AliyunServiceRolePolicyForElasticsearchCollector is the authorization policy dedicated to a service-linked role. The policy is automatically attached to a service role when the service role is created. Then, the service-linked role is authorized to access other cloud services. This policy is updated by the relevant Alibaba Cloud service. Do not attach this policy to a RAM identity other than a service-linked role.
Policy details
Type: service system policy
Creation time: 17:32:27 on March 11, 2026
Update time: 17:32:27 on March 11, 2026
Current version: v1
Policy content
{
"Version": "1",
"Statement": [
{
"Action": [
"oos:CancelExecution",
"oos:DeleteExecutions",
"oos:GenerateExecutionPolicy",
"oos:GetExecutionTemplate",
"oos:ListExecutionLogs",
"oos:ListExecutions",
"oos:ListTaskExecutions",
"oos:NotifyExecution",
"oos:StartExecution",
"oos:ListTagResources",
"oos:TagResources",
"oos:UntagResources",
"oos:CreateTemplate",
"oos:DeleteTemplate",
"oos:GetTemplate",
"oos:ListExecutionRiskyTasks",
"oos:ListTemplates",
"oos:UpdateTemplate"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"ecs:DescribeInstances",
"ecs:DescribeCloudAssistantStatus"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"cs:GetUserConfig",
"cs:GetClusters",
"cs:GetClusterById",
"cs:DescribeClusterInnerServiceKubeconfig",
"cs:RevokeClusterInnerServiceKubeconfig"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "collector.elasticsearch.aliyuncs.com"
}
}
},
{
"Effect": "Allow",
"Action": "ram:PassRole",
"Resource": "acs:ram:*:*:role/aliyunoosaccessingecs4esrole",
"Condition": {
"StringEquals": {
"acs:Service": "oos.aliyuncs.com"
}
}
}
]
}