solution/automation/finance-industry/settings.tfvars (866 lines of code) (raw):

# Please modify according to the actual situation # Account information management_account_id = "114xxxx592" payer_account_id = "114xxxx592" log_account_id = "104xxxx656" shared_service_account_id = "186xxxx635" core_folder_id = "fd-xxxxcMA" applications_folder_id = "fd-xxxxw6j" security_display_name = "安全账号3" security_account_name_prefix = "security3" ops_display_name = "运维账号3" ops_account_name_prefix = "operation3" dev_display_name = "开发测试账号3" dev_account_name_prefix = "dev3" prod_display_name = "生产账号3" prod_account_name_prefix = "prod3" # SSO Provider Name sso_provider_name = "idp" sso_provider_description = "Created with Terraform automation scripts." encodedsaml_metadata_document = "yourEncodedSAMLDocumentData" # Compliance # The steps to enable the compliance package are as follows: # 1. By the following template IDs,call the ListCompliancePackTemplates interface to query the list of compliance package templates. # @see https://help.aliyun.com/document_detail/285530.html # 2. According to the following configuration format,build the configuration based on the returned rule result. # Pay attention to modifying the rule parameters. # @see https://registry.terraform.io/providers/aliyun/alicloud/latest/docs/resources/config_aggregate_compliance_pack # The built-in template IDs are as follows: # "OSS合规管理最佳实践":"ct-a5edff4e06a3004a5e15" # "网络合规管理最佳实践":"ct-d254ff4e06a300cfc654" # "账号权限合规管理最佳实践":"ct-d264ff4e06a300a9c2d0" # "等保三级预检合规包":"ct-5f26ff4e06a300c49609" # "CIS网络安全框架检查合规包":"ct-5f99ff4e06a3006c54d2" # "数据库合规管理最佳实践":"ct-a292ff4e06a300b2db8b" # "云治理中心合规实践":"ct-a292ff4e06a300b2db8c" # "ECS合规管理最佳实践":"ct-3d20ff4e06a30027f76e" # "RMiT金融标准检查合规包":"ct-81ceff4e06a3008583ca" # "安全组最佳实践":"ct-484cff4e06a300621b5b" # "OceanBase最佳实践":"ct-484cff4e06a300621b5c" # "资源稳定性最佳实践":"ct-484cff4e06a300621b5e" # The following configuration is just an example. Please modify the rule parameters! # In particular, include the allowEmptyReferer parameters and # allowEmptyReferer parameters in the following configuration! config_compliance_packs = [ { config_compliance_pack_name = "OSS合规管理" config_compliance_pack_description = "持续检测云上存储的加密、备份、防盗、访问控制的合规性,避免数据泄露等数据安全风险。" config_compliance_pack_template_id = "ct-a5edff4e06a3004a5e15" config_compliance_pack_risk_level = 1 config_compliance_rules = [ { rule_name = "OSS存储空间Referer在指定的防盗链白名单中" rule_description = "OSS存储空间开启防盗链并且Referer在指定白名单中,视为“合规”。" rule_identifier = "oss-bucket-referer-limit" parameters = [ { name = "allowEmptyReferer" value = "true" }, { name = "allowReferers" value = "www.landingzone.cc" } ] resource_types_scope = ["ACS::OSS::Bucket"] tag_key_scope = null tag_value_scope = null }, { rule_name = "OSS存储空间ACL禁止公共读" rule_description = "OSS存储空间的ACL策略禁止公共读,视为“合规”。" rule_identifier = "oss-bucket-public-read-prohibited" parameters = [] resource_types_scope = ["ACS::OSS::Bucket"] tag_key_scope = null tag_value_scope = null }, { rule_name = "OSS存储空间ACL禁止公共读写" rule_description = "OSS存储空间的ACL策略禁止公共读写,视为“合规”。" rule_identifier = "oss-bucket-public-write-prohibited" parameters = [] resource_types_scope = ["ACS::OSS::Bucket"] tag_key_scope = null tag_value_scope = null }, { rule_name = "OSS存储空间开启服务端加密" rule_description = "OSS存储空间开启服务端OSS完全托管加密,视为“合规”。" rule_identifier = "oss-bucket-server-side-encryption-enabled" parameters = [] resource_types_scope = ["ACS::OSS::Bucket"] tag_key_scope = null tag_value_scope = null }, { rule_name = "OSS存储空间开启同城冗余存储" rule_description = "OSS存储空间开启同城冗余存储,视为“合规”。" rule_identifier = "oss-zrs-enabled" parameters = [] resource_types_scope = ["ACS::OSS::Bucket"] tag_key_scope = null tag_value_scope = null }, { rule_name = "OSS存储空间开启日志存储" rule_description = "OSS存储空间的日志管理中开启日志存储,视为“合规”。" rule_identifier = "oss-bucket-logging-enabled" parameters = [] resource_types_scope = ["ACS::OSS::Bucket"] tag_key_scope = null tag_value_scope = null }, { rule_name = "OSS存储空间开启版本控制" rule_description = "OSS存储空间开启版本控制,视为“合规”。" rule_identifier = "oss-bucket-versioning-enabled" parameters = [] resource_types_scope = ["ACS::OSS::Bucket"] tag_key_scope = null tag_value_scope = null } ] } ] # ECS & ALB security_group_name = "sg-lz-tf" security_group_desc = "sg-lz-tf" ecs_instance_password = "Ll1234qaz" dmz_vpc_ecs_instance_deploy_config = [ { instance_name = "ecs-dmz-sh-1" host_name = "ecs-dmz-sh-1" description = "ecs-dmz-sh-1" }, { instance_name = "ecs-dmz-sh-2" host_name = "ecs-dmz-sh-2" description = "ecs-dmz-sh-2" } ] dev_vpc_ecs_instance_deploy_config = [ { instance_name = "ecs-dev-sh-1" host_name = "ecs-dev-sh-1" description = "ecs-dev-sh-1" }, { instance_name = "ecs-dev-sh-2" host_name = "ecs-dev-sh-2" description = "ecs-dev-sh-2" } ] # ECS instance spec ecs_instance_spec = { instance_type = "ecs.t5-lc1m1.small" system_disk_category = "cloud_efficiency" image_id = "centos_8_5_x64_20G_alibase_20220428.vhd" instance_charge_type = "PostPaid" period_unit = "Month" period = 1 internet_max_bandwidth_out = 0 tags = { createdBy : "Terraform" } volume_tags = { createdBy : "Terraform" } } # ALB instance info dmz_vpc_alb_instance_name = "alb-tf-default" dev_vpc_alb_instance_name = "alb-tf-default" # ALB instance spec alb_instance_spec = { protocol = "HTTP" address_type = "Internet" address_allocated_mode = "Fixed" load_balancer_name = "alb-tf-default" load_balancer_edition = "Basic" tags = { createdBy : "Terraform" } } # ALB listener alb_listener_description = "createdByTerraform" # ALB server group server_group_config = { server_group_name = "server-group-tf" protocol = "HTTP" tags = { createdBy : "Terraform" } health_check_protocol = "HTTP" health_check_connect_port = "80" health_check_enabled = true health_check_codes = ["http_2xx", "http_3xx", "http_4xx"] health_check_http_version = "HTTP1.1" health_check_interval = "2" health_check_method = "GET" health_check_path = "/hello_landing_zone" health_check_timeout = 5 healthy_threshold = 3 unhealthy_threshold = 3 sticky_session_enabled = false cookie = null cookie_timeout = 1000 sticky_session_type = "Insert" port = 80 weight = 100 } # security group security_group_rule = [ { type = "ingress" ip_protocol = "tcp" nic_type = "intranet" policy = "accept" port_range = "80/80" priority = 1 cidr_ip = "0.0.0.0/0" }, { type = "ingress" ip_protocol = "tcp" nic_type = "intranet" policy = "accept" port_range = "22/22" priority = 1 cidr_ip = "0.0.0.0/0" }, { type = "ingress" ip_protocol = "tcp" nic_type = "intranet" policy = "accept" port_range = "443/443" priority = 1 cidr_ip = "0.0.0.0/0" }, { type = "ingress" ip_protocol = "tcp" nic_type = "intranet" policy = "accept" port_range = "3389/3389" priority = 1 cidr_ip = "0.0.0.0/0" }, { type = "ingress" ip_protocol = "icmp" nic_type = "intranet" policy = "accept" port_range = "-1/-1" priority = 1 cidr_ip = "0.0.0.0/0" } ] # Network cen_instance_name = "Terraform-CEN" cen_instance_desc = "Created by Terraform" cen_instance_tags = { "Environment" = "shared" "Department" = "ops" } dmz_egress_nat_gateway_name = "nat-gateway-dmz-egress" dmz_egress_eip_name = "eip--dmz-egress" # contains VSwitch for business and VSwitch for transit router shared_service_account_vpc_config = { "region" = "cn-shanghai" "vpc_name" = "vpc-sh-dmz" "vpc_desc" = "Demilitarized Zone" "vpc_cidr" = "10.0.0.0/16" "vpc_tags" = { "Environment" = "shared" "Department" = "ops" } "vswitch" = [ { "vswitch_name" = "vsw-sh-dmz-f-tr" "vswitch_desc" = "vsw-sh-dmz-f-tr" "vswitch_cidr" = "10.0.0.8/29" "zone_id" = "cn-shanghai-f" "vswitch_tags" = { "Environment" = "shared" "Department" = "ops" } }, { "vswitch_name" = "vsw-sh-dmz-g-tr" "vswitch_desc" = "vsw-sh-dmz-g-tr" "vswitch_cidr" = "10.0.0.16/29" "zone_id" = "cn-shanghai-g" "vswitch_tags" = { "Environment" = "shared" "Department" = "ops" } }, { "vswitch_name" = "vsw-sh-dmz-f-1" "vswitch_desc" = "vsw-sh-dmz-f-1" "vswitch_cidr" = "10.0.4.0/22" "zone_id" = "cn-shanghai-f" "vswitch_tags" = { "Environment" = "shared" "Department" = "ops" } }, { "vswitch_name" = "vsw-sh-dmz-g-1" "vswitch_desc" = "vsw-sh-dmz-g-1" "vswitch_cidr" = "10.0.8.0/22" "zone_id" = "cn-shanghai-g" "vswitch_tags" = { "Environment" = "shared" "Department" = "ops" } } ] } # contains VSwitch for business and VSwitch for transit router dev_account_vpc_config = { "region" = "cn-shanghai" "vpc_name" = "vpc-sh-development" "vpc_desc" = "Development VPC" "vpc_cidr" = "10.1.0.0/16" "vpc_tags" = { "Environment" = "dev" "Department" = "department1" } "vswitch" = [ { "vswitch_name" = "vsw-sh-dev-f-tr" "vswitch_desc" = "vsw-sh-dev-f-tr" "vswitch_cidr" = "10.1.0.8/29" "zone_id" = "cn-shanghai-f" "vswitch_tags" = { "Environment" = "dev" "Department" = "department1" } }, { "vswitch_name" = "vsw-sh-dev-g-tr" "vswitch_desc" = "vsw-sh-dev-g-tr" "vswitch_cidr" = "10.1.0.16/29" "zone_id" = "cn-shanghai-g" "vswitch_tags" = { "Environment" = "dev" "Department" = "department1" } }, { "vswitch_name" = "vsw-sh-dev-f-1" "vswitch_desc" = "vsw-sh-dev-f-1" "vswitch_cidr" = "10.1.4.0/22" "zone_id" = "cn-shanghai-f" "vswitch_tags" = { "Environment" = "dev" "Department" = "department1" } }, { "vswitch_name" = "vsw-sh-dev-g-1" "vswitch_desc" = "vsw-sh-dev-g-1" "vswitch_cidr" = "10.1.8.0/22" "zone_id" = "cn-shanghai-g" "vswitch_tags" = { "Environment" = "dev" "Department" = "department1" } } ] } # contains VSwitch for business and VSwitch for transit router prod_account_vpc_config = { "region" = "cn-shanghai" "vpc_name" = "vpc-sh-production" "vpc_desc" = "Production VPC" "vpc_cidr" = "10.2.0.0/16" "vpc_tags" = { "Environment" = "prod" "Department" = "department1" } "vswitch" = [ { "vswitch_name" = "vsw-sh-prod-f-tr" "vswitch_desc" = "vsw-sh-prod-f-tr" "vswitch_cidr" = "10.2.0.8/29" "zone_id" = "cn-shanghai-f" "vswitch_tags" = { "Environment" = "prod" "Department" = "department1" } }, { "vswitch_name" = "vsw-sh-prod-g-tr" "vswitch_desc" = "vsw-sh-prod-g-tr" "vswitch_cidr" = "10.2.0.16/29" "zone_id" = "cn-shanghai-g" "vswitch_tags" = { "Environment" = "prod" "Department" = "department1" } }, { "vswitch_name" = "vsw-sh-prod-f-1" "vswitch_desc" = "vsw-sh-prod-f-1" "vswitch_cidr" = "10.2.4.0/22" "zone_id" = "cn-shanghai-f" "vswitch_tags" = { "Environment" = "prod" "Department" = "department1" } }, { "vswitch_name" = "vsw-sh-prod-g-1" "vswitch_desc" = "vsw-sh-prod-g-1" "vswitch_cidr" = "10.2.8.0/22" "zone_id" = "cn-shanghai-g" "vswitch_tags" = { "Environment" = "prod" "Department" = "department1" } } ] } # contains VSwitch for business and VSwitch for transit router ops_account_vpc_config = { "region" = "cn-shanghai" "vpc_name" = "vpc-sh-management" "vpc_desc" = "Management VPC" "vpc_cidr" = "10.3.0.0/16" "vpc_tags" = { "Environment" = "ops" "Department" = "ops" } "vswitch" = [ { "vswitch_name" = "vsw-sh-management-f-tr" "vswitch_desc" = "vsw-sh-management-f-tr" "vswitch_cidr" = "10.3.0.8/29" "zone_id" = "cn-shanghai-f" "vswitch_tags" = { "Environment" = "ops" "Department" = "ops" } }, { "vswitch_name" = "vsw-sh-management-g-tr" "vswitch_desc" = "vsw-sh-management-g-tr" "vswitch_cidr" = "10.3.0.16/29" "zone_id" = "cn-shanghai-g" "vswitch_tags" = { "Environment" = "ops" "Department" = "ops" } }, { "vswitch_name" = "vsw-sh-management-f-1" "vswitch_desc" = "vsw-sh-management-f-1" "vswitch_cidr" = "10.3.4.0/22" "zone_id" = "cn-shanghai-f" "vswitch_tags" = { "Environment" = "ops" "Department" = "ops" } }, { "vswitch_name" = "vsw-sh-management-g-1" "vswitch_desc" = "vsw-sh-management-g-1" "vswitch_cidr" = "10.3.8.0/22" "zone_id" = "cn-shanghai-g" "vswitch_tags" = { "Environment" = "ops" "Department" = "ops" } } ] } # Security # @see https://registry.terraform.io/providers/aliyun/alicloud/latest/docs/resources/waf_instance waf_instance_spec = { big_screen = "0" exclusive_ip_package = "1" ext_bandwidth = "50" ext_domain_package = "1" package_code = "version_3" prefessional_service = "false" subscription_type = "Subscription" period = 1 waf_log = "false" log_storage = "3" log_time = "180" } waf_domain_config = { is_access_product = "On" http2_port = [443] http_port = [80] https_port = [443] http_to_user_ip = "Off" https_redirect = "Off" load_balancing = "IpHash" } # @see https://registry.terraform.io/providers/aliyun/alicloud/latest/docs/resources/ddoscoo_instance ddos_bgp_instance_spec = { name = "createByTerraform" bandwidth = "30" base_bandwidth = "30" service_bandwidth = "100" port_count = "50" domain_count = "50" period = "1" product_type = "ddoscoo" } ddos_domain_https_ext = "{\"Http2\":0,\"Http2https\":0,\"Https2http\":0}" ddos_domain_proxy_types = [ { proxy_ports = [80] proxy_type = "http" } ] # @see https://registry.terraform.io/providers/aliyun/alicloud/latest/docs/resources/cloud_firewall_instance cfw_instance_spec = { payment_type = "Subscription" spec = "ultimate_version" ip_number = 400 band_width = 200 cfw_log = false cfw_log_storage = 5000 cfw_service = false fw_vpc_number = 5 period = 6 } cfw_control_policy = [ { application_name = "HTTP" acl_action = "accept" description = "createdByTerraform" destination_type = "net" destination = "0.0.0.0/0" dest_port = "80/80" dest_port_type = "port" direction = "out" proto = "TCP" source = "0.0.0.0/0" source_type = "net" order = 1 }, { application_name = "HTTPS" acl_action = "accept" description = "createdByTerraform" destination_type = "net" destination = "0.0.0.0/0" dest_port = "443/443" dest_port_type = "port" direction = "out" proto = "TCP" source = "0.0.0.0/0" source_type = "net" order = 2 } ] # Identity and permissions ram_user_initial_pwd = "pop$#cem%$z19D" management_account_ram_users = [ { "name" = "Emergency" "description" = "Emergency user" "enable_console_login" = true "enable_api_access" = false "system_policy" = ["AdministratorAccess"] } ] management_account_ram_roles = [ { "name" = "SystemAdmin" "description" = "Administrator role" "system_policy" = ["AdministratorAccess"] }, { "name" = "ResourceDirectoryAdmin" "description" = "Administrator role for Resource Directory" "system_policy" = ["AliyunResourceDirectoryFullAccess"] }, { "name" = "BillingAdmin" "description" = "Administrator role for billing" "system_policy" = ["AliyunBSSFullAccess"] } ] log_account_ram_users = [ { "name" = "ProgrammaticReadOnlyUser" "description" = "Programmatic Read Only User" "enable_console_login" = false "enable_api_access" = true "system_policy" = ["ReadOnlyAccess"] }, { "name" = "ProgrammaticUser" "description" = "Programmatic User" "enable_console_login" = false "enable_api_access" = true "system_policy" = ["AliyunOSSFullAccess", "AliyunLogFullAccess"] } ] log_account_ram_roles = [ { "name" = "SystemAdmin" "description" = "Administrator role" "system_policy" = ["AdministratorAccess"] }, { "name" = "AuditAdmin" "description" = "AuditAdmin role" "system_policy" = [ "AliyunActionTrailFullAccess", "AliyunConfigFullAccess", "AliyunOSSFullAccess", "AliyunLogFullAccess" ] }, { "name" = "LogAdmin" "description" = "Administrator role for log" "system_policy" = ["AliyunOSSFullAccess", "AliyunLogFullAccess"] }, { "name" = "ReadOnly" "description" = "Read only role" "system_policy" = ["ReadOnlyAccess"] } ] shared_service_account_ram_users = [ { "name" = "CloudAdmin" "description" = "CloudAdmin user" "enable_console_login" = true "enable_api_access" = false "system_policy" = ["AdministratorAccess"] }, { "name" = "Emergency" "description" = "Emergency user" "enable_console_login" = true "enable_api_access" = false "system_policy" = ["AdministratorAccess"] }, { "name" = "ProgrammaticUser" "description" = "Programmatic user" "enable_console_login" = false "enable_api_access" = true "system_policy" = ["AdministratorAccess"] } ] shared_service_account_ram_roles = [ { "name" = "SystemAdmin" "description" = "Administrator role" "system_policy" = ["AdministratorAccess"] }, { "name" = "RAMAdmin" "description" = "Administrator role for RAM" "system_policy" = ["AliyunRAMFullAccess"] }, { "name" = "NetworkAdmin" "description" = "Administrator role for network" "system_policy" = [ "AliyunVPCFullAccess", "AliyunNATGatewayFullAccess", "AliyunSLBFullAccess", "AliyunCENFullAccess", "AliyunEIPFullAccess", "AliyunSmartAccessGatewayFullAccess", "AliyunVPNGatewayFullAccess", "AliyunExpressConnectFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "SecurityAdmin" "description" = "Administrator role for security" "system_policy" = [ "AliyunYundunCloudFirewallFullAccess", "AliyunCSASFullAccess", "AliyunYundunSASFullAccess", "AliyunYundunAntiDDoSPremiumFullAccess", "AliyunYundunDDoSRewardsFullAccess", "AliyunYundunNewBGPAntiDDoSServicePROFullAccess", "AliyunYundunAntiDDoSBagFullAccess", "AliyunYundunDDosFullAccess", "AliyunYundunWAFFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "ReadOnly" "description" = "Read