tccli-intl-en 3.1.13.1__py2.py3-none-any.whl → 3.1.39.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +3 -0
- tccli/services/advisor/advisor_client.py +56 -0
- tccli/services/advisor/v20200721/api.json +34 -0
- tccli/services/advisor/v20200721/examples.json +8 -0
- tccli/services/autoscaling/v20180419/api.json +41 -13
- tccli/services/billing/billing_client.py +172 -4
- tccli/services/billing/v20180709/api.json +332 -1
- tccli/services/billing/v20180709/examples.json +24 -0
- tccli/services/ccc/v20200210/api.json +71 -26
- tccli/services/cdb/cdb_client.py +1128 -288
- tccli/services/cdb/v20170320/api.json +2166 -335
- tccli/services/cdb/v20170320/examples.json +126 -6
- tccli/services/cdn/v20180606/api.json +22 -22
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/ckafka/ckafka_client.py +120 -8
- tccli/services/ckafka/v20190819/api.json +525 -180
- tccli/services/ckafka/v20190819/examples.json +30 -20
- tccli/services/clb/v20180317/api.json +87 -87
- tccli/services/csip/csip_client.py +392 -0
- tccli/services/csip/v20221121/api.json +2050 -284
- tccli/services/csip/v20221121/examples.json +56 -0
- tccli/services/cvm/v20170312/api.json +20 -20
- tccli/services/cvm/v20170312/examples.json +8 -8
- tccli/services/emr/v20190103/api.json +6 -6
- tccli/services/faceid/v20180301/api.json +102 -52
- tccli/services/faceid/v20180301/examples.json +3 -9
- tccli/services/hunyuan/hunyuan_client.py +448 -0
- tccli/services/hunyuan/v20230901/api.json +879 -18
- tccli/services/hunyuan/v20230901/examples.json +64 -0
- tccli/services/lighthouse/lighthouse_client.py +360 -24
- tccli/services/lighthouse/v20200324/api.json +488 -0
- tccli/services/lighthouse/v20200324/examples.json +54 -0
- tccli/services/lkeap/v20240522/api.json +36 -0
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/mdl/v20200326/api.json +309 -38
- tccli/services/mdp/v20200527/api.json +191 -28
- tccli/services/mongodb/v20190725/api.json +39 -39
- tccli/services/monitor/v20180724/api.json +5 -5
- tccli/services/mps/mps_client.py +341 -61
- tccli/services/mps/v20190612/api.json +890 -31
- tccli/services/mps/v20190612/examples.json +40 -0
- tccli/services/mqtt/__init__.py +4 -0
- tccli/services/mqtt/mqtt_client.py +1610 -0
- tccli/services/mqtt/v20240516/api.json +3057 -0
- tccli/services/mqtt/v20240516/examples.json +213 -0
- tccli/services/ocr/v20181119/api.json +23 -3
- tccli/services/ocr/v20181119/examples.json +6 -6
- tccli/services/redis/v20180412/api.json +12 -12
- tccli/services/ses/ses_client.py +348 -12
- tccli/services/ses/v20201002/api.json +1197 -256
- tccli/services/ses/v20201002/examples.json +78 -24
- tccli/services/tcsas/tcsas_client.py +2281 -209
- tccli/services/tcsas/v20250106/api.json +8410 -3423
- tccli/services/tcsas/v20250106/examples.json +308 -12
- tccli/services/tdmq/v20200217/api.json +4 -4
- tccli/services/teo/v20220901/api.json +10 -10
- tccli/services/tke/tke_client.py +168 -0
- tccli/services/tke/v20180525/api.json +227 -0
- tccli/services/tke/v20180525/examples.json +24 -0
- tccli/services/trocket/v20230308/api.json +96 -96
- tccli/services/trtc/v20190722/api.json +212 -144
- tccli/services/trtc/v20190722/examples.json +7 -7
- tccli/services/vod/v20180717/api.json +2929 -296
- tccli/services/vod/v20180717/examples.json +40 -6
- tccli/services/vod/vod_client.py +280 -0
- tccli/services/vpc/v20170312/api.json +80 -13
- tccli/services/vpc/v20170312/examples.json +17 -9
- tccli/services/vpc/vpc_client.py +64 -8
- {tccli_intl_en-3.1.13.1.dist-info → tccli_intl_en-3.1.39.1.dist-info}/METADATA +2 -2
- {tccli_intl_en-3.1.13.1.dist-info → tccli_intl_en-3.1.39.1.dist-info}/RECORD +75 -71
- {tccli_intl_en-3.1.13.1.dist-info → tccli_intl_en-3.1.39.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.1.13.1.dist-info → tccli_intl_en-3.1.39.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.1.13.1.dist-info → tccli_intl_en-3.1.39.1.dist-info}/entry_points.txt +0 -0
- {tccli_intl_en-3.1.13.1.dist-info → tccli_intl_en-3.1.39.1.dist-info}/top_level.txt +0 -0
|
@@ -3093,7 +3093,7 @@
|
|
|
3093
3093
|
},
|
|
3094
3094
|
{
|
|
3095
3095
|
"disabled": false,
|
|
3096
|
-
"document": "Cluster specification code.\nRefers to professional cluster specifications (https://www.tencentcloud.
