Write IAM policies to control access to the Cluster Placement Groups service.
Resource-Types
cluster-placement-group
cluster-placement-groups
Supported Variables 🔗
Cluster Placement Groups supports all the general variables, plus the ones listed here. For more information about general variables supported by Oracle Cloud Infrastructure services, see General Variables for All Requests.
Variable
Variable Type
Comments
target.cluster-placement-group.id
Entity (OCID)
Use this variable to control whether to allow operations against a specific cluster placement group in response to a request to read, update, delete, or move a cluster placement group or to view information related to work requests for a cluster placement group.
target.cluster-placement-group.name
String
Use this variable to control whether to allow operations against a specific cluster placement group in response to a request to read, update, delete, or move a cluster placement group or to view information related to work requests for a cluster placement group. This variable can't be used to control whether to allow operations against a specific cluster placement group in response to a request to create a resource in a specific cluster placement group.
Details for Verb + Resource-Type Combinations 🔗
The level of access is cumulative as you go from inspect to read to use to manage.
A plus sign (+) in a table cell indicates incremental access when compared to the preceding cell, whereas no extra indicates no incremental access.
For example, the read verb for the cluster-placement-group resource-type includes the same permissions and API operations as the inspect verb, but also adds the GetClusterPlacementGroup API operation. Likewise, the manage verb for the cluster-placement-group resource-type allows even more permissions when compared to the use permission. For the cluster-placement-group resource-type, the manage verb includes the same permissions and API operations as the use verb, plus the CLUSTER_PLACEMENT_GROUP_CREATE, CLUSTER_PLACEMENT_GROUP_UPDATE, CLUSTER_PLACEMENT_GROUP_DELETE, and CLUSTER_PLACEMENT_GROUP_MOVE permissions and several API operations (CreateClusterPlacementGroup, UpdateClusterPlacementGroup, DeleteClusterPlacementGroup, and ChangeClusterPlacementGroupCompartment).
cluster-placement-group 🔗
Verbs
Permissions
APIs Fully Covered
APIs Partially Covered
inspect
CLUSTER_PLACEMENT_GROUP_INSPECT
ListClusterPlacementGroups
none
read
INSPECT +
CLUSTER_PLACEMENT_GROUP_READ
INSPECT +
GetClusterPlacementGroup
none
use
READ +
CLUSTER_PLACEMENT_GROUP_USE
no extra
none
manage
USE +
CLUSTER_PLACEMENT_GROUP_CREATE
CLUSTER_PLACEMENT_GROUP_UPDATE
CLUSTER_PLACEMENT_GROUP_DELETE
CLUSTER_PLACEMENT_GROUP_MOVE
USE +
CreateClusterPlacementGroup
UpdateClusterPlacementGroup
ChangeClusterPlacementGroupCompartment
ActivateClusterPlacementGroup
DeactivateClusterPlacementGroup
DeleteClusterPlacementGroup (also needs permission to inspect all-resources)
Permissions Required for Each API Operation 🔗
The following table lists the API operations in a logical order.
For information about permissions, see Permissions.
API Operation
Permissions Required to Use the Operation
ListClusterPlacementGroups
CLUSTER_PLACEMENT_GROUP_INSPECT
GetClusterPlacementGroup
CLUSTER_PLACEMENT_GROUP_READ
CreateClusterPlacementGroup
CLUSTER_PLACEMENT_GROUP_CREATE
UpdateClusterPlacementGroup
CLUSTER_PLACEMENT_GROUP_UPDATE
DeleteClusterPlacementGroup
CLUSTER_PLACEMENT_GROUP_DELETE
ChangeClusterPlacementGroupCompartment
CLUSTER_PLACEMENT_GROUP_MOVE
DeactivateClusterPlacementGroup
CLUSTER_PLACEMENT_GROUP_UPDATE
ActivateClusterPlacementGroup
CLUSTER_PLACEMENT_GROUP_UPDATE
Policy Examples 🔗
Cluster Placement Groups policy examples include the following:
Allow users in the group NetworkAdmins to create and update all Cluster Placement Groups resources in the entire tenancy:
Copy
Allow group NetworkAdmins to manage cluster-placement-groups in tenancy
Allow users in the group ClusterPlacementGroupUsers to create resources in cluster placement groups in the entire tenancy:
Copy
Allow group ClusterPlacementGroupUsers to use cluster-placement-groups in tenancy
Allow users in the group NetworkAdmins to list resources in cluster placement groups in the entire tenancy:
Allow group NetworkAdmins to inspect all-resources in tenancy
Allow users in the group NetworkAdmins to delete all Cluster Placement Groups resources in the entire tenancy:
Allow group NetworkAdmins to manage cluster-placement-groups in tenancy
Allow group NetworkAdmins to inspect all-resources in tenancy
To create an instance or block volume in a cluster placement group, users require the following permissions for other Oracle Cloud Infrastructure resources: