Configure IAM Predefined Permission Policy
CCE uses IAM policy authorization, whereby the administrator of the Baidu AI Cloud account (or the IAM with system administrator permissions) grants the predefined CCE system policy to the IAM user/user group through Identity and Access Management (IAM), so that they have the read-only and management permissions of cluster-level resources (such as clusters, nodes and node groups). The CCE system policy authorization will apply to all clusters in all regions.
This document outlines the procedures and use of CCE with IAM policy-based authorization.
Description
This section covers CCE IAM policy authorization only for K8S Cluster CCE-level resources and associated cloud product/service permissions, excluding Kubernetes resource permissions at the cluster namespace level. For operational authorization of namespace Kubernetes resources, refer to Configuring Preset RBAC Permission Policies.
CCE pre-configured policies
You can use the following pre-configured policies to grant relevant permissions to IAM users:
| Policy name | Policy description | Permission scope |
|---|---|---|
| CCEDevelopPolicy | CCE development management policy: Include read-only access to cluster-level resources such as K8S Cluster CCE, nodes and node groups as well as related cloud products/services such as BCC, CDS, VPC, EIP, BLB and CCR. Exclude cluster namespace-level permissions. For developers who need to deploy and modify service applications, after granting this policy and authorizing specific cluster and namespace operation and maintenance & development permissions via CCE RBAC, they can perform operations such as creating workloads and other Kubernetes resources. |
Cluster/node resource operations: View cluster/node/node group lists/details View cluster/node health checks View/Download cluster kubeconfig View node group scaling configurations/activities View cluster snapshot lists View permission management list View component introduction details View cluster/node monitoring View cluster/node logs View cluster/node events View Helm templates/instances View/Pull image registry images View image registry namespace Associated cloud product/service operations: View compute resources (BCC, BBC), storage resources (CDS, BOS), network resources (VPC, subnets, security groups, BLB, EIP, ENI, ACL), as well as monitoring services (BCM), cloud container registry (CCR), ElasticSearch services) |
| CCEFullControlAccessPolicy | CCE full control management policy: Include management permission of cluster-level resources such as K8S Cluster CCE, nodes and node groups as well as operation permission of related cloud products/services such as BCC, CDS, VPC, EIP, BLB and CCR. Exclude cluster namespace-level permissions. For O&M personnel who need to create and manage clusters, scaling node resources, and modify, upgrade, monitor, and maintain the service deployment and operation environment, granting this policy is sufficient. |
Cluster/node resource operations: Create/Delete clusters/node groups Add/Remove nodes Upgrade cluster version Modify node group configuration Adjust the number of nodes in a node group Create/Delete cluster snapshots Install/Upgrade/Uninstall components Configure container monitoring/alarms Create/Delete log rules Enable/Disable event persistence/exception event push Create/Update/Delete helm instances Push images to image repository Create/Delete image repository namespace Associated cloud product/service operations: O&M operations for computing resources (BCC, BBC), storage resources (CDS, BOS), network resources (VPC, subnets, security groups, BLB, EIP, ENI, ACL), as well as operations for cloud container registry CCR, ElasticSearch service |
Kind reminder
- CCE integrates with several cloud products/services. To simplify and optimize the authorization process, the CCE IAM system policy includes operational permissions for commonly integrated cloud products/services.
- By assigning the CCE IAM system policy to IAM users, they gain read-only or management permissions for K8S Cluster CCE, node resources, and related cloud products/services without needing to understand or handle multiple cloud product policies and authorizations.
- If the system policy doesn’t meet your authorization requirements, you can create a custom policy to allow or deny specific operations for particular cloud products/services.
Operation steps
Directly grant permissions to IAM users
You can associate policies directly with IAM users to grant the permissions defined in those policies.
- Enter the Identity and Access Management console and select User Management > IAM User in the left navigation bar to enter the IAM User Management List page.
- Select the target IAM user and click Username to enter the User Details page.
- Click on Authorize and select the required policies in the Edit Permission pop-up window.
- Click OK to confirm.
Authorize IAM users through user groups
Add IAM users to a user group to automatically grant them the permissions associated with the group's policies. To remove those permissions, simply delete the IAM user from the respective user group.
- Enter the Identity and Access Management console and select Group Management in the left navigation bar to enter the Group Management List page.
- Select the target user group, click Edit to enter the Edit Group page.
- On the Edit Group page, select the necessary policies and add the corresponding IAM users.
- Click OK to continue.