|
|
3096
|
+
"document": "Cluster specification code.\nRefers to professional cluster specifications (https://www.tencentcloud.com/document/product/1179/83705?from_cn_redirect=1).",
|
|
3097
3097
|
"example": "PULSAR.P1.MINI2",
|
|
3098
3098
|
"member": "string",
|
|
3099
3099
|
"name": "ProductName",
|
|
@@ -3102,7 +3102,7 @@
|
|
|
3102
3102
|
},
|
|
3103
3103
|
{
|
|
3104
3104
|
"disabled": false,
|
|
3105
|
-
"document": "Specifies the storage specification.\nRefers to professional cluster specifications (https://www.tencentcloud.
|
|
3105
|
+
"document": "Specifies the storage specification.\nRefers to professional cluster specifications (https://www.tencentcloud.com/document/product/1179/83705?from_cn_redirect=1).",
|
|
3106
3106
|
"example": "200",
|
|
3107
3107
|
"member": "int64",
|
|
3108
3108
|
"name": "StorageSize",
|
|
@@ -3425,7 +3425,7 @@
|
|
|
3425
3425
|
},
|
|
3426
3426
|
{
|
|
3427
3427
|
"disabled": false,
|
|
3428
|
-
"document": "vpc ID, such as vpc-xxx. valid VpcId can be obtained by logging in to the virtual private cloud console (https://console.cloud.tencent.com/vpc/vpc?rid=1) or via api call to DescribeVpcEx (https://www.tencentcloud.
|
|
3428
|
+
"document": "vpc ID, such as vpc-xxx. valid VpcId can be obtained by logging in to the virtual private cloud console (https://console.cloud.tencent.com/vpc/vpc?rid=1) or via api call to DescribeVpcEx (https://www.tencentcloud.com/document/api/215/1372?from_cn_redirect=1), retrieving the unVpcId field from the api response. if both VpcId and SubnetId are set to DEFAULT when creating an instance, the DEFAULT vpc network will be forcibly used.",
|
|
3429
3429
|
"example": "vpc-5ghsr4p9",
|
|
3430
3430
|
"member": "string",
|
|
3431
3431
|
"name": "VpcId",
|
|
@@ -3434,7 +3434,7 @@
|
|
|
3434
3434
|
},
|
|
3435
3435
|
{
|
|
3436
3436
|
"disabled": false,
|
|
3437
|
-
"document": "The subnet ID of the vpc, such as subnet-xxx. valid subnet ids can be queried by logging in to the subnet console (https://console.cloud.tencent.com/vpc/subnet?rid=1) or by calling the api [DescribeSubnets](https://www.tencentcloud.
|
|
3437
|
+
"document": "The subnet ID of the vpc, such as subnet-xxx. valid subnet ids can be queried by logging in to the subnet console (https://console.cloud.tencent.com/vpc/subnet?rid=1) or by calling the api [DescribeSubnets](https://www.tencentcloud.com/document/api/215/15784?from_cn_redirect=1) and obtaining the unSubnetId field from the api response. if both SubnetId and VpcId are set to DEFAULT when creating an instance, the DEFAULT vpc network will be forcibly used.",
|
|
3438
3438
|
"example": "subnet-67y9wil4",
|
|
3439
3439
|
"member": "string",
|
|
3440
3440
|
"name": "SubnetId",
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"actions": {
|
|
3
3
|
"ApplyFreeCertificate": {
|
|
4
|
-
"document": "This API is used to apply for a free certificate. If you need to proceed with DNS delegated verification or file verification, you can call this API to initiate the certificate application and obtain the corresponding verification content based on the application method. The order for API calls is as follows:.\nStep 1: Call ApplyFreeCertificate, specify the verification method for free certificate application, and obtain the verification content.\nStep 2: Configure the corresponding domain as verification content.\nStep 3: Call CheckFreeCertificateVerification to verify. After verification passes, the free certificate application is completed.\nStep 4: Call ModifyHostsCertificate to issue a domain certificate configured to use the EdgeOne free certificate.\n\nThe application method introduction in the document: [Free Certificate Application Description](https://www.tencentcloud.
|
|
4
|
+
"document": "This API is used to apply for a free certificate. If you need to proceed with DNS delegated verification or file verification, you can call this API to initiate the certificate application and obtain the corresponding verification content based on the application method. The order for API calls is as follows:.\nStep 1: Call ApplyFreeCertificate, specify the verification method for free certificate application, and obtain the verification content.\nStep 2: Configure the corresponding domain as verification content.\nStep 3: Call CheckFreeCertificateVerification to verify. After verification passes, the free certificate application is completed.\nStep 4: Call ModifyHostsCertificate to issue a domain certificate configured to use the EdgeOne free certificate.\n\nThe application method introduction in the document: [Free Certificate Application Description](https://www.tencentcloud.com/document/product/1552/90437?from_cn_redirect=1). \ndescription:.\n- Only CNAME access mode can call this API to specify the free certificate application method. NS/DNSPod hosting access modes use automatic validation to apply for free certificates with no need to call this API.\n- If you need to switch the free certificate authentication method, you can call this API again by changing the VerificationMethod field to update it.\n- A domain name can only apply for one free certificate. After calling this API, the backend will trigger the free certificate application task. You need to complete the domain name verification info configuration within 2 days, then finish certificate authentication.",
|
|
5
5
|
"input": "ApplyFreeCertificateRequest",
|
|
6
6
|
"name": "Applies for a free certificate",
|
|
7
7
|
"output": "ApplyFreeCertificateResponse",
|
|
@@ -36,7 +36,7 @@
|
|
|
36
36
|
"status": "online"
|
|
37
37
|
},
|
|
38
38
|
"CheckFreeCertificateVerification": {
|
|
39
|
-
"document": "This API is used to verify a free certificate and obtain the application result. If verified, you can query the free certificate information for the corresponding domain name application through this API. If failed to apply, this API will return the corresponding verification failure message.\nThis API is used to check the free certificate application result after triggering the [ApplyFreeCertificate](https://www.tencentcloud.
