Permission Dependency of the CCE Console
Some CCE permissions policies depend on the policies of other cloud services. To view or use other cloud resources on the CCE console, enable the access control feature of IAM and assign dependency policies for the other cloud services.
- Dependency policies are assigned based on the CCE FullAccess or CCE ReadOnlyAccess policy you configure. For details, see Granting Cluster Permissions to an IAM User.
- Only users and user groups with namespace permissions can gain the view access to resources in clusters.
- If a user is granted the view access to all namespaces of a cluster, the user can view all namespace resources (except secrets) in the cluster. To view secrets in the cluster, the user must gain the admin or edit role in all namespaces of the cluster.
- The view role within a single namespace allows users to view resources only in the specified namespace.
Dependency Policy Configuration
To grant an IAM user the permissions to view or use resources of other cloud services on the CCE console, you must first grant the CCE Administrator, CCE FullAccess, or CCE ReadOnlyAccess policy to the user group to which the user belongs and then grant the dependency policies listed in Table 1 to the user. These dependency policies will allow the IAM user to access resources of other cloud services.
Enterprise projects can group and manage resources across different projects of an enterprise. Resources are thereby isolated. IAM allows you to implement fine-grained authorization. It is strongly recommended that you use IAM for permissions management.
If you use an enterprise project to set permissions for IAM users, the following restrictions apply:
- On the CCE console, enterprise projects cannot call the API used to obtain AOM monitoring data for cluster monitoring. Therefore, IAM users in these enterprise projects cannot query monitoring data.
- On the CCE console, enterprise projects cannot call the API to query the key pair created during node creation. Therefore, IAM users in these enterprise projects cannot use the key pair login mode. Only the password login mode is supported.
- On the CCE console, enterprise projects are not supported during template creation. Therefore, enterprise project sub-users cannot use template management.
- On the CCE console, the EVS disk query API does not support enterprise projects. Therefore, enterprise project IAM users cannot use existing EVS disks to create PVs. To use this function, add the fine-grained permissions such as evs:volumes:get to the IAM users.
CCE supports fine-grained permissions configuration, but has the following restrictions:
- AOM does not support resource-level monitoring. After operation permissions on specific resources are configured using IAM's fine-grained cluster resource management function, IAM users can view cluster monitoring information on the Dashboard page of the CCE console, but cannot view the data on non-fine-grained metrics.
Console Function |
Dependent Service |
Role or Policy Required |
---|---|---|
Cluster overview |
Application Operations Management (AOM) |
|
Workload management |
Elastic Load Balance (ELB) Application Performance Management (APM) Application Operations Management (AOM) NAT Gateway Object Storage Service (OBS) Scalable File Service (SFS) |
Except in the following cases, the user does not require any additional role to create workloads.
|
Cluster management |
Application Operations Management (AOM) Billing Center (BSS) |
|
Node management |
Elastic Cloud Server (ECS) |
If the permission assigned to an IAM user is CCE Administrator, creating or deleting a node requires the ECS FullAccess or ECS Administrator policy and the VPC Administrator policy. |
Service |
Elastic Load Balance (ELB) NAT Gateway |
Except in the following cases, the user does not require any additional role to create a Service.
|
Storage |
Object Storage Service (OBS) Scalable File Service (SFS) SFS Turbo |
The CCE Administrator role is required for importing storage devices. |
Namespace management |
/ |
/ |
Chart management |
/ |
Cloud accounts and the IAM users with CCE Administrator assigned can use this function. |
Add-ons |
/ |
Cloud accounts and the IAM users with CCE Administrator, CCE FullAccess, or CCE ReadOnlyAccess assigned can use this function. |
Permissions management |
/ |
|
ConfigMaps and Secrets |
/ |
|
Help center |
/ |
/ |
Switching to other related services |
Software Repository for Container (SWR) Log Tank Service (LTS) Multi-Cloud Container Platform (MCP) |
The CCE console provides links to other related services. To view or use these services, an IAM user must be assigned required permissions for the services. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot