Permissions for BlueXP workload factory
To use BlueXP workload factory features and services, you'll need to provide permissions so that workload factory can perform operations in your cloud environment.
Why use permissions
When you provide read or automate mode permissions, workload factory attaches a policy to the instance with permissions to manage resources and processes within that AWS account. This allows workload factory to execute various operations starting from discovery of your storage environments to deploying AWS resources such as file systems in storage management or knowledge bases for GenAI workloads.
For database workloads for example, when workload factory is granted with the required permissions, it scans all EC2 instances in a given account and region, and filters all Windows-based machines. If AWS Systems Manager (SSM) Agent is installed and running on the host and System Manager networking is configured properly, workload factory can access the Windows machine and verify whether SQL Server software is installed or not.
Permissions by workload
Each workload uses permissions to perform certain tasks in workload factory. Scroll to the workload you use to view the list of permissions, their purpose, where they are used, and which modes support them.
Permissions for Storage
The IAM policies available for Storage provide the permissions that workload factory needs to manage resources and processes within your public cloud environment based on the operational mode you operate in.
Select your operational mode to view the required IAM policies:
IAM policies for Storage
The following table displays the permissions for Storage.
Table of permissions for Storage
Purpose | Action | Where used | Mode |
---|---|---|---|
Create an FSx for ONTAP file system |
fsx:CreateFileSystem* |
Deployment |
Automate |
Create a security group for an FSx for ONTAP file system |
ec2:CreateSecurityGroup |
Deployment |
Automate |
Add tags to a security group for an FSx for ONTAP file system |
ec2:CreateTags |
Deployment |
Automate |
Authorize security group egress and ingress for an FSx for ONTAP file system |
ec2:AuthorizeSecurityGroupEgress |
Deployment |
Automate |
ec2:AuthorizeSecurityGroupIngress |
Deployment |
Automate |
|
Granted role provides communication between FSx for ONTAP and other AWS services |
iam:CreateServiceLinkedRole |
Deployment |
Automate |
Get details to fill in the FSx for ONTAP file system deployment form |
ec2:DescribeVpcs |
|
|
ec2:DescribeSubnets |
|
|
|
ec2:DescribeRegions |
|
|
|
ec2:DescribeSecurityGroups |
|
|
|
ec2:DescribeRouteTables |
|
|
|
ec2:DescribeNetworkInterfaces |
|
|
|
ec2:DescribeVolumeStatus |
|
|
|
Get KMS key details and use for FSx for ONTAP encryption |
kms:CreateGrant |
Deployment |
Automate |
kms:Describe* |
Deployment |
|
|
kms:List* |
Deployment |
|
|
Get volume details for EC2 instances |
ec2:DescribeVolumes |
|
|
Get details for EC2 instances |
ec2:DescribeInstances |
Explore savings |
|
Describe Elastic File System in the savings calculator |
elasticfilesystem:Describe* |
Explore savings |
Read |
List tags for FSx for ONTAP resources |
fsx:ListTagsForResource |
Inventory |
|
Manage security group egress and ingress for an FSx for ONTAP file system |
ec2:RevokeSecurityGroupIngress |
Management operations |
Automate |
ec2:DeleteSecurityGroup |
Management operations |
Automate |
|
Create, view, and manage FSx for ONTAP file system resources |
fsx:CreateVolume* |
Management operations |
Automate |
fsx:TagResource* |
Management operations |
Automate |
|
fsx:CreateStorageVirtualMachine* |
Management operations |
Automate |
|
fsx:DeleteFileSystem* |
Management operations |
Automate |
|
fsx:DeleteStorageVirtualMachine* |
Management operations |
Automate |
|
fsx:DescribeFileSystems* |
Inventory |
|
|
fsx:DescribeStorageVirtualMachines* |
Inventory |
|
|
fsx:UpdateFileSystem* |
Management operations |
Automate |
|
fsx:UpdateStorageVirtualMachine* |
Management operations |
Automate |
|
fsx:DescribeVolumes* |
Inventory |
|
|
fsx:UpdateVolume* |
Management operations |
Automate |
|
fsx:DeleteVolume* |
Management operations |
Automate |
|
fsx:UntagResource* |
Management operations |
Automate |
|
fsx:DescribeBackups* |
Management operations |
|
|
fsx:CreateBackup* |
Management operations |
Automate |
|
fsx:CreateVolumeFromBackup* |
Management operations |
Automate |
|
Report CloudWatch metrics |
cloudwatch:PutMetricData |
Management operations |
Automate |
Get file system and volume metrics |
cloudwatch:GetMetricData |
Management operations |
|
cloudwatch:GetMetricStatistics |
Management operations |
|
Permissions for Databases workloads
The IAM policies available for Databases workloads provide the permissions that workload factory needs to manage resources and processes within your public cloud environment based on the operational mode you operate in.
Select your operational mode to view the required IAM policies:
IAM policies for Databases workloads
The following table displays the permissions for database workloads.
Table of permissions for database workloads
Purpose | Action | Where used | Mode |
---|---|---|---|
Get metric statistics for FSx for ONTAP, EBS, and FSx for Windows File Server |
cloudwatch:GetMetricStatistics |
|
|
List and set triggers for events |
sns:ListTopics |
Deployment |
|
Get details for EC2 instances |
ec2:DescribeInstances |
|
|
ec2:DescribeKeyPairs |
Deployment |
|
|
ec2:DescribeNetworkInterfaces |
Deployment |
|
|
ec2:DescribeInstanceTypes |
|
|
|
Get details to fill in the FSx for ONTAP deployment form |
ec2:DescribeVpcs |
|
|
ec2:DescribeSubnets |
|
|
|
ec2:DescribeSecurityGroups |
Deployment |
|
|
ec2:DescribeImages |
Deployment |
|
|
ec2:DescribeRegions |
Deployment |
|
|
ec2:DescribeRouteTables |
|
|
|
Get any existing VPC endpoints to determine if new endpoints need to be created before deployments |
ec2:DescribeVpcEndpoints |
|
|
Create VPC endpoints if they don't exist for required services irrespective of public network connectivity on EC2 instances |
ec2:CreateVpcEndpoint |
Deployment |
Automate |
Get instance types available in region for validation nodes (t2.micro/t3.micro) |
ec2:DescribeInstanceTypeOfferings |
Deployment |
|
Get snapshot details of each attached EBS volumes for pricing and savings estimate |
ec2:DescribeSnapshots |
Explore savings |
|
Get details of each attached EBS volumes for pricing and savings estimate |
ec2:DescribeVolumes |
|
|
Get KMS key details for FSx for ONTAP file system encryption |
kms:ListAliases |
Deployment |
|
kms:ListKeys |
Deployment |
|
|
kms:DescribeKey |
Deployment |
|
|
Get list of CloudFormation stacks running in the environment to check quota limit |
cloudformation:ListStacks |
Deployment |
|
Check account limits for resources before triggering deployment |
cloudformation:DescribeAccountLimits |
Deployment |
|
Get list of AWS-managed Active Directories in the region |
ds:DescribeDirectories |
Deployment |
|
Get lists and details of volumes, backups, SVMs, file systems in AZs, and tags for FSx for ONTAP file system |
fsx:DescribeVolumes |
|
|
fsx:DescribeBackups |
|
|
|
fsx:DescribeStorageVirtualMachines |
|
|
|
fsx:DescribeFileSystems |
|
|
|
fsx:ListTagsForResource |
Manage operations |
|
|
Get service quota limits for CloudFormation and VPC |
servicequotas:ListServiceQuotas |
Deployment |
|
Use SSM-based query to get the updated list of FSx for ONTAP supported regions |
ssm:GetParametersByPath |
Deployment |
|
Poll for SSM response after sending command for manage operations post deployment |
ssm:GetCommandInvocation |
|
|
Send commands over SSM to EC2 instances |
ssm:SendCommand |
|
|
Get the SSM connectivity status on instances post deployment |
ssm:GetConnectionStatus |
|
|
Fetch SSM association status for a group of managed EC2 instances (SQL nodes) |
ssm:DescribeInstanceInformation |
Inventory |
Read |
Get the list of available patch baselines for operating system patch assessment |
ssm:DescribePatchBaselines |
Optimization |
|
Get the patching state on Windows EC2 instances for operating system patch assessment |
ssm:DescribeInstancePatchStates |
Optimization |
|
List commands executed by AWS Patch Manager on EC2 instances for operating system patch management |
