tccli 3.0.1216.1__py2.py3-none-any.whl → 3.0.1217.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (252) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argparser.py +1 -1
  3. tccli/command.py +2 -2
  4. tccli/credentials.py +25 -0
  5. tccli/main.py +6 -2
  6. tccli/plugins/sso/__init__.py +61 -0
  7. tccli/plugins/sso/configs.py +4 -0
  8. tccli/plugins/sso/configure.py +45 -0
  9. tccli/plugins/sso/login.py +144 -0
  10. tccli/plugins/sso/logout.py +21 -0
  11. tccli/plugins/sso/terminal.py +161 -0
  12. tccli/plugins/sso/texts.py +40 -0
  13. tccli/services/__init__.py +6 -0
  14. tccli/services/acp/v20220105/api.json +7 -7
  15. tccli/services/acp/v20220105/examples.json +2 -2
  16. tccli/services/aiart/v20221229/api.json +29 -29
  17. tccli/services/aiart/v20221229/examples.json +8 -8
  18. tccli/services/apigateway/v20180808/api.json +18 -17
  19. tccli/services/apigateway/v20180808/examples.json +12 -12
  20. tccli/services/apm/v20210622/api.json +98 -4
  21. tccli/services/asr/v20190614/api.json +18 -17
  22. tccli/services/asr/v20190614/examples.json +13 -13
  23. tccli/services/autoscaling/v20180419/api.json +371 -309
  24. tccli/services/autoscaling/v20180419/examples.json +17 -17
  25. tccli/services/batch/v20170312/api.json +7 -7
  26. tccli/services/bda/v20200324/api.json +39 -31
  27. tccli/services/bda/v20200324/examples.json +9 -9
  28. tccli/services/bh/__init__.py +4 -0
  29. tccli/services/bh/bh_client.py +3428 -0
  30. tccli/services/bh/v20230418/api.json +8180 -0
  31. tccli/services/bh/v20230418/examples.json +519 -0
  32. tccli/services/bi/v20220105/api.json +48 -0
  33. tccli/services/billing/v20180709/api.json +26 -24
  34. tccli/services/bsca/v20210811/api.json +1 -1
  35. tccli/services/btoe/v20210514/api.json +4 -4
  36. tccli/services/btoe/v20210514/examples.json +2 -2
  37. tccli/services/ca/v20230228/api.json +60 -0
  38. tccli/services/cam/v20190116/api.json +11 -11
  39. tccli/services/cat/v20180409/api.json +9 -0
  40. tccli/services/cbs/v20170312/api.json +200 -188
  41. tccli/services/cbs/v20170312/examples.json +4 -4
  42. tccli/services/ccc/v20200210/api.json +390 -323
  43. tccli/services/ccc/v20200210/examples.json +15 -15
  44. tccli/services/cdb/cdb_client.py +13 -13
  45. tccli/services/cdb/v20170320/api.json +295 -270
  46. tccli/services/cdb/v20170320/examples.json +38 -38
  47. tccli/services/cdc/v20201214/api.json +283 -270
  48. tccli/services/cdc/v20201214/examples.json +26 -26
  49. tccli/services/cds/v20180420/api.json +82 -76
  50. tccli/services/cds/v20180420/examples.json +1 -1
  51. tccli/services/cdwch/v20200915/api.json +1 -1
  52. tccli/services/cdwdoris/v20211228/api.json +42 -2
  53. tccli/services/cdz/v20221123/api.json +41 -5
  54. tccli/services/cfg/v20210820/api.json +31 -0
  55. tccli/services/cfs/v20190719/api.json +89 -1
  56. tccli/services/cfs/v20190719/examples.json +1 -1
  57. tccli/services/cfw/cfw_client.py +0 -53
  58. tccli/services/cfw/v20190904/api.json +1849 -1999
  59. tccli/services/cfw/v20190904/examples.json +157 -159
  60. tccli/services/ckafka/v20190819/api.json +104 -75
  61. tccli/services/clb/v20180317/api.json +48 -26
  62. tccli/services/clb/v20180317/examples.json +1 -1
  63. tccli/services/cloudapp/v20220530/api.json +5 -1
  64. tccli/services/cloudaudit/v20190319/api.json +58 -44
  65. tccli/services/cloudaudit/v20190319/examples.json +6 -6
  66. tccli/services/cloudstudio/v20230508/api.json +38 -37
  67. tccli/services/cloudstudio/v20230508/examples.json +4 -4
  68. tccli/services/cls/cls_client.py +216 -4
  69. tccli/services/cls/v20201016/api.json +536 -47
  70. tccli/services/cls/v20201016/examples.json +34 -2
  71. tccli/services/csip/v20221121/api.json +2562 -2382
  72. tccli/services/csip/v20221121/examples.json +108 -108
  73. tccli/services/cvm/v20170312/api.json +149 -112
  74. tccli/services/cvm/v20170312/examples.json +2 -2
  75. tccli/services/cwp/cwp_client.py +4 -110
  76. tccli/services/cwp/v20180228/api.json +6338 -6146
  77. tccli/services/cwp/v20180228/examples.json +342 -370
  78. tccli/services/cynosdb/v20190107/api.json +93 -81
  79. tccli/services/cynosdb/v20190107/examples.json +70 -70
  80. tccli/services/dasb/v20191018/api.json +796 -651
  81. tccli/services/dasb/v20191018/examples.json +101 -101
  82. tccli/services/dcdb/dcdb_client.py +114 -61
  83. tccli/services/dcdb/v20180411/api.json +141 -7
  84. tccli/services/dcdb/v20180411/examples.json +32 -0
  85. tccli/services/dlc/v20210125/api.json +21 -11
  86. tccli/services/dnspod/dnspod_client.py +417 -46
  87. tccli/services/dnspod/v20210323/api.json +751 -30
  88. tccli/services/dnspod/v20210323/examples.json +62 -0
  89. tccli/services/dts/v20211206/api.json +4 -4
  90. tccli/services/ecm/v20190719/api.json +2 -2
  91. tccli/services/emr/v20190103/api.json +339 -114
  92. tccli/services/emr/v20190103/examples.json +64 -82
  93. tccli/services/es/v20180416/api.json +29 -0
  94. tccli/services/es/v20180416/examples.json +1 -1
  95. tccli/services/ess/v20201111/api.json +49 -31
  96. tccli/services/ess/v20201111/examples.json +20 -8
  97. tccli/services/essbasic/v20210526/api.json +54 -49
  98. tccli/services/essbasic/v20210526/examples.json +36 -18
  99. tccli/services/facefusion/v20181201/api.json +47 -45
  100. tccli/services/facefusion/v20181201/examples.json +2 -2
  101. tccli/services/facefusion/v20220927/api.json +54 -48
  102. tccli/services/facefusion/v20220927/examples.json +5 -5
  103. tccli/services/faceid/v20180301/api.json +497 -496
  104. tccli/services/faceid/v20180301/examples.json +219 -101
  105. tccli/services/fmu/v20191213/api.json +59 -67
  106. tccli/services/fmu/v20191213/examples.json +22 -22
  107. tccli/services/ft/v20200304/api.json +53 -57
  108. tccli/services/ft/v20200304/examples.json +14 -14
  109. tccli/services/gme/v20180711/api.json +21 -11
  110. tccli/services/gme/v20180711/examples.json +1 -1
  111. tccli/services/hai/v20230812/api.json +116 -9
  112. tccli/services/hai/v20230812/examples.json +4 -4
  113. tccli/services/hunyuan/hunyuan_client.py +436 -12
  114. tccli/services/hunyuan/v20230901/api.json +1482 -118
  115. tccli/services/hunyuan/v20230901/examples.json +82 -18
  116. tccli/services/iai/v20180301/api.json +23 -19
  117. tccli/services/iai/v20180301/examples.json +2 -2
  118. tccli/services/iai/v20200303/api.json +530 -511
  119. tccli/services/iai/v20200303/examples.json +116 -86
  120. tccli/services/ig/__init__.py +4 -0
  121. tccli/services/ig/ig_client.py +195 -0
  122. tccli/services/ig/v20210518/api.json +83 -0
  123. tccli/services/ig/v20210518/examples.json +13 -0
  124. tccli/services/ioa/ioa_client.py +53 -0
  125. tccli/services/ioa/v20220601/api.json +662 -413
  126. tccli/services/ioa/v20220601/examples.json +24 -10
  127. tccli/services/iotexplorer/v20190423/api.json +33 -13
  128. tccli/services/iotexplorer/v20190423/examples.json +3 -3
  129. tccli/services/iotvideo/iotvideo_client.py +106 -0
  130. tccli/services/iotvideo/v20191126/api.json +256 -24
  131. tccli/services/iotvideo/v20191126/examples.json +19 -3
  132. tccli/services/iotvideo/v20201215/api.json +1 -1
  133. tccli/services/iotvideo/v20201215/examples.json +1 -1
  134. tccli/services/iotvideo/v20211125/api.json +1 -1
  135. tccli/services/iotvideo/v20211125/examples.json +2 -2
  136. tccli/services/iss/iss_client.py +69 -122
  137. tccli/services/iss/v20230517/api.json +10 -54
  138. tccli/services/iss/v20230517/examples.json +0 -14
  139. tccli/services/kms/v20190118/api.json +301 -268
  140. tccli/services/kms/v20190118/examples.json +45 -51
