyuncs.com",
"securitylens.log.aliyuncs.com",
"ai-lens.log.aliyuncs.com",
"storagelens.log.aliyuncs.com"
]
}
}
},
{
"Action": "ram:CreateServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "nlb.aliyuncs.com"
}
}
}
]
}相关文档
该文章对您有帮助吗?