Actions Supported by Identity Policy-based Authorization
IAM provides system-defined identity policies to define typical cloud service permissions. You can also create custom identity policies using the actions supported by cloud services for more refined access control.
In addition to IAM, the Organizations service also provides Service Control Policies (SCPs) to set access control policies.
SCPs do not actually grant any permissions to an entity. They only set the permissions boundary for the entity. When SCPs are attached to an organizational unit (OU) or a member account, the SCPs do not directly grant permissions to that OU or member account. Instead, the SCPs only determine what permissions are available for that member account or those member accounts under that OU. The granted permissions can be applied only if they are allowed by the SCPs.
To learn more about how IAM is different from Organizations for access control, see How IAM Is Different from Organizations for Access Control?.
This section describes the elements used by IAM custom identity policies and Organizations SCPs. The elements include actions, resources, and conditions.
- For details about how to use these elements to edit an IAM custom identity policy, see Creating a Custom Identity Policy.
- For details about how to use these elements to edit a custom SCP, see Creating an SCP.
Actions
Actions are specific operations that are allowed or denied in an identity policy.
- The Access Level column describes how the action is classified (List, Read, or Write). This classification helps you understand the level of access that an action grants when you use it in an identity policy.
- The Resource Type column indicates whether the action supports resource-level permissions.
- You can use a wildcard (*) to indicate all resource types. If this column is empty (-), the action does not support resource-level permissions and you must specify all resources ("*") in your identity policy statements.
- If this column includes a resource type, you must specify the URN in the Resource element of your identity policy statements.
- Required resources are marked with asterisks (*) in the table. If you specify a resource in a statement using this action, then it must be of this type.
For details about the resource types defined by LTS, see Resources.
- The Condition Key column contains keys that you can specify in the Condition element of an identity policy statement.
- If the Resource Type column has values for an action, the condition key takes effect only for the listed resource types.
- If the Resource Type column is empty (-) for an action, the condition key takes effect for all resources that action supports.
- If the Condition Key column is empty (-) for an action, the action does not support any condition keys.
For details about the condition keys defined by LTS, see Conditions.
- The Alias column lists the policy actions that are configured in identity policies. With these actions, you can use APIs for policy-based authorization. For details, see Policies and Identity Policies.
The following table lists the actions that you can define in identity policy statements for LTS.
|
Action |
Description |
Access Level |
Resource Type (*: required) |
Condition Key |
Alias |
|---|---|---|---|---|---|
|
lts:logGroup:deleteLogGroup |
Grants permission to delete log group. |
Write |
logGroup * |
- |
|
|
lts:logGroup:listLogGroup |
Grants permission to get log group list . |
List |
- |
- |
|
|
lts:logGroup:createLogGroup |
Grants permission to create log group. |
Write |
- |
- |
|
|
lts:logGroup:updateLogGroup |
Grants permission to update log group. |
Write |
logGroup * |
- |
|
|
lts:logStream:listLogStream |
Grants permission to get log stream list. |
List |
logGroup * |
- |
|
|
lts:logStream:deleteLogStream |
Grants permission to delete log stream. |
Write |
logStream * |
- |
|
|
lts:logStream:createLogStream |
Grants permission to create log stream. |
Write |
logGroup * |
- |
|
|
lts:logStream:searchLog |
Grants permission to get logs list. |
List |
logStream * |
- |
|
|
lts:logStream:searchStructLog |
