注册并登录到 Cloud Assembly |
VMware ID。
|
连接到 vRealize Automation Cloud 服务 |
对出站流量打开并具有透过防火墙对以下域的访问权限的 HTTPS 端口 443:
- *.vmwareidentity.com
- gaz.csp-vidm-prod.com
- *.vmware.com
有关端口和协议的详细信息,请参见 VMware 端口和协议。 |
添加 vCenter 云帐户 |
vSphere 代理需要拥有管理
vCenter Server 实例的特权。提供具有以下读取和写入权限的帐户:
- vCenter IP 地址或 FQDN
- 在 vCenter Server 上安装云代理所需的权限
将列出管理 VMware Cloud on AWS 和 vCenter 云帐户所需的权限。必须对 vCenter Server 中的所有集群启用权限,而不仅仅是托管端点的集群。 对于所有基于 vCenter Server 的云帐户(包括 NSX-V、NSX-T、vCenter 和 VMware Cloud on AWS),管理员必须拥有 vSphere 端点凭据,或者在 vCenter 中运行代理服务的凭据,从而提供对主机 vCenter Server 的管理访问权限。 有关 vSphere 代理要求的详细信息,请参见 VMware vSphere 产品文档。
|
添加 Amazon Web Services (AWS) 云帐户 |
提供具有读取和写入权限的超级用户帐户。用户帐户必须是 AWS 标识与访问管理 (IAM) 系统中的电源访问策略 (PowerUserAccess) 的成员。
如果您使用的是外部 HTTP Internet 代理,则必须针对 IPv4 对其进行配置。 vRealize Automation 基于操作的可扩展性 (ABX) 和外部 IPAM 集成可能需要额外的权限。
要允许 Auto Scaling 功能,建议具备以下 AWS 权限:
- Auto Scaling 操作:
- autoscaling:DescribeAutoScalingInstances
- autoscaling:AttachInstances
- autoscaling:DeleteLaunchConfiguration
- autoscaling:DescribeAutoScalingGroups
- autoscaling:CreateAutoScalingGroup
- autoscaling:UpdateAutoScalingGroup
- autoscaling:DeleteAutoScalingGroup
- autoscaling:DescribeLoadBalancers
- Auto Scaling 资源:
要允许 AWS Security Token Service (AWS STS) 功能对 AWS 身份和访问支持临时、有限特权凭据,需要具备以下权限:
要允许 EC2 功能,需要具备以下 AWS 权限:
要允许弹性负载均衡功能,需要具备以下 AWS 权限:
- 负载均衡器操作:
- elasticloadbalancing:DeleteLoadBalancer
- elasticloadbalancing:DescribeLoadBalancers
- elasticloadbalancing:RemoveTags
- elasticloadbalancing:CreateLoadBalancer
- elasticloadbalancing:DescribeTags
- elasticloadbalancing:ConfigureHealthCheck
- elasticloadbalancing:AddTags
- elasticloadbalancing:CreateTargetGroup
- elasticloadbalancing:DeleteLoadBalancerListeners
- elasticloadbalancing:DeregisterInstancesFromLoadBalancer
- elasticloadbalancing:RegisterInstancesWithLoadBalancer
- elasticloadbalancing:CreateLoadBalancerListeners
- 负载均衡器资源:
可以启用以下 AWS 身份与访问管理 (IAM) 权限,但这些权限不是必需权限:
- iam:SimulateCustomPolicy
- iam:GetUser
- iam:ListUserPolicies
- iam:GetUserPolicy
- iam:ListAttachedUserPolicies
- iam:GetPolicyVersion
- iam:ListGroupsForUser
- iam:ListGroupPolicies
- iam:GetGroupPolicy
- iam:ListAttachedGroupPolicies
- iam:ListPolicyVersions
|
添加 Microsoft Azure 云帐户 |
配置 Microsoft Azure 实例,并获取可以在其中使用订阅 ID 的有效 Microsoft Azure 订阅。 按照 Microsoft Azure 产品文档中的如何:使用门户创建可访问资源的 Azure AD 应用程序和服务主体所述创建 Active Directory 应用程序。 如果您使用的是外部 HTTP Internet 代理,则必须针对 IPv4 对其进行配置。
记录以下信息:
- 订阅 ID
允许您访问 Microsoft Azure 订阅。
- 租户 ID
在 Microsoft Azure 帐户中创建的 Active Directory 应用程序的授权端点。
- 客户端应用程序 ID
用于访问 Microsoft Azure 个人帐户中的 Microsoft Active Directory。
- 客户端应用程序密钥
生成的唯一的密钥,用于与客户端应用程序 ID 配对。
创建和验证
Microsoft Azure 云帐户需要以下权限:
- Microsoft 计算
- Microsoft.Compute/virtualMachines/extensions/write
- Microsoft.Compute/virtualMachines/extensions/read
- Microsoft.Compute/virtualMachines/extensions/delete
- Microsoft.Compute/virtualMachines/deallocate/action
- Microsoft.Compute/virtualMachines/delete
- Microsoft.Compute/virtualMachines/powerOff/action
- Microsoft.Compute/virtualMachines/read
- Microsoft.Compute/virtualMachines/restart/action
- Microsoft.Compute/virtualMachines/start/action
- Microsoft.Compute/virtualMachines/write
- Microsoft.Compute/availabilitySets/write
- Microsoft.Compute/availabilitySets/read
- Microsoft.Compute/availabilitySets/delete
- Microsoft.Compute/disks/delete
- Microsoft.Compute/disks/read
- Microsoft.Compute/disks/write
- Microsoft 网络
- Microsoft.Network/loadBalancers/backendAddressPools/join/action
- Microsoft.Network/loadBalancers/delete
- Microsoft.Network/loadBalancers/read
- Microsoft.Network/loadBalancers/write
- Microsoft.Network/networkInterfaces/join/action
- Microsoft.Network/networkInterfaces/read
- Microsoft.Network/networkInterfaces/write
- Microsoft.Network/networkInterfaces/delete
- Microsoft.Network/networkSecurityGroups/join/action
- Microsoft.Network/networkSecurityGroups/read
- Microsoft.Network/networkSecurityGroups/write
- Microsoft.Network/networkSecurityGroups/delete
- Microsoft.Network/publicIPAddresses/delete
- Microsoft.Network/publicIPAddresses/join/action
- Microsoft.Network/publicIPAddresses/read
- Microsoft.Network/publicIPAddresses/write
- Microsoft.Network/virtualNetworks/read
- Microsoft.Network/virtualNetworks/subnets/delete
- Microsoft.Network/virtualNetworks/subnets/join/action
- Microsoft.Network/virtualNetworks/subnets/read
- Microsoft.Network/virtualNetworks/subnets/write
- Microsoft.Network/virtualNetworks/write
- Microsoft 资源
- Microsoft.Resources/subscriptions/resourcegroups/delete
- Microsoft.Resources/subscriptions/resourcegroups/read
- Microsoft.Resources/subscriptions/resourcegroups/write
- Microsoft 存储
- Microsoft Web
- Microsoft.Web/sites/read
- Microsoft.Web/sites/write
- Microsoft.Web/sites/delete
- Microsoft.Web/sites/config/read
- Microsoft.Web/sites/config/write
- Microsoft.Web/sites/config/list/action
- Microsoft.Web/sites/publishxml/action
- Microsoft.Web/serverfarms/write
- Microsoft.Web/serverfarms/delete
- Microsoft.Web/sites/hostruntime/functions/keys/read
- Microsoft.Web/sites/hostruntime/host/read
- Microsoft.web/sites/functions/masterkey/read
如果要将
Microsoft Azure 与基于操作的可扩展性配合使用,除了最小权限外,还需要以下权限:
- Microsoft.Web/sites/read
- Microsoft.Web/sites/write
- Microsoft.Web/sites/delete
- Microsoft.Web/sites/*/action
- Microsoft.Web/sites/config/read
- Microsoft.Web/sites/config/write
- Microsoft.Web/sites/config/list/action
- Microsoft.Web/sites/publishxml/action
- Microsoft.Web/serverfarms/write
- Microsoft.Web/serverfarms/delete
- Microsoft.Web/sites/hostruntime/functions/keys/read
- Microsoft.Web/sites/hostruntime/host/read
- Microsoft.Web/sites/functions/masterkey/read
- Microsoft.Web/apimanagementaccounts/apis/read
- Microsoft.Authorization/roleAssignments/read
- Microsoft.Authorization/roleAssignments/write
- Microsoft.Authorization/roleAssignments/delete
- Microsoft.Insights/Components/Read
- Microsoft.Insights/Components/Write
- Microsoft.Insights/Components/Query/Read
如果要将
Microsoft Azure 与包含扩展的基于操作的可扩展性配合使用,还需要以下权限:
- Microsoft.Compute/virtualMachines/extensions/write
- Microsoft.Compute/virtualMachines/extensions/read
- Microsoft.Compute/virtualMachines/extensions/delete
有关创建 Microsoft Azure 云帐户的相关信息,请参见配置 Microsoft Azure。 |
添加 Google Cloud Platform (GCP) 云帐户 |
