本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AmazonRDSCustomInstanceProfileRolePolicy
描述:允许 Amazon RDS Custom 通过 EC2 实例配置文件执行各种自动化操作和数据库管理任务。
AmazonRDSCustomInstanceProfileRolePolicy
是一项 AWS 托管式策略。
使用此策略
您可以将 AmazonRDSCustomInstanceProfileRolePolicy
附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创建时间:2024 年 2 月 27 日 17:42 UTC
-
编辑时间:世界标准时间 2025 年 3 月 20 日 16:22
-
ARN:
arn:aws:iam::aws:policy/AmazonRDSCustomInstanceProfileRolePolicy
策略版本
策略版本:v2 (默认值)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "ssmAgentPermission1", "Effect" : "Allow", "Action" : [ "ssm:UpdateInstanceInformation" ], "Resource" : "arn:aws:ec2:*:*:instance/*", "Condition" : { "StringLike" : { "aws:ResourceTag/AWSRDSCustom" : [ "custom-oracle", "custom-sqlserver", "custom-oracle-rac" ] } } }, { "Sid" : "ssmAgentPermission2", "Effect" : "Allow", "Action" : [ "ssm:GetManifest", "ssm:PutConfigurePackageResult" ], "Resource" : "*" }, { "Sid" : "ssmAgentPermission3", "Effect" : "Allow", "Action" : [ "ssm:GetDocument", "ssm:DescribeDocument" ], "Resource" : "arn:aws:ssm:*:*:document/*" }, { "Sid" : "ssmAgentPermission4", "Effect" : "Allow", "Action" : [ "ssmmessages:CreateControlChannel", "ssmmessages:OpenControlChannel" ], "Resource" : "*" }, { "Sid" : "ssmAgentPermission5", "Effect" : "Allow", "Action" : [ "ec2messages:AcknowledgeMessage", "ec2messages:DeleteMessage", "ec2messages:FailMessage", "ec2messages:GetEndpoint", "ec2messages:GetMessages", "ec2messages:SendReply" ], "Resource" : "*" }, { "Sid" : "createEc2SnapshotPermission1", "Effect" : "Allow", "Action" : [ "ec2:CreateSnapshot", "ec2:CreateSnapshots" ], "Resource" : [ "arn:aws:ec2:*:*:volume/*" ], "Condition" : { "StringLike" : { "aws:ResourceTag/AWSRDSCustom" : [ "custom-oracle", "custom-sqlserver", "custom-oracle-rac" ] } } }, { "Sid" : "createEc2SnapshotPermission2", "Effect" : "Allow", "Action" : [ "ec2:CreateSnapshot", "ec2:CreateSnapshots" ], "Resource" : [ "arn:aws:ec2:*::snapshot/*" ], "Condition" : { "StringLike" : { "aws:RequestTag/AWSRDSCustom" : [ "custom-oracle", "custom-sqlserver", "custom-oracle-rac" ] } } }, { "Sid" : "createEc2SnapshotPermission3", "Effect" : "Allow", "Action" : "ec2:CreateSnapshots", "Resource" : [ "arn:aws:ec2:*:*:instance/*" ], "Condition" : { "StringLike" : { "aws:ResourceTag/AWSRDSCustom" : [ "custom-oracle", "custom-sqlserver", "custom-oracle-rac" ] } } }, { "Sid" : "createTagForEc2SnapshotPermission", "Effect" : "Allow", "Action" : "ec2:CreateTags", "Resource" : "*", "Condition" : { "StringLike" : { "aws:RequestTag/AWSRDSCustom" : [ "custom-oracle", "custom-sqlserver", "custom-oracle-rac" ], "ec2:CreateAction" : [ "CreateSnapshot", "CreateSnapshots" ] } } }, { "Sid" : "rdsCustomS3ObjectPermission", "Effect" : "Allow", "Action" : [ "s3:putObject", "s3:getObject", "s3:getObjectVersion", "s3:AbortMultipartUpload", "s3:ListMultipartUploadParts" ], "Resource" : [ "arn:aws:s3:::do-not-delete-rds-custom-*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "rdsCustomS3BucketPermission", "Effect" : "Allow", "Action" : [ "s3:ListBucketVersions", "s3:ListBucketMultipartUploads" ], "Resource" : [ "arn:aws:s3:::do-not-delete-rds-custom-*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "readSecretsFromCpPermission", "Effect" : "Allow", "Action" : [ "secretsmanager:GetSecretValue", "secretsmanager:DescribeSecret" ], "Resource" : [ "arn:aws:secretsmanager:*:*:secret:do-not-delete-rds-custom-*", "arn:aws:secretsmanager:*:*:secret:rds-custom!*" ], "Condition" : { "StringLike" : { "aws:ResourceTag/AWSRDSCustom" : [ "custom-oracle", "custom-sqlserver", "custom-oracle-rac" ] } } }, { "Sid" : "createSecretsOnDpPermission", "Effect" : "Allow", "Action" : [ "secretsmanager:CreateSecret", "secretsmanager:TagResource" ], "Resource" : [ "arn:aws:secretsmanager:*:*:secret:do-not-delete-rds-custom-*" ], "Condition" : { "StringLike" : { "aws:RequestTag/AWSRDSCustom" : "custom-oracle-rac" } } }, { "Sid" : "publishCwMetricsPermission", "Effect" : "Allow", "Action" : "cloudwatch:PutMetricData", "Resource" : "*", "Condition" : { "StringEquals" : { "cloudwatch:namespace" : [ "rdscustom/rds-custom-sqlserver-agent", "RDSCustomForOracle/Agent" ] } } }, { "Sid" : "putEventsToEventBusPermission", "Effect" : "Allow", "Action" : "events:PutEvents", "Resource" : "arn:aws:events:*:*:event-bus/default" }, { "Sid" : "cwlUploadPermission", "Effect" : "Allow", "Action" : [ "logs:PutRetentionPolicy", "logs:PutLogEvents", "logs:DescribeLogStreams", "logs:CreateLogStream", "logs:CreateLogGroup" ], "Resource" : "arn:aws:logs:*:*:log-group:rds-custom-instance-*" }, { "Sid" : "sendMessageToSqsQueuePermission", "Effect" : "Allow", "Action" : [ "sqs:SendMessage", "sqs:ReceiveMessage", "sqs:DeleteMessage", "sqs:GetQueueUrl" ], "Resource" : [ "arn:aws:sqs:*:*:do-not-delete-rds-custom-*" ], "Condition" : { "StringLike" : { "aws:ResourceTag/AWSRDSCustom" : "custom-sqlserver" } } }, { "Sid" : "managePrivateIpOnEniPermission", "Effect" : "Allow", "Action" : [ "ec2:AssignPrivateIpAddresses", "ec2:UnassignPrivateIpAddresses" ], "Resource" : "arn:aws:ec2:*:*:network-interface/*", "Condition" : { "StringLike" : { "aws:ResourceTag/AWSRDSCustom" : "custom-oracle-rac" } } }, { "Sid" : "kmsPermissionWithSecret", "Effect" : "Allow", "Action" : [ "kms:Decrypt", "kms:GenerateDataKey" ], "Resource" : "*", "Condition" : { "ArnLike" : { "kms:EncryptionContext:SecretARN" : [ "arn:aws:secretsmanager:*:*:secret:do-not-delete-rds-custom-*", "arn:aws:secretsmanager:*:*:secret:rds-custom!*" ] }, "StringLike" : { "kms:ViaService" : "secretsmanager.*.amazonaws.com" } } }, { "Sid" : "kmsPermissionWithS3", "Effect" : "Allow", "Action" : [ "kms:Decrypt", "kms:GenerateDataKey" ], "Resource" : "*", "Condition" : { "ArnLike" : { "kms:EncryptionContext:aws:s3:arn" : "arn:aws:s3:::do-not-delete-rds-custom-*" }, "StringLike" : { "kms:ViaService" : "s3.*.amazonaws.com" } } } ] }