Grants permission to get struct logs list. |
List |
logStream * |
- |
- |
|
lts:logStream:searchLogHistogram |
Grants permission to get logHistogram list. |
List |
logStream * |
- |
|
|
lts:transfer:createTransfer |
Grants permission to create transfer. |
Write |
- |
- |
|
|
lts:transfer:deleteTransfer |
Grants permission to delete transfer. |
Write |
transfer * |
- |
|
|
lts:transfer:listTransfer |
Grants permission to get transfers list. |
List |
- |
- |
|
|
lts:transfer:updateTransfer |
Grants permission to update transfer. |
Write |
transfer * |
- |
|
|
lts:transfer:registerDmsKafkaInstance |
Grants permission to register DmsKafka instance. |
Write |
- |
- |
- |
|
lts:configCenter:updateOverCollectSwitch |
Grants permission to update over collect switch. |
Write |
- |
- |
|
|
lts:structConfig:createStructConfig |
Grants permission to create struct config. |
Write |
logStream * |
- |
|
|
lts:structConfig:deleteStructConfig |
Grants permission to delete struct config. |
Write |
logStream * |
- |
|
|
lts:structConfig:getStructConfig |
Grants permission to get struct config. |
Read |
logStream * |
- |
|
|
lts:structConfig:listStructTemplate |
Grants permission to get struct template list. |
List |
- |
- |
|
|
lts:structConfig:updateStructConfig |
Grants permission to update struct config. |
Write |
logStream * |
- |
|
|
lts:mappingRule:create |
Grants permission to create mapping rule. |
Write |
- |
- |
|
|
lts:mappingRule:delete |
Grants permission to delete mapping rule. |
Write |
- |
- |
|
|
lts:mappingRule:get |
Grants permission to get mapping rule detail. |
Read |
- |
- |
|
|
lts:mappingRule:list |
Grants permission to get mapping rule list. |
List |
- |
- |
|
|
lts:mappingRule:update |
Grants permission to update mapping rule. |
Write |
- |
- |
|
|
lts:logStream:getHistorySql |
Grants permission to get log stream history sql. |
Read |
logStream * |
- |
|
|
lts:alarmRule:createSqlAlarmRule |
Grants permission to create sql alarm rules. |
Write |
- |
- |
|
|
lts:alarmRule:deleteSqlAlarmRule |
Grants permission to delete sql alarm rules. |
Write |
alarmRule * |
- |
|
|
lts:alarmRule:updateSqlAlarmRule |
Grants permission to update sql alarm rules. |
Write |
alarmRule * |
- |
|
|
lts:alarmRule:listSqlAlarmRule |
Grants permission to get sql alarm rules. |
List |
- |
- |
|
|
lts:alarmRule:createWordAlarmRule |
Grants permission to create word alarm rules. |
Write |
- |
- |
|
|
lts:alarmRule:deleteWordAlarmRule |
Grants permission to delete word alarm rules. |
Write |
alarmRule * |
- |
|
|
lts:alarmRule:updateWordAlarmRule |
Grants permission to update word alarm rules. |
Write |
alarmRule * |
- |
|
|
lts:alarmRule:listWordAlarmRule |
Grants permission to get word alarm rules. |
List |
- |
- |
- |
|
lts:alarm:cleanAlarm |
Grants permission to delete alarm. |
Write |
- |
- |
|
|
lts:alarm:listAlarm |
Grants permission to get alarm list. |
List |
- |
- |
|
|
lts:logStream:listChart |
Grants permission to query the log stream chart. |
List |
- |
- |
- |
|
lts:alarmNoticeTemplate:create |
Grants permission to creating alarm notification template. |
Write |
- |
- |
|
|
lts:alarmNoticeTemplate:update |
Grants permission to update alarm notification template. |
Write |
- |
- |
|
|
lts:alarmNoticeTemplate:delete |
Grants permission to delete alarm notification template. |
Write |
- |
- |
|
|
lts:alarmNoticeTemplate:list |
Grants permission to query alarm notification template list. |
List |
- |
- |
|
|
lts:alarmNoticeTemplate:get |
Grants permission to query alarm notification template details. |
Read |
- |
- |
|
|
lts:hostGroup:create |
Grants permission to create host group. |
Write |
- |
- |
|
|
lts:hostGroup:delete |
Grants permission to delete Host Group. |
Write |
hostGroup * |
- |
|
|
lts:host:list |
Grants permission to query host list. |
List |
- |
- |
- |
|
lts:hostGroup:list |
Grants permission to query host group list. |
List |
accessConfig * |
- |
- |
|
lts:hostGroup:update |
Grants permission to update host group list. |
Write |
hostGroup * |
- |
|
|
lts:accessConfig:create |
Grants permission to create access config. |
Write |
logStream * |
