All Products
Search
Document Center

TSDB Service Linked Role

Last Updated: Aug 18, 2020

Background information

To implement some features of TSDB for InfluxDB®, TSDB for InfluxDB® may need to be authorized to access other cloud services. The AliyunServiceRoleForTSDB service linked role is provided for TSDB for InfluxDB® to complete the authorization. For more information about service linked roles, see Service linked roles.

Scenarios

TSDB for InfluxDB® needs to access the resources of Elastic Compute Service (ECS), ApsaraDB for MongoDB, and ApsaraDB for Redis.

AliyunServiceRoleForTSDB overview

The name of the service linked role is AliyunServiceRoleForTSDB

The service linked role is attached with the AliyunServiceRolePolicyForTSDB permission policy.

The permissions specified by the permission policy allow TSDB for InfluxDB® to access the data that is stored in your ECS, ApsaraDB for MongoDB, and ApsaraDB for Redis instances.

If you have the permissions that are specified by the permission policy, you can perform the following operations:

  • Manage elastic network interfaces (ENIs) and security groups. You can enable two-way access between instances that are connected to the same virtual private cloud (VPC).
  • Monitor ApsaraDB for MongoDB and ApsaraDB for Redis instances by collecting instance data.
  1. {
  2. "Version": "1",
  3. "Statement": [
  4. {
  5. "Action": [
  6. "ecs:CreateNetworkInterface",
  7. "ecs:DescribeNetworkInterfaces",
  8. "ecs:DeleteNetworkINterface",
  9. "ecs:AttachNetworkInterface",
  10. "ecs:DetachNetworkInterface",
  11. "ecs:CreateNetworkInterfacePermission",
  12. "ecs:DescribeNetworkInterfacePermissions",
  13. "ecs:DeleteNetworkInterfacePermission",
  14. "ecs:CreateSecurityGroup",
  15. "ecs:DescirbeSecurityGroups",
  16. "ecs:DescribeSecurityGroupAttribute",
  17. "ecs:DeleteSecurityGroup",
  18. "ecs:AuthorizeSecurityGroup",
  19. "ecs:AuthorizeSecurityGroupEgress",
  20. "ecs:RevokeSecurityGroup",
  21. "ecs:RevokeSecurityGroupEgress"
  22. ],
  23. "Resource": "*",
  24. "Effect": "Allow"
  25. },
  26. {
  27. "Action": [
  28. "dds:DescribeDBInstances",
  29. "dds:DescribeDBInstanceAttribute"
  30. ],
  31. "Resource": "*",
  32. "Effect": "Allow"
  33. },
  34. {
  35. "Action": [
  36. "kvstore:DescribeRegions",
  37. "kvstore:DescribeInstances",
  38. "kvstore:DescribeInstanceAttribute"
  39. ],
  40. "Resource": "*",
  41. "Effect": "Allow"
  42. },
  43. {
  44. "Action": "ram:DeleteServiceLinkedRole",
  45. "Resource": "*",
  46. "Effect": "Allow",
  47. "Condition": {
  48. "StringEquals": {
  49. "ram:ServiceName": "hitsdb.aliyuncs.com"
  50. }
  51. }
  52. }
  53. ]
  54. }

Delete the service linked role

Before you delete the AliyunServiceRoleForTSDB service linked role, make sure that the role is not assigned to the instances managed by your Alibaba Cloud account. For more information, see Delete a service linked role.

Grant a RAM user the required permissions to create a service linked role

  1. {
  2. "Action": "ram:CreateServiceLinkedRole",
  3. "Resource": "*",
  4. "Effect": "Allow",
  5. "Condition": {
  6. "StringEquals": {
  7. "ram:ServiceName": "hitsdb.aliyuncs.com"
  8. }
  9. }
  10. }