|
|
39
|
+
"document": "This API is used to verify a free certificate and obtain the application result. If verified, you can query the free certificate information for the corresponding domain name application through this API. If failed to apply, this API will return the corresponding verification failure message.\nThis API is used to check the free certificate application result after triggering the [ApplyFreeCertificate](https://www.tencentcloud.com/document/product/1552/124807?from_cn_redirect=1) . Once the application is successful, you need to configure through the [ModifyHostsCertificate](https://www.tencentcloud.com/document/product/1552/80764?from_cn_redirect=1) to deploy the free certificate to the acceleration domain.",
|
|
40
40
|
"input": "CheckFreeCertificateVerificationRequest",
|
|
41
41
|
"name": "Check free certificate application result",
|
|
42
42
|
"output": "CheckFreeCertificateVerificationResponse",
|
|
@@ -134,7 +134,7 @@
|
|
|
134
134
|
"status": "online"
|
|
135
135
|
},
|
|
136
136
|
"CreateJustInTimeTranscodeTemplate": {
|
|
137
|
-
"document": "JIT transcoding already provides preset transcoding templates to meet most needs. If there are personalized transcoding requirements, you can create custom transcoding templates through this API, with up to 100 custom transcoding templates allowed.\nThis API is used to ensure the consistency of JIT transcoding effect, avoid video output exceptions caused by EO cache or M3U8 sharding template changes during the process, and templates cannot be modified after creation.\nThis API is used to learn about the detailed capacity of JIT transcoding. EdgeOne video instant processing function introduction (https://www.tencentcloud.
|
|
137
|
+
"document": "JIT transcoding already provides preset transcoding templates to meet most needs. If there are personalized transcoding requirements, you can create custom transcoding templates through this API, with up to 100 custom transcoding templates allowed.\nThis API is used to ensure the consistency of JIT transcoding effect, avoid video output exceptions caused by EO cache or M3U8 sharding template changes during the process, and templates cannot be modified after creation.\nThis API is used to learn about the detailed capacity of JIT transcoding. EdgeOne video instant processing function introduction (https://www.tencentcloud.com/document/product/1552/111927?from_cn_redirect=1).",
|
|
138
138
|
"input": "CreateJustInTimeTranscodeTemplateRequest",
|
|
139
139
|
"name": "Create a just-in-time transcoding template",
|
|
140
140
|
"output": "CreateJustInTimeTranscodeTemplateResponse",
|
|
@@ -2904,7 +2904,7 @@
|
|
|
2904
2904
|
},
|
|
2905
2905
|
{
|
|
2906
2906
|
"disabled": false,
|
|
2907
|
-
"document": "Specifies the verification method for applying for a free certificate. for detailed verification methods, refer to the [free certificate application documentation](https://www.tencentcloud.
|
|
2907
|
+
"document": "Specifies the verification method for applying for a free certificate. for detailed verification methods, refer to the [free certificate application documentation](https://www.tencentcloud.com/document/product/1552/90437?from_cn_redirect=1). valid values:.\n<li>http_challenge: specifies the file validation mode for http access. verifies by getting file information from the specified URL of the access domain to complete free certificate application.</li>\n<li>dns_challenge: specifies the dns delegation verification method. verifies the free certificate application by adding the designated host record pointing to EdgeOne.</li>\n\nNote: after triggering this api, you need to complete the verification content configuration based on the returned verification information. once configured, you must also verify by calling the <a href = 'https://www.tencentcloud.com/document/product/1552/124806?from_cn_redirect=1'>check free certificate application result</a> api. after verification passes, the application succeeds. once the application is successful, you can call the <a href = 'https://www.tencentcloud.com/document/product/1552/80764?from_cn_redirect=1'>configure domain name certificate</a> API to deploy a free certificate for the current domain name.",
|
|
2908
2908
|
"example": "http_challenge",
|
|
2909
2909
|
"member": "string",
|
|
2910
2910
|
"name": "VerificationMethod",
|
|
@@ -4634,7 +4634,7 @@
|
|
|
4634
4634
|
},
|
|
4635
4635
|
{
|
|
4636
4636
|
"disabled": false,
|
|
4637
|
-
"document": "Acceleration domain name, that domain name used when [applying for free certificate](https://www.tencentcloud.
|
|
4637
|
+
"document": "Acceleration domain name, that domain name used when [applying for free certificate](https://www.tencentcloud.com/document/product/1552/124807?from_cn_redirect=1).",
|
|
4638
4638
|
"example": "qq.com",
|
|
4639
4639
|
"member": "string",
|
|
4640
4640
|
"name": "Domain",
|
|
@@ -13798,7 +13798,7 @@
|
|
|
13798
13798
|
},
|
|
13799
13799
|
{
|
|
13800
13800
|
"disabled": false,
|
|
13801
|
-
"document": "Site ID
|
|
13801
|
+
"document": "Site ID set. this parameter will change from option to required after may 30, 2024. for details, see the notice: [tencent cloud EdgeOne API change notification](https://www.tencentcloud.com/document/product/1145/59980). a maximum of 100 site ids can be imported. use `*` to query all site data under the tencent cloud root account. querying account-level data requires all resource permissions for all sites in this interface.",
|
|
13802
13802
|
"example": "[\"*\"]",
|
|
13803
13803
|
"member": "string",
|
|
13804
13804
|
"name": "ZoneIds",
|
|
@@ -13816,7 +13816,7 @@
|
|
|
13816
13816
|
},
|
|
13817
13817
|
{
|
|
13818
13818
|
"disabled": false,
|
|
13819
|
-
"document": "Filter criteria used when filtering data. valid values refer to the available filter options for L7 access traffic, bandwidth, and request count in the [metric analysis filtering condition description](https://www.tencentcloud.