- |
|
|
lts:accessConfig:delete |
Grants permission to delete access config. |
Write |
accessConfig * |
- |
- |
|
lts:accessConfig:list |
Grants permission to get access config list. |
List |
- |
- |
- |
|
lts:accessConfig:update |
Grants permission to update access config. |
Write |
accessConfig * |
- |
- |
|
hostGroup |
- |
||||
|
lts:tag:create |
Grants permission to create tag. |
Write |
- |
- |
|
|
lts:tag:delete |
Grants permission to delete tag. |
Write |
- |
- |
|
|
lts:logStream:createQuickQuery |
Grants permission to create quick query. |
Write |
logStream * |
- |
|
|
lts:logStream:deleteQuickQuery |
Grants permission to delete quick query. |
Write |
logStream * |
- |
|
|
lts:logStream:listQuickQuery |
Grants permission to query quick query list. |
List |
logGroup * |
- |
|
|
lts:logFavorite:create |
Grants permission to create log favorite. |
Write |
logStream * |
- |
|
|
lts:logFavorite:delete |
Grants permission to delete log favorite. |
Write |
- |
- |
|
|
lts:dashboardGroup:create |
Grants permission to create dashboard group. |
Write |
- |
- |
|
|
lts:dashboard:create |
Grants permission to create dashboard. |
Write |
- |
- |
|
|
lts:trafficStatistic:get |
Grants permission to get trafficStatistic detail. |
Read |
- |
- |
|
|
lts:tokenizer:get |
Grants permission to obtains the configured separator. |
Read |
- |
- |
|
|
lts:tokenizer:create |
Grants permission to preview Word Breakers. |
Write |
- |
- |
|
|
lts:tokenizer:preview |
Grants permission to preview Word Breakers. |
Read |
- |
- |
|
|
lts:usageAlarm:update |
Grants permission to enables or disables usage warning. |
Write |
- |
- |
|
|
lts:csvTable:list |
Grants permission to obtaining the Associated Data Source Configuration Information Table. |
List |
- |
- |
|
|
lts:csvTable:upload |
Grants permission to uploading a CSV File. |
Write |
- |
- |
|
|
lts:csvTable:get |
Grants permission to preview associated data and view associated data source information. |
Read |
- |
- |
|
|
lts:csvTable:create |
Grants permission to creating Associated Data Sources. |
Write |
- |
- |
|
|
lts:csvTable:update |
Grants permission to updating Associated Data Sources. |
Write |
- |
- |
|
|
lts:csvTable:delete |
Grants permission to deleting Associated Data Sources. |
Write |
- |
- |
|
|
lts:scheduledSql:create |
Grants permission to create a scheduled SQL statement. |
Write |
- |
- |
|
|
lts:scheduledSql:delete |
Grants permission to delete the scheduled SQL statement. |
Write |
- |
- |
|
|
lts:scheduledSql:update |
Grants permission to modify the scheduled SQL statement. |
Write |
- |
- |
|
|
lts:scheduledSql:list |
Grants permission to get this interface is used to obtain the scheduled SQL list. |
List |
- |
- |
|
|
lts:scheduledSql:get |
Grants permission to get scheduled SQL details. |
Read |
- |
- |
|
|
lts:scheduledSql:retry |
Grants permission to retry the execution instance. |
Write |
- |
- |
|
|
lts:transfer:getDisList |
Grants permission to obtaining the dis channel list. |
List |
- |
- |
|
|
lts:transfer:listKafkaInstance |
Grants permission to obtaining the Kafka List. |
List |
- |
- |
|
|
lts:transfer:updateKafkaInstance |
Grants permission to updating kafka information. |
Write |
- |
- |
|
|
lts:transfer:deleteKafkaInstance |
Grants permission to deleting kafka information. |
Write |
- |
- |
|
|
lts:transfer:listKafkaAuthorization |
Grants permission to querying the kafka authorization list of user configurations. |
List |
- |
- |
|
|
lts:transfer:createKafkaAuthorization |
Grants permission to adding a user configuration kafka authorization list. |
Write |
- |
- |
|
|
lts:transfer:deleteKafkaAuthorization |
Grants permission to deleting a user configuration kafka authorization list. |
Write |
- |
- |
|
|
lts:transfer:getTransfer |
Grants permission to obtaining information about a dump task. |
Read |
transfer * |
- |
|
|
lts:transfer:getDwsInfo |
Grants permission to querying dws information of a tenant. |
Read |
- |
- |
|
|
lts:transfer:registerDwsCluster |
Grants permission to registering a dws cluster. |
Write |
- |
- |
|
|
lts:hostGroup:getHost |
