本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AmazonMSKFullAccess
描述:提供对 Amazon MSK 的完全访问权限,以及对其依赖项的其他必要权限。
AmazonMSKFullAccess
是一项 AWS 托管式策略。
使用此策略
您可以将 AmazonMSKFullAccess
附加到您的用户、组和角色。
策略详细信息
-
类型:AWS 托管策略
-
创建时间:2019 年 1 月 14 日 22:07 UTC
-
编辑时间:2023 年 10 月 18 日 11:33 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonMSKFullAccess
策略版本
策略版本:v7(默认)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时,AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{
"Version" : "2012-10-17",
"Statement" : [
{
"Effect" : "Allow",
"Action" : [
"kafka:*",
"ec2:DescribeSubnets",
"ec2:DescribeVpcs",
"ec2:DescribeSecurityGroups",
"ec2:DescribeRouteTables",
"ec2:DescribeVpcEndpoints",
"ec2:DescribeVpcAttribute",
"kms:DescribeKey",
"kms:CreateGrant",
"logs:CreateLogDelivery",
"logs:GetLogDelivery",
"logs:UpdateLogDelivery",
"logs:DeleteLogDelivery",
"logs:ListLogDeliveries",
"logs:PutResourcePolicy",
"logs:DescribeResourcePolicies",
"logs:DescribeLogGroups",
"S3:GetBucketPolicy",
"firehose:TagDeliveryStream"
],
"Resource" : "*"
},
{
"Effect" : "Allow",
"Action" : [
"ec2:CreateVpcEndpoint"
],
"Resource" : [
"arn:*:ec2:*:*:vpc/*",
"arn:*:ec2:*:*:subnet/*",
"arn:*:ec2:*:*:security-group/*"
]
},
{
"Effect" : "Allow",
"Action" : [
"ec2:CreateVpcEndpoint"
],
"Resource" : [
"arn:*:ec2:*:*:vpc-endpoint/*"
],
"Condition" : {
"StringEquals" : {
"aws:RequestTag/AWSMSKManaged" : "true"
},
"StringLike" : {
"aws:RequestTag/ClusterArn" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : [
"ec2:CreateTags"
],
"Resource" : "arn:*:ec2:*:*:vpc-endpoint/*",
"Condition" : {
"StringEquals" : {
"ec2:CreateAction" : "CreateVpcEndpoint"
}
}
},
{
"Effect" : "Allow",
"Action" : [
"ec2:DeleteVpcEndpoints"
],
"Resource" : "arn:*:ec2:*:*:vpc-endpoint/*",
"Condition" : {
"StringEquals" : {
"ec2:ResourceTag/AWSMSKManaged" : "true"
},
"StringLike" : {
"ec2:ResourceTag/ClusterArn" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "kafka.amazonaws.com"
}
}
},
{
"Effect" : "Allow",
"Action" : "iam:CreateServiceLinkedRole",
"Resource" : "arn:aws:iam::*:role/aws-service-role/kafka.amazonaws.com/AWSServiceRoleForKafka*",
"Condition" : {
"StringEquals" : {
"iam:AWSServiceName" : "kafka.amazonaws.com"
}
}
},
{
"Effect" : "Allow",
"Action" : "iam:CreateServiceLinkedRole",
"Resource" : "arn:aws:iam::*:role/aws-service-role/delivery.logs.amazonaws.com/AWSServiceRoleForLogDelivery*",
"Condition" : {
"StringEquals" : {
"iam:AWSServiceName" : "delivery.logs.amazonaws.com"
}
}
}
]
}