Amazon CloudWatch 网络监测仪的 IAM 权限 - Amazon CloudWatch

Amazon CloudWatch 网络监测仪的 IAM 权限

要访问使用 Amazon CloudWatch 网络监测仪中的监测仪和数据的操作,用户必须拥有正确权限。

有关 Amazon CloudWatch 安全性的更多信息,请参阅 适用于 Amazon CloudWatch 的 Identity and Access Management

Amazon CloudWatch 网络监测仪的只读访问权限

要访问只读操作以使用 Amazon CloudWatch 网络监测仪中的监测仪和数据,用户必须以具有以下权限的用户或角色身份登录:

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "cloudwatch:GetMetricData", "internetmonitor:Get*", "internetmonitor:List*", "internetmonitor:StartQuery", "internetmonitor:StopQuery", "logs:DescribeLogGroups", "logs:GetQueryResults", "logs:StartQuery", "logs:StopQuery" ], "Resource": "*" } ] }

Amazon CloudWatch 网络监测仪的完全访问权限

要在 Amazon CloudWatch 网络监测仪中创建监测仪,并拥有操作完全访问权限以使用网络监测仪中的监测仪和数据,用户必须以具有以下权限的用户或角色身份登录:

注意

如果创建更为严格的基于身份的权限策略,则采用该策略的用户可能没有完全访问权限以创建与使用网络监测仪中的监测仪和数据。

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "internetmonitor:*" ], "Resource": "*" }, { "Effect": "Allow", "Action": "iam:CreateServiceLinkedRole", "Resource": "arn:aws:iam::*:role/aws-service-role/internetmonitor.amazonaws.com/AWSServiceRoleForInternetMonitor", "Condition": { "StringLike": { "iam:AWSServiceName": "internetmonitor.amazonaws.com" } } }, { "Effect": "Allow", "Action": [ "iam:AttachRolePolicy", "iam:PutRolePolicy" ], "Resource": "arn:aws:iam::*:role/aws-service-role/internetmonitor.amazonaws.com/AWSServiceRoleForInternetMonitor" }, { "Action": [ "ec2:DescribeVpcs", "elasticloadbalancing:DescribeLoadBalancers", "workspaces:DescribeWorkspaceDirectories", "cloudfront:GetDistribution" ], "Effect": "Allow", "Resource": "*" } ] }