Grants permission to obtains all hosts based on query conditions.. |
Read |
- |
- |
|
|
lts:hostGroup:get |
Grants permission to obtains all configurations of a single host group based on search criteria. |
Read |
- |
- |
|
|
lts:accessConfig:get |
Grants permission to obtaining a single collection configuration. |
Read |
accessConfig * |
- |
|
|
lts:logFavorite:list |
Grants permission to obtaining the favorites list. |
List |
- |
- |
|
|
lts:logFavorite:update |
Grants permission to modify favorites. |
Write |
logStream * |
- |
|
|
lts:logGroup:getLogGroup |
Grants permission to querying a log group. |
Read |
logGroup * |
- |
|
|
lts:IndexConfig:list |
Grants permission to querying indexes. |
List |
logGroup * |
- |
|
|
lts:IndexConfig:create |
Grants permission to creating an Index. |
Write |
logGroup * |
- |
|
|
lts:structConfig:listStructConfig |
Grants permission to obtaining structured log stream information. |
List |
logStream * |
- |
|
|
lts:logStream:updateLogStream |
Grants permission to modifying a log stream. |
Write |
logStream * |
- |
|
|
lts:logStream:getRealtimeLog |
Grants permission to obtaining real-time logs. |
Read |
logStream * |
- |
|
|
lts:logStream:getLogStream |
Grants permission to obtaining stream infos. |
Read |
logStream * |
- |
|
|
lts:logStream:createLogFilterRules |
Grants permission to creating a log cleaning rule. |
Write |
logStream * |
- |
|
|
lts:logStream:updateLogFilterRules |
Grants permission to modifying a log cleaning rule. |
Write |
logStream * |
- |
|
|
lts:logStream:deleteLogFilterRules |
Grants permission to deleting a log cleaning rule. |
Write |
logStream * |
- |
|
|
lts:logStream:listLogFilterRules |
Grants permission to querying log cleaning rules. |
List |
logStream * |
- |
|
|
lts:logStream:getQuickQuery |
Grants permission to view quick queries. |
List |
logStream * |
- |
|
|
lts:logStream:updateQuickQuery |
Grants permission to modify quick query. |
Write |
logStream * |
- |
|
|
lts:logStream:searchLogContext |
Grants permission to querying the log context. |
Read |
logStream * |
- |
|
|
lts:structConfig:getCustomTemplate |
Grants permission to querying a user-defined template. |
Read |
- |
- |
|
|
lts:structConfig:createCustomTemplate |
Grants permission to creating a user-defined template. |
Write |
- |
- |
|
|
lts:structConfig:updateCustomTemplate |
Grants permission to modifying a user-defined template. |
Write |
- |
- |
|
|
lts:structConfig:deleteCustomTemplate |
Grants permission to deleting a user-defined template. |
Write |
- |
- |
|
|
lts:structConfig:listCustomTemplate |
Grants permission to querying the user-defined template list. |
Read |
- |
- |
|
|
lts:structConfig:smartExtra |
Grants permission to intelligent extraction of structured fields. |
Write |
- |
- |
|
|
lts:logStream:getAggrResult |
Grants permission to obtaining quick analysis results. |
Read |
logStream * |
- |
|
|
lts:logStream:getAggr |
Grants permission to query quick analysis aggregator. |
Read |
- |
- |
|
|
lts:logStream:createAggr |
Grants permission to creating a quick analysis aggregator. |
Write |
- |
- |
|
|
lts:logStream:deleteAggr |
Grants permission to delete quick analysis aggregator. |
Write |
- |
- |
|
|
lts:logStream:getQuickAnalysisAggValue |
Grants permission to obtains the quick analysis result of the numeric type. |
Read |
logStream * |
- |
- |
|
lts:logStream:getWordFreqConfig |
Grants permission to querying quick analysis fields created by users. |
Read |
logStream * |
- |
|
|
lts:logStream:refreshWordFreqConfig |
Grants permission to modifying a quick analysis field. |
Write |
logStream * |
- |
|
|
lts:logCrux:list |
Grants permission to querying log clustering information. |
List |
- |
- |
|
|
lts:logCrux:get |
Grants permission to obtains the log clustering switch information. |
Read |
- |
- |
|
|
lts:logCrux:enable |
Grants permission to enabling Log Clustering. |
Write |
- |
- |
|
|
lts:logCrux:disable |
Grants permission to disabling log clustering. |
Write |
- |
- |
|
|
lts:logStream:updateChart |
Grants permission to updating the user log dashboard. |
Write |
- |
- |
|
|
lts:logStream:createChart |