|
|
13819
|
+
"document": "Filter criteria used when filtering data. valid values refer to the available filter options for L7 access traffic, bandwidth, and request count in the [metric analysis filtering condition description](https://www.tencentcloud.com/document/product/1145/56985#1aaf1150-55a4-4b4d-b103-3a8317ac7945).\nIf needed, limit the site or content identifier by importing the corresponding value in the `ZoneIds.N` parameter.",
|
|
13820
13820
|
"example": "无",
|
|
13821
13821
|
"member": "QueryCondition",
|
|
13822
13822
|
"name": "Filters",
|
|
@@ -14092,7 +14092,7 @@
|
|
|
14092
14092
|
},
|
|
14093
14093
|
{
|
|
14094
14094
|
"disabled": false,
|
|
14095
|
-
"document": "Site ID set. this parameter will change from option to required after may 30, 2024. for details, see the notice: [tencent cloud EdgeOne API change notification](https://www.tencentcloud.
|
|
14095
|
+
"document": "Site ID set. this parameter will change from option to required after may 30, 2024. for details, see the notice: [tencent cloud EdgeOne API change notification](https://www.tencentcloud.com/document/product/1552/104902?from_cn_redirect=1). a maximum of 100 site ids can be imported. use `*` to query all site data under the tencent cloud root account. querying account-level data requires all resource permissions for all sites in this interface.",
|
|
14096
14096
|
"example": "[\"*\"]",
|
|
14097
14097
|
"member": "string",
|
|
14098
14098
|
"name": "ZoneIds",
|
|
@@ -20149,7 +20149,7 @@
|
|
|
20149
20149
|
},
|
|
20150
20150
|
{
|
|
20151
20151
|
"disabled": false,
|
|
20152
|
-
"document": "Configures the server certificate mode. valid values:.\n\n- disable: without configuring server certificate.\n- eofreecert: specifies to apply for a free certificate through automatic validation and deploy it. for verification methods, see [free certificate application supported verification methods](https://www.tencentcloud.
|
|
20152
|
+
"document": "Configures the server certificate mode. valid values:.\n\n- disable: without configuring server certificate.\n- eofreecert: specifies to apply for a free certificate through automatic validation and deploy it. for verification methods, see [free certificate application supported verification methods](https://www.tencentcloud.com/document/product/1552/90437?from_cn_redirect=1).\n - In ns or DNSPod hosting access mode, free certificates can only be applied for via automatic validation.\n - When a free certificate application fails, it can cause deployment failure. you can obtain the failure reason through the <a href = 'https://www.tencentcloud.com/document/product/1552/124806?from_cn_redirect=1)'>check free certificate application result</a> .\n- eofreecert_manual: specifies the deployment of free certificates applied through DNS delegation verification or file verification. before deploying a free certificate, you need to trigger the [apply for free certificate](https://www.tencentcloud.com/document/product/1552/124807?from_cn_redirect=1)) api to apply for a free certificate. once the application is successful, you can use this enumeration value to deploy the free certificate.\nNote: when deploying a free certificate, ensure a successful application for a free certificate already exists. you can check whether a successful application for a free certificate already exists through the <a href = 'https://www.tencentcloud.com/document/product/1552/124806?from_cn_redirect=1)'>check free certificate application result</a> api.\n- sslcert: specifies the configuration of the managed service side certificate.",
|
|
20153
20153
|
"example": "eofreecert",
|
|
20154
20154
|
"member": "string",
|
|
20155
20155
|
"name": "Mode",
|
|
@@ -20185,7 +20185,7 @@
|
|
|
20185
20185
|
},
|
|
20186
20186
|
{
|
|
20187
20187
|
"disabled": false,
|
|
20188
|
-
"document": "Specifies the certificate carried during EO node origin-pull for origin-pull mutual authentication handshake, off by default. leave blank to indicate retaining the original configuration. this configuration is currently in closed beta testing for the allowlist feature. if you need to use it, please contact us (https://www.tencentcloud.
