aws ec2流量限制_如何限制共享的AWS EC2帐户访问权限以查看和启动所有VM但仅停止某些VM

本文介绍了如何在AWS IAM管理中通过创建策略和用户组,限制用户访问权限。允许开发者查看并启动所有VM,但只能停止标记为'prod/dev'为'dev'的VM,以防止误操作生产环境。
摘要由CSDN通过智能技术生成

aws ec2流量限制

If a team with many accounts share and manages the virtual machines under that same AWS accounts, it is a common practice to limit AWS EC2 accounts’ access to view or start all VMs yet stop only certain VMs. For example, one account has 50 VMs tagged "prod" while 25 VMs tagged "dev". The developers should be able to start all the "prod" and "dev" VMs while they only be able to stop the "dev" VMs unless they have accesses to the "prod" VMs. These limitations can avoid accidentally shutting down production virtual machines.

如果拥有多个账户的团队在同一 AWS账户下共享和管理虚拟机,通常的做法是限制AWS EC2账户的访问权限以查看或启动所有VM,而仅停止某些VM。 例如,一个帐户有50个标记为“ prod”的VM,而25个标记为“ dev”的VM。 开发人员应该能够启动所有“ prod”和“ dev” VM,而他们只能停止“ dev” VM,除非他们有权访问“ prod” VM。 这些限制可以避免意外关闭生产虚拟机。

AWS gives the mechanism to achieve so in the IAM management. We show how to make use of the policies in AWS IAM management to achieve such goals.

AWS提供了在IAM管理中实现这一目标的机制。 我们将展示如何利用AWS IAM管理中的策略来实现这些目标。

In AWS, VMs can be tagged, and there are policies the can filter VMs by tags. There are user groups and users. User can be assgined to one or many user groups and the policies can be attached to the user groups to give access rights.

在AWS中,可以对VM进行标记,并且存在可以按标记过滤 VM的策略。 有用户组和用户。 可以将用户分配给一个或多个用户组,并且可以将策略附加到这些用户组以提供访问权限。

users---belong to---> user group <---attached to---policy

To limit certain users’ accesses, we can create user groups and policies attached to the user groups, and assign the users to these groups.

为了限制某些用户的访问,我们可以创建用户组和附加到用户组的策略,然后将用户分配给这些组。

建立政策 (Create policies)

AWS’ policy system is very flexible and at fine granularity. The policies can be implemented as a JSON file and uploaded to AWS management console to take effect. In this example, we will create 2 policies to

AWS的策略系统非常灵活且粒度精细。 这些策略可以实现为JSON文件,并上传到AWS管理控制台以生效。 在此示例中,我们将创建2个策略

  • list all instances

    列出所有实例
  • start all instances

    启动所有实例
  • stop instances that have a tag "Prod/Dev" set to "dev"

    停止将标签“ Prod / Dev”设置为“ dev”的实例

We will implement the rules in 2 policies.

我们将在2个策略中实施规则。

The policy control web page interface in the IAM management allows us to create new policies as follows.

IAM管理中的

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值