ssm:ListCommands |
Optimization |
|
Check if account is enrolled in AWS Compute Optimizer |
compute-optimizer:GetEnrollmentStatus |
|
Automate |
Update an existing recommendation preference in AWS Compute Optimizer to tailor suggestions for SQL server workloads |
compute-optimizer:PutRecommendationPreferences |
|
Automate |
Get recommendation preferences that are in effect for a given resource from AWS Compute Optimizer |
compute-optimizer:GetEffectiveRecommendationPreferences |
|
Automate |
Fetch recommendations that AWS Compute Optimizer generates for Amazon Elastic Compute Cloud (Amazon EC2) instances |
compute-optimizer:GetEC2InstanceRecommendations |
|
Automate |
Check for instance association to auto-scaling groups |
autoscaling:DescribeAutoScalingGroups |
|
Automate |
autoscaling:DescribeAutoScalingInstances |
|
Automate |
|
Get, list, create, and delete SSM parameters for AD, FSx for ONTAP, and SQL user credentials used during deployment or managed in your AWS account |
ssm:GetParameter 1 |
|
|
ssm:GetParameters 1 |
Manage operations |
|
|
ssm:PutParameter 1 |
|
|
|
ssm:DeleteParameters 1 |
Manage operations |
|
|
Associate network resources to SQL nodes and validation nodes, and add additional secondary IPs to SQL nodes |
ec2:AllocateAddress 1 |
Deployment |
Automate |
ec2:AllocateHosts 1 |
Deployment |
Automate |
|
ec2:AssignPrivateIpAddresses 1 |
Deployment |
Automate |
|
ec2:AssociateAddress 1 |
Deployment |
Automate |
|
ec2:AssociateRouteTable 1 |
Deployment |
Automate |
|
ec2:AssociateSubnetCidrBlock 1 |
Deployment |
Automate |
|
ec2:AssociateVpcCidrBlock 1 |
Deployment |
Automate |
|
ec2:AttachInternetGateway 1 |
Deployment |
Automate |
|
ec2:AttachNetworkInterface 1 |
Deployment |
Automate |
|
Attach EBS volumes required to the SQL nodes for deployment |
ec2:AttachVolume |
Deployment |
Automate |
Attach security groups and modify rules for the provisioned nodes |
ec2:AuthorizeSecurityGroupEgress |
Deployment |
Automate |
ec2:AuthorizeSecurityGroupIngress |
Deployment |
Automate |
|
Create EBS volumes required to the SQL nodes for deployment |
ec2:CreateVolume |
Deployment |
Automate |
Remove the temporary validation nodes created of type t2.micro and for rollback or retry of failed EC2 SQL nodes |
ec2:DeleteNetworkInterface |
Deployment |
Automate |
ec2:DeleteSecurityGroup |
Deployment |
Automate |
|
ec2:DeleteTags |
Deployment |
Automate |
|
ec2:DeleteVolume |
Deployment |
Automate |
|
ec2:DetachNetworkInterface |
Deployment |
Automate |
|
ec2:DetachVolume |
Deployment |
Automate |
|
ec2:DisassociateAddress |
Deployment |
Automate |
|
ec2:DisassociateIamInstanceProfile |
Deployment |
Automate |
|
ec2:DisassociateRouteTable |
Deployment |
Automate |
|
ec2:DisassociateSubnetCidrBlock |
Deployment |
Automate |
|
ec2:DisassociateVpcCidrBlock |
Deployment |
Automate |
|
Modify attributes for created SQL instances. Only applicable to names that start with WLMDB. |
ec2:ModifyInstanceAttribute |
Deployment |
Automate |
ec2:ModifyInstancePlacement |
Deployment |
Automate |
|
ec2:ModifyNetworkInterfaceAttribute |
Deployment |
Automate |
|
ec2:ModifySubnetAttribute |
Deployment |
Automate |
|
ec2:ModifyVolume |
Deployment |
Automate |
|
ec2:ModifyVolumeAttribute |
Deployment |
Automate |
|
ec2:ModifyVpcAttribute |
Deployment |
Automate |
|
Disassociate and destroy validation instances |
ec2:ReleaseAddress |
Deployment |
Automate |
ec2:ReplaceRoute |
Deployment |
Automate |
|
ec2:ReplaceRouteTableAssociation |
Deployment |
Automate |
|
ec2:RevokeSecurityGroupEgress |
Deployment |
Automate |
|
ec2:RevokeSecurityGroupIngress |
Deployment |
Automate |
|
Start the deployed instances |
ec2:StartInstances |
Deployment |
Automate |
Stop the deployed instances |
ec2:StopInstances |
Deployment |
Automate |
Tag custom values for Amazon FSx for NetApp ONTAP resources created by WLMDB to get billing details during resource management |
fsx:TagResource 1 |
|
Automate |
Create and validate CloudFormation template for deployment |
cloudformation:CreateStack |
Deployment |
Automate |
cloudformation:DescribeStackEvents |
Deployment |
Automate |
|
cloudformation:DescribeStacks |
Deployment |
Automate |
|
cloudformation:ListStacks |
Deployment |
Automate |
|
cloudformation:ValidateTemplate |
Deployment |
Automate |
|
Fetch metrics for compute optimization recommendation |
cloudwatch:GetMetricStatistics |
Explore savings |
Automate |
Fetch directories available in the region |
ds:DescribeDirectories |
Deployment |
Automate |
Add rules for the Security Group attached to provisioned EC2 instances |
ec2:AuthorizeSecurityGroupEgress |
Deployment |
Automate |
ec2:AuthorizeSecurityGroupIngress |
Deployment |
Automate |
|
Create nested stack templates for retry and rollback |
ec2:CreateLaunchTemplate |
Deployment |
Automate |
ec2:CreateLaunchTemplateVersion |
Deployment |
Automate |
|
Manage tags and network security on created instances |
ec2:CreateNetworkInterface |
Deployment |
Automate |
ec2:CreateSecurityGroup |
Deployment |
Automate |
|
ec2:CreateTags |
Deployment |
Automate |
|
Delete the Security Group created temporarily for validation nodes |
ec2:DeleteSecurityGroup |
Deployment |
Automate |
Get instance details for provisioning |
ec2:Describe* |
|
Automate |
ec2:Get* |
|
Automate |
|
Start the created instances |
ec2:RunInstances |
Deployment |
Automate |
Systems Manager uses AWS message delivery service endpoint for API operations |
ec2messages:* |
|
Automate |
Create FSx for ONTAP resources required for provisioning. For existing FSx for ONTAP systems, a new SVM is created to host SQL volumes. |
fsx:CreateFileSystem |
Deployment |
Automate |
fsx:CreateStorageVirtualMachine |
Deployment |
Automate |
|
fsx:CreateVolume |
|
Automate |
|
Get FSx for ONTAP details |
fsx:Describe* |
|
Automate |
fsx:List* |
|
Automate |
|
Resize FSx for ONTAP file system to remediate file system headroom |
fsx:UpdateFilesystem |
Optimization |
Automate |
Resize volumes to remediate log and TempDB drive sizes |
fsx:UpdateVolume |
Optimization |
Automate |
Get KMS key details and use for FSx for ONTAP encryption |
kms:CreateGrant |
Deployment |
Automate |
kms:Describe* |
Deployment |
Automate |
|
kms:List* |
Deployment |
Automate |
|
kms:GenerateDataKey |
Deployment |
Automate |
|
Create CloudWatch logs for validation and provisioning scripts running on EC2 instances |
logs:CreateLogGroup |
Deployment |
Automate |
logs:CreateLogStream |
Deployment |
Automate |
|
logs:DescribeLog* |
Deployment |
Automate |
|
logs:GetLog* |
Deployment |
Automate |
|
logs:ListLogDeliveries |
Deployment |
Automate |
|
logs:PutLogEvents |
|
Automate |
|
logs:TagResource |
Deployment |
Automate |
|