|
|
20188
|
+
"document": "Specifies the certificate carried during EO node origin-pull for origin-pull mutual authentication handshake, off by default. leave blank to indicate retaining the original configuration. this configuration is currently in closed beta testing for the allowlist feature. if you need to use it, please contact us (https://www.tencentcloud.com/online?from_cn_redirect=1-service).",
|
|
20189
20189
|
"example": "无",
|
|
20190
20190
|
"member": "UpstreamCertInfo",
|
|
20191
20191
|
"name": "UpstreamCertInfo",
|
tccli/services/tke/tke_client.py
CHANGED
|
@@ -2824,6 +2824,61 @@ def doAddVpcCniSubnets(args, parsed_globals):
|
|
|
2824
2824
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2825
2825
|
|
|
2826
2826
|
|
|
2827
|
+
def doDisableControlPlaneLogs(args, parsed_globals):
|
|
2828
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2829
|
+
|
|
2830
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2831
|
+
cred = credential.CVMRoleCredential()
|
|
2832
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2833
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2834
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2835
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2836
|
+
)
|
|
2837
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2839
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2840
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2841
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2842
|
+
else:
|
|
2843
|
+
cred = credential.Credential(
|
|
2844
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2845
|
+
)
|
|
2846
|
+
http_profile = HttpProfile(
|
|
2847
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2848
|
+
reqMethod="POST",
|
|
2849
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2850
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2851
|
+
)
|
|
2852
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2853
|
+
if g_param[OptionsDefine.Language]:
|
|
2854
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2855
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2856
|
+
client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2857
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2858
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2859
|
+
model = models.DisableControlPlaneLogsRequest()
|
|
2860
|
+
model.from_json_string(json.dumps(args))
|
|
2861
|
+
start_time = time.time()
|
|
2862
|
+
while True:
|
|
2863
|
+
rsp = client.DisableControlPlaneLogs(model)
|
|
2864
|
+
result = rsp.to_json_string()
|
|
2865
|
+
try:
|
|
2866
|
+
json_obj = json.loads(result)
|
|
2867
|
+
except TypeError as e:
|
|
2868
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2869
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2870
|
+
break
|
|
2871
|
+
cur_time = time.time()
|
|
2872
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2873
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2874
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2875
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2876
|
+
else:
|
|
2877
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2878
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2879
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2880
|
+
|
|
2881
|
+
|
|
2827
2882
|
def doDescribeExistedInstances(args, parsed_globals):
|
|
2828
2883
|
g_param = parse_global_arg(parsed_globals)
|
|
2829
2884
|
|
|
@@ -6124,6 +6179,61 @@ def doDescribeClusterRoutes(args, parsed_globals):
|
|
|
6124
6179
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6125
6180
|
|
|
6126
6181
|
|
|
6182
|
+
def doEnableControlPlaneLogs(args, parsed_globals):
|
|
6183
|
+
g_param = parse_global_arg(parsed_globals)
|
|
6184
|
+
|
|
6185
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
6186
|
+
cred = credential.CVMRoleCredential()
|
|
6187
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
6188
|
+
cred = credential.STSAssumeRoleCredential(
|
|
6189
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6190
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6191
|
+
)
|
|
6192
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6193
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6194
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6195
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6196
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6197
|
+
else:
|
|
6198
|
+
cred = credential.Credential(
|
|
6199
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
6200
|
+
)
|
|
6201
|
+
http_profile = HttpProfile(
|
|
6202
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
6203
|
+
reqMethod="POST",
|
|
6204
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6205
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6206
|
+
)
|
|
6207
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6208
|
+
if g_param[OptionsDefine.Language]:
|
|
6209
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
6210
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
6211
|
+
client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
|
|
6212
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
6213
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
6214
|
+
