选择您的 Cookie 首选项

我们使用必要 Cookie 和类似工具提供我们的网站和服务。我们使用性能 Cookie 收集匿名统计数据,以便我们可以了解客户如何使用我们的网站并进行改进。必要 Cookie 无法停用,但您可以单击“自定义”或“拒绝”来拒绝性能 Cookie。

如果您同意,AWS 和经批准的第三方还将使用 Cookie 提供有用的网站功能、记住您的首选项并显示相关内容,包括相关广告。要接受或拒绝所有非必要 Cookie,请单击“接受”或“拒绝”。要做出更详细的选择,请单击“自定义”。

AmazonRedshiftServiceLinkedRolePolicy - AWS 托管策略

本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。

本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。

AmazonRedshiftServiceLinkedRolePolicy

描述:允许 Amazon Redshift 代表你呼叫 AWS 服务

AmazonRedshiftServiceLinkedRolePolicy 是一项 AWS 托管式策略

使用此策略

此附加到服务相关角色的策略允许服务代表您执行操作。您无法将此策略附加到您的用户、组或角色。

策略详细信息

  • 类型:服务相关角色策略

  • 创作时间:2017 年 9 月 18 日 19:19 UTC

  • 编辑时间:2024 年 11 月 20 日 18:06 UTC

  • ARN: arn:aws:iam::aws:policy/aws-service-role/AmazonRedshiftServiceLinkedRolePolicy

策略版本

策略版本:v14 (默认值)

此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。

JSON政策文件

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "Ec2VpcPermissions", "Effect" : "Allow", "Action" : [ "ec2:DescribeVpcs", "ec2:DescribeSubnets", "ec2:DescribeNetworkInterfaces", "ec2:DescribeAddresses", "ec2:AssociateAddress", "ec2:DisassociateAddress", "ec2:CreateNetworkInterface", "ec2:DeleteNetworkInterface", "ec2:ModifyNetworkInterfaceAttribute", "ec2:CreateVpcEndpoint", "ec2:DeleteVpcEndpoints", "ec2:DescribeVpcEndpoints", "ec2:ModifyVpcEndpoint" ], "Resource" : "*" }, { "Sid" : "PublicAccessCreateEip", "Effect" : "Allow", "Action" : [ "ec2:AllocateAddress" ], "Resource" : [ "arn:aws:ec2:*:*:elastic-ip/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/Redshift" : "true" } } }, { "Sid" : "PublicAccessReleaseEip", "Effect" : "Allow", "Action" : [ "ec2:ReleaseAddress" ], "Resource" : [ "arn:aws:ec2:*:*:elastic-ip/*" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/Redshift" : "true" } } }, { "Sid" : "EnableCreationAndManagementOfRedshiftCloudwatchLogGroups", "Effect" : "Allow", "Action" : [ "logs:CreateLogGroup", "logs:PutRetentionPolicy" ], "Resource" : [ "arn:aws:logs:*:*:log-group:/aws/redshift/*" ] }, { "Sid" : "EnableCreationAndManagementOfRedshiftCloudwatchLogStreams", "Effect" : "Allow", "Action" : [ "logs:CreateLogStream", "logs:PutLogEvents", "logs:DescribeLogStreams", "logs:GetLogEvents" ], "Resource" : [ "arn:aws:logs:*:*:log-group:/aws/redshift/*:log-stream:*" ] }, { "Sid" : "CreateSecurityGroupWithTags", "Effect" : "Allow", "Action" : [ "ec2:CreateSecurityGroup" ], "Resource" : [ "arn:aws:ec2:*:*:security-group/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/Redshift" : "true" } } }, { "Sid" : "SecurityGroupPermissions", "Effect" : "Allow", "Action" : [ "ec2:AuthorizeSecurityGroupEgress", "ec2:AuthorizeSecurityGroupIngress", "ec2:RevokeSecurityGroupEgress", "ec2:RevokeSecurityGroupIngress", "ec2:ModifySecurityGroupRules", "ec2:DeleteSecurityGroup" ], "Resource" : [ "arn:aws:ec2:*:*:security-group/*" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/Redshift" : "true" } } }, { "Sid" : "CreateSecurityGroup", "Effect" : "Allow", "Action" : [ "ec2:CreateSecurityGroup" ], "Resource" : [ "arn:aws:ec2:*:*:vpc/*" ] }, { "Sid" : "CreateTagsOnResources", "Effect" : "Allow", "Action" : "ec2:CreateTags", "Resource" : [ "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:route-table/*", "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*:*:vpc/*", "arn:aws:ec2:*:*:internet-gateway/*", "arn:aws:ec2:*:*:elastic-ip/*" ], "Condition" : { "StringEquals" : { "ec2:CreateAction" : [ "CreateVpc", "CreateSecurityGroup", "CreateSubnet", "CreateInternetGateway", "CreateRouteTable", "AllocateAddress" ] } } }, { "Sid" : "VPCPermissions", "Effect" : "Allow", "Action" : [ "ec2:DescribeVpcAttribute", "ec2:DescribeSecurityGroups", "ec2:DescribeInternetGateways", "ec2:DescribeSecurityGroupRules", "ec2:DescribeAvailabilityZones", "ec2:DescribeNetworkAcls", "ec2:DescribeRouteTables" ], "Resource" : "*" }, { "Sid" : "CloudWatch", "Effect" : "Allow", "Action" : [ "cloudwatch:PutMetricData" ], "Resource" : "*", "Condition" : { "StringEquals" : { "cloudwatch:namespace" : [ "AWS/Redshift-Serverless", "AWS/Redshift" ] } } }, { "Sid" : "SecretManager", "Effect" : "Allow", "Action" : [ "secretsmanager:DescribeSecret", "secretsmanager:DeleteSecret", "secretsmanager:PutSecretValue", "secretsmanager:UpdateSecret", "secretsmanager:UpdateSecretVersionStage", "secretsmanager:RotateSecret" ], "Resource" : [ "arn:aws:secretsmanager:*:*:secret:redshift!*" ], "Condition" : { "StringEquals" : { "secretsmanager:ResourceTag/aws:secretsmanager:owningService" : "redshift", "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "SecretsManagerRandomPassword", "Effect" : "Allow", "Action" : [ "secretsmanager:GetRandomPassword" ], "Resource" : "*" }, { "Sid" : "IPV6Permissions", "Effect" : "Allow", "Action" : [ "ec2:AssignIpv6Addresses", "ec2:UnassignIpv6Addresses" ], "Resource" : [ "arn:aws:ec2:*:*:network-interface/*" ] }, { "Sid" : "ServiceQuotasToCheckCustomerLimits", "Effect" : "Allow", "Action" : [ "servicequotas:GetServiceQuota" ], "Resource" : [ "arn:aws:servicequotas:*:*:ec2/L-0263D0A3", "arn:aws:servicequotas:*:*:vpc/L-29B6F2EB" ] }, { "Sid" : "DiscoverRedshiftCatalogs", "Effect" : "Allow", "Action" : [ "glue:GetCatalog", "glue:GetCatalogs" ], "Resource" : [ "arn:aws:glue:*:*:catalog", "arn:aws:glue:*:*:catalog/*" ], "Condition" : { "Bool" : { "glue:EnabledForRedshiftAutoDiscovery" : "true" } } } ] }

了解更多

隐私网站条款Cookie 首选项
© 2025, Amazon Web Services, Inc. 或其附属公司。保留所有权利。