This topic describes how to grant a RAM user the permissions on the Tracing Analysis feature by attaching a custom policy to the RAM user.

Prerequisites

  • You have a basic knowledge of policy elements, structure, and syntax before you create a custom policy. For more information, see Policy elements.
  • Make sure that the following system policies are not attached to the RAM user: AliyunTracingAnalysisFull-Access and AliyunTracingAnalysisReadOnlyAccess policies.
    Important If you attach a system policy of Tracing Analysis to a RAM user, you cannot attach a custom policy to the RAM user at the same time.

Background information

The system policies provided by Tracing Analysis are coarse-grained. If the system policies cannot meet your requirements, you can create custom policies to implement fine-grained access control. For example, if you need to grant the permissions on a specific application to a RAM user, you must create a custom policy.

Step 1: Create a custom policy

  1. Log on to the RAM console by using your Alibaba Cloud account.
  2. In the left-side navigation pane, choose Permissions > Policies.
  3. On the Policies page, click Create Policy.
  4. On the Create Policy page, click the JSON tab. Configure a permission policy in the editor.
    For more information, see Policy elements.
    • Example: Create a custom policy that grants the read-only permissions on all applications in the China (Hangzhou) region.
      {
          "Version": "1",
          "Statement": [
              {
                  "Action": "xtrace:ReadXtraceApp",
                  "Resource": "acs:xtrace:cn-hangzhou:*:xtrace/*",
                  "Effect": "Allow"
              },
              {
                  "Action": "xtrace:Describe*",
                  "Resource": "*",
                  "Effect": "Allow"
              }
          ]
      }
    • Example: Create a custom policy that grants the read-only permissions on the applications whose names start with demo in the China (Hangzhou) region.
      {
          "Version": "1",
          "Statement": [
              {
                  "Action": "xtrace:ReadXtraceApp",
                  "Resource": "acs:xtrace:cn-hangzhou:*:xtrace/demo*",
                  "Effect": "Allow"
              },
              {
                  "Action": "xtrace:Describe*",
                  "Resource": "*",
                  "Effect": "Allow"
              }
          ]
      }
  5. Click Next to edit policy information.
  6. Specify the Name and Description fields.
  7. Click OK.

Step 2: Attach the custom policy to a RAM user

  1. Log on to the RAM console by using your Alibaba Cloud account.
  2. In the left-side navigation pane, choose Identities > Users.
  3. On the Users page, find the RAM user to which you want to attach the custom policy, and click Add Permissions in the Actions column.
  4. In the Add Permissions panel, grant permissions to the RAM user.
    1. Select the authorization scope.
      • Alibaba Cloud Account: The authorization takes effect on the current Alibaba Cloud account.
      • Specific Resource Group: The authorization takes effect in a specific resource group.
        Note If you select Specific Resource Group for Authorized Scope, make sure that the required cloud service supports resource groups. For more information, see Services that work with Resource Group.
    2. Specify the principal.
      The principal is the RAM user to which you want to grant permissions. By default, the current RAM user is specified. You can also specify another RAM user.
    3. Select policies.
      Note You can attach a maximum of five policies to a RAM user at a time. If you need to attach more than five policies to a RAM user, perform the operation multiple times.
  5. Click OK.
  6. Click Complete.

Policy elements

Effect

Specifies whether a statement result is an explicit allow or an explicit deny. Valid values: Allow and Deny.

Action

ActionPermission
xtrace:DescribeThe coarse-grained read-only permissions of Tracing Analysis and coarse-grained read permissions. Only the RAM users with this permission can log on to the Tracing Analysis console.
xtrace:ReadXtraceAppThe read-only permissions of Tracing Analysis. You can use this permission to view information such as the applications, application details, and details of API calls. You can also use this permission to control RAM permissions on applications and regions.
xtrace:SaveXtraceAppConfigThe permissions to save application configurations of Tracing Analysis.
xtrace:DeleteXtraceAppThe permissions to delete applications from Tracing Analysis.

Resources

Specifies the resources on which the policy takes effect.

Sample statement:

"Resource": [
     "acs:xtrace:<regionid>:*:xtrace/<appname>"
 ]
  • Replace <regionid> with the specified region ID. If you want to grant the permissions on resources in all regions, replace <regionid> with *.
  • Replace <appname> with the specified application name. If you want to grant permissions on all applications, replace <appname> with *. If you want to specify applications that have the same name prefix, replace <appname> with Name prefix*. Example: k8s*.