As traduções são geradas por tradução automática. Em caso de conflito entre o conteúdo da tradução e da versão original em inglês, a versão em inglês prevalecerá.
AmazonEMRServicePolicy_v2
Descrição: esta política é usada para o perfil de serviço do Amazon EMR e NÃO deve ser usada para nenhum outro usuário ou perfil do IAM em sua conta. A política concede permissões para criar e gerenciar recursos associados ao EMR e serviços relacionados necessários para a operação do seu cluster do EMR.
AmazonEMRServicePolicy_v2
é uma política gerenciada pelo AWS.
Utilização desta política
Você pode vincular a AmazonEMRServicePolicy_v2
aos seus usuários, grupos e perfis.
Detalhes desta política
-
Tipo: Política de função de serviço
-
Hora da criação: 12 de março de 2021, 1:11 UTC
-
Hora da edição: 02 de maio de 2024, 18:43 UTC
-
ARN:
arn:aws:iam::aws:policy/service-role/AmazonEMRServicePolicy_v2
Versão da política
Versão da política: v3 (padrão)
A versão padrão da política é aquela que define as permissões desta política. Quando um usuário ou função da política faz uma solicitação para acessar um AWS recurso, AWS verifica a versão padrão da política para determinar se a solicitação deve ser permitida.
Documento da política JSON
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "CreateInTaggedNetwork",
"Effect" : "Allow",
"Action" : [
"ec2:CreateNetworkInterface",
"ec2:RunInstances",
"ec2:CreateFleet",
"ec2:CreateLaunchTemplate",
"ec2:CreateLaunchTemplateVersion"
],
"Resource" : [
"arn:aws:ec2:*:*:subnet/*",
"arn:aws:ec2:*:*:security-group/*"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "CreateWithEMRTaggedLaunchTemplate",
"Effect" : "Allow",
"Action" : [
"ec2:CreateFleet",
"ec2:RunInstances",
"ec2:CreateLaunchTemplateVersion"
],
"Resource" : "arn:aws:ec2:*:*:launch-template/*",
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "CreateEMRTaggedLaunchTemplate",
"Effect" : "Allow",
"Action" : "ec2:CreateLaunchTemplate",
"Resource" : "arn:aws:ec2:*:*:launch-template/*",
"Condition" : {
"StringEquals" : {
"aws:RequestTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "CreateEMRTaggedInstancesAndVolumes",
"Effect" : "Allow",
"Action" : [
"ec2:RunInstances",
"ec2:CreateFleet"
],
"Resource" : [
"arn:aws:ec2:*:*:instance/*",
"arn:aws:ec2:*:*:volume/*"
],
"Condition" : {
"StringEquals" : {
"aws:RequestTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "ResourcesToLaunchEC2",
"Effect" : "Allow",
"Action" : [
"ec2:RunInstances",
"ec2:CreateFleet",
"ec2:CreateLaunchTemplate",
"ec2:CreateLaunchTemplateVersion"
],
"Resource" : [
"arn:aws:ec2:*:*:network-interface/*",
"arn:aws:ec2:*::image/ami-*",
"arn:aws:ec2:*:*:key-pair/*",
"arn:aws:ec2:*:*:capacity-reservation/*",
"arn:aws:ec2:*:*:placement-group/EMR_*",
"arn:aws:ec2:*:*:fleet/*",
"arn:aws:ec2:*:*:dedicated-host/*",
"arn:aws:resource-groups:*:*:group/*"
]
},
{
"Sid" : "ManageEMRTaggedResources",
"Effect" : "Allow",
"Action" : [
"ec2:CreateLaunchTemplateVersion",
"ec2:DeleteLaunchTemplate",
"ec2:DeleteNetworkInterface",
"ec2:ModifyInstanceAttribute",
"ec2:TerminateInstances"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "ManageTagsOnEMRTaggedResources",
"Effect" : "Allow",
"Action" : [
"ec2:CreateTags",
"ec2:DeleteTags"
],
"Resource" : [
"arn:aws:ec2:*:*:instance/*",
"arn:aws:ec2:*:*:volume/*",
"arn:aws:ec2:*:*:network-interface/*",
"arn:aws:ec2:*:*:launch-template/*"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "CreateNetworkInterfaceNeededForPrivateSubnet",
"Effect" : "Allow",
"Action" : [
"ec2:CreateNetworkInterface"
],
"Resource" : [
"arn:aws:ec2:*:*:network-interface/*"
],
"Condition" : {
"StringEquals" : {
