Product | Role Name | Role Types | Role Entity |
---|---|---|---|
Cloud Native Database TDSQL-C | CynosDB_QCSLinkedRoleInDBLog | Service-Related Roles | DBLog.cynosdb.cloud.tencent.com |
Cloud Native Database TDSQL-C | CynosDBMysql_QCSLinkedRoleInKms | Service-Related Roles | kms.cynosdb.cloud.tencent.com |
Cloud Native Database TDSQL-C | CynosDBMysql_QCSLinkedRoleInClslog | Service-Related Roles | clslog.cynosdb.cloud.tencent.com |
Use Cases: The current role is the TDSQL-C service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"cls:ModifyKafkaRecharge",
"cls:DescribeKafkaRecharges",
"cls:DeleteKafkaRecharge",
"cls:CreateKafkaRecharge",
"cls:DeleteCloudProductLogTask"
],
"resource": "*"
}
]
}
Use Cases: The current role is the cynosdb service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"kms:GetServiceStatus",
"kms:ListKeyDetail",
"kms:CreateKey",
"kms:GenerateDataKey",
"kms:Decrypt",
"kms:BindCloudResource",
"kms:UnbindCloudResource"
],
"resource": [
"*"
]
}
]
}
Use Cases: The current role is the CYNOSDB service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"cls:DescribeIndexs",
"cls:DescribeTopics",
"cls:DescribeIndex",
"cls:CreateIndex",
"cls:DeleteIndex",
"cls:ModifyIndex",
"cls:pushLog",
"cls:CreateLogset",
"cls:CreateTopic",
"cls:DescribeLogsets",
"cls:DeleteTopic",
"cls:DeleteLogset"
],
"resource": [
"*"
]
}
]
}
문제 해결에 도움이 되었나요?