Product | Role Name | Role Types | Role Entity |
---|---|---|---|
Cloud Native Database TDSQL-C | CynosDB_QCSLinkedRoleInDBLog | Service-Related Roles | DBLog.cynosdb.cloud.tencent.com |
Cloud Native Database TDSQL-C | CynosDBMysql_QCSLinkedRoleInKms | Service-Related Roles | kms.cynosdb.cloud.tencent.com |
Cloud Native Database TDSQL-C | CynosDBMysql_QCSLinkedRoleInClslog | Service-Related Roles | clslog.cynosdb.cloud.tencent.com |
Cloud Native Database TDSQL-C | CynosDB_QCSLinkedRoleInDBlogDeliver | Service-Related Roles | DBLogDeliver.cynosdb.cloud.tencent.com |
Cloud Native Database TDSQL-C | CynosDBMysql_QCSLinkedRoleInDtsDataSync | Service-Related Roles | dtsDataSync.cynosdb.cloud.tencent.com |
Use Cases: The current role is the TDSQL-C service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"cls:ModifyKafkaRecharge",
"cls:DescribeKafkaRecharges",
"cls:DeleteKafkaRecharge",
"cls:CreateKafkaRecharge",
"cls:DeleteCloudProductLogTask",
"cls:ModifyCloudProductLogTask"
],
"resource": "*"
}
]
}
Use Cases: The current role is the cynosdb service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"kms:GetServiceStatus",
"kms:ListKeyDetail",
"kms:CreateKey",
"kms:GenerateDataKey",
"kms:Decrypt",
"kms:BindCloudResource",
"kms:UnbindCloudResource"
],
"resource": [
"*"
]
}
]
}
Use Cases: The current role is the CYNOSDB service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"cls:DescribeIndexs",
"cls:DescribeTopics",
"cls:DescribeIndex",
"cls:CreateIndex",
"cls:DeleteIndex",
"cls:ModifyIndex",
"cls:pushLog",
"cls:CreateLogset",
"cls:CreateTopic",
"cls:DescribeLogsets",
"cls:DeleteTopic",
"cls:DeleteLogset"
],
"resource": [
"*"
]
}
]
}
Use Cases: The current role is the TDSQL-C service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"ckafka:DescribeTopic",
"ckafka:CreateTopic",
"ckafka:CreateRoute",
"ckafka:DescribeTaskStatus",
"ckafka:DescribeRoute"
],
"resource": "*"
}
]
}
Use Cases: The current role is the cynosdb service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"dts:CreateSyncJob",
"dts:ConfigureSyncJob",
"dts:CreateCheckSyncJob",
"dts:DescribeCheckSyncJobResult",
"dts:SkipSyncCheckItem",
"dts:StartSyncJob",
"dts:DescribeSyncJobs",
"dts:IsolateSyncJob",
"dts:DestroySyncJob"
],
"resource": [
"*"
]
},
{
"action": [
"finance:trade",
"finance:CreateOrders"
],
"effect": "allow",
"resource": [
"qcs::dts:::*"
]
}
]
}