model = models.EnableControlPlaneLogsRequest()
|
|
6215
|
+
model.from_json_string(json.dumps(args))
|
|
6216
|
+
start_time = time.time()
|
|
6217
|
+
while True:
|
|
6218
|
+
rsp = client.EnableControlPlaneLogs(model)
|
|
6219
|
+
result = rsp.to_json_string()
|
|
6220
|
+
try:
|
|
6221
|
+
json_obj = json.loads(result)
|
|
6222
|
+
except TypeError as e:
|
|
6223
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
6224
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
6225
|
+
break
|
|
6226
|
+
cur_time = time.time()
|
|
6227
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
6228
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
6229
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
6230
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
6231
|
+
else:
|
|
6232
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
6233
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
6234
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6235
|
+
|
|
6236
|
+
|
|
6127
6237
|
def doModifyNodePoolInstanceTypes(args, parsed_globals):
|
|
6128
6238
|
g_param = parse_global_arg(parsed_globals)
|
|
6129
6239
|
|
|
@@ -6234,6 +6344,61 @@ def doCheckInstancesUpgradeAble(args, parsed_globals):
|
|
|
6234
6344
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6235
6345
|
|
|
6236
6346
|
|
|
6347
|
+
def doDescribeControlPlaneLogs(args, parsed_globals):
|
|
6348
|
+
g_param = parse_global_arg(parsed_globals)
|
|
6349
|
+
|
|
6350
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
6351
|
+
cred = credential.CVMRoleCredential()
|
|
6352
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
6353
|
+
cred = credential.STSAssumeRoleCredential(
|
|
6354
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6355
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6356
|
+
)
|
|
6357
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6358
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6359
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6360
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6361
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6362
|
+
else:
|
|
6363
|
+
cred = credential.Credential(
|
|
6364
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
6365
|
+
)
|
|
6366
|
+
http_profile = HttpProfile(
|
|
6367
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
6368
|
+
reqMethod="POST",
|
|
6369
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6370
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6371
|
+
)
|
|
6372
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6373
|
+
if g_param[OptionsDefine.Language]:
|
|
6374
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
6375
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
6376
|
+
client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
|
|
6377
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
6378
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
6379
|
+
model = models.DescribeControlPlaneLogsRequest()
|
|
6380
|
+
model.from_json_string(json.dumps(args))
|
|
6381
|
+
start_time = time.time()
|
|
6382
|
+
while True:
|
|
6383
|
+
rsp = client.DescribeControlPlaneLogs(model)
|
|
6384
|
+
result = rsp.to_json_string()
|
|
6385
|
+
try:
|
|
6386
|
+
json_obj = json.loads(result)
|
|
6387
|
+
except TypeError as e:
|
|
6388
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
6389
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
6390
|
+
break
|
|
6391
|
+
cur_time = time.time()
|
|
6392
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
6393
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
6394
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
6395
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
6396
|
+
else:
|
|
6397
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
6398
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
6399
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6400
|
+
|
|
6401
|
+
|
|
6237
6402
|
def doDeleteNodePool(args, parsed_globals):
|
|
6238
6403
|
g_param = parse_global_arg(parsed_globals)
|
|
6239
6404
|
|
|
@@ -7673,6 +7838,7 @@ ACTION_MAP = {
|
|
|
7673
7838
|
"DeleteClusterAsGroups": doDeleteClusterAsGroups,
|
|
7674
7839
|
"DeleteClusterRoute": doDeleteClusterRoute,
|
|
7675
7840
|
"AddVpcCniSubnets": doAddVpcCniSubnets,
|
|
7841
|
+
"DisableControlPlaneLogs": doDisableControlPlaneLogs,
|
|
7676
7842
|
"DescribeExistedInstances": doDescribeExistedInstances,
|
|
7677
7843
|
"DescribeClusterNodePools": doDescribeClusterNodePools,
|
|
7678
7844
|
"DescribeTKEEdgeClusterCredential": doDescribeTKEEdgeClusterCredential,
|
|
@@ -7733,8 +7899,10 @@ ACTION_MAP = {
|
|
|
7733
7899
|
"DescribeClusterEndpoints": doDescribeClusterEndpoints,
|
|
7734
7900
|
"ModifyClusterEndpointSP": doModifyClusterEndpointSP,
|
|
7735
7901
|
"DescribeClusterRoutes": doDescribeClusterRoutes,
|
|
7902
|
+
"EnableControlPlaneLogs": doEnableControlPlaneLogs,
|
|
7736
7903
|
"ModifyNodePoolInstanceTypes": doModifyNodePoolInstanceTypes,
|
|
7737
7904
|
"CheckInstancesUpgradeAble": doCheckInstancesUpgradeAble,
|
|
7905
|
+
"DescribeControlPlaneLogs": doDescribeControlPlaneLogs,
|
|
7738
7906
|
"DeleteNodePool": doDeleteNodePool,
|
|
7739
7907
|
"DescribeHealthCheckPolicies": doDescribeHealthCheckPolicies,
