What Can I Do If the System Displays a Message Indicating Insufficient Permissions When I Click Configure on the Server Monitoring Page?
Symptoms
When you click Configure on the Server Monitoring page as an IAM user account, a message is displayed, indicating that you do not have the required permissions. In this case, the administrator needs to grant the agency query permissions for the user account.
Procedure
- Add a custom policy for querying the agencies.
- Use the Huawei Cloud account to log in to the Huawei Cloud management console.
- Ensure that the Huawei Cloud account has been granted the Agent permissions for the region. On the Cloud Eye console, choose Server Monitoring > Elastic Cloud Server. Check whether Configure is displayed above the ECS list.
- If it is not, the Agent permission has been granted for the region.
- If it is, click Configure to enable the Agent permissions for the region.
- On the management console, hover your mouse over the username in the upper right corner, and choose Identity and Access Management from the drop-down list.
- In the navigation pane on the left, choose Permissions. In the upper right corner of the displayed page, click Create Custom Policy.
- Enter the following information to create a policy:
- Policy Name: Specify a custom policy name.
- Scope: Select Global services.
- Policy View: Select JSON.
- Policy Content: Copy the following code and paste it to the text box.
{ "Version": "1.1", "Statement": [ { "Action": [ "iam:roles:listRoles", "iam:permissions:listRolesForAgencyOnProject", "iam:agencies:listAgencies", "iam:agencies:getAgency", "iam:agencies:createAgency", "iam:permissions:grantRoleToAgency", "iam:permissions:grantRoleToAgencyOnProject", "iam:permissions:revokeRoleFromAgencyOnProject", "iam:permissions:grantRoleToAgencyOnDomain", "iam:permissions:revokeRoleFromAgencyOnProject", "iam:permissions:revokeRoleFromAgency", "iam:permissions:revokeRoleFromAgencyOnDomain" ], "Effect": "Allow" } ] }
- (Optional) Description: Provide supplementary information about the policy.
- Confirm the policy content and click OK to save the policy.
Figure 1 Create Custom Policy
- Assign permissions to the user account.
- On the IAM console, in the navigation pane on the left, choose User Groups, locate the row containing the user group the user account belongs to, and choose More > Manage Permissions in the Operation column.
- Click Assign Permissions. On the page displayed, search for the created custom policy, select it, and click OK.
Figure 2 Assign Permissions
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.