Google Cloud Platform 云帐户与 Google Cloud Platform 计算引擎交互。 创建和验证 Google Cloud Platform 云帐户需要项目管理员和所有者凭据。 如果您使用的是外部 HTTP Internet 代理,则必须针对 IPv4 对其进行配置。 必须启用计算引擎服务。在 vRealize Automation Cloud 中创建云帐户时,请使用在初始化计算引擎时创建的服务帐户。 还需要以下计算引擎权限,具体取决于用户可以执行的操作:
- roles/compute.admin
用于完全控制所有计算引擎资源。
- roles/iam.serviceAccountUser
用于访问管理已配置为作为服务帐户运行的虚拟机实例的用户。授予对以下资源和服务的访问权限:
- compute.*
- resourcemanager.projects.get
- resourcemanager.projects.list
- serviceusage.quotas.get
- serviceusage.services.get
- serviceusage.services.list
- roles/compute.imageUser
提供列出和读取映像的权限,而无需对映像具有其他权限。在项目级别授予 compute.imageUser 角色,使用户能够列出项目中的所有映像。它还允许用户根据项目中的映像创建实例和永久磁盘等资源。
- compute.images.get
- compute.images.getFromFamily
- compute.images.list
- compute.images.useReadOnly
- resourcemanager.projects.get
- resourcemanager.projects.list
- serviceusage.quotas.get
- serviceusage.services.get
- serviceusage.services.list
- roles/compute.instanceAdmin
提供创建、修改和删除虚拟机实例的权限。这包括创建、修改和删除磁盘以及配置受防护 VMBETA 设置的权限。 对于管理虚拟机实例(但不是网络或安全设置或作为服务帐户运行的实例)的用户,将此角色授予包含实例的组织、文件夹或项目,或者授予单个实例。 管理已配置为作为服务帐户运行的虚拟机实例的用户还需要 roles/iam.serviceAccountUser 角色。
- compute.acceleratorTypes
- compute.addresses.get
- compute.addresses.list
- compute.addresses.use
- compute.autoscalers
- compute.diskTypes
- compute.disks.create
- compute.disks.createSnapshot
- compute.disks.delete
- compute.disks.get
- compute.disks.list
- compute.disks.resize
- compute.disks.setLabels
- compute.disks.update
- compute.disks.use
- compute.disks.useReadOnly
- compute.globalAddresses.get
- compute.globalAddresses.list
- compute.globalAddresses.use
- compute.globalOperations.get
- compute.globalOperations.list
- compute.images.get
- compute.images.getFromFamily
- compute.images.list
- compute.images.useReadOnly
- compute.instanceGroupManagers
- compute.instanceGroups
- compute.instanceTemplates
- compute.instances
- compute.licenses.get
- compute.licenses.list
- compute.machineTypes
- compute.networkEndpointGroups
- compute.networks.get
- compute.networks.list
- compute.networks.use
- compute.networks.useExternalIp
- compute.projects.get
- compute.regionOperations.get
- compute.regionOperations.list
- compute.regions
- compute.reservations.get
- compute.reservations.list
- compute.subnetworks.get
- compute.subnetworks.list
- compute.subnetworks.use
- compute.subnetworks.useExternalIp
- compute.targetPools.get
- compute.targetPools.list
- compute.zoneOperations.get
- compute.zoneOperations.list
- compute.zones
- resourcemanager.projects.get
- resourcemanager.projects.list
- serviceusage.quotas.get
- serviceusage.services.get
- serviceusage.services.list
- roles/compute.instanceAdmin.v1
用于完全控制计算引擎实例、实例组、磁盘、快照和映像。还提供对所有计算引擎网络资源的读取访问权限。
注: 如果在实例级别为用户授予此角色,则该用户无法创建新的实例。
- compute.acceleratorTypes
- compute.addresses.get
- compute.addresses.list
- compute.addresses.use
- compute.autoscalers
- compute.backendBuckets.get
- compute.backendBuckets.list
- compute.backendServices.get
- compute.backendServices.list
- compute.diskTypes
- compute.disks
- compute.firewalls.get
- compute.firewalls.list
- compute.forwardingRules.get
- compute.forwardingRules.list
- compute.globalAddresses.get
- compute.globalAddresses.list
- compute.globalAddresses.use
- compute.globalForwardingRules.get
- compute.globalForwardingRules.list
- compute.globalOperations.get
- compute.globalOperations.list
- compute.healthChecks.get
- compute.healthChecks.list
- compute.httpHealthChecks.get
- compute.httpHealthChecks.list
- compute.httpsHealthChecks.get
- compute.httpsHealthChecks.list
- compute.images
- compute.instanceGroupManagers
- compute.instanceGroups
- compute.instanceTemplates
- compute.instances
- compute.interconnectAttachments.get
- compute.interconnectAttachments.list
- compute.interconnectLocations
- compute.interconnects.get
- compute.interconnects.list
- compute.licenseCodes
- compute.licenses
- compute.machineTypes
- compute.networkEndpointGroups
- compute.networks.get
- compute.networks.list
- compute.networks.use
- compute.networks.useExternalIp
- compute.projects.get
- compute.projects.setCommonInstanceMetadata
- compute.regionBackendServices.get
- compute.regionBackendServices.list
- compute.regionOperations.get
- compute.regionOperations.list
- compute.regions
- compute.reservations.get
- compute.reservations.list
- compute.resourcePolicies
- compute.routers.get
- compute.routers.list
- compute.routes.get
- compute.routes.list
- compute.snapshots
- compute.sslCertificates.get
- compute.sslCertificates.list
- compute.sslPolicies.get
- compute.sslPolicies.list
- compute.sslPolicies.listAvailableFeatures
- compute.subnetworks.get
- compute.subnetworks.list
- compute.subnetworks.use
- compute.subnetworks.useExternalIp
- compute.targetHttpProxies.get
- compute.targetHttpProxies.list
- compute.targetHttpsProxies.get
- compute.targetHttpsProxies.list
- compute.targetInstances.get
- compute.targetInstances.list
- compute.targetPools.get
- compute.targetPools.list
- compute.targetSslProxies.get
- compute.targetSslProxies.list
- compute.targetTcpProxies.get
- compute.targetTcpProxies.list
- compute.targetVpnGateways.get
- compute.targetVpnGateways.list
- compute.urlMaps.get
- compute.urlMaps.list
- compute.vpnTunnels.get
- compute.vpnTunnels.list
- compute.zoneOperations.get
- compute.zoneOperations.list
- compute.zones
- resourcemanager.projects.get
- resourcemanager.projects.list
- serviceusage.quotas.get
- serviceusage.services.get
- serviceusage.services.list
|
添加 NSX-T 云帐户 |
提供具有以下读取和写入权限的帐户:
- NSX-T IP 地址或 FQDN
- NSX-T Data Center - 企业级管理员角色和访问凭据
- 在管理此 NSX-T 实例的 vCenter Server 实例上安装云代理所需的权限
管理员还需要能够访问 vCenter Server,如此表的“添加 vCenter 云帐户”部分中所述。 |
添加 NSX-V 云帐户 |
提供具有以下读取和写入权限的帐户:
- NSX-V 企业级管理员角色和访问凭据
- NSX-V IP 地址或 FQDN
- 在管理此 NSX-V 实例的 vCenter Server 实例上安装云代理所需的权限
管理员还需要能够访问 vCenter Server,如此表的“添加 vCenter 云帐户”部分中所述。 |
添加 VMware Cloud on AWS (VMC) 云帐户 |
提供具有以下读取和写入权限的帐户:
- cloudadmin@vmc.local 帐户或 CloudAdmin 组中的任何用户帐户
- NSX 企业级管理员角色和访问凭据
- 对您组织的 VMware Cloud on AWS SDDC 环境的 NSX 云管理员访问权限
- 对您组织的 VMware Cloud on AWS SDDC 环境的管理员访问权限
- 您组织的 VMware Cloud on AWS 服务中的 VMware Cloud on AWS 环境的 VMware Cloud on AWS API 令牌
- vCenter IP 地址或 FQDN
- 在 vCenter Server 上安装云代理所需的权限
管理员还需要能够访问 vCenter Server,如此表的“添加 vCenter 云帐户”部分中所述。 有关创建和使用 VMware Cloud on AWS 云帐户所需的权限的详细信息,请参见 VMware Cloud on AWS 产品文档中的管理 VMware Cloud on AWS 数据中心。 |