Create secrets in a user account for the credentials provided for SQL, domain, and FSx for ONTAP |
servicequotas:ListServiceQuotas |
Deployment |
Automate |
List customer SNS topics and publish to WLMDB backend SNS as well as customer SNS if selected |
sns:ListTopics |
Deployment |
Automate |
sns:Publish |
Deployment |
Automate |
|
Required SSM permissions to run the discovery script on provisioned SQL instances and to fetch latest list of FSx for ONTAP supported AWS regions. |
ssm:Describe* |
Deployment |
Automate |
ssm:Get* |
|
Automate |
|
ssm:List* |
Deployment |
Automate |
|
ssm:PutComplianceItems |
Deployment |
Automate |
|
ssm:PutConfigurePackageResult |
Deployment |
Automate |
|
ssm:PutInventory |
Deployment |
Automate |
|
ssm:SendCommand |
|
Automate |
|
ssm:UpdateAssociationStatus |
Deployment |
Automate |
|
ssm:UpdateInstanceAssociationStatus |
Deployment |
Automate |
|
ssm:UpdateInstanceInformation |
Deployment |
Automate |
|
ssmmessages:* |
|
Automate |
|
Save credentials for FSx for ONTAP, Active Directory, and SQL user (only for SQL user authentication) |
ssm:GetParameter 1 |
|
Automate |
ssm:GetParameters 1 |
|
Automate |
|
ssm:PutParameter 1 |
|
Automate |
|
ssm:DeleteParameters 1 |
|
Automate |
|
Signal CloudFormation stack on success or failure. |
cloudformation:SignalResource 1 |
Deployment |
Automate |
Add EC2 role created by template to the instance profile of EC2 to allow scripts on EC2 to access the required resources for deployment. |
iam:AddRoleToInstanceProfile |
Deployment |
Automate |
Create instance profile for EC2 and attach the created EC2 role. |
iam:CreateInstanceProfile |
Deployment |
Automate |
Create EC2 role through template with permissions listed below |
iam:CreateRole |
Deployment |
Automate |
Create role linked to EC2 service |
iam:CreateServiceLinkedRole 2 |
Deployment |
Automate |
Delete instance profile created during deployment specifically for the validation nodes |
iam:DeleteInstanceProfile |
Deployment |
Automate |
Get the role and policy details to determine any gaps in permission and validate for deployment |
iam:GetPolicy |
Deployment |
Automate |
iam:GetPolicyVersion |
Deployment |
Automate |
|
iam:GetRole |
Deployment |
Automate |
|
iam:GetRolePolicy |
Deployment |
Automate |
|
iam:GetUser |
Deployment |
Automate |
|
Pass the role created to EC2 instance |
iam:PassRole 3 |
Deployment |
Automate |
Add policy with required permissions to the EC2 role created |
iam:PutRolePolicy |
Deployment |
Automate |
Detach role from the provisioned EC2 instance profile |
iam:RemoveRoleFromInstanceProfile |
Deployment |
Automate |
Simulate workload operations to validate available permissions and compare with required AWS account permissions |
iam:SimulatePrincipalPolicy |
Deployment |
|
-
Permission is restricted to resources starting with WLMDB.
-
"iam:CreateServiceLinkedRole" limited by "iam:AWSServiceName": "ec2.amazonaws.com"*
-
"iam:PassRole" limited by "iam:PassedToService": "ec2.amazonaws.com"*
Permissions for GenAI workloads
The IAM policies for VMware workloads provide the permissions that workload factory for VMware needs to manage resources and processes within your public cloud environment based on the operational mode you operate in.
GenAI IAM policies are only available in Operate mode:
IAM policies for GenAI workloads
The following table provides details about the permissions for GenAI workloads.