"aws:RequestTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "TagOnCreateTaggedEMRResources",
"Effect" : "Allow",
"Action" : [
"ec2:CreateTags"
],
"Resource" : [
"arn:aws:ec2:*:*:network-interface/*",
"arn:aws:ec2:*:*:instance/*",
"arn:aws:ec2:*:*:volume/*",
"arn:aws:ec2:*:*:launch-template/*"
],
"Condition" : {
"StringEquals" : {
"ec2:CreateAction" : [
"RunInstances",
"CreateFleet",
"CreateLaunchTemplate",
"CreateNetworkInterface"
]
}
}
},
{
"Sid" : "TagPlacementGroups",
"Effect" : "Allow",
"Action" : [
"ec2:CreateTags",
"ec2:DeleteTags"
],
"Resource" : [
"arn:aws:ec2:*:*:placement-group/EMR_*"
]
},
{
"Sid" : "ListActionsForEC2Resources",
"Effect" : "Allow",
"Action" : [
"ec2:DescribeAccountAttributes",
"ec2:DescribeCapacityReservations",
"ec2:DescribeDhcpOptions",
"ec2:DescribeImages",
"ec2:DescribeInstances",
"ec2:DescribeInstanceTypeOfferings",
"ec2:DescribeLaunchTemplates",
"ec2:DescribeNetworkAcls",
"ec2:DescribeNetworkInterfaces",
"ec2:DescribePlacementGroups",
"ec2:DescribeRouteTables",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeVolumes",
"ec2:DescribeVolumeStatus",
"ec2:DescribeVpcAttribute",
"ec2:DescribeVpcEndpoints",
"ec2:DescribeVpcs"
],
"Resource" : "*"
},
{
"Sid" : "CreateDefaultSecurityGroupWithEMRTags",
"Effect" : "Allow",
"Action" : [
"ec2:CreateSecurityGroup"
],
"Resource" : [
"arn:aws:ec2:*:*:security-group/*"
],
"Condition" : {
"StringEquals" : {
"aws:RequestTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "CreateDefaultSecurityGroupInVPCWithEMRTags",
"Effect" : "Allow",
"Action" : [
"ec2:CreateSecurityGroup"
],
"Resource" : [
"arn:aws:ec2:*:*:vpc/*"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "TagOnCreateDefaultSecurityGroupWithEMRTags",
"Effect" : "Allow",
"Action" : [
"ec2:CreateTags"
],
"Resource" : "arn:aws:ec2:*:*:security-group/*",
"Condition" : {
"StringEquals" : {
"aws:RequestTag/for-use-with-amazon-emr-managed-policies" : "true",
"ec2:CreateAction" : "CreateSecurityGroup"
}
}
},
{
"Sid" : "ManageSecurityGroups",
"Effect" : "Allow",
"Action" : [
"ec2:AuthorizeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:RevokeSecurityGroupEgress",
"ec2:RevokeSecurityGroupIngress"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/for-use-with-amazon-emr-managed-policies" : "true"
}
}
},
{
"Sid" : "CreateEMRPlacementGroups",
"Effect" : "Allow",
"Action" : [
"ec2:CreatePlacementGroup"
],
"Resource" : "arn:aws:ec2:*:*:placement-group/EMR_*"
},
{
"Sid" : "DeletePlacementGroups",
"Effect" : "Allow",
"Action" : [
"ec2:DeletePlacementGroup"
],
"Resource" : "*"
},
{
"Sid" : "AutoScaling",
"Effect" : "Allow",
"Action" : [
"application-autoscaling:DeleteScalingPolicy",
"application-autoscaling:DeregisterScalableTarget",
"application-autoscaling:DescribeScalableTargets",
"application-autoscaling:DescribeScalingPolicies",
"application-autoscaling:PutScalingPolicy",
"application-autoscaling:RegisterScalableTarget"
],
"Resource" : "*"
},
{
"Sid" : "ResourceGroupsForCapacityReservations",
"Effect" : "Allow",
"Action" : [
"resource-groups:ListGroupResources"
],
"Resource" : "*"
},
{
"Sid" : "AutoScalingCloudWatch",
"Effect" : "Allow",
"Action" : [
"cloudwatch:PutMetricAlarm",
"cloudwatch:DeleteAlarms",
"cloudwatch:DescribeAlarms"
],
"Resource" : "arn:aws:cloudwatch:*:*:alarm:*_EMR_Auto_Scaling"
},
{
"Sid" : "PassRoleForAutoScaling",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/EMR_AutoScaling_DefaultRole",
"Condition" : {
"StringLike" : {
"iam:PassedToService" : "application-autoscaling.amazonaws.com*"
}
}
},
{
"Sid" : "PassRoleForEC2",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/EMR_EC2_DefaultRole",
"Condition" : {
"StringLike" : {
"iam:PassedToService" : "ec2.amazonaws.com*"
}
}
}
]
}