本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AWSEC2VssRestorePolicy
描述:授予 Amazon EC2 和 AWS SSM 从 VSS 创建的应用程序一致性快照恢复 SQL Ser AWS ver 数据库的权限。
AWSEC2VssRestorePolicy 是一项 AWS 托管式策略。
使用此策略
您可以将 AWSEC2VssRestorePolicy 附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创建时间:世界标准时间 2026 年 3 月 25 日 23:12
-
编辑时间:世界标准时间 2026 年 3 月 25 日 23:12
-
ARN:
arn:aws:iam::aws:policy/AWSEC2VssRestorePolicy
策略版本
策略版本:v1(默认)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "CreateVolumeAccessVolume", "Effect" : "Allow", "Action" : "ec2:CreateVolume", "Resource" : "arn:aws:ec2:*:*:volume/*", "Condition" : { "StringLike" : { "aws:RequestTag/AwsVssConfig" : "*" }, "ArnLike" : { "ec2:ParentSnapshot" : "arn:aws:ec2:*:*:snapshot/*" } } }, { "Sid" : "CreateVolumeAccessSnapshot", "Effect" : "Allow", "Action" : "ec2:CreateVolume", "Resource" : "arn:aws:ec2:*:*:snapshot/*", "Condition" : { "StringLike" : { "ec2:ResourceTag/AwsVssConfig" : "*" } } }, { "Sid" : "CreateVolumeWithTagging", "Effect" : "Allow", "Action" : "ec2:CreateTags", "Resource" : "arn:aws:ec2:*:*:volume/*", "Condition" : { "StringEquals" : { "ec2:CreateAction" : "CreateVolume" } } }, { "Sid" : "AttachVolumeAccessVolume", "Effect" : "Allow", "Action" : "ec2:AttachVolume", "Resource" : "*", "Condition" : { "StringLike" : { "ec2:ResourceTag/AwsVssConfig" : "*" } } }, { "Sid" : "AttachVolumeAccessInstance", "Effect" : "Allow", "Action" : "ec2:AttachVolume", "Resource" : "arn:aws:ec2:*:*:instance/*" }, { "Sid" : "DescribeVolumes", "Effect" : "Allow", "Action" : "ec2:DescribeVolumes", "Resource" : "*" }, { "Sid" : "DescribeSnapshots", "Effect" : "Allow", "Action" : "ec2:DescribeSnapshots", "Resource" : "*" }, { "Sid" : "DescribeInstanceAttribute", "Effect" : "Allow", "Action" : "ec2:DescribeInstanceAttribute", "Resource" : "arn:aws:ec2:*:*:instance/*" }, { "Sid" : "SsmAutomationRead", "Effect" : "Allow", "Action" : [ "ssm:DescribeInstanceInformation", "ssm:ListCommandInvocations", "ssm:ListCommands" ], "Resource" : "*" }, { "Sid" : "SsmRunCommand", "Effect" : "Allow", "Action" : [ "ssm:SendCommand", "ssm:GetDocument" ], "Resource" : [ "arn:aws:ec2:*:*:instance/*", "arn:aws:ssm:*:*:document/AWS-ConfigureAWSPackage", "arn:aws:ssm:*:*:document/AWSEC2-PrepareVssRestore", "arn:aws:ssm:*:*:document/AWSEC2-RunVssRestoreForSqlDatabase" ] } ] }