Table of permissions for GenAI workloads
Purpose | Action | Where used | Mode |
---|---|---|---|
Create AI engine cloudformation stack during deploy and rebuild operations |
cloudformation:CreateStack |
Deployment |
Automate |
Create the AI engine cloudformation stack |
cloudformation:DescribeStacks |
Deployment |
Automate |
List regions for the AI engine deployment wizard |
ec2:DescribeRegions |
Deployment |
Automate |
Display AI engine tags |
ec2:DescribeTags |
Deployment |
Automate |
List VPC endpoints before AI engine stack creation |
ec2:CreateVpcEndpoint |
Deployment |
Automate |
Create an AI engine security group during the AI engine stack creation during deploy and rebuild operations |
ec2:CreateSecurityGroup |
Deployment |
Automate |
Tag resources created by AI engine stack creation during deploy and rebuild operations |
ec2:CreateTags |
Deployment |
Automate |
Publish encrypted events to the WLMAI backend from the AI engine stack |
kms:GenerateDataKey |
Deployment |
Automate |
kms:Decrypt |
Deployment |
Automate |
|
Publish events and custom resources to the WLMAI backend from the ai-engine stack |
sns:Publish |
Deployment |
Automate |
List VPCs during AI engine deployment wizard |
ec2:DescribeVpcs |
Deployment |
Automate |
List subnets on the ai-engine deployment wizard |
ec2:DescribeSubnets |
Deployment |
Automate |
Get route tables during AI engine deployment and rebuild |
ec2:DescribeRouteTables |
Deployment |
Automate |
List key-pairs during AI engine deployment wizard |
ec2:DescribeKeyPairs |
Deployment |
Automate |
List security groups during AI engine stack creation (to find security groups on the private endpoints) |
ec2:DescribeSecurityGroups |
Deployment |
Automate |
Get VPC endpoints to determine if any should be created during the AI engine deployment |
ec2:DescribeVpcEndpoints |
Deployment |
Automate |
List instances to find out the AI engine state |
ec2:DescribeInstances |
Troubleshooting |
Automate |
List images during the AI engine stack creation during deploy and rebuild operations |
ec2:DescribeImages |
Deployment |
Automate |
Create and update AI instance and private endpoint security group during the AI instance stack creation during on deploy and rebuild operations |
ec2:RevokeSecurityGroupEgress |
Deployment |
Automate |
ec2:RevokeSecurityGroupIngress |
Deployment |
Automate |
|
Run AI engine during cloudformation stack creation during deploy and rebuild operations |
ec2:RunInstances |
Deployment |
Automate |
Attach security group and modify rules for the AI engine during stack creation during deploy and rebuild operations |
ec2:AuthorizeSecurityGroupEgress |
Deployment |
Automate |
ec2:AuthorizeSecurityGroupIngress |
Deployment |
Automate |
|
Query Amazon Bedrock / Amazon CloudWatch logging status during AI engine deployment |
bedrock:GetModelInvocationLoggingConfiguration |
Deployment |
Automate |
Initiate chat request to one of the foundation models |
bedrock:InvokeModelWithResponseStream |
Deployment |
Automate |
Begin chat/embedding request for foundation models |
bedrock:InvokeModel |
Deployment |
Automate |
Show the available foundation models in a region |
bedrock:ListFoundationModels |
Deployment |
Automate |
Verify access to the foundation model |
bedrock:GetFoundationModelAvailability |
Deployment |
Automate |
Verify need to create Amazon CloudWatch log group during deploy and rebuild operations |
logs:DescribeLogGroups |
Deployment |
Automate |
Get regions that support FSx and Amazon Bedrock during the AI engine wizard |
ssm:GetParametersByPath |
Deployment |
Automate |
Get the latest Amazon Linux image for the AI engine deployment during deploy and rebuild operations |
