本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AmazonMWAAServiceRolePolicy
說明:用於 Apache 氣流的 Amazon 受管工作流程所使用的服務連結角色。
AmazonMWAAServiceRolePolicy
是AWS 受管理的策略。
使用此政策
此原則附加至服務連結角色,可讓服務代表您執行動作。您無法將此政策連接至使用者、群組或角色。
政策詳情
-
類型:服務連結角色原則
-
創建時間:2020 年十一月二十四日,世界標準時間 14:13
-
編輯時間:2022 年十一月十七日,世界標準時間 00:56
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/AmazonMWAAServiceRolePolicy
政策版本
策略版本:v2(預設值)
原則的預設版本是定義原則權限的版本。當具有策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本,以決定是否允許該要求。
政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Effect" : "Allow",
"Action" : [
"logs:CreateLogStream",
"logs:CreateLogGroup",
"logs:DescribeLogGroups"
],
"Resource" : "arn:aws:logs:*:*:log-group:airflow-*:*"
},
{
"Effect" : "Allow",
"Action" : [
"ec2:AttachNetworkInterface",
"ec2:CreateNetworkInterface",
"ec2:CreateNetworkInterfacePermission",
"ec2:DeleteNetworkInterface",
"ec2:DeleteNetworkInterfacePermission",
"ec2:DescribeDhcpOptions",
"ec2:DescribeNetworkInterfaces",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeVpcEndpoints",
"ec2:DescribeVpcs",
"ec2:DetachNetworkInterface"
],
"Resource" : "*"
},
{
"Effect" : "Allow",
"Action" : "ec2:CreateVpcEndpoint",
"Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:TagKeys" : "AmazonMWAAManaged"
}
}
},
{
"Effect" : "Allow",
"Action" : [
"ec2:ModifyVpcEndpoint",
"ec2:DeleteVpcEndpoints"
],
"Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*",
"Condition" : {
"Null" : {
"aws:ResourceTag/AmazonMWAAManaged" : false
}
}
},
{
"Effect" : "Allow",
"Action" : [
"ec2:CreateVpcEndpoint",
"ec2:ModifyVpcEndpoint"
],
"Resource" : [
"arn:aws:ec2:*:*:vpc/*",
"arn:aws:ec2:*:*:security-group/*",
"arn:aws:ec2:*:*:subnet/*"
]
},
{
"Effect" : "Allow",
"Action" : "ec2:CreateTags",
"Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*",
"Condition" : {
"StringEquals" : {
"ec2:CreateAction" : "CreateVpcEndpoint"
},
"ForAnyValue:StringEquals" : {
"aws:TagKeys" : "AmazonMWAAManaged"
}
}
},
{
"Effect" : "Allow",
"Action" : "cloudwatch:PutMetricData",
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"cloudwatch:namespace" : [
"AWS/MWAA"
]
}
}
}
]
}