Updated on 2025-11-06 GMT+08:00

Custom Agencies

CCE clusters rely on various cloud services in areas like compute, storage, networking, and monitoring to function properly. To access these cloud resources, CCE clusters need authorization, which is handled through agencies. By default, CCE uses system agencies to generate temporary access credentials. These credentials are used internally by the clusters to access cloud services. You can also configure a custom agency for your cluster. Once set, the cluster will use this custom agency to generate its temporary access credentials.

  • Custom agencies are supported only in clusters of v1.27 or later.
  • Custom agencies are supported only in CCE standard clusters.
  • Custom agencies do not support IAM 5.0 trust agencies.

Prerequisites

  • You need to create a custom agency of the cloud service type on the Agencies page of the IAM console and authorize it to CCE. For details, see Creating an Agency and Assigning Permissions.
  • You need to authorize the created custom agency. CCE has preset the permissions required for cluster running as system policies. Some of them are mandatory, and the rest can be granted on demand based on what cluster functions you will use. For details, see System Policies.

    Ensure that you have granted the required permissions to the created agency, or some functions of the cluster may be unavailable.

Configuring a Custom Agency During Cluster Creation

A custom agency can be configured during cluster creation only using APIs. For details, see Making an API Request.

Call the API for creating a cluster and configure a custom agency.

The request body is as follows:

{
	"kind": "Cluster",
	"apiVersion": "v3",
	"metadata": {
		"name": "cce-cluster",
	},
	"spec": {
		"agencyName": "custom_agency_name",
		"category": "CCE",
		. . .
	}
}

custom_agency_name is the name of the custom agency created on IAM.

Configuring a Custom Agency for a Running Cluster

Custom agencies can be configured for running clusters only using APIs. For details, see Making an API Request.

Call the API for updating a specified cluster and configure a custom agency.

The request body is as follows:

{
	"spec": {
		"agencyName": "custom_agency_name"
	}
}

custom_agency_name is the name of the custom agency created on IAM.

  • If you use a custom agency in a cluster, do not delete the agency or allow it to expire, as this may cause certain cluster functions to become unavailable.
  • After modifying the custom agency used in a cluster, allow some time for the modifications to apply.

System Policies

System Policy

Description

Authorization Required

CCEClusterManagedPolicy

Permissions for using the basic functions of a CCE cluster

Yes

CCEClusterNodePolicy

Permissions for using the basic functions of worker nodes in a CCE cluster

Yes

CCEClusterTurboNetworkingPolicy

Permissions for using Cloud Native 2.0 networks in a CCE cluster

Required if the Cloud Native 2.0 network is used for a cluster

CCEClusterVPCNetworkingPolicy

Permissions for using VPC networks in a CCE cluster

Required if the VPC network is used for a cluster

CCEClusterLoadBalancingPolicy

Permissions for using ELB capabilities in a CCE cluster

No

CCEClusterResourceOrderPolicy

Permissions for automatically subscribing to yearly/monthly resources in a CCE cluster

No

CCEClusterCSIEVSPolicy

Permissions for using EVS volumes in a CCE cluster

No

CCEClusterCSIOBSPolicy

Permissions for using OBS volumes in a CCE cluster

No (OBS is a global service. To use OBS, grant all project service permissions.)

CCEClusterCSISFSGeneralPolicy

Permissions for using SFS 3.0 volumes in a CCE cluster

No (SFS 3.0 is a global service. To use SFS 3.0, grant all project service permissions.)

CCEClusterCSISFSTurboPolicy

Permissions for using SFS Turbo volumes in a CCE cluster

No

CCEClusterGEIPPolicy

Permissions for binding global EIPs to load balancers in a CCE cluster

No (Global EIP is a global service. To use global EIPs, grant all project service permissions.)

CCEClusterKMSPolicy

Permissions for mounting encrypted credentials located outside the cluster to containers

No

CCEClusterLogPolicy

Permissions for using log collection in a CCE cluster

No

CCEClusterNodeAutoscalingPolicy

Permissions for using node auto scaling in a CCE cluster

No

CCEClusterVirtualKubeletPolicy

Permissions for using CCE Cloud Bursting Engine for CCI in a CCE cluster

No