Product | Role Name | Role Types | Role Entity |
---|---|---|---|
Tencent Cloud Elastic Microservice | TEM_QCSLinkedRoleInTEMAPI | Service-Related Roles | temapi.tem.cloud.tencent.com |
Tencent Cloud Elastic Microservice | TEM_QCSLinkedRoleInTEMLog | Service-Related Roles | cvm.qcloud.com temlog.tem.cloud.tencent.com |
Tencent Cloud Elastic Microservice | TEM_QCSLinkedRoleInAccessCluster | Service-Related Roles | accesscluster.tem.cloud.tencent.com |
Tencent Cloud Elastic Microservice | TEM_QCSLinkedRoleInAccessResourceService | Service-Related Roles | accessresourceservice.tem.cloud.tencent.com |
Use Cases: The current role is the TEM service role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"resource": [
"*"
],
"action": [
"apm:CreatePAASInstance",
"apm:DescribeApmAgent",
"apm:DescribeTopology",
"apm:DeletePAASInstance",
"apm:DescribePAASTopology",
"tcb:CreateCloudBaseRunServerVersionWithMicroService"
]
}
]
}
Use Cases: The current role is the TEM service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"resource": [
"*"
],
"action": [
"cls:listTopic",
"cls:getTopic",
"cls:createTopic",
"cls:modifyTopic",
"cls:listMachineGroup",
"cls:getMachineGroup",
"cls:createMachineGroup",
"cls:modifyMachineGroup",
"cls:deleteMachineGroup",
"cls:getMachineStatus",
"cls:pushLog",
"cls:agentHeartBeat",
"cls:getConfig"
]
}
]
}
Use Cases: The current role is the TEM service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"tse:DescribeSREInstances",
"tse:DescribeSREInstanceAccessAddress",
"tse:DescribeSREGlobalConfigs",
"tke:DescribeClusters",
"tcr:CreateNamespacePersonal",
"tcr:DeleteNamespacePersonal",
"tcr:DescribeRepositoryOwnerPersonal",
"tcr:DeleteRepositoryPersonal",
"tcr:DeleteImagePersonal",
"tcr:CreateRepositoryPersonal",
"tcr:BatchDeleteRepositoryPersonal",
"tcr:BatchDeleteImagePersonal",
"tcr:CreateInstanceToken",
"tcr:DescribeInstanceToken",
"tcr:DeleteInstanceToken",
"tcr:DescribeRepositories",
"tcr:PullRepository",
"tcr:PullRepositoryPersonal",
"cls:searchLog",
"cls:getTopic",
"cls:getIndex",
"cls:CreateIndex",
"cls:modifyIndex",
"cls:DeleteIndex",
"cfs:DescribeCfsFileSystems",
"cfs:DescribeMountTargets",
"vpc:DescribeSubnetEx",
"vpc:DescribeSubnet",
"apm:CreateApmInstance",
"apm:ModifyApmInstance",
"apm:TerminateApmInstance",
"apm:CreatePAASInstance",
"apm:DeletePAASInstance",
"apm:DescribeApmAgent",
"apm:DescribeTopologyMetricLineData",
"apm:DescribeMetricLineData",
"apm:DescribeServiceOverview",
"apm:DescribeMetricRecords",
"cam:GetRole",
"tcr:DescribeInternalEndpoints",
"tcr:DescribeInternalEndpointDnsStatus",
"tcr:CreateInternalEndpointDns",
"tcr:DuplicateImagePersonal",
"tcr:DescribeInstances",
"tcr:CreateInstance",
"tcr:DescribeNamespaces",
"tcr:CreateNamespace",
"tcr:CreateRepository",
"tcr:DescribeRepositories",
"tcr:ManageInternalEndpoint",
"tcr:PushRepository",
"tcr:PushRepositoryPersonal",
"monitor:DescribePrometheusInstances",
"monitor:UpgradeGrafanaDashboard",
"vpc:CreateVpc",
"vpc:CreateSubnet",
"vpc:DescribeVpcEx",
"vpc:DeleteNatGateway",
"vpc:CreateNatGateway",
"vpc:CreateRoute",
"vpc:EnableRoutes",
"vpc:DeleteRoute",
"vpc:DescribeNatGateways",
"vpc:DescribeRouteTable",
"cvm:ReleaseAddresses",
"monitor:TerminatePrometheusInstances",
"monitor:CreatePrometheusMultiTenantInstancePostPayMode"
],
"resource": [
"*"
]
}
]
}
Use Cases: The current role is the TEM service role,which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"tcb:DescribeCloudBaseGWAPI",
"tcb:DescribeCloudBaseRunServer",
"tcb:DescribeCloudBaseRunServers",
"tcb:DescribeCloudBaseRunServerVersion",
"tcb:DescribeEnvLimit",
"tcb:DescribeCloudBaseRunPodList",
"tcb:DescribeICPResources",
"tcb:DescribePostPackage",
"tcb:DescribeCloudBaseGWService",
"tcb:DescribeCurveData",
"tcb:SearchClsLog",
"tcb:DescribeCloudBaseRunImages",
"tcb:DescribeCloudBaseRunServerFlowConf",
"tcb:CreateCloudBaseRunServerVersion",
"tcb:CreateCloudBaseGWAPI",
"tcb:ModifyCloudBaseGWAPIPublicAccess",
"tcb:ModifyCloudBaseGWAPIAccessType",
"tcb:ModifyCloudBaseRunServerVersion",
"tcb:CreatePostpayPackage",
"tcb:DeleteCloudBaseRunImageRepo",
"tcb:DeleteCloudBaseRunServer",
"tcb:DeleteCloudBaseRunServerVersion",
"tcb:EstablishCloudBaseRunServer",
"tcb:ModifyCloudBaseRunServerFlowConf",
"tcb:RollUpdateCloudBaseRunServerVersion",
"tcb:DescribeEnvs",
"tcb:DestroyEnv",
"tcb:CheckTcbService",
"tcb:ModifyEnv",
"tcb:DescribeCloudBaseRunVersionException"
],
"resource": [
"*"
]
}
]
}
문제 해결에 도움이 되었나요?