本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AWSServiceRoleForAmazonEKSNodegroup
描述:管理客戶帳戶中節點群組所需的許可。這些政策與下列資源的管理相關: AutoscalingGroups、 SecurityGroups、 LaunchTemplates 和 InstanceProfiles。
AWSServiceRoleForAmazonEKSNodegroup
是AWS 受管政策。
使用此政策
此政策會連接至服務連結角色,讓服務代表您執行動作。您無法將此政策連接至使用者、群組或角色。
政策詳細資訊
-
類型:服務連結角色政策
-
建立時間:2019 年 11 月 7 日 01:34 UTC
-
編輯時間:2024 年 11 月 21 日 00:07 UTC
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForAmazonEKSNodegroup
政策版本
政策版本:v10 (預設值)
政策的預設版本是定義政策許可的版本。當具有 政策的使用者或角色提出存取 AWS 資源的請求時, 會 AWS 檢查政策的預設版本,以決定是否允許請求。
JSON 政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "SharedSecurityGroupRelatedPermissions",
"Effect" : "Allow",
"Action" : [
"ec2:RevokeSecurityGroupIngress",
"ec2:AuthorizeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:DescribeInstances",
"ec2:RevokeSecurityGroupEgress",
"ec2:DeleteSecurityGroup"
],
"Resource" : "*",
"Condition" : {
"StringLike" : {
"ec2:ResourceTag/eks" : "*"
}
}
},
{
"Sid" : "EKSCreatedSecurityGroupRelatedPermissions",
"Effect" : "Allow",
"Action" : [
"ec2:RevokeSecurityGroupIngress",
"ec2:AuthorizeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:DescribeInstances",
"ec2:RevokeSecurityGroupEgress",
"ec2:DeleteSecurityGroup"
],
"Resource" : "*",
"Condition" : {
"StringLike" : {
"ec2:ResourceTag/eks:nodegroup-name" : "*"
}
}
},
{
"Sid" : "LaunchTemplateRelatedPermissions",
"Effect" : "Allow",
"Action" : [
"ec2:DeleteLaunchTemplate",
"ec2:CreateLaunchTemplateVersion"
],
"Resource" : "*",
"Condition" : {
"StringLike" : {
"ec2:ResourceTag/eks:nodegroup-name" : "*"
}
}
},
{
"Sid" : "AutoscalingRelatedPermissions",
"Effect" : "Allow",
"Action" : [
"autoscaling:UpdateAutoScalingGroup",
"autoscaling:DeleteAutoScalingGroup",
"autoscaling:TerminateInstanceInAutoScalingGroup",
"autoscaling:CompleteLifecycleAction",
"autoscaling:PutLifecycleHook",
"autoscaling:PutNotificationConfiguration",
"autoscaling:EnableMetricsCollection",
"autoscaling:PutScheduledUpdateGroupAction",
"autoscaling:ResumeProcesses",
"autoscaling:SuspendProcesses"
],
"Resource" : "arn:aws:autoscaling:*:*:*:autoScalingGroupName/eks-*"
},
{
"Sid" : "AllowAutoscalingToCreateSLR",
"Effect" : "Allow",
"Condition" : {
"StringEquals" : {
"iam:AWSServiceName" : "autoscaling.amazonaws.com"
}
},
"Action" : "iam:CreateServiceLinkedRole",
"Resource" : "*"
},
{
"Sid" : "AllowASGCreationByEKS",
"Effect" : "Allow",
"Action" : [
"autoscaling:CreateOrUpdateTags",
"autoscaling:CreateAutoScalingGroup"
],
"Resource" : "*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:TagKeys" : [
"eks",
"eks:cluster-name",
"eks:nodegroup-name"
]
}
}
},
{
"Sid" : "AllowPassRoleToAutoscaling",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "autoscaling.amazonaws.com"
}
}
},
{
"Sid" : "AllowPassRoleToEC2",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "*",
"Condition" : {
"StringEqualsIfExists" : {
"iam:PassedToService" : [
"ec2.amazonaws.com"
]
}
}
},
{
"Sid" : "PermissionsToManageResourcesForNodegroups",
"Effect" : "Allow",
"Action" : [
"iam:GetRole",
"ec2:CreateLaunchTemplate",
"ec2:DescribeInstances",
"iam:GetInstanceProfile",
"ec2:DescribeLaunchTemplates",
"autoscaling:DescribeAutoScalingGroups",
"ec2:CreateSecurityGroup",
"ec2:DescribeLaunchTemplateVersions",
"ec2:RunInstances",
"ec2:DescribeSecurityGroups",
"ec2:GetConsoleOutput",
"ec2:DescribeRouteTables",
"ec2:DescribeSubnets",
"ec2:DescribeCapacityReservations"
],
"Resource" : "*"
},
{
"Sid" : "PermissionsToCreateAndManageInstanceProfiles",
"Effect" : "Allow",
"Action" : [
"iam:CreateInstanceProfile",
"iam:DeleteInstanceProfile",
"iam:RemoveRoleFromInstanceProfile",
"iam:AddRoleToInstanceProfile"
],
"Resource" : "arn:aws:iam::*:instance-profile/eks-*"
},
{
"Sid" : "PermissionsToDeleteEKSAndKubernetesTags",
"Effect" : "Allow",
"Action" : [
"ec2:DeleteTags"
],
"Resource" : "*",
"Condition" : {
"ForAnyValue:StringLike" : {
"aws:TagKeys" : [
"eks",
"eks:cluster-name",
"eks:nodegroup-name",
"kubernetes.io/cluster/*"
]
}
}
},
{
"Sid" : "PermissionsForManagedNodegroupsAutoRepair",
"Effect" : "Allow",
"Action" : [
"ec2:RebootInstances"
],
"Resource" : "*",
"Condition" : {
"StringLike" : {
"ec2:ResourceTag/eks:nodegroup-name" : "*"
}
}
},
{
"Sid" : "PermissionsToCreateEKSAndKubernetesTags",
"Effect" : "Allow",
"Action" : [
"ec2:CreateTags"
],
"Resource" : [
"arn:*:ec2:*:*:security-group/*",
"arn:*:ec2:*:*:launch-template/*"
],
"Condition" : {
"ForAnyValue:StringLike" : {
"aws:TagKeys" : [
"eks",
"eks:cluster-name",
"eks:nodegroup-name",
"kubernetes.io/cluster/*"
]
}
}
},
{
"Sid" : "AllowTaggingEC2ResourcesOnlyDuringInstanceCreation",
"Effect" : "Allow",
"Action" : [
"ec2:CreateTags"
],
"Resource" : [
"arn:*:ec2:*:*:instance/*",
"arn:*:ec2:*:*:volume/*",
"arn:*:ec2:*:*:network-interface/*"
],
"Condition" : {
"StringEquals" : {
"ec2:CreateAction" : [
"RunInstances"
]
},
"ForAnyValue:StringLike" : {
"aws:TagKeys" : [
"eks",
"eks:cluster-name",
"eks:nodegroup-name",
"kubernetes.io/cluster/*"
]
}
}
}
]
}