|
|
7740
7908
|
"DescribeImages": doDescribeImages,
|
|
@@ -469,6 +469,13 @@
|
|
|
469
469
|
"output": "DescribeClustersResponse",
|
|
470
470
|
"status": "online"
|
|
471
471
|
},
|
|
472
|
+
"DescribeControlPlaneLogs": {
|
|
473
|
+
"document": "This API is used to query plug-in log collection settings.",
|
|
474
|
+
"input": "DescribeControlPlaneLogsRequest",
|
|
475
|
+
"name": "Query the collection enable status of managed component logs for a user",
|
|
476
|
+
"output": "DescribeControlPlaneLogsResponse",
|
|
477
|
+
"status": "online"
|
|
478
|
+
},
|
|
472
479
|
"DescribeECMInstances": {
|
|
473
480
|
"document": "This API is used to obtain the ECM instance information.",
|
|
474
481
|
"input": "DescribeECMInstancesRequest",
|
|
@@ -679,6 +686,13 @@
|
|
|
679
686
|
"output": "DisableClusterDeletionProtectionResponse",
|
|
680
687
|
"status": "online"
|
|
681
688
|
},
|
|
689
|
+
"DisableControlPlaneLogs": {
|
|
690
|
+
"document": "This API is used to delete the log collection configuration of a plugin.",
|
|
691
|
+
"input": "DisableControlPlaneLogsRequest",
|
|
692
|
+
"name": "Disable user managed component log collection",
|
|
693
|
+
"output": "DisableControlPlaneLogsResponse",
|
|
694
|
+
"status": "online"
|
|
695
|
+
},
|
|
682
696
|
"DisableEncryptionProtection": {
|
|
683
697
|
"document": "This API is used to disable encryption protection.",
|
|
684
698
|
"input": "DisableEncryptionProtectionRequest",
|
|
@@ -700,6 +714,13 @@
|
|
|
700
714
|
"output": "EnableClusterDeletionProtectionResponse",
|
|
701
715
|
"status": "online"
|
|
702
716
|
},
|
|
717
|
+
"EnableControlPlaneLogs": {
|
|
718
|
+
"document": "This API is used to create log collection settings for plugins.",
|
|
719
|
+
"input": "EnableControlPlaneLogsRequest",
|
|
720
|
+
"name": "Enable log collection for managed components in specified clusters",
|
|
721
|
+
"output": "EnableControlPlaneLogsResponse",
|
|
722
|
+
"status": "online"
|
|
723
|
+
},
|
|
703
724
|
"EnableEncryptionProtection": {
|
|
704
725
|
"document": "This API is used to enable Encrypted Data Protection, which requires enabling KMS capability and completing KMS authorization.",
|
|
705
726
|
"input": "EnableEncryptionProtectionRequest",
|
|
@@ -3261,6 +3282,67 @@
|
|
|
3261
3282
|
],
|
|
3262
3283
|
"usage": "out"
|
|
3263
3284
|
},
|
|
3285
|
+
"ComponentLogConfig": {
|
|
3286
|
+
"document": "Component log collection configuration.",
|
|
3287
|
+
"members": [
|
|
3288
|
+
{
|
|
3289
|
+
"disabled": false,
|
|
3290
|
+
"document": "Component name",
|
|
3291
|
+
"example": "kapenter",
|
|
3292
|
+
"member": "string",
|
|
3293
|
+
"name": "Name",
|
|
3294
|
+
"output_required": true,
|
|
3295
|
+
"required": true,
|
|
3296
|
+
"type": "string",
|
|
3297
|
+
"value_allowed_null": false
|
|
3298
|
+
},
|
|
3299
|
+
{
|
|
3300
|
+
"disabled": false,
|
|
3301
|
+
"document": "Log level. for components that support dynamic adjustment, you can specify this parameter when enabling logs.",
|
|
3302
|
+
"example": "2",
|
|
3303
|
+
"member": "int64",
|
|
3304
|
+
"name": "LogLevel",
|
|
3305
|
+
"output_required": true,
|
|
3306
|
+
"required": false,
|
|
3307
|
+
"type": "int",
|
|
3308
|
+
"value_allowed_null": false
|
|
3309
|
+
},
|
|
3310
|
+
{
|
|
3311
|
+
"disabled": false,
|
|
3312
|
+
"document": "Logset ID. if not specified, auto-create.",
|
|
3313
|
+
"example": "2912eb16-a56c-4b9b-adb0-9828db1ad342",
|
|
3314
|
+
"member": "string",
|
|
3315
|
+
"name": "LogSetId",
|
|
3316
|
+
"output_required": true,
|
|
3317
|
+
"required": false,
|
|
3318
|
+
"type": "string",
|
|
3319
|
+
"value_allowed_null": false
|
|
3320
|
+
},
|
|
3321
|
+
{
|
|
3322
|
+
"disabled": false,
|
|
3323
|
+
"document": "Log topic ID. if not specified, auto-create.",
|
|
3324
|
+
"example": "2912eb16-a56c-4b9b-adb0-9828db1ad342",
|
|
3325
|
+
"member": "string",
|
|
3326
|
+
"name": "TopicId",
|
|
3327
|
+
"output_required": true,
|
|
3328
|
+
"required": false,
|
|
3329
|
+
"type": "string",
|
|
3330
|
+
"value_allowed_null": false
|
|
3331
|
+
},
|
|
3332
|
+
{
|
|
3333
|
+
"disabled": false,
|
|
3334
|
+
"document": "topic region. this parameter enables cross-region shipping of logs.",
|
|
3335
|
+
"example": "ap-guangzhou",
|
|
3336
|
+
"member": "string",
|
|
3337
|
+
"name": "TopicRegion",
|
|
3338
|
+
"output_required": true,
|
|
3339
|
+
"required": false,
|
|
3340
|
+
"type": "string",
|
|
3341
|
+
"value_allowed_null": false
|
|
3342
|
+
}
|
|
3343
|
+
],
|
|
3344
|
+
"usage": "both"
|
|
3345
|
+
},
|
|
3264
3346
|
"CreateBackupStorageLocationRequest": {
|
|
3265
3347
|
"document": "CreateBackupStorageLocation request structure.",
|
|
3266
3348
|
"members": [
|
|
@@ -7036,6 +7118,52 @@
|
|
|
7036
7118
|
],
|
|
7037
7119
|
"type": "object"
|
|
7038
7120
|
},
|
|
7121
|
+
"DescribeControlPlaneLogsRequest": {
|
|
7122
|
+
"document": "DescribeControlPlaneLogs request structure.",
|
|
7123
|
+
"members": [
|
|
7124
|
+
{
|
|
7125
|
+
"disabled": false,
|
|
7126
|
+
"document": "Cluster ID",
|
|
7127
|
+
"example": "cls-kaftesta",
|
|
7128
|
+
"member": "string",
|
|
7129
|
+
"name": "ClusterId",
|
|
7130
|
+
"required": true,
|
|
7131
|
+
"type": "string"
