tencent cloud

TencentDB for MySQL
Last updated:2026-02-16 09:45:39
TencentDB for MySQL
Last updated: 2026-02-16 09:45:39

Service roles and service-linked roles are predefined by Tencent Cloud services and, upon user authorization, the corresponding services can access and use resources by assuming these service-linked roles. This document provides detailed information on the use cases and associated authorization policies of these specific service-linked roles.

Product Role Name Role Types Role Entity
Cloud Database CDB_QCSLinkedRoleInDBLog Service-Related Roles DBLog.cdb.cloud.tencent.com
Cloud Database CDB_QCSLinkedRoleInCdbwan Service-Related Roles cdbwan.cdb.cloud.tencent.com
Cloud Database CDB_QCSLinkedRoleInDBlogDeliver Service-Related Roles DBLogDeliver.cdb.cloud.tencent.com
Cloud Database CDB_QCSLinkedRoleInDBLogDeliverCOS Service-Related Roles DBLogDeliverCOS.cdb.cloud.tencent.com

CDB_QCSLinkedRoleInDBLog

Use Cases: The current role is the TencentDB for MySQL service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices

  • Policy Name: QcloudAccessForCDBLinkedRoleInDBLog
  • Policy Information:
    {
      "version": "2.0",
      "statement": [
          {
              "effect": "allow",
              "action": [
                  "cls:DeleteCloudProductLogTask",
                  "cls:ModifyCloudProductLogTask",
                  "cls:CreateKafkaRecharge",
                  "cls:DeleteKafkaRecharge",
                  "cls:DescribeKafkaRecharges",
                  "cls:ModifyKafkaRecharge"
              ],
              "resource": "*"
          }
      ]
    }

CDB_QCSLinkedRoleInCdbwan

Use Cases: The current role is the CDB_QCSLinkedRoleInCdbwan service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices

  • Policy Name: QcloudAccessForCDBLinkedRoleInCdbwan
  • Policy Information:
    {
      "statement": [
          {
              "action": [
                  "clb:DescribeLoadBalancers",
                  "clb:CreateLoadBalancer",
                  "clb:DeleteLoadBalancer",
                  "clb:ModifyLoadBalancerAttributes",
                  "clb:ModifyLBOperateProtect",
                  "clb:CreateListener",
                  "clb:DescribeListeners",
                  "clb:DeleteListener",
                  "clb:RegisterTargets",
                  "clb:BatchRegisterTargets",
                  "clb:DeregisterTargets",
                  "clb:BatchDeregisterTargets",
                  "clb:ModifyListener",
                  "clb:DescribeTaskStatus",
                  "clb:DescribeTargets"
              ],
              "effect": "allow",
              "resource": [
                  "*"
              ]
          },
          {
              "effect": "allow",
              "action": "finance:trade",
              "resource": "qcs::clb:::*"
          }
      ],
      "version": "2.0"
    }

CDB_QCSLinkedRoleInDBlogDeliver

Use Cases: The current role is the TencentDB for MySQL service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices

  • Policy Name: QcloudAccessForCDBLinkedRoleInDBLogDeliver
  • Policy Information:
    {
      "version": "2.0",
      "statement": [
          {
              "effect": "allow",
              "action": [
                  "ckafka:DescribeTaskStatus",
                  "ckafka:DescribeRoute",
                  "ckafka:CreateRoute",
                  "ckafka:DescribeTopic",
                  "ckafka:CreateTopic"
              ],
              "resource": "*"
          }
      ]
    }

CDB_QCSLinkedRoleInDBLogDeliverCOS

Use Cases: The current role is the TencentDB for MySQL service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices

  • Policy Name: QcloudAccessForCDBLinkedRoleInDBLogDeliverCOS
  • Policy Information:
    {
      "version": "2.0",
      "statement": [
          {
              "effect": "allow",
              "action": [
                  "cos:InitiateMultipartUpload",
                  "cos:UploadPart",
                  "cos:CompleteMultipartUpload",
                  "cos:AbortMultipartUpload",
                  "cos:ListMultipartUploads",
                  "cos:ListParts",
                  "cos:HeadObject",
                  "cos:PutBucketLifecycle",
                  "cos:GetBucketLifecycle",
                  "cos:DeleteBucketLifecycle"
              ],
              "resource": "*"
          }
      ]
    }
Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback