使用 Evidently 的 IAM policy - Amazon CloudWatch
Amazon Web Services 文档中描述的 Amazon Web Services 服务或功能可能因区域而异。要查看适用于中国区域的差异,请参阅 中国的 Amazon Web Services 服务入门 (PDF)

使用 Evidently 的 IAM policy

要完全管理 CloudWatch Evidently,您必须以具有以下权限的 IAM 用户或角色的身份登录:

  • AmazonCloudWatchEvidentlyFullAccess 策略

  • ResourceGroupsandTagEditorReadOnlyAccess 策略

此外,为能够创建在 Amazon S3 或 CloudWatch Logs 中存储评估事件的项目,您需要以下权限:

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetBucketPolicy", "s3:PutBucketPolicy", "s3:GetObject", "s3:ListBucket" ], "Resource": "arn:aws:s3:::*" }, { "Effect": "Allow", "Action": [ "logs:CreateLogDelivery", "logs:DeleteLogDelivery", "logs:DescribeResourcePolicies", "logs:PutResourcePolicy" ], "Resource": [ "*" ] } ] }

CloudWatch RUM 集成的其他权限

此外,如果您打算管理与 Amazon CloudWatch RUM 集成的 Evidently 启动或实验,并使用 CloudWatch RUM 指标进行监控,您需要 AmazonCloudWatchRUMFullAccess 策略。要创建 IAM 角色以授予 CloudWatch RUM Web 客户端向 CloudWatch RUM 发送数据的权限,您需要以下权限:

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "iam:CreateRole", "iam:CreatePolicy", "iam:AttachRolePolicy" ], "Resource": [ "arn:aws:iam::*:role/service-role/CloudWatchRUMEvidentlyRole-*", "arn:aws:iam::*:policy/service-role/CloudWatchRUMEvidentlyPolicy-*" ] } ] }

对 Evidently 的只读访问权限

对于需要查看 Evidently 数据但不需要创建 Evidently 资源的其他用户,您可以授予 AmazonCloudWatchEvidentlyReadOnlyAccess 策略。