ssm:GetParameters |
Deployment |
Automate |
Get the SSM response from the command sent to the AI engine |
ssm:GetCommandInvocation |
Deployment |
Automate |
Check the SSM connection to the AI engine |
ssm:SendCommand |
Deployment |
Automate |
ssm:GetConnectionStatus |
Deployment |
Automate |
|
Create AI engine instance profile during stack creation during deploy and rebuild operations |
iam:CreateRole |
Deployment |
Automate |
iam:CreateInstanceProfile |
Deployment |
Automate |
|
iam:AddRoleToInstanceProfile |
Deployment |
Automate |
|
iam:PutRolePolicy |
Deployment |
Automate |
|
iam:GetRolePolicy |
Deployment |
Automate |
|
iam:GetRole |
Deployment |
Automate |
|
iam:TagRole |
Deployment |
Automate |
|
iam:PassRole |
Deployment |
Automate |
|
Simulate workload operations to validate available permissions and compare with required AWS account permissions |
iam:SimulatePrincipalPolicy |
Deployment |
Automate |
List FSx for ONTAP file systems during the "Create knowledgebase" wizard |
fsx:DescribeVolumes |
Knowledge base creation |
Automate |
List FSx for ONTAP file system volumes during the "Create knowledgebase" wizard |
fsx:DescribeFileSystems |
Knowledge base creation |
Automate |
Manage knowledge bases on the AI engine during rebuild operations |
fsx:ListTagsForResource |
Troubleshooting |
Automate |
List FSx for ONTAP file system storage virtual machines during the "Create knowledgebase" wizard |
fsx:DescribeStorageVirtualMachines |
Deployment |
Automate |
Move the knowledgebase to a new instance |
fsx:UntagResource |
Troubleshooting |
Automate |
Manage knowledgebase on the AI engine during rebuild |
fsx:TagResource |
Troubleshooting |
Automate |
Save SSM secrets (ECR token, CIFS credentials, tenancy service accounts keys) in a secure way |
ssm:GetParameter |
Deployment |
Automate |
ssm:PutParameter |
Deployment |
Automate |
|
Send the AI engine logs to Amazon CloudWatch log group during deploy and rebuild operations |
logs:CreateLogGroup |
Deployment |
Automate |
logs:PutRetentionPolicy |
Deployment |
Automate |
|
Send the AI engine logs to Amazon CloudWatch log group |
logs:TagResource |
Troubleshooting |
Automate |
Get SSM response from Amazon CloudWatch (when the response is too long) |
logs:DescribeLogStreams |
Troubleshooting |
Automate |
Get the SSM response from Amazon CloudWatch |
logs:GetLogEvents |
Troubleshooting |
Automate |
Create Amazon CloudWatch log group for Amazon Bedrock logs during the stack reation during deploy and rebuild operations |
logs:CreateLogGroup |
Deployment |
Automate |
logs:PutRetentionPolicy |
Deployment |
Automate |
|
logs:TagResource |
Deployment |
Automate |
|
Send bedrock logs to Amazon CloudWatch |
bedrock:PutModelInvocationLoggingConfiguration |
Troubleshooting |
Automate |
Create the role that enables sending Amazon Bedrock logs to Amazon CloudWatch |
iam:AttachRolePolicy |
Troubleshooting |
Automate |
Create the role that enables sending Amazon Bedrock logs to Amazon CloudWatch |
iam:PassRole |
Troubleshooting |
Automate |
Create the role that enables sending Amazon Bedrock logs to Amazon CloudWatch |
iam:createPolicy |
Troubleshooting |
Automate |
List inference profiles for the model |
bedrock:ListInferenceProfiles |
Troubleshooting |
Automate |
Permissions for VMware workloads
The IAM policies for VMware workloads provide the permissions that workload factory for VMware needs to manage resources and processes within your public cloud environment based on the operational mode you operate in.
Select your operational mode to view the required IAM policies:
IAM policies for VMware workloads
The following table provides details about the permissions for VMware workloads.
