本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AWSEC2VssRestorePolicy
描述:授予 Amazon EC2 和 AWS SSM 從 AWS VSS 建立的應用程式一致性快照還原 SQL Server 資料庫的許可。
AWSEC2VssRestorePolicy 是 AWS 受管政策。
使用此政策
您可以將 AWSEC2VssRestorePolicy 連接至使用者、群組與角色。
政策詳細資訊
-
類型: AWS 受管政策
-
建立時間:2026 年 3 月 25 日 23:12 UTC
-
編輯時間:2026 年 3 月 25 日 23:12 UTC
-
ARN:
arn:aws:iam::aws:policy/AWSEC2VssRestorePolicy
政策版本
政策版本: v1 (預設)
政策的預設版本是定義政策許可的版本。當具有 政策的使用者或角色提出存取 AWS 資源的請求時, 會 AWS 檢查政策的預設版本,以決定是否允許請求。
JSON 政策文件
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "CreateVolumeAccessVolume", "Effect" : "Allow", "Action" : "ec2:CreateVolume", "Resource" : "arn:aws:ec2:*:*:volume/*", "Condition" : { "StringLike" : { "aws:RequestTag/AwsVssConfig" : "*" }, "ArnLike" : { "ec2:ParentSnapshot" : "arn:aws:ec2:*:*:snapshot/*" } } }, { "Sid" : "CreateVolumeAccessSnapshot", "Effect" : "Allow", "Action" : "ec2:CreateVolume", "Resource" : "arn:aws:ec2:*:*:snapshot/*", "Condition" : { "StringLike" : { "ec2:ResourceTag/AwsVssConfig" : "*" } } }, { "Sid" : "CreateVolumeWithTagging", "Effect" : "Allow", "Action" : "ec2:CreateTags", "Resource" : "arn:aws:ec2:*:*:volume/*", "Condition" : { "StringEquals" : { "ec2:CreateAction" : "CreateVolume" } } }, { "Sid" : "AttachVolumeAccessVolume", "Effect" : "Allow", "Action" : "ec2:AttachVolume", "Resource" : "*", "Condition" : { "StringLike" : { "ec2:ResourceTag/AwsVssConfig" : "*" } } }, { "Sid" : "AttachVolumeAccessInstance", "Effect" : "Allow", "Action" : "ec2:AttachVolume", "Resource" : "arn:aws:ec2:*:*:instance/*" }, { "Sid" : "DescribeVolumes", "Effect" : "Allow", "Action" : "ec2:DescribeVolumes", "Resource" : "*" }, { "Sid" : "DescribeSnapshots", "Effect" : "Allow", "Action" : "ec2:DescribeSnapshots", "Resource" : "*" }, { "Sid" : "DescribeInstanceAttribute", "Effect" : "Allow", "Action" : "ec2:DescribeInstanceAttribute", "Resource" : "arn:aws:ec2:*:*:instance/*" }, { "Sid" : "SsmAutomationRead", "Effect" : "Allow", "Action" : [ "ssm:DescribeInstanceInformation", "ssm:ListCommandInvocations", "ssm:ListCommands" ], "Resource" : "*" }, { "Sid" : "SsmRunCommand", "Effect" : "Allow", "Action" : [ "ssm:SendCommand", "ssm:GetDocument" ], "Resource" : [ "arn:aws:ec2:*:*:instance/*", "arn:aws:ssm:*:*:document/AWS-ConfigureAWSPackage", "arn:aws:ssm:*:*:document/AWSEC2-PrepareVssRestore", "arn:aws:ssm:*:*:document/AWSEC2-RunVssRestoreForSqlDatabase" ] } ] }