Getting Started with Resource Scheduler
This page provides a high level list of the processes to create, edit, suspend, postpone, and delete schedules with Resource Scheduler. See the detail pages for each step in the process.
To create and manage schedules you must create two policies:
- A policy to give users permission to access and change schedules
- A policy to give schedules permission to manage resources.
For more information and examples, see Authentication, Authorization, and Required Policies, Resource Scheduler Policies, and Example Policies.
Basic Operation
- Add basic schedule information (schedule name, description, action, and (optionally) tags.
- Select a compartment and resources
- Add schedule timing (set dates and times) for the schedule.
- Review settings and create the schedule
- As needed, manage the schedule details.
Authentication, Authorization, and Required Policies
Resource Scheduler uses the Identity and Access Management IAM process that is used to ensure secure access to Resource Scheduler, to create schedules, and to use schedules to manage resources.
Each service in Oracle Cloud Infrastructure integrates with IAM for authentication and authorization, for all interfaces (the Console, SDK or CLI, and REST API).
An administrator in your organization needs to set up groups , compartments , andpolicies that control which users can access which services, which resources, and the type of access. For example, the policies control who can create new users, create and manage the cloud network, create instances, create buckets, download objects, and so on. For more information, see Managing Identity Domains. For specific details about writing policies for each of the different services, see the Policy Reference.
Required Policies
To create and manage schedules you must create a policy to give users permission to create and change schedules AND you must create a policy to give schedules permission to manage resources.
Example 1. This policy gives users permission to create and modify schedules
Allow the ResourceScheduleUsers group to view and list resource schedules in tenancy.
Allow ResourceScheduleUsers to inspect resource-schedule in tenancy
Example 2. This policy gives the resource schedule permission to perform an action on the target resource.
When a resource schedule is created, by default, it doesn't have permission to perform the action on target resources, so you must give it permission.
General example
Allow any-user to manage <resource_type (instance, database, and others)> in compartment id <target_compartment_ocid> where all {request.principal.type='resourceschedule',request.principal.id='ocid_of_resourceschedule'}
If you are a regular user (not an administrator) who needs to use the Oracle Cloud Infrastructure resources that your company owns, contact your administrator to set up a user ID for you. The administrator can confirm which compartment or compartments you should use.
To use any of the Resource Scheduler API operations, you must be authorized in an IAM policy. If you're not authorized, contact the administrator. If you're an administrator who needs to write policies to give users access, see Managing Identity Domains