AWSAWS 平行運算服務的 受管政策 - AWS PCS

本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。

AWSAWS 平行運算服務的 受管政策

AWS 受管政策是由 AWS AWS 受管政策建立和管理的獨立政策旨在為許多常見使用案例提供許可,以便您可以開始將許可指派給使用者、群組和角色。

請記住, AWS 受管政策可能不會授予特定使用案例的最低權限許可,因為這些許可可供所有 AWS 客戶使用。我們建議您定義使用案例專屬的客戶管理政策,以便進一步減少許可。

您無法變更 AWS 受管政策中定義的許可。如果 AWS 更新受管政策中 AWS 定義的許可,則更新會影響政策連接的所有主體身分 (使用者、群組和角色)。 AWS 最有可能在 AWS 服務 啟動新的 或新的 API 操作可用於現有 服務時更新受 AWS 管政策。

如需詳細資訊,請參閱 IAM 使用者指南中的 AWS 受管政策

AWS 受管政策: AWSPCSServiceRolePolicy

您無法將 AWSPCSServiceRolePolicy 連接至 IAM 實體。此政策會連接至服務連結角色,讓 AWS PCS 代表您執行動作。如需詳細資訊,請參閱AWS PCS 的服務連結角色

許可詳細資訊

此政策包含以下許可。

  • ec2 – 允許 AWS PCS 建立和管理 Amazon EC2 資源。

  • iam – 允許 AWS PCS 為 Amazon EC2 機群建立服務連結角色,並將角色傳遞至 Amazon EC2。

  • cloudwatch – 允許 AWS PCS 將服務指標發佈至 Amazon CloudWatch。

  • secretsmanager – 允許 AWS PCS 管理 for AWS PCS 叢集資源的秘密。

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "PermissionsToCreatePCSNetworkInterfaces", "Effect" : "Allow", "Action" : [ "ec2:CreateNetworkInterface" ], "Resource" : "arn:aws:ec2:*:*:network-interface/*", "Condition" : { "Null" : { "aws:RequestTag/AWSPCSManaged" : "false" } } }, { "Sid" : "PermissionsToCreatePCSNetworkInterfacesInSubnet", "Effect" : "Allow", "Action" : [ "ec2:CreateNetworkInterface" ], "Resource" : [ "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:security-group/*" ] }, { "Sid" : "PermissionsToManagePCSNetworkInterfaces", "Effect" : "Allow", "Action" : [ "ec2:DeleteNetworkInterface", "ec2:CreateNetworkInterfacePermission" ], "Resource" : "arn:aws:ec2:*:*:network-interface/*", "Condition" : { "Null" : { "aws:ResourceTag/AWSPCSManaged" : "false" } } }, { "Sid" : "PermissionsToDescribePCSResources", "Effect" : "Allow", "Action" : [ "ec2:DescribeSubnets", "ec2:DescribeVpcs", "ec2:DescribeNetworkInterfaces", "ec2:DescribeLaunchTemplates", "ec2:DescribeLaunchTemplateVersions", "ec2:DescribeInstances", "ec2:DescribeInstanceTypes", "ec2:DescribeInstanceStatus", "ec2:DescribeInstanceAttribute", "ec2:DescribeSecurityGroups", "ec2:DescribeKeyPairs", "ec2:DescribeImages", "ec2:DescribeImageAttribute" ], "Resource" : "*" }, { "Sid" : "PermissionsToCreatePCSLaunchTemplates", "Effect" : "Allow", "Action" : [ "ec2:CreateLaunchTemplate" ], "Resource" : "arn:aws:ec2:*:*:launch-template/*", "Condition" : { "Null" : { "aws:RequestTag/AWSPCSManaged" : "false" } } }, { "Sid" : "PermissionsToManagePCSLaunchTemplates", "Effect" : "Allow", "Action" : [ "ec2:DeleteLaunchTemplate", "ec2:DeleteLaunchTemplateVersions", "ec2:CreateLaunchTemplateVersion" ], "Resource" : "arn:aws:ec2:*:*:launch-template/*", "Condition" : { "Null" : { "aws:ResourceTag/AWSPCSManaged" : "false" } } }, { "Sid" : "PermissionsToTerminatePCSManagedInstances", "Effect" : "Allow", "Action" : [ "ec2:TerminateInstances" ], "Resource" : "arn:aws:ec2:*:*:instance/*", "Condition" : { "Null" : { "aws:ResourceTag/AWSPCSManaged" : "false" } } }, { "Sid" : "PermissionsToPassRoleToEC2", "Effect" : "Allow", "Action" : "iam:PassRole", "Resource" : [ "arn:aws:iam::*:role/*/AWSPCS*", "arn:aws:iam::*:role/AWSPCS*", "arn:aws:iam::*:role/aws-pcs/*", "arn:aws:iam::*:role/*/aws-pcs/*" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "ec2.amazonaws.com" ] } } }, { "Sid" : "PermissionsToControlClusterInstanceAttributes", "Effect" : "Allow", "Action" : [ "ec2:RunInstances", "ec2:CreateFleet" ], "Resource" : [ "arn:aws:ec2:*::image/*", "arn:aws:ec2:*::snapshot/*", "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:network-interface/*", "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*:*:volume/*", "arn:aws:ec2:*:*:key-pair/*", "arn:aws:ec2:*:*:launch-template/*", "arn:aws:ec2:*:*:placement-group/*", "arn:aws:ec2:*:*:capacity-reservation/*", "arn:aws:resource-groups:*:*:group/*", "arn:aws:ec2:*:*:fleet/*", "arn:aws:ec2:*:*:spot-instances-request/*" ] }, { "Sid" : "PermissionsToProvisionClusterInstances", "Effect" : "Allow", "Action" : [ "ec2:RunInstances", "ec2:CreateFleet" ], "Resource" : [ "arn:aws:ec2:*:*:instance/*" ], "Condition" : { "Null" : { "aws:RequestTag/AWSPCSManaged" : "false" } } }, { "Sid" : "PermissionsToTagPCSResources", "Effect" : "Allow", "Action" : [ "ec2:CreateTags" ], "Resource" : [ "*" ], "Condition" : { "StringEquals" : { "ec2:CreateAction" : [ "RunInstances", "CreateLaunchTemplate", "CreateFleet", "CreateNetworkInterface" ] } } }, { "Sid" : "PermissionsToPublishMetrics", "Effect" : "Allow", "Action" : "cloudwatch:PutMetricData", "Resource" : "*", "Condition" : { "StringEquals" : { "cloudwatch:namespace" : "AWS/PCS" } } }, { "Sid" : "PermissionsToManageSecret", "Effect" : "Allow", "Action" : [ "secretsmanager:DescribeSecret", "secretsmanager:GetSecretValue", "secretsmanager:PutSecretValue", "secretsmanager:UpdateSecretVersionStage", "secretsmanager:DeleteSecret" ], "Resource" : "arn:aws:secretsmanager:*:*:secret:pcs!*", "Condition" : { "StringEquals" : { "secretsmanager:ResourceTag/aws:secretsmanager:owningService" : "pcs", "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } } ] }

AWS 受管政策的AWS PCS 更新

檢視自此服務開始追蹤這些變更以來,受 AWS 管政策 for AWS PCS 的更新詳細資訊。如需此頁面變更的自動提醒,請訂閱 RSS 文件歷史記錄頁面上的 AWS PCS 摘要。

變更 描述 日期

已更新本文件中的 JSON

更正本文件中的 JSON 以包含 "arn:aws:ec2:*:*:spot-instances-request/*"

2024 年 9 月 5 日

AWS PCS 已開始追蹤變更

AWS PCS 開始追蹤其 AWS 受管政策的變更。

2024 年 8 月 28 日