Grants permission to creating a user log dashboard. |
Write |
- |
- |
|
|
lts:logStream:deleteChart |
Grants permission to deleting a user log dashboard. |
Write |
logStream * |
- |
|
|
lts:logStream:getChart |
Grants permission to obtaining the user log dashboard. |
Read |
logStream * |
- |
|
|
lts:dashboard:deleteChart |
Grants permission to delete chart. |
Write |
dashboard * |
- |
|
|
lts:dashboard:listCharts |
Grants permission to displays charts at the dashboard level.. |
List |
- |
- |
|
|
lts:dashboard:updateChart |
Grants permission to moving charts. |
Write |
dashboard * |
- |
|
|
lts:dashboard:getDashboard |
Grants permission to querying user log dashboards. |
Read |
- |
- |
|
|
lts:dashboardGroup:getDashboardsGroup |
Grants permission to querying user log dashboard groups. |
Read |
- |
- |
|
|
lts:dashboardGroup:updateDashboardsGroup |
Grants permission to modifying a user log dashboard group. |
Write |
- |
- |
|
|
lts:dashboardGroup:deleteDashboardsGroup |
Grants permission to updating user log dashboard groups. |
Write |
- |
- |
|
|
lts:dashboard:CreateDashBoard |
Grants permission to creating dashboards in batches based on the log dashboard template. |
Write |
- |
- |
|
|
lts:dashboard:CreateDashBoardTemplate |
Grants permission to creating a user log dashboard template. |
Write |
- |
- |
|
|
lts:dashboard:getDashBoardTemplate |
Grants permission to querying a user log dashboard template. |
Read |
- |
- |
|
|
lts:dashboard:updateDashBoardTemplate |
Grants permission to modifying a user log dashboard template. |
Write |
- |
- |
|
|
lts:dashboard:deleteDashBoardTemplate |
Grants permission to deleting a user log dashboard template. |
Write |
- |
- |
|
|
lts:dashboardGroup:createLogDashboardTemplateGroup |
Grants permission to creating a dashboard template group. |
Write |
- |
- |
|
|
lts:dashboardGroup:updateLogDashboardTemplateGroup |
Grants permission to modifying a dashboard template group. |
Write |
- |
- |
|
|
lts:dashboardGroup:deleteLogDashboardTemplateGroup |
Grants permission to deleting a user log dashboard template group. |
Write |
- |
- |
|
|
lts:dashboard:listFilter |
Grants permission to querying dashboard filters. |
List |
dashboard * |
- |
- |
|
lts:dashboard:createFilter |
Grants permission to Creating a Dashboard Filter. |
Write |
dashboard * |
- |
- |
|
lts:dashboard:updateFilter |
Grants permission to modifying a Dashboard Filter. |
Write |
dashboard * |
- |
- |
|
lts:dashboard:deleteFilter |
Grants permission to deleting a Dashboard Filter. |
Write |
dashboard * |
- |
- |
|
lts:alarmRule:listAlarmRules |
Grants permission to querying the alarm rule list. |
List |
- |
- |
|
|
lts:alarmRule:getKeywordsAlarmRule |
Grants permission to querying keyword alarm rules. |
Read |
alarmRule * |
- |
|
|
lts:alarmRule:getSqlAlarmRule |
Grants permission to querying sql alarm rules. |
Read |
alarmRule * |
- |
|
|
lts:alarm:listAlarmStatistic |
Grants permission to querying sql alarm data. |
List |
- |
- |
|
|
lts:dashboard:update |
Grants permission to modifying a user log dashboard. |
Write |
- |
- |
|
|
lts:dashboard:delete |
Grants permission to deleting a user log dashboard. |
Write |
- |
- |
|
|
lts:logSearch:list |
Grants permission to obtains the cluster list, namespace, component, instance, log, node, and log file page component list and file list. |
List |
- |
- |
|
|
lts:logSearch:getTime |
Grants permission to obtains the current time of the backend node. |
Read |
- |
- |
|
|
lts:logSearch:getLogContext |
Grants permission to obtaining the log context. |
Read |
- |
- |
|
|
lts:logSearch:exportLogs |
Grants permission to download logs. |
Write |
- |
- |
|
|
lts:ageingTime:get |
Grants permission to obtaining quota management. |
List |
- |
- |
|
|
lts:ageingTime:update |
Grants permission to modify quota management. |
Write |
- |
- |
|
|
lts:logConfigPath:list |
Grants permission to querying the vm log path configuration. |
List |
- |
- |
|
|
lts:logConfigPath:create |
Grants permission to configuring the log path of a new vm. |
Write |
- |
- |
|
|
lts:structRule:get |
Grants permission to obtaining structured rules. |
Read |
