百度智能云

All Product Document

          Log Service

          Identity and access management

          Introduction to Identity and Access Management product

          Identity and Access Management (IAM) is designed for managing identities and access to Baidu AI Cloud resources. It facilitates centralized authorization, resource sharing, and multi-user collaboration for cloud accounts. IAM allows enterprises to grant different product permissions to employees based on their roles, enabling them to share resources within the account to fulfill their responsibilities. When an enterprise requires multi-user collaboration or resource sharing, it is recommended to utilize IAM.

          Below are typical scenarios where Identity and Access Management applies:

          • Medium and large enterprise customers: Centralized resource and permission management for different employees across multiple departments within the company
          • Independent software vendors (ISVs) or SaaS platform providers: Centralized resource and permission management for proxy clients
          • Small and medium-sized developers or small enterprise: Add project members or collaborators for resource and permission management

          For details about Identity and Access Management, refer to the IAM Help Document.

          Definition

          • Permission: Refers to whether one or several APIs are allowed to be accessed, such as viewing task details, editing tasks, etc.
          • Resource: Refers to the smallest entity created, maintained, and accessed by users in the service. In BLS, items such as tasks, agents, and agent groups are considered resources.
          • Policy: A combination of permissions, resources, and user identities, such as read-only policy or custom policy

          Configuration Policy

          • System policy: Permission set predefined by Baidu AI Cloud System for resource management. Such policies can be directly authorized for IAM users, and users can only use it but cannot modify it.
          • Custom policy: User-created more detailed permission set for resource management, allowing permission configuration for single instance to flexibly meet differentiated permission management of accounts for different users.

          Description of system policy permission

          The BLS system policy includes read-only permissions, operational permissions, and management permissions. Detailed descriptions are provided below:

          Policy namePermissionPermission scope
          BLSReadPolicy Permissions for read-only access to BLS Permissions only include: viewing task details, viewing agent details, viewing agent group details, viewing agent installation, acquiring LogStore details, reading logrecord, getting index details, getting quick query details, viewing delivery task configuration details, and viewing delivery task execution records;
          BLSOperatePolicy BLS operations permissions In addition to read-only, you can also edit tasks, start/stop tasks, edit agents, edit agent groups, modify LogStore, write log records, modify indexes, modify quick queries, modify delivery tasks, start/stop individual delivery tasks, and start/stop delivery tasks in batches;
          BLSFullControlPolicy Full control permission for BLS management Possesses full BLS permissions;

          Description of custom policy permission

          The permission operation types and scope for BLS custom policy are specified as follows:

          Operation typePermission scope
          Read-only operation
          • Task:
            • View task details
          • Agent:
            • View agent details
          • Agent groups:
            • View agent group details
          • LogStore:
            • LogStore: Get LogStore details
            • Logrecord: Read logrecord
            • LogStore index: Get index details
          • Quick query:
            • Get quick query details
          • Log delivery:
            • View delivery task configuration details
            • View delivery tasks execution records
          Operation and maintenance operations
          • Task:
            • Edit tasks
            • Start/Stop tasks
          • Agent:
            • Edit agent
          • Agent groups:
            • Edit agent group
          • LogStore:
            • LogStore: modify LogStore, get LogStore details
            • Logrecord: Write in logrecord, read logrecord
            • LogStore index: Modify index, get index details
          • Quick query:
            • Modify FastQuery
            • Retrieve FastQuery details.
          • Log delivery:
            • Modify delivery tasks
            • View delivery task configuration details
            • View delivery tasks execution records
            • Start/Stop a single delivery task
            • Batch start/stop delivery tasks
          Management operations
          • Task:
            • Edit tasks
            • Start/Stop tasks
            • Delete task
          • Agent:
            • Edit agent
            • Delete agent
          • Agent groups:
            • Edit agent group
            • Delete agent group
          • LogStore:
            • LogStore: Delete LogStore, modify LogStore, get LogStore details
            • Logrecord: Write in logrecord, read logrecord
            • LogStore index: Modify index, delete index, get index details
          • Quick query:
            • Delete FastQuery
            • Modify FastQuery
            • Retrieve FastQuery details.
          • Log delivery:
            • Modify delivery tasks
            • View delivery task configuration details
            • View delivery tasks execution records
            • Delete a single delivery task
            • Batch delete delivery tasks
            • Start/Stop a single delivery task
            • Batch start/stop delivery tasks

          Cloud product access permissions

          The log service supports collecting log data from several Baidu AI Cloud products, including Content Delivery Network (CDN), Virtual Private Cloud (VPC), and Container Instance (BCI). When sub-accounts need to enable log-push services via cloud product consoles, ensure the necessary BLS permissions are in place. For instance, to write/push data to an existing LogStore, ensure the account has the "Write Records" permission. To create a new LogStore, ensure the account has the "BLSFullControlPolicy" permission.

          Authorization cases

          Authorization steps are as follows:

          • Create IAM user
          • Create custom policy
          • Grant permissions to IAM users
          • IAM user signs in to the console to access products

          Create IAM user

          Step 1: Click the user avatar in the upper right corner, and then click "Identity and Access Management";

          create subUser step1

          Step 2: Click "Create IAM User". After the IAM User is created, the login link is shown as in the figure;

          create subUser step2

          For details, refer to the Identity and Access Management Help Document.

          Create custom policy

          Step 1: Click "Policy" on the left, click "Create Policy", and then click "Create via Visual Editor";

          custom policy 1

          Step 2: Click "Add Permission";

          custom policy 2

          Step 3: Select "Baidu Log Service (BLS)", check the Permissions, check the Resources, and click "Complete";

          custom policy 3

          Step 4: Click "Complete" again;

          custom policy 4

          Grant permissions to IAM users

          Step 1: Click "Add Permission";

          auth 1

          Step 2: Search for "bls," where you can add "System Policy" and "Custom Policy," then click "OK";

          auth 2

          IAM user signs in to the console and access products

          Step 1: Access the Sign in as IAM User link;

          Screenshot 2021-09-07 7.20.07 PM.png

          Step 2: Click BLS & access the product;

          login 2

          Previous
          Overview
          Next
          Agent