本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
VPC 聯網的服務連結角色
HealthOmics 使用 IAM 服務連結角色,在您的 VPC 中建立和管理彈性網路介面 ENIs)。當您建立第一個 VPC 組態時,會自動建立此角色。
服務連結角色詳細資訊
角色名稱:
AWSServiceRoleForHealthOmics受管政策:
AWSHealthOmicsServiceLinkedRolePolicy服務主體:
omics.amazonaws.com
授予的許可
服務連結角色授予 HealthOmics 下列 Amazon EC2 許可,以管理 VPC 中的網路介面:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "AllowEC2DescribeActions", "Effect": "Allow", "Action": [ "ec2:DescribeSubnets", "ec2:DescribeTags", "ec2:DescribeSecurityGroups", "ec2:DescribeSecurityGroupRules", "ec2:DescribeVpcs", "ec2:DescribeNetworkInterfaces", "ec2:DescribeAvailabilityZones" ], "Resource": "*" }, { "Sid": "AllowVpcGetActions", "Effect": "Allow", "Action": [ "ec2:GetSecurityGroupsForVpc" ], "Resource": "arn:aws:ec2:*:*:vpc/*" }, { "Sid": "AllowCreateNetworkInterfaceWithTag", "Effect": "Allow", "Action": "ec2:CreateNetworkInterface", "Resource": "arn:aws:ec2:*:*:network-interface/*", "Condition": { "StringEquals": { "aws:RequestTag/Service": "HealthOmics" } } }, { "Sid": "AllowCreateNetworkInterfaceSubnetSecurityGroup", "Effect": "Allow", "Action": "ec2:CreateNetworkInterface", "Resource": [ "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:security-group/*" ] }, { "Sid": "AllowCreateTags", "Effect": "Allow", "Action": "ec2:CreateTags", "Resource": "arn:aws:ec2:*:*:network-interface/*", "Condition": { "StringEquals": { "ec2:CreateAction": "CreateNetworkInterface" } } }, { "Sid": "AllowDeleteNetworkInterface", "Effect": "Allow", "Action": "ec2:DeleteNetworkInterface", "Resource": "arn:aws:ec2:*:*:network-interface/*", "Condition": { "StringEquals": { "aws:ResourceTag/Service": "HealthOmics" } } }, { "Sid": "AllowAssignUnassignPrivateIpAddresses", "Effect": "Allow", "Action": [ "ec2:AssignPrivateIpAddresses", "ec2:UnassignPrivateIpAddresses" ], "Resource": "arn:aws:ec2:*:*:network-interface/*", "Condition": { "StringEquals": { "aws:ResourceTag/Service": "HealthOmics" } } } ] }
建立 服務連結角色
當您使用 CreateConfiguration API 建立第一個 VPC 組態時,會自動建立服務連結角色。您必須擁有下列 IAM 許可:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "iam:CreateServiceLinkedRole", "Resource": "arn:aws:iam::*:role/aws-service-role/omics.amazonaws.com/AWSServiceRoleForHealthOmics", "Condition": { "StringEquals": { "iam:AWSServiceName": "omics.amazonaws.com" } } } ] }
刪除 服務連結角色
只有在刪除帳戶中的所有 VPC 組態後,您才能刪除服務連結角色。若要刪除角色:
aws iam delete-service-linked-role \ --role-name AWSServiceRoleForHealthOmics
如果您有作用中的 VPC 組態,刪除將會失敗,並顯示必須先刪除哪些組態資源的訊息。