Resource Access Management (RAM) is a service provided by Alibaba Cloud to manage user identities and resource access permissions. You can use RAM to prevent RAM users from sharing the AccessKey pairs of your Alibaba Cloud account. You can also use RAM to grant minimum permissions to RAM users. RAM uses policies to define permissions.
This topic describes the elements, such as Action, Resource, and Condition, which are defined by SLS. You can use the elements to create policies in RAM. The code (RamCode) in RAM that is used to indicate SLS is log. You can grant permissions on SLS at the .
General structure of a policy
Policies can be stored as JSON files. The following code provides an example on the general structure of a policy:
{
"Version": "1",
"Statement": [
{
"Effect": "<Effect>",
"Action": "<Action>",
"Resource": "<Resource>",
"Condition": {
"<Condition_operator>": {
"<Condition_key>": [
"<Condition_value>"
]
}
}
}
]
}
- Effect: specifies the authorization effect. Valid values: Allow, Deny.
- Action: specifies one or more API operations that are allowed or denied. For more information, see the Action section of this topic.
- Resource: specifies one or more resources to which the policy applies. You can use an Alibaba Cloud Resource Name (ARN) to specify a resource. For more information, see the Resource section of this topic.
- Condition: specifies one or more conditions that are required for the policy to take effect. This is an optional field. For more information, see the Condition section of this topic.
- Condition_operator: specifies the conditional operators. Different types of conditions support different conditional operators. For more information, see Policy elements.
- Condition_key: specifies the condition keys.
- Condition_value: specifies the condition values.
Action
SLS defines the values that you can use in theAction
element of a policy statement. You can attach the policy to a RAM user or a RAM role so that the RAM user or the RAM role can perform a group of operations. You cannot authorize the RAM user or the RAM role to perform a specific operation in SLS. You can authorize the RAM user or the RAM role to perform only a group of operations at the service level. The following list describes the columns in the table:- Operation: a group of operations that you can authorize the RAM user or the RAM to perform.
- Access level: the access level of each operation. The levels are read, write, and list.
- Resource type: the type of the resource on which you can authorize the RAM user or the RAM role to perform the group of operations. You cannot grant permissions on this Alibaba Cloud service at the resource level. Therefore, you must grant permissions on all resources in this Alibaba Cloud service.
- Condition key: the condition keys that are defined by the Alibaba Cloud service. The Condition key column does not list the common condition keys that are defined by Alibaba Cloud. For more information about the common condition keys, see Generic Condition Keyword.
- Associated operation: other operations that the RAM user or the RAM role must have permissions to perform to complete the operation. To complete the operation, the RAM user or the RAM role must have the permissions to perform the associated operations.
Actions | Access level | Resource type | Condition key | Associated operation |
---|---|---|---|---|
log:CreateConfig | create | All Resources | log:TLSVersion | None |
log:ListConsumerGroup | get | All Resources | log:TLSVersion | None |
log:CreateIndex | create | All Resources | log:TLSVersion | None |
log:UpdateLogStore | update | All Resources | log:TLSVersion log:Encrypted | None |
log:UpdateLogtailPipelineConfig | update | All Resources | log:TLSVersion | None |
log:GetCursorOrData | get | All Resources | log:TLSVersion | None |
log:ChangeResourceGroup | update | All Resources | log:TLSVersion | None |
log:ListLogStores | get | All Resources | log:TLSVersion | None |
log:ConsumerGroupHeartBeat | none | All Resources | log:TLSVersion | None |
log:UpdateSavedSearch | update | All Resources | log:TLSVersion | None |
log:DeleteProject | delete | All Resources | log:TLSVersion | None |
log:UpdateProject | update | All Resources | log:TLSVersion | None |
log:ListProject | get | All Resources | log:TLSVersion | None |
log:ListSavedSearch | get | All Resources | log:TLSVersion | None |
log:GetIndex | get | All Resources | log:TLSVersion | None |
log:ListMachines | get | All Resources | log:TLSVersion | None |
log:ListConfig | list | All Resources | log:TLSVersion | None |
log:ListTagResources | get | All Resources | log:TLSVersion | None |
log:CreateLogStore | create | All Resources | log:TLSVersion log:Encrypted | None |
log:ListMachineGroup | get | All Resources | log:TLSVersion | None |
log:GetLogging | get | All Resources | log:TLSVersion | None |
log:GetAppliedConfigs | get | All Resources | log:TLSVersion | None |
log:UpdateConsumerGroup | update | All Resources | log:TLSVersion | None |
log:GetMachineGroup | get | All Resources | log:TLSVersion | None |
log:GetCursorOrData | get | All Resources | log:TLSVersion | None |
log:ListDomains | get | All Resources | log:TLSVersion | None |
log:ListShards | get | All Resources | log:TLSVersion | None |
log:CreateDashboard | create | All Resources | log:TLSVersion | None |
log:CreateSavedSearch | create | All Resources | log:TLSVersion | None |
log:UpdateDashboard | update | All Resources | log:TLSVersion | None |
log:CreateConsumerGroup | create | All Resources | log:TLSVersion | None |
log:GetConfig | get | All Resources | log:TLSVersion | None |
log:ListDashboard | list | All Resources | log:TLSVersion | None |
log:CreateLogging | create | All Resources | log:TLSVersion | None |
log:UpdateIndex | update | All Resources | log:TLSVersion | None |
log:GetProject | get | All Resources | log:TLSVersion | None |
log:GetAppliedMachineGroups | get | All Resources | log:TLSVersion | None |
log:UpdateConfig | update | All Resources | log:TLSVersion | None |
log:GetDashboard | get | All Resources | log:TLSVersion | None |
log:CreateMachineGroup | create | All Resources | log:TLSVersion | None |
log:CreateProject | create | All Resources | log:TLSVersion | None |
log:GetLogStoreMeteringMode | get | All Resources | None | None |
log:GetLogtailPipelineConfig | get | All Resources | log:TLSVersion | None |
log:GetLogStore | get | All Resources | log:TLSVersion | None |
log:ConsumerGroupUpdateCheckPoint | update | All Resources | log:TLSVersion | None |
Resource
Resource type | ARN |
---|
No data
Condition
SLS defines the values that you can use in the
Condition
element of a policy statement. The following table describes the values. The following table describes the service-specific condition keys. The common condition keys that are defined by Alibaba Cloud also apply to SLS. For more information about the common condition keys, see Generic Condition Keyword.The data type determines the conditional operators that you can use to compare the value in a request with the value in a policy statement. You must use conditional operators that are supported by the data type. Otherwise, you cannot compare the value in the request with the value in the policy statement. In this case, the authorization is invalid. For more information about the conditional operators that are supported by each data type, see Policy elements.
Condition key | Description | Data type |
---|---|---|
log:TLSVersion | Version of TLS | String |
log:Encrypted | Whether to specify encryption configuration when creating or modifying a Logstore | Boolean |