|
|
7132
|
+
},
|
|
7133
|
+
{
|
|
7134
|
+
"disabled": false,
|
|
7135
|
+
"document": "Cluster type. currently only support tke.",
|
|
7136
|
+
"example": "tke",
|
|
7137
|
+
"member": "string",
|
|
7138
|
+
"name": "ClusterType",
|
|
7139
|
+
"required": true,
|
|
7140
|
+
"type": "string"
|
|
7141
|
+
}
|
|
7142
|
+
],
|
|
7143
|
+
"type": "object"
|
|
7144
|
+
},
|
|
7145
|
+
"DescribeControlPlaneLogsResponse": {
|
|
7146
|
+
"document": "DescribeControlPlaneLogs response structure.",
|
|
7147
|
+
"members": [
|
|
7148
|
+
{
|
|
7149
|
+
"disabled": false,
|
|
7150
|
+
"document": "Specifies the query result of log collection configuration.",
|
|
7151
|
+
"example": "无",
|
|
7152
|
+
"member": "ComponentLogConfig",
|
|
7153
|
+
"name": "Details",
|
|
7154
|
+
"output_required": false,
|
|
7155
|
+
"type": "list",
|
|
7156
|
+
"value_allowed_null": false
|
|
7157
|
+
},
|
|
7158
|
+
{
|
|
7159
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
7160
|
+
"member": "string",
|
|
7161
|
+
"name": "RequestId",
|
|
7162
|
+
"type": "string"
|
|
7163
|
+
}
|
|
7164
|
+
],
|
|
7165
|
+
"type": "object"
|
|
7166
|
+
},
|
|
7039
7167
|
"DescribeECMInstancesRequest": {
|
|
7040
7168
|
"document": "DescribeECMInstances request structure.",
|
|
7041
7169
|
"members": [
|
|
@@ -9042,6 +9170,60 @@
|
|
|
9042
9170
|
],
|
|
9043
9171
|
"type": "object"
|
|
9044
9172
|
},
|
|
9173
|
+
"DisableControlPlaneLogsRequest": {
|
|
9174
|
+
"document": "DisableControlPlaneLogs request structure.",
|
|
9175
|
+
"members": [
|
|
9176
|
+
{
|
|
9177
|
+
"disabled": false,
|
|
9178
|
+
"document": "Cluster ID",
|
|
9179
|
+
"example": "cls-kaftesta",
|
|
9180
|
+
"member": "string",
|
|
9181
|
+
"name": "ClusterId",
|
|
9182
|
+
"required": true,
|
|
9183
|
+
"type": "string"
|
|
9184
|
+
},
|
|
9185
|
+
{
|
|
9186
|
+
"disabled": false,
|
|
9187
|
+
"document": "Cluster type. currently only support tke.",
|
|
9188
|
+
"example": "tke",
|
|
9189
|
+
"member": "string",
|
|
9190
|
+
"name": "ClusterType",
|
|
9191
|
+
"required": true,
|
|
9192
|
+
"type": "string"
|
|
9193
|
+
},
|
|
9194
|
+
{
|
|
9195
|
+
"disabled": false,
|
|
9196
|
+
"document": "Component name list. currently supports cluster-autoscaler, kapenter.",
|
|
9197
|
+
"example": "[\"karpenter\"]",
|
|
9198
|
+
"member": "string",
|
|
9199
|
+
"name": "ComponentNames",
|
|
9200
|
+
"required": true,
|
|
9201
|
+
"type": "list"
|
|
9202
|
+
},
|
|
9203
|
+
{
|
|
9204
|
+
"disabled": false,
|
|
9205
|
+
"document": "Specifies whether to delete the logset and topic. if the logset and topic are in use by other collection rules, they will not be deleted.",
|
|
9206
|
+
"example": "false",
|
|
9207
|
+
"member": "bool",
|
|
9208
|
+
"name": "DeleteLogSetAndTopic",
|
|
9209
|
+
"required": false,
|
|
9210
|
+
"type": "bool"
|
|
9211
|
+
}
|
|
9212
|
+
],
|
|
9213
|
+
"type": "object"
|
|
9214
|
+
},
|
|
9215
|
+
"DisableControlPlaneLogsResponse": {
|
|
9216
|
+
"document": "DisableControlPlaneLogs response structure.",
|
|
9217
|
+
"members": [
|
|
9218
|
+
{
|
|
9219
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
9220
|
+
"member": "string",
|
|
9221
|
+
"name": "RequestId",
|
|
9222
|
+
"type": "string"
|
|
9223
|
+
}
|
|
9224
|
+
],
|
|
9225
|
+
"type": "object"
|
|
9226
|
+
},
|
|
9045
9227
|
"DisableEncryptionProtectionRequest": {
|
|
9046
9228
|
"document": "DisableEncryptionProtection request structure.",
|
|
9047
9229
|
"members": [
|
|
@@ -9666,6 +9848,51 @@
|
|
|
9666
9848
|
],
|
|
9667
9849
|
"type": "object"
|
|
9668
9850
|
},
|
|
9851
|
+
"EnableControlPlaneLogsRequest": {
|
|
9852
|
+
"document": "EnableControlPlaneLogs request structure.",
|
|
9853
|
+
"members": [
|
|
9854
|
+
{
|
|
9855
|
+
"disabled": false,
|
|
9856
|
+
"document": "Cluster ID",
|
|
9857
|
+
"example": "cls-kaftesta",
|
|
9858
|
+
"member": "string",
|
|
9859
|
+
"name": "ClusterId",
|
|
9860
|
+
"required": true,
|
|
9861
|
+
"type": "string"
|
|
9862
|
+
},
|
|
9863
|
+
{
|
|
9864
|
+
"disabled": false,
|
|
9865
|
+
"document": "Cluster type. currently only support tke.",
|
|
9866
|
+
"example": "tke",
|
|
9867
|
+
"member": "string",
|
|
9868
|
+
"name": "ClusterType",
|
|
9869
|
+
"required": true,
|
|
9870
|
+
"type": "string"
|
|
9871
|
+
},
|
|
9872
|
+
{
|
|
9873
|
+
"disabled": false,
|
|
9874
|
+
"document": "Component name list. currently supports cluster-autoscaler, kapenter.",
|
|
9875
|
+
"example": "无",
|
|
9876
|
+
"member": "ComponentLogConfig",
|
|
9877
|
+
"name": "Components",
|
|
9878
|
+
"required": true,
|
|
9879
|
+
"type": "list"
|
|
9880
|
+
}
|
|
9881
|
+
],
|
|
9882
|
+
"type": "object"
|
|
9883
|
+
},
|
|
9884
|
+
"EnableControlPlaneLogsResponse": {
|
|
9885
|
+
"document": "EnableControlPlaneLogs response structure.",
|
|
9886
|
+
"members": [
|
|
9887
|
+
{
|
|
9888
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
9889
|
+
"member": "string",
|
|
9890
|
+
"name": "RequestId",
|
|
9891
|
+
"type": "string"
|
|
9892
|
+
}
|
|
9893
|
+
],
|
|
9894
|
+
"type": "object"
|
|
9895
|
+
},
|
|
9669
9896
|
"EnableEncryptionProtectionRequest": {
|
|
9670
9897
|
"document": "EnableEncryptionProtection request structure.",
|
|
9671
9898
|
"members": [
|