Use IAM to implement fine-grained permission control over your MRS. With IAM, you can:
If your cloud account does not require IAM users, skip this section.
This section describes the procedure for granting permissions (see Figure 1).
Learn about the permissions. For the permissions of other services, see Permission Description.
Create a user group on the IAM console, and assign MRS permissions to the group.
Create a user on the IAM console and add the user to the group created in 1. Create a user group and assign permissions to it.
Log in to the console by using the user created, and verify that the user has the granted permissions.
By default, new IAM users do not have any permissions. To assign permissions to a user, add the user to one or more groups and assign permissions policies or roles to these groups. The user then inherits permissions from the groups it is a member of and can perform specified operations on cloud services based on the permissions.
MRS is a project-level service deployed and accessed in specific physical regions. To assign permissions to a user group, specify Scope as Region-specific projects and select projects in the corresponding region for the permissions to take effect. If All projects is selected, the permissions will take effect for the user group in all region-specific projects. When accessing MRS, the users need to switch to a region where they have been authorized to use the MRS service.
You can grant users permissions by using roles and policies.
Policy |
Description |
Type |
---|---|---|
MRS FullAccess |
Administrator permissions for MRS. Users granted these permissions can operate and use all MRS resources. |
Fine-grained policy |
MRS CommonOperations |
Common user permissions for MRS. Users granted these permissions can use MRS but cannot add or delete resources. |
Fine-grained policy |
MRS ReadOnlyAccess |
Read-only permission for MRS. Users granted these permissions can only view MRS resources. |
Fine-grained policy |
MRS Administrator |
Permissions:
|
RBAC policy |
Table 2 lists the common operations supported by each system-defined policy or role of MRS. Select the policies or roles as required.
Operation |
MRS FullAccess |
MRS CommonOperations |
MRS ReadOnlyAccess |
MRS Administrator |
---|---|---|---|---|
Creating a cluster |
√ |
x |
x |
√ |
Resizing a cluster |
√ |
x |
x |
√ |
Upgrading node specifications |
√ |
x |
x |
√ |
Deleting a cluster |
√ |
x |
x |
√ |
Querying cluster details |
√ |
√ |
√ |
√ |
Querying a cluster list |
√ |
√ |
√ |
√ |
Configuring an auto scaling rule |
√ |
x |
x |
√ |
Querying a host list |
√ |
√ |
√ |
√ |
Querying operation logs |
√ |
√ |
√ |
√ |
Creating and executing a job |
√ |
√ |
x |
√ |
Stopping a job |
√ |
√ |
x |
√ |
Deleting a single job |
√ |
√ |
x |
√ |
Deleting jobs in batches |
√ |
√ |
x |
√ |
Querying job details |
√ |
√ |
√ |
√ |
Querying a job list |
√ |
√ |
√ |
√ |
Creating a folder |
√ |
√ |
x |
√ |
Deleting a file |
√ |
√ |
x |
√ |
Querying a file list |
√ |
√ |
√ |
√ |
Operating cluster tags in batches |
√ |
√ |
x |
√ |
Creating a single cluster tag |
√ |
√ |
x |
√ |
Deleting a single cluster tag |
√ |
√ |
x |
√ |
Querying a resource list by tag |
√ |
√ |
√ |
√ |
Querying cluster tags |
√ |
√ |
√ |
√ |
Accessing Manager |
√ |
√ |
x |
√ |
Querying a patch list |
√ |
√ |
√ |
√ |
Installing a patch |
√ |
√ |
x |
√ |
Uninstalling a patch |
√ |
√ |
x |
√ |
Authorizing O&M channels |
√ |
√ |
x |
√ |
Sharing O&M channel logs |
√ |
√ |
x |
√ |
Querying an alarm list |
√ |
√ |
√ |
√ |
Subscribing to alarm notification |
√ |
√ |
x |
√ |
Submitting an SQL statement |
√ |
√ |
x |
√ |
Querying SQL results |
√ |
√ |
x |
√ |
Canceling an SQL execution task |
√ |
√ |
x |
√ |