- |
- |
|
|
lts:structRule:create |
Grants permission to creating a structured rule. |
Write |
- |
- |
|
|
lts:structRule:delete |
Grants permission to deleting a structured rule. |
Write |
- |
- |
|
|
lts:structRule:regex |
Grants permission to structured extraction. |
Write |
- |
- |
|
|
lts:logPail:list |
Grants permission to querying a log bucket, logs in a bucket, and log bar chart. |
List |
- |
- |
|
|
lts:structSql:list |
Grants permission to querying structured logs. |
List |
- |
- |
|
|
lts:logPail:create |
Grants permission to adding a log bucket. |
Write |
- |
- |
|
|
lts:logPail:update |
Grants permission to modifying a log bucket. |
List |
- |
- |
|
|
lts:logPail:delete |
Grants permission to deleting a log bucket. |
Write |
- |
- |
|
|
lts:storageRelation:list |
Grants permission to querying the dump relationship of the current tenant. |
List |
- |
- |
|
|
lts:storageRelation:delete |
Grants permission to delete the dump relationship of the current tenant. |
Write |
- |
- |
|
|
lts:storage:batchAction |
Grants permission to periodic batch start and stop. |
Write |
- |
- |
|
|
lts:logPailDump:create |
Grants permission to add log dump. |
Write |
- |
- |
|
|
lts:statisticsRule:list |
Grants permission to querying statistics rules. |
List |
- |
- |
|
|
lts:statisticsRule:create |
Grants permission to creating a statistics rule. |
Write |
- |
- |
|
|
lts:statisticsRule:update |
Grants permission to modifying a statistics rule. |
Write |
- |
- |
|
|
lts:statisticsRule:delete |
Grants permission to deleting a statistical rule. |
Write |
- |
- |
|
|
lts:transfer:listKafkaInstanceTopic |
Grants permission to obtains all Kafka topics of a user. |
List |
- |
- |
|
|
lts:logPackage:create |
Grants permission to purchase a resource package. |
Write |
- |
- |
|
|
lts:consumerGroup:create |
Grants permission to creating a consumer group. |
Write |
- |
- |
|
|
lts:consumerGroup:delete |
Grants permission to deleting a consumer group. |
Write |
- |
- |
|
|
lts:consumerGroup:list |
Grants permission to querying the consumer group list. |
List |
- |
- |
|
|
lts:consumerGroup:get |
Grants permission to querying consumer group details. |
Read |
- |
- |
|
|
lts:consumerGroup:update |
Grants permission to modify consumer group. |
Write |
- |
- |
|
|
lts:logStream:get |
Grants permission to obtaining log flow details. |
Read |
- |
- |
|
|
lts:agency:listGroupAndStream |
Grants permission to obtains the log stream list of the log group of the delegator. |
List |
- |
- |
|
|
lts:agency:listEps |
Grants permission to obtain the eps list of the entrusting party. |
List |
- |
- |
|
|
lts:agency:listStructConfig |
Grants permission to obtaining the structured configuration of the delegator. |
List |
- |
- |
|
|
lts:logConverge:get |
Grants permission to obtaining Multi-Account log aggregation configuration. |
Read |
- |
- |
|
|
lts:logConverge:update |
Grants permission to update Multi-Account log aggregation configuration. |
Write |
- |
- |
|
|
lts:logManager:createAggr |
Grants permission to create a quick analysis aggregator. |
Write |
logStream * |
- |
|
|
lts:logManager:createAggrs |
Grants permission to create some quick analysis aggregators. |
Write |
logStream * |
- |
|
|
lts:logManager:deleteAggr |
Grants permission to delete the Quick Analysis Aggregator. |
Write |
logStream * |
- |
|
|
lts:logManager:deleteAggrs |
Grants permission to bulk delete Quick Analysis Aggregators. |
Write |
logStream * |
- |
|
|
lts:logmanager:createLogFilter |
Grants permission to create log cleaning rules. |
Write |
logStream * |
- |
|
|
lts:logmanager:listLogFilters |
Grants permission to view log cleaning rules. |
Read |
logStream * |
- |
|
|
lts:logmanager:updateLogFilters |
Grants permission to modify log cleaning rules. |
Write |
logStream * |
- |
|
|
lts:logmanager:deleteLogFilters |
Grants permission to delete log cleaning rules. |
Write |
logStream * |
- |
|
|
lts:structConfig:regex |
Grants permission to regularize structuring sample logs. |
Write |
- |
- |
|
Each API of LTS usually supports one or more actions. Table 2 lists the supported actions and dependencies.
