The Operation Content and Result Delivery feature provided by Cloud Assistant allows you to deliver O&M task execution records to specified Object Storage Service (OSS) buckets or Log Service Logstores for persistent storage. AliyunServiceRoleForECSArchiving is the Resource Access Management (RAM) service-linked role provided by Cloud Assistant for this feature to obtain access permissions on resources of other Alibaba Cloud services.
Background information
A service-linked role is a role that is linked to a service and includes the permissions required to call other services. For example, the AliyunServiceRoleForECSArchiving service-linked role includes the access permissions on Log Service and OSS resources that are required for the Operation Content and Result Delivery feature to deliver Cloud Assistant task execution records. For more information about service-linked roles, see Service-linked roles.
Create the AliyunServiceRoleForECSArchiving role
When you use the Operation Content and Result Delivery feature, the system checks whether the AliyunServiceRoleForECSArchiving role exists. If the role does not exist, the system creates the role. The AliyunServiceRolePolicyForECSArchiving policy is attached to the AliyunServiceRoleForECSArchiving role. Cloud Assistant can assume the role to take on the permissions of the role.
{
"Version": "1",
"Statement": [
{
"Action": [
"oss:PutObject",
"oss:GetBucketInfo",
"log:GetProject",
"log:GetLogStore",
"log:CreateLogStore",
"log:PostLogStoreLogs",
"log:GetIndex",
"log:CreateIndex"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "archiving.ecs.aliyuncs.com"
}
}
}
]
}
Delete the AliyunServiceRoleForECSArchiving role
If the AliyunServiceRoleForECSArchiving role within your account is no longer needed, you can manually delete the role.
For more information about how to delete service-linked roles, see Delete the service-linked role AliyunServiceRoleForDAS.
FAQ
Why cannot the AliyunServiceRoleForECSArchiving role be automatically created when I use a RAM user?
{
"Version": "1",
"Statement": [
{
"Action": [
"ram:CreateServiceLinkedRole"
],
"Resource": "acs:ram:*:<account ID>:role/*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": [
"archiving.ecs.aliyuncs.com"
]
}
}
}
]
}