All Products
Search
Document Center

Container Service for Kubernetes:ACK roles

Last Updated:Mar 01, 2026

When you activate Container Service for Kubernetes (ACK), you must assign RAM roles to ACK. ACK assumes these roles to access other Alibaba Cloud services such as Elastic Compute Service (ECS), Object Storage Service (OSS), File Storage NAS (NAS), and Server Load Balancer (SLB) on your behalf. These roles enable ACK to create clusters, manage infrastructure, and store log files.

ACK uses two categories of roles:

  • Quick authorization roles: 12 roles assigned through RAM Quick Authorization when you first activate ACK. These roles cover cluster management, networking, storage, monitoring, and logging.

  • Optional roles: 9 roles that you assign manually for specific features such as auto scaling, backup, or edge computing.

Quick authorization roles

The following roles are assigned to ACK through RAM Quick Authorization when you use ACK for the first time.

Cluster management roles

RoleDescriptionPolicy details
AliyunCSDefaultRoleACK assumes this role to access your resources in other cloud services when ACK manages clusters. These cloud services include ECS, Virtual Private Cloud (VPC), SLB, Resource Orchestration Service (ROS), and Auto Scaling.AliyunCSDefaultRolePolicy
AliyunCSManagedKubernetesRoleAn ACK managed cluster or ACK Edge cluster assumes this role to access other cloud services such as ECS, VPC, SLB, and Container Registry.AliyunCSManagedKubernetesRolePolicy
AliyunCSServerlessKubernetesRoleAn ACK Edge cluster or ACK Serverless cluster assumes this role to access your resources in other cloud services such as ECS, VPC, SLB, and Private Zone.AliyunCSServerlessKubernetesRolePolicy

Networking role

RoleDescriptionPolicy details
AliyunCSManagedNetworkRoleThe network component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in other cloud services such as ECS and VPC.AliyunCSManagedNetworkRolePolicy

Storage roles

RoleDescriptionPolicy details
AliyunCSManagedCsiRoleThe storage component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in other cloud services such as ECS, NAS, and OSS.AliyunCSManagedCsiRolePolicy
AliyunCSManagedCsiProvisionerRoleThe storage component (csi-provisioner) of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in ECS, NAS, and OSS.AliyunCSManagedCsiProvisionerRolePolicy
AliyunCSManagedCsiPluginRoleThe CSI storage component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in ECS.AliyunCSManagedCsiPluginRolePolicy

Monitoring and logging roles

RoleDescriptionPolicy details
AliyunCSKubernetesAuditRoleThe audit feature of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in Simple Log Service (SLS).AliyunCSKubernetesAuditRolePolicy
AliyunCSManagedCmsRoleThe monitoring component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in other cloud services such as CloudMonitor and SLS.AliyunCSManagedCmsRolePolicy
AliyunCSManagedLogRoleThe log component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in SLS.AliyunCSManagedLogRolePolicy
AliyunCSManagedArmsRoleThe Application Real-Time Monitoring Service (ARMS) component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in ARMS.AliyunCSManagedArmsRolePolicy

Diagnostics role

RoleDescriptionPolicy details
AliyunCISDefaultRoleACK Container Intelligence Service assumes this role to access your resources in other cloud services such as ECS, VPC, and SLB to provide diagnostic and inspection services.AliyunCISDefaultRolePolicy

Optional roles

Important

To assign optional roles, you must use an Alibaba Cloud account or a RAM user with administrator permissions.

RoleDescriptionPolicy details
AliyunCSManagedAcrRoleThe password-free image pulling plug-in of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in Container Registry.AliyunCSManagedAcrRolePolicy
AliyunCSManagedNlcRoleThe managed node pool controller of an ACK managed cluster or ACK Edge cluster assumes this role to access your node pool resources in ECS and ACK.AliyunCSManagedNlcRolePolicy
AliyunCSManagedAutoScalerRoleThe auto scaling component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in Auto Scaling and ECS.AliyunCSManagedAutoScalerRolePolicy
AliyunCSManagedSecurityRoleThe disk encryption component and the credential management component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assume this role to access your resources in Key Management Service (KMS).AliyunCSManagedSecurityRolePolicy
AliyunCSManagedCostRoleThe cost analysis component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in API, ECS, and Elastic Container Instance.AliyunCSManagedCostRolePolicy
AliyunCSManagedNimitzRoleThe network component of an ACK Lingjun cluster assumes this role to access your resources in Lingjun AI Computing Service.AliyunCSManagedNimitzRolePolicy
AliyunCSManagedBackupRestoreRoleThe backup center component of an ACK managed cluster, ACK Edge cluster, or ACK Serverless cluster assumes this role to access your resources in Cloud Backup service and OSS.AliyunCSManagedBackupRestoreRolePolicy
AliyunCSManagedEdgeRoleThe control component of an ACK Edge cluster assumes this role to access your resources in Smart Access Gateway (SAG), VPC, and Cloud Enterprise Network (CEN).AliyunCSManagedEdgeRolePolicy
AliyunOOSLifecycleHook4CSRoleCloudOps Orchestration Service (OOS) assumes this role to access your resources in ACK, ECS, and PolarDB.See the following inline policy.

AliyunOOSLifecycleHook4CSRole inline policy

{
    "Version": "1",
    "Statement": [
        {
            "Action": [
                "cs:DeleteClusterNodes",
                "cs:DescribeClusterNodes",
                "cs:DescribeTaskInfo"
            ],
            "Resource": [
                "*"
            ],
            "Effect": "Allow"
        },
        {
            "Action": [
                "ess:CompleteLifecycleAction"
            ],
            "Resource": [
                "*"
            ],
            "Effect": "Allow"
        },
        {
            "Action": [
                "polardb:DescribeDBClusterAccessWhitelist",
                "polardb:ModifyDBClusterAccessWhitelist"
            ],
            "Resource": [
                "*"
            ],
            "Effect": "Allow"
        },
        {
            "Action": [
                "ecs:DescribeInstances"
            ],
            "Resource": [
                "*"
            ],
            "Effect": "Allow"
        }
    ]
}