|
API |
Action |
Dependencies |
|---|---|---|
|
lts:logGroup:createLogGroup |
- |
|
|
lts:logGroup:deleteLogGroup |
- |
|
|
lts:logGroup:listLogGroup |
- |
|
|
lts:logGroup:updateLogGroup |
- |
|
|
lts:logStream:createLogStream |
- |
|
|
PUT /v2/{project_id}/groups/{log_group_id}/streams-ttl/{log_stream_id} |
lts:logStream:updateLogStream |
- |
|
DELETE /v2/{project_id}/groups/{log_group_id}/streams/{log_stream_id} |
lts:logStream:deleteLogStream |
- |
|
lts:logStream:listLogStream |
- |
|
|
lts:logStream:listLogStream |
- |
|
|
lts:logStream:searchLogHistogram |
- |
|
|
POST /v2/{project_id}/groups/{log_group_id}/streams/{log_stream_id}/content/query |
lts:logStream:searchLog |
- |
|
POST /v2/{project_id}/groups/{log_group_id}/streams/{log_stream_id}/struct-content/query |
lts:logStream:searchStructLog |
- |
|
POST /v2/{project_id}/streams/{log_stream_id}/struct-content/query |
lts:logStream:searchStructLog |
- |
|
lts:transfer:createTransfer |
|
|
|
lts:transfer:deleteTransfer |
- |
|
|
lts:transfer:listTransfer |
- |
|
|
lts:transfer:registerDmsKafkaInstance |
dms:instance:list |
|
|
lts:transfer:updateTransfer |
|
|
|
lts:configCenter:updateOverCollectSwitch |
- |
|
|
lts:configCenter:updateOverCollectSwitch |
- |
|
|
lts:structConfig:createStructConfig |
- |
|
|
lts:structConfig:deleteStructConfig |
- |
|
|
lts:structConfig:listStructTemplate |
- |
|
|
lts:structConfig:listStructTemplate |
- |
|
|
lts:structConfig:getStructConfig |
- |
|
|
lts:structConfig:updateStructConfig |
- |
|
|
lts:mappingRule:create |
- |
|
|
lts:mappingRule:delete |
- |
|
|
lts:mappingRule:get |
- |
|
|
lts:mappingRule:list |
- |
|
|
lts:mappingRule:update |
- |
|
|
lts:alarmNoticeTemplate:list |
smn:topic:list |
|
|
lts:alarmRule:createSqlAlarmRule |
- |
|
|
DELETE /v2/{project_id}/lts/alarms/sql-alarm-rule/{sql_alarm_rule_id} |
lts:alarmRule:deleteSqlAlarmRule |
- |
|
lts:alarmRule:listSqlAlarmRule |
- |
|
|
lts:alarmRule:updateSqlAlarmRule |
- |
|
|
lts:alarmRule:updateSqlAlarmRule |
- |
|
|
lts:alarmRule:createWordAlarmRule |
- |
|
|
DELETE /v2/{project_id}/lts/alarms/keywords-alarm-rule/{keywords_alarm_rule_id} |
lts:alarmRule:deleteWordAlarmRule |
- |
|
lts:alarmRule:listWordAlarmRule |
- |
|
|
lts:alarmRule:updateWordAlarmRule |
- |
|
|
POST /v2/{project_id}/{domain_id}/lts/alarms/sql-alarm/clear |
lts:alarm:cleanAlarm |
- |
|
POST /v2/{project_id}/{domain_id}/lts/alarms/sql-alarm/query |
lts:alarm:listAlarm |
- |
|
GET /v2/{project_id}/groups/{log_group_id}/streams/{log_stream_id}/charts |
lts:logStream:listChart |
- |
|
POST /v2/{project_id}/{domain_id}/lts/events/notification/templates |
lts:alarmNoticeTemplate:create |
- |
|
DELETE /v2/{project_id}/{domain_id}/lts/events/notification/templates |
lts:alarmNoticeTemplate:delete |
- |
|
POST /v2/{project_id}/{domain_id}/lts/events/notification/templates/view |
