Product | Role Name | Role Types | Role Entity |
---|---|---|---|
Cloud Data Warehouse ClickHouse | CDWCH_QCSLinkedRoleInCKCOS | Service-Related Roles | ckcos.cdwch.cloud.tencent.com |
Cloud Data Warehouse ClickHouse | CDWCH_QCSLinkedRoleInCdwchClb | Service-Related Roles | cdwchclb.cdwch.cloud.tencent.com |
Cloud Data Warehouse ClickHouse | CDWCH_QCSLinkedRoleInCKLOGSHOW | Service-Related Roles | cklogshow.cdwch.cloud.tencent.com |
Use Cases: The current role is the CDWCH service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"cos:AbortMultipartUpload",
"cos:GetBucket",
"cos:GetBucketACL",
"cos:GetBucketAccelerate",
"cos:GetBucketCORS",
"cos:GetBucketDomain",
"cos:GetBucketEncryption",
"cos:GetBucketIntelligentTiering",
"cos:GetBucketInventory",
"cos:GetBucketLifecycle",
"cos:GetBucketLocation",
"cos:GetBucketLogging",
"cos:GetBucketNotification",
"cos:GetBucketObjectVersions",
"cos:GetBucketOrigin",
"cos:GetBucketPolicy",
"cos:GetBucketReferer",
"cos:GetBucketReplication",
"cos:GetBucketTagging",
"cos:GetBucketVersionAcl",
"cos:GetBucketVersioning",
"cos:GetBucketWebsite",
"cos:GetObject",
"cos:GetObjectACL",
"cos:GetObjectTagging",
"cos:GetObjectVersionAcl",
"cos:GetService",
"cos:HeadBucket",
"cos:HeadObject",
"cos:ListMultipartUploads",
"cos:ListParts",
"cos:OptionsObject",
"cos:AppendObject",
"cos:CompleteMultipartUpload",
"cos:InitiateMultipartUpload",
"cos:PostObject",
"cos:PostObjectRestore",
"cos:PutBucket",
"cos:PutBucketEncryption",
"cos:PutBucketIntelligentTiering",
"cos:PutBucketInventory",
"cos:PutBucketLifecycle",
"cos:PutBucketLogging",
"cos:PutBucketReplication",
"cos:PutBucketVersioning",
"cos:PutObject",
"cos:PutObjectCopy",
"cos:PutObjectTagging",
"cos:UploadPart",
"cos:UploadPartCopy",
"cos:DeleteMultipleObjects",
"cos:DeleteObject",
"cos:GetVodPlayList",
"cos:DeleteObjectTagging"
],
"resource": [
"*"
]
}
]
}
Use Cases: The current role is the CAM service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"clb:*"
],
"resource": "*"
}
]
}
Use Cases: The current role is the CDWCH service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"cls:DescribeConfigs",
"cls:DescribeIndex",
"cls:DescribeMachines",
"cls:GetAccount",
"cls:DescribeTopics",
"cls:GetLog",
"cls:SearchLog",
"cls:getConfig",
"cls:getConsumerGroupCursor",
"cls:getCursor",
"cls:getIndex",
"cls:getLogset",
"cls:getMachineGroup",
"cls:getMachineStatus",
"cls:getShipper",
"cls:getTopic",
"cls:searchLog",
"cls:ShowContext",
"cls:ApplyConfigToMachineGroup",
"cls:CreateConfig",
"cls:CreateIndex",
"cls:CreateLogset",
"cls:CreateMachineGroup",
"cls:CreateTopic",
"cls:DeleteIndex",
"cls:DeleteConfig",
"cls:DeleteMachineGroup",
"cls:ModifyIndex",
"cls:ModifyMachineGroup",
"cls:createLogset",
"cls:createMachineGroup",
"cls:createShipper",
"cls:createTopic",
"cls:modifyIndex",
"cls:modifyLogset",
"cls:modifyMachineGroup",
"cls:modifyShipper",
"cls:modifyTopic",
"cls:pushLog",
"cls:deleteMachineGroup",
"cls:deleteShipper",
"cls:DescribeAgentConfigs",
"cls:DescribeLogsets",
"cls:listLogset",
"cls:listMachineGroup",
"cls:listShipper",
"cls:listTopic",
"cls:agentHeartBeat",
"cls:DescribeMachineGroups",
"tag:TagResources"
],
"resource": [
"*"
]
}
]
}
Was this page helpful?