Table of permissions for VMware workloads
Purpose | Action | Where used | Mode |
---|---|---|---|
Attach security groups and modify rules for the provisioned nodes |
ec2:AuthorizeSecurityGroupIngress |
Deployment |
Automate |
Create EBS volumes |
ec2:CreateVolume |
Deployment |
Automate |
Tag custom values for FSx for NetApp ONTAP resources created by VMware workloads |
fsx:TagResource |
Deployment |
Automate |
Create and validate the CloudFormation template |
cloudformation:CreateStack |
Deployment |
Automate |
Manage tags and network security on created instances |
ec2:CreateSecurityGroup |
Deployment |
Automate |
Start the created instances |
ec2:RunInstances |
Deployment |
Automate |
Get EC2 instance details |
ec2:DescribeInstances |
Deployment |
Automate |
List images during the stack creation during deploy and rebuild operations |
ec2:DescribeImages |
Deployment |
Automate |
Get the VPCs in the selected environment to complete deployment form |
ec2:DescribeVpcs |
|
|
Get the subnets in selected environment to complete deployment form |
ec2:DescribeSubnets |
|
|
Get the security groups in selected environment to complete deployment form |
ec2:DescribeSecurityGroups |
Deployment |
|
Get the availability zones in selected environment |
ec2:DescribeAvailabilityZones |
|
|
Get the regions with Amazon FSx for NetApp ONTAP support |
ec2:DescribeRegions |
Deployment |
|
Get KMS keys' aliases to be used for Amazon FSx for NetApp ONTAP encryption |
kms:ListAliases |
Deployment |
|
Get KMS keys to be used for Amazon FSx for NetApp ONTAP encryption |
kms:ListKeys |
Deployment |
|
Get KMS keys expiry details to be used for Amazon FSx for NetApp ONTAP encryption |
kms:DescribeKey |
Deployment |
|
SSM based query is used to get the updated list of Amazon FSx for NetApp ONTAP supported regions |
ssm:GetParametersByPath |
Deployment |
|
Create Amazon FSx for NetApp ONTAP resources required for provisioning |
fsx:CreateFileSystem |
Deployment |
Automate |
fsx:CreateStorageVirtualMachine |
Deployment |
Automate |
|
fsx:CreateVolume |
|
Automate |
|
Get Amazon FSx for NetApp ONTAP details |
fsx:Describe* |
|
Automate |
fsx:List* |
|
Automate |
|
Get KMS key details and use for Amazon FSx for NetApp ONTAP encryption |
kms:CreateGrant |
Deployment |
Automate |
kms:Describe* |
Deployment |
Automate |
|
kms:List* |
Deployment |
Automate |
|
kms:Decrypt |
Deployment |
Automate |
|
kms:GenerateDataKey |
Deployment |
Automate |
|
List customer SNS topics and publish to WLMVMC backend SNS as well as customer SNS if selected |
sns:Publish |
Deployment |
Automate |
Used to fetch latest list of Amazon FSx for NetApp ONTAP supported AWS regions |
ssm:Get* |
|
Automate |
Simulate workload operations to validate available permissions and compare with required AWS account permissions |
iam:SimulatePrincipalPolicy |
Deployment |
Automate |
SSM Parameter store is used to save credentials of Amazon FSx for NetApp ONTAP |
ssm:GetParameter |
|
Automate |
ssm:PutParameters |
|
Automate |
|
ssm:PutParameter |
|
Automate |
|
ssm:DeleteParameters |
|
Automate |
Change log
As permissions are added and removed, we'll note them in the sections below.
2 April 2025
The following permission is now available in read mode for Databases: ssm:DescribeInstanceInformation
.
30 March 2025
GenAI workload permissions update
The following permissions are now available in automate mode for GenAI:
-
bedrock:PutModelInvocationLoggingConfiguration
-
iam:AttachRolePolicy
-
iam:PassRole
-
iam:createPolicy
-
bedrock:ListInferenceProfiles
The following permission has been removed from automate mode for GenAI: Bedrock:GetFoundationModel
.
iam:SimulatePrincipalPolicy permission update
The iam:SimulatePrincipalPolicy
permission is part of all workload permission policies if you enable the automatic permissions check when adding additional AWS account credentials or adding a new workload capability from the workload factory console. The permission simulates workload operations and checks if you have the required AWS account permissions before deploying resources from workload factory. Enabling this check reduces the time and effort that you might need to clean up resources from failed operations and to add in missing permissions.
2 March 2025
The following permission is now available in automate mode for GenAI: bedrock:GetFoundationModel
.
3 February 2025
The following permission is now available in read mode for Databases: iam:SimulatePrincipalPolicy
.