only role" "system_policy" = ["ReadOnlyAccess"] } ] security_account_ram_users = [ ] security_account_ram_roles = [ { "name" = "SystemAdmin" "description" = "Administrator role" "system_policy" = ["AdministratorAccess"] }, { "name" = "SecurityAdmin" "description" = "Administrator role for Resource Directory" "system_policy" = [ "AliyunYundunCloudFirewallFullAccess", "AliyunCSASFullAccess", "AliyunYundunSASFullAccess", "AliyunYundunAntiDDoSPremiumFullAccess", "AliyunYundunDDoSRewardsFullAccess", "AliyunYundunNewBGPAntiDDoSServicePROFullAccess", "AliyunYundunAntiDDoSBagFullAccess", "AliyunYundunDDosFullAccess", "AliyunYundunWAFFullAccess", "AliyunBSSFullAccess" ] } ] ops_account_ram_users = [ { "name" = "CloudAdmin" "description" = "CloudAdmin user" "enable_console_login" = true "enable_api_access" = false "system_policy" = ["AdministratorAccess"] }, { "name" = "Emergency" "description" = "Emergency user" "enable_console_login" = true "enable_api_access" = false "system_policy" = ["AdministratorAccess"] }, { "name" = "ProgrammaticUser" "description" = "Programmatic user" "enable_console_login" = false "enable_api_access" = true "system_policy" = ["AdministratorAccess"] } ] ops_account_ram_roles = [ { "name" = "SystemAdmin" "description" = "Administrator role" "system_policy" = ["AdministratorAccess"] }, { "name" = "RAMAdmin" "description" = "Administrator role for RAM" "system_policy" = ["AliyunRAMFullAccess"] }, { "name" = "NetworkAdmin" "description" = "Administrator role for network" "system_policy" = [ "AliyunVPCFullAccess", "AliyunNATGatewayFullAccess", "AliyunSLBFullAccess", "AliyunCENFullAccess", "AliyunEIPFullAccess", "AliyunSmartAccessGatewayFullAccess", "AliyunVPNGatewayFullAccess", "AliyunExpressConnectFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "SecurityAdmin" "description" = "Administrator role for security" "system_policy" = [ "AliyunYundunCloudFirewallFullAccess", "AliyunCSASFullAccess", "AliyunYundunSASFullAccess", "AliyunYundunAntiDDoSPremiumFullAccess", "AliyunYundunDDoSRewardsFullAccess", "AliyunYundunNewBGPAntiDDoSServicePROFullAccess", "AliyunYundunAntiDDoSBagFullAccess", "AliyunYundunDDosFullAccess", "AliyunYundunWAFFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "ReadOnly" "description" = "Read only role" "system_policy" = ["ReadOnlyAccess"] } ] dev_account_ram_users = [ ] dev_account_ram_roles = [ { "name" = "SystemAdmin" "description" = "Administrator role" "system_policy" = ["AdministratorAccess"] }, { "name" = "RAMAdmin" "description" = "Administrator role for Resource Directory" "system_policy" = ["AliyunRAMFullAccess"] }, { "name" = "NetworkAdmin" "description" = "Administrator role for billing" "system_policy" = [ "AliyunVPCFullAccess", "AliyunNATGatewayFullAccess", "AliyunSLBFullAccess", "AliyunCENFullAccess", "AliyunEIPFullAccess", "AliyunSmartAccessGatewayFullAccess", "AliyunVPNGatewayFullAccess", "AliyunExpressConnectFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "SecurityAdmin" "description" = "Administrator role for billing" "system_policy" = [ "AliyunYundunCloudFirewallFullAccess", "AliyunCSASFullAccess", "AliyunYundunSASFullAccess", "AliyunYundunAntiDDoSPremiumFullAccess", "AliyunYundunDDoSRewardsFullAccess", "AliyunYundunNewBGPAntiDDoSServicePROFullAccess", "AliyunYundunAntiDDoSBagFullAccess", "AliyunYundunDDosFullAccess", "AliyunYundunWAFFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "DBAdmin" "description" = "Administrator role for database" "system_policy" = [ "AliyunMongoDBFullAccess", "AliyunGPDBFullAccess", "AliyunADBFullAccess", "AliyunGDBFullAccess", "AliyunPolardbFullAccess", "AliyunDBSFullAccess", "AliyunHiTSDBFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "BigdataAdmin" "description" = "Administrator role for bigdata" "system_policy" = [ "AliyunDataWorksFullAccess", "AliyunDataHubFullAccess", "AliyunDataVFullAccess", "AliyunDLAFullAccess", "AliyunEMRFullAccess", "AliyunPAIEASFullAccess", "AliyunElasticsearchFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "ReadOnly" "description" = "ReadOnly" "system_policy" = ["ReadOnlyAccess"] }, { "name" = "ContainerAdmin" "description" = "Administrator role for container" "system_policy" = ["AliyunContainerRegistryFullAccess", "AliyunCSFullAccess", "AliyunBSSFullAccess"] }, { "name" = "ContainerReadOnly" "description" = "Administrator role for container" "system_policy" = ["AliyunCSReadOnlyAccess", "AliyunContainerRegistryFullAccess"] } ] prod_account_ram_users = [ ] prod_account_ram_roles = [ { "name" = "SystemAdmin" "description" = "Administrator role" "system_policy" = ["AdministratorAccess"] }, { "name" = "RAMAdmin" "description" = "Administrator role for Resource Directory" "system_policy" = ["AliyunRAMFullAccess"] }, { "name" = "NetworkAdmin" "description" = "Administrator role for billing" "system_policy" = [ "AliyunVPCFullAccess", "AliyunNATGatewayFullAccess", "AliyunSLBFullAccess", "AliyunCENFullAccess", "AliyunEIPFullAccess", "AliyunSmartAccessGatewayFullAccess", "AliyunVPNGatewayFullAccess", "AliyunExpressConnectFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "SecurityAdmin" "description" = "Administrator role for billing" "system_policy" = [ "AliyunYundunCloudFirewallFullAccess", "AliyunCSASFullAccess", "AliyunYundunSASFullAccess", "AliyunYundunAntiDDoSPremiumFullAccess", "AliyunYundunDDoSRewardsFullAccess", "AliyunYundunNewBGPAntiDDoSServicePROFullAccess", "AliyunYundunAntiDDoSBagFullAccess", "AliyunYundunDDosFullAccess", "AliyunYundunWAFFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "DBAdmin" "description" = "Administrator role for database" "system_policy" = [ "AliyunMongoDBFullAccess", "AliyunGPDBFullAccess", "AliyunADBFullAccess", "AliyunGDBFullAccess", "AliyunPolardbFullAccess", "AliyunDBSFullAccess", "AliyunHiTSDBFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "BigdataAdmin" "description" = "Administrator role for bigdata" "system_policy" = [ "AliyunDataWorksFullAccess", "AliyunDataHubFullAccess", "AliyunDataVFullAccess", "AliyunDLAFullAccess", "AliyunEMRFullAccess", "AliyunPAIEASFullAccess", "AliyunElasticsearchFullAccess", "AliyunBSSFullAccess" ] }, { "name" = "ReadOnly" "description" = "ReadOnly" "system_policy" = ["ReadOnlyAccess"] }, { "name" = "ContainerAdmin" "description" = "Administrator role for container" "system_policy" = ["AliyunContainerRegistryFullAccess", "AliyunCSFullAccess", "AliyunBSSFullAccess"] }, { "name" = "ContainerReadOnly" "description" = "Administrator role for container" "system_policy" = ["AliyunCSReadOnlyAccess", "AliyunContainerRegistryFullAccess"] } ]