本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AmazonDynamoDBFullAccesswithDataPipeline
描述:此策略已进入弃用路径。有关指导,请参阅文档:通过 https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/DynamoDBPipeline.html. Provides full access to Amazon DynamoDB including Export/Import使用 AWS Data Pipeline AWS Management Console。
AmazonDynamoDBFullAccesswithDataPipeline
是一项 AWS 托管式策略。
使用此策略
您可以将 AmazonDynamoDBFullAccesswithDataPipeline
附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创建时间:2015 年 2 月 6 日 18:40 UTC
-
编辑时间:2015 年 11 月 12 日 02:17 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonDynamoDBFullAccesswithDataPipeline
策略版本
策略版本:v2 (默认值)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{ "Version" : "2012-10-17", "Statement" : [ { "Action" : [ "cloudwatch:DeleteAlarms", "cloudwatch:DescribeAlarmHistory", "cloudwatch:DescribeAlarms", "cloudwatch:DescribeAlarmsForMetric", "cloudwatch:GetMetricStatistics", "cloudwatch:ListMetrics", "cloudwatch:PutMetricAlarm", "dynamodb:*", "sns:CreateTopic", "sns:DeleteTopic", "sns:ListSubscriptions", "sns:ListSubscriptionsByTopic", "sns:ListTopics", "sns:Subscribe", "sns:Unsubscribe", "sns:SetTopicAttributes" ], "Effect" : "Allow", "Resource" : "*", "Sid" : "DDBConsole" }, { "Action" : [ "lambda:*", "iam:ListRoles" ], "Effect" : "Allow", "Resource" : "*", "Sid" : "DDBConsoleTriggers" }, { "Action" : [ "datapipeline:*", "iam:ListRoles" ], "Effect" : "Allow", "Resource" : "*", "Sid" : "DDBConsoleImportExport" }, { "Effect" : "Allow", "Action" : [ "iam:GetRolePolicy", "iam:PassRole" ], "Resource" : [ "*" ], "Sid" : "IAMEDPRoles" }, { "Action" : [ "ec2:CreateTags", "ec2:DescribeInstances", "ec2:RunInstances", "ec2:StartInstances", "ec2:StopInstances", "ec2:TerminateInstances", "elasticmapreduce:*", "datapipeline:*" ], "Effect" : "Allow", "Resource" : "*", "Sid" : "EMR" }, { "Action" : [ "s3:DeleteObject", "s3:Get*", "s3:List*", "s3:Put*" ], "Effect" : "Allow", "Resource" : [ "*" ], "Sid" : "S3" } ] }