本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AmazonEKSLocalOutpostServiceRolePolicy
說明:允許 Amazon EKS 本地代表您撥打 AWS 服務。
AmazonEKSLocalOutpostServiceRolePolicy
是AWS 受管理的策略。
使用此政策
此原則附加至服務連結角色,可讓服務代表您執行動作。您無法將此政策連接至使用者、群組或角色。
政策詳情
-
類型:服務連結角色原則
-
創建時間:2022 年 8 月 23 日,世界標準時間 21:53
-
編輯時間:2022 年 10 月 24 日,世界標準時間下午 16:24
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/AmazonEKSLocalOutpostServiceRolePolicy
政策版本
策略版本:v2(預設值)
原則的預設版本是定義原則權限的版本。當具有策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本,以決定是否允許該要求。
政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Effect" : "Allow",
"Action" : [
"ec2:DescribeVpcs",
"ec2:DescribeSubnets",
"ec2:DescribeRouteTables",
"ec2:DescribeAddresses",
"ec2:DescribeImages",
"ec2:DescribeInstances",
"ec2:DescribeNetworkInterfaces",
"ec2:DescribeNetworkInterfaceAttribute",
"ec2:DescribeSecurityGroups",
"ec2:DescribeVpcAttribute",
"ec2:DescribePlacementGroups"
],
"Resource" : "*"
},
{
"Effect" : "Allow",
"Action" : [
"ec2:CreateNetworkInterface"
],
"Resource" : "arn:aws:ec2:*:*:network-interface/*",
"Condition" : {
"StringLike" : {
"aws:RequestTag/eks-local:controlplane-name" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : [
"ec2:CreateNetworkInterface"
],
"Resource" : [
"arn:aws:ec2:*:*:security-group/*",
"arn:aws:ec2:*:*:subnet/*"
]
},
{
"Effect" : "Allow",
"Action" : [
"ec2:ModifyNetworkInterfaceAttribute"
],
"Resource" : [
"arn:aws:ec2:*:*:instance/*",
"arn:aws:ec2:*:*:security-group/*",
"arn:aws:ec2:*:*:network-interface/*"
],
"Condition" : {
"StringLike" : {
"aws:ResourceTag/eks-local:controlplane-name" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : [
"ec2:CreateSecurityGroup"
],
"Resource" : "arn:aws:ec2:*:*:security-group/*",
"Condition" : {
"StringLike" : {
"aws:RequestTag/eks-local:controlplane-name" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : [
"ec2:CreateSecurityGroup"
],
"Resource" : "arn:aws:ec2:*:*:vpc/*"
},
{
"Effect" : "Allow",
"Action" : "ec2:RunInstances",
"Resource" : "arn:aws:ec2:*:*:instance/*",
"Condition" : {
"StringLike" : {
"aws:RequestTag/eks-local:controlplane-name" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : "ec2:RunInstances",
"Resource" : [
"arn:aws:ec2:*:*:volume/*",
"arn:aws:ec2:*:*:image/*",
"arn:aws:ec2:*:*:launch-template/*",
"arn:aws:ec2:*:*:network-interface/*",
"arn:aws:ec2:*:*:security-group/*",
"arn:aws:ec2:*:*:subnet/*",
"arn:aws:ec2:*:*:placement-group/*"
]
},
{
"Effect" : "Allow",
"Action" : [
"ec2:AuthorizeSecurityGroupIngress",
"ec2:RevokeSecurityGroupIngress",
"ec2:DeleteNetworkInterface",
"ec2:DeleteSecurityGroup",
"ec2:TerminateInstances",
"ec2:GetConsoleOutput"
],
"Resource" : "*",
"Condition" : {
"StringLike" : {
"aws:ResourceTag/eks-local:controlplane-name" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : "ec2:CreateTags",
"Resource" : [
"arn:aws:ec2:*:*:security-group/*",
"arn:aws:ec2:*:*:network-interface/*",
"arn:aws:ec2:*:*:instance/*"
],
"Condition" : {
"ForAnyValue:StringLike" : {
"aws:TagKeys" : [
"kubernetes.io/cluster/*",
"eks*"
]
},
"StringEquals" : {
"ec2:CreateAction" : [
"CreateNetworkInterface",
"CreateSecurityGroup",
"RunInstances"
]
}
}
},
{
"Effect" : "Allow",
"Action" : [
"secretsmanager:TagResource"
],
"Resource" : "arn:aws:secretsmanager:*:*:secret:eks-local.cluster.x-k8s.io/*",
"Condition" : {
"ForAnyValue:StringLike" : {
"aws:TagKeys" : [
"kubernetes.io/cluster/*",
"eks*"
]
}
}
},
{
"Effect" : "Allow",
"Action" : [
"secretsmanager:CreateSecret"
],
"Resource" : "arn:aws:secretsmanager:*:*:secret:eks-local.cluster.x-k8s.io/*",
"Condition" : {
"StringLike" : {
"aws:RequestTag/eks-local:controlplane-name" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : "secretsmanager:DeleteSecret",
"Resource" : "arn:aws:secretsmanager:*:*:secret:eks-local.cluster.x-k8s.io/*",
"Condition" : {
"StringLike" : {
"aws:ResourceTag/eks-local:controlplane-name" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : "secretsmanager:DescribeSecret",
"Resource" : "arn:aws:secretsmanager:*:*:secret:eks-local.cluster.x-k8s.io/*"
},
{
"Effect" : "Allow",
"Action" : [
"iam:PassRole"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "ec2.amazonaws.com"
}
}
},
{
"Effect" : "Allow",
"Action" : [
"iam:GetInstanceProfile",
"iam:DeleteInstanceProfile",
"iam:RemoveRoleFromInstanceProfile"
],
"Resource" : "arn:aws:iam::*:instance-profile/eks-local-*"
},
{
"Effect" : "Allow",
"Action" : [
"ssm:StartSession"
],
"Resource" : "arn:aws:ec2:*:*:instance/*",
"Condition" : {
"StringLike" : {
"ssm:resourceTag/eks-local:controlplane-name" : "*"
}
}
},
{
"Effect" : "Allow",
"Action" : [
"ssm:StartSession"
],
"Resource" : "arn:aws:ssm:*::document/AmazonEKS-ControlPlaneInstanceProxy"
},
{
"Effect" : "Allow",
"Action" : [
"ssm:ResumeSession",
"ssm:TerminateSession"
],
"Resource" : "*"
},
{
"Effect" : "Allow",
"Action" : [
"outposts:GetOutpost"
],
"Resource" : "*"
}
]
}