AliyunServiceRolePolicyForSearchPlat is the authorization policy dedicated to a service-linked role. The policy is automatically attached to a service role when the service role is created. Then, the service-linked role is authorized to access other cloud services. This policy is updated by the relevant Alibaba Cloud service. Do not attach this policy to a RAM identity other than a service-linked role.
Policy details
Type: service system policy
Creation time: 17:34:23 on July 21, 2025
Update time: 02:33:24 on November 20, 2025
Current version: v4
Policy content
{
"Version": "1",
"Statement": [
{
"Action": [
"vpc:DescribeVpcs",
"vpc:DescribeVpcAttribute",
"vpc:DescribeVSwitches",
"vpc:DescribeVSwitchAttributes"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"nas:DescribeFileSystems",
"nas:DescribeMountTargets",
"nas:CreateMountTarget",
"nas:ModifyMountTarget",
"nas:DescribeProtocolMountTarget"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"oss:ListObjects",
"oss:GetObject",
"oss:PutObject"
],
"Effect": "Allow",
"Resource": "*",
"Condition": {
"StringEquals": {
"oss:BucketTag/opensearch": [
"opensearch"
]
}
}
},
{
"Action": [
"ecs:CreateSecurityGroup",
"ecs:DeleteSecurityGroup",
"ecs:AuthorizeSecurityGroup"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"mns:CreateQueue",
"mns:DeleteQueue",
"mns:PutEventNotifications",
"mns:DeleteEventNotifications",
"mns:ReceiveMessage",
"mns:DeleteMessage"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"privatelink:CheckProductOpen",
"privatelink:OpenPrivateLinkService",
"privatelink:ListVpcEndpoints",
"privatelink:CreateVpcEndpoint",
"privatelink:DeleteVpcEndpoint",
"privatelink:GetVpcEndpointAttribute",
"privatelink:UpdateVpcEndpointAttribute",
"privatelink:ListVpcEndpointSecurityGroups",
"privatelink:AttachSecurityGroupToVpcEndpoint",
"privatelink:DetachSecurityGroupFromVpcEndpoint",
"privatelink:ListVpcEndpointZones",
"privatelink:AddZoneToVpcEndpoint",
"privatelink:RemoveZoneFromVpcEndpoint"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"rds:DescribeDBInstanceAttribute",
"rds:DescribeDBInstances",
"rds:DescribeDatabases",
"rds:DescribeDBInstanceIPArrayList",
"rds:DescribeAccounts",
"rds:DescribeAbnormalDBInstances",
"rds:ModifySecurityIps",
"rds:DescribeResourceUsage",
"rds:DescribeBinlogFiles",
"rds:DescribeBackups",
"rds:DescribeBackupPolicy",
"rds:DescribeBackupTasks",
"rds:ModifyBackupPolicy",
"rds:CheckRegionSupportBackupEncryption"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"es-serverless:GetApp",
"es-serverless:UpdateNetwork"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"elasticsearch:DescribeInstance",
"elasticsearch:ModifyWhiteIps"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": [
"dlf:ListCatalogs",
"dlf:GetCatalog",
"dlf:GetCatalogById",
"dlf:GetCatalogByInstanceId",
"dlf:ListDatabases",
"dlf:GetDatabase",
"dlf:ListTables",
"dlf:GetTable",
"dlf:GetConfig",
"dlf:GetTableToken",
"dlf:GetTableSnapshot",
"dlf:ListTableNames",
"dlf:GetCatalogAccessInfo",
"dlf:GetDataToken",
"dlf:GetDataTokenByName",
"dlf:CheckPermissions",
"dlf:ListPermissions"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": "dlf-auth:ActOnBehalfOfAnotherUser",
"Effect": "Allow",
"Resource": "*"
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "searchplat.aliyuncs.com"
}
}
},
{
"Action": "ram:CreateServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "privatelink.aliyuncs.com"
}
}
}
]
}