lts:alarmNoticeTemplate:list |
- |
|
GET /v2/{project_id}/{domain_id}/lts/events/notification/templates |
lts:alarmNoticeTemplate:list |
- |
|
GET /v2/{project_id}/{domain_id}/lts/events/notification/template/{template_name} |
lts:alarmNoticeTemplate:get |
- |
|
PUT /v2/{project_id}/{domain_id}/lts/events/notification/templates |
lts:alarmNoticeTemplate:update |
- |
|
lts:hostGroup:create |
- |
|
|
lts:hostGroup:delete |
- |
|
|
lts:host:list |
|
|
|
lts:hostGroup:list |
- |
|
|
lts:hostGroup:update |
- |
|
|
lts:accessConfig:create |
- |
|
|
lts:accessConfig:delete |
- |
|
|
lts:accessConfig:list |
- |
|
|
lts:accessConfig:update |
- |
|
|
POST /v1/{project_id}/{resource_type}/{resource_id}/tags/action |
lts:tag:create |
- |
|
POST /v1.0/{project_id}/groups/{group_id}/topics/{topic_id}/search-criterias |
lts:logStream:createQuickQuery |
- |
|
DELETE /v1.0/{project_id}/groups/{group_id}/topics/{topic_id}/search-criterias |
lts:logStream:deleteQuickQuery |
- |
|
GET /v1.0/{project_id}/groups/{group_id}/topics/{topic_id}/search-criterias |
lts:logStream:listQuickQuery |
- |
|
lts:logStream:getHistorySql |
- |
|
|
GET /v1.0/{project_id}/lts/groups/{group_id}/search-criterias |
lts:logStream:listQuickQuery |
- |
|
lts:logFavorite:create |
- |
|
|
lts:logFavorite:delete |
- |
|
|
lts:dashboard:create |
- |
|
|
lts:dashboardGroup:create |
- |
|
|
lts:trafficStatistic:get |
- |
|
|
lts:trafficStatistic:get |
- |
Resources
A resource type indicates the resources that an identity policy applies to. If you specify a resource type for any action in Table 3, the resource URN must be specified in the identity policy statements using that action, and the identity policy applies only to resources of this type. If no resource type is specified, the Resource element is marked with an asterisk (*) and the identity policy applies to all resources. You can also set condition keys in an identity policy to define resource types.
The following table lists the resource types that you can define in identity policy statements for LTS.
|
Resource Type |
URN |
|---|---|
|
logStream |
lts:<region>:<account-id>:logStream:<group_id>/<stream_id> |
|
logGroup |
lts:<region>:<account-id>:logGroup:<group_id> |
|
dashboard |
lts:<region>:<account-id>:dashboard:<dashboard_id> |
|
accessConfig |
lts:<region>:<account-id>:accessConfig:<config_id> |
|
alarmRule |
lts:<region>:<account-id>:alarmRule:<alarm_rule_id> |
|
transfer |
lts:<region>:<account-id>:transfer:<transfer_id> |
|
hostGroup |
lts:<region>:<account-id>:hostGroup:<host_group_id> |
Conditions
LTS does not support service-specific condition keys in identity policies.It can only use global condition keys applicable to all services. For details, see Global Condition Keys.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot