Creating Schedules

You can use Resource Scheduler to create schedules and add resources, dates, start and end times to the schedules, and review and edit the schedule before saving it.

Task Overview

  1. Complete the prerequisites and create the required policies.
  2. Add basic schedule information (schedule name, description, action, and (optionally) tags.
  3. Select a compartment and resources.
  4. Add dates and times to the schedule
  5. Review and save the schedule
  6. Monitor and manage schedules (edit, disable, enable, delete, as needed)

Prerequisites

Before creating a schedule, check the requirements listed here and create the necessary policies to allow users to create schedules and schedules to manage resources.

  1. Administrators, create the required policies described in the next section on this page.
  2. Users, check your access rights and obtain the necessary permissions from the administrator to create schedules.
  3. Before creating a schedule, ensure that you have the following information:
    • The names of the tenancies, compartments, regions, and organizations where the resources are
    • The list of resources to be affected by the scheduled actions
    • The dates and times of the start and stop actions to be in the schedules
  4. Check for schedule conflicts. Look for existing schedules that use the same resources that you are scheduling at the same time you're scheduling them.

Required Policies

Important

Before you can create or manage a schedule, you must create a policy to give users permission to access and change schedules (see Example 1) AND you must create a policy to policy to give schedules permission to manage resources (see Example 2).

Example 1. This policy gives users permission to manage (create, delete, activate, and others.) resource schedules in their tenancy.

General example
Allow group <groupname> to manage resource-schedule-family in tenancy

Specific example
Allow group ResourceScheduleAdmins to manage resource-schedule-family in tenancy

Example 2. This policy gives a resource schedule permission to perform an action on a resource.

When a resource schedule is created, by default, it doesn't have permission to perform the action on target resources, so you must give it permission.

This policy gives a schedule permission to manage predefined resources such as instances in a compartment.

General example
Allow any-user to manage <resource_type> 
in compartment id <compartment_ocid> where all
{request.principal.type='resourceschedule',
request.principal.id='<ocid_of_resourceschedule>'}

Specific example
Allow any-user to manage instance in
compartment id ocid.compartment.oc1...q7fa where all
{request.principal.type='resourceschedule',
request.principal.id='ocid.resourceschedule.oc1.iad.axgr...dt8zb'}

Authentication and Authorization

This page describes the Identity and Access Management IAM process that is used to ensure secure access to Resource Scheduler.

Each service in Oracle Cloud Infrastructure integrates with IAM for authentication and authorization, for all interfaces (the Console, SDK or CLI, and REST API).

An administrator in your organization needs to set up groups , compartments , andpolicies  that control which users can access which services, which resources, and the type of access. For example, the policies control who can create new users, create and manage the cloud network, launch instances, create buckets, download objects, and so on. For more information, see Managing Identity Domains. For specific details about writing policies for each of the different services, see the Policy Reference.

Example policy

Allow the ResourceScheduleAdmins group to perform administrative operations with resource schedules, including Create, Update, Move, and Delete.

Allow group ResourceScheduleAdmins to manage resource-schedule in tenancy
Note

More policy examples are shown in Example Policies

If you are a regular user (not an administrator) who needs to use the Oracle Cloud Infrastructure resources that your company owns, contact your administrator to set up a user ID for you. The administrator can confirm which compartment or compartments you should be using.

To use any of the Resource Scheduler API operations, you must be authorized in an IAM policy. If you're not authorized, contact the administrator. If you're an administrator who needs to write policies to give users access, see Managing Identity Domains.