  141. tccli/services/lcic/lcic_client.py +159 -0
  142. tccli/services/lcic/v20220817/api.json +273 -1
  143. tccli/services/lcic/v20220817/examples.json +24 -0
  144. tccli/services/lighthouse/v20200324/api.json +56 -0
  145. tccli/services/live/live_client.py +159 -0
  146. tccli/services/live/v20180801/api.json +244 -0
  147. tccli/services/live/v20180801/examples.json +24 -0
  148. tccli/services/lke/v20231130/api.json +17 -17
  149. tccli/services/lke/v20231130/examples.json +19 -25
  150. tccli/services/mariadb/v20170312/api.json +7 -7
  151. tccli/services/market/v20191010/api.json +3 -3
  152. tccli/services/market/v20191010/examples.json +2 -2
  153. tccli/services/mmps/v20200710/api.json +47 -47
  154. tccli/services/mmps/v20200710/examples.json +3 -3
  155. tccli/services/mongodb/v20190725/api.json +4 -4
  156. tccli/services/monitor/v20180724/api.json +46 -19
  157. tccli/services/mps/v20190612/api.json +282 -5
  158. tccli/services/mps/v20190612/examples.json +25 -1
  159. tccli/services/mqtt/v20240516/api.json +2 -2
  160. tccli/services/mrs/v20200910/api.json +72 -34
  161. tccli/services/mrs/v20200910/examples.json +2 -2
  162. tccli/services/ms/v20180408/api.json +535 -506
  163. tccli/services/ms/v20180408/examples.json +25 -25
  164. tccli/services/oceanus/v20190422/api.json +130 -0
  165. tccli/services/ocr/ocr_client.py +232 -20
  166. tccli/services/ocr/v20181119/api.json +2265 -760
  167. tccli/services/ocr/v20181119/examples.json +200 -180
  168. tccli/services/omics/v20221128/api.json +614 -553
  169. tccli/services/omics/v20221128/examples.json +9 -9
  170. tccli/services/organization/v20210331/api.json +13 -4
  171. tccli/services/organization/v20210331/examples.json +2 -2
  172. tccli/services/partners/v20180321/api.json +244 -234
  173. tccli/services/partners/v20180321/examples.json +19 -19
  174. tccli/services/privatedns/privatedns_client.py +428 -4
  175. tccli/services/privatedns/v20201028/api.json +815 -11
  176. tccli/services/privatedns/v20201028/examples.json +64 -0
  177. tccli/services/pts/v20210728/api.json +18 -0
  178. tccli/services/pts/v20210728/examples.json +1 -1
  179. tccli/services/rce/rce_client.py +53 -0
  180. tccli/services/rce/v20201103/api.json +146 -0
  181. tccli/services/rce/v20201103/examples.json +8 -0
  182. tccli/services/redis/v20180412/api.json +42 -42
  183. tccli/services/redis/v20180412/examples.json +19 -19
  184. tccli/services/rum/v20210622/api.json +9 -0
  185. tccli/services/scf/v20180416/api.json +15 -15
  186. tccli/services/scf/v20180416/examples.json +1 -1
  187. tccli/services/smop/v20201203/api.json +46 -42
  188. tccli/services/smop/v20201203/examples.json +2 -2
  189. tccli/services/soe/v20180724/api.json +10 -10
  190. tccli/services/sqlserver/v20180328/api.json +21 -8
  191. tccli/services/sqlserver/v20180328/examples.json +5 -5
  192. tccli/services/ssl/v20191205/api.json +97 -4
  193. tccli/services/ssm/v20190923/api.json +292 -231
  194. tccli/services/ssm/v20190923/examples.json +42 -42
  195. tccli/services/tat/v20201028/api.json +97 -97
  196. tccli/services/tat/v20201028/examples.json +20 -26
  197. tccli/services/tchd/v20230306/api.json +5 -5
  198. tccli/services/tchd/v20230306/examples.json +3 -3
  199. tccli/services/tcr/v20190924/api.json +1 -1
  200. tccli/services/tcr/v20190924/examples.json +1 -1
  201. tccli/services/tcss/v20201101/api.json +1973 -1426
  202. tccli/services/tcss/v20201101/examples.json +346 -364
  203. tccli/services/tdmq/v20200217/api.json +539 -401
  204. tccli/services/tdmq/v20200217/examples.json +104 -104
  205. tccli/services/tds/v20220801/api.json +4 -4
  206. tccli/services/tem/v20210701/api.json +287 -271
  207. tccli/services/tem/v20210701/examples.json +59 -59
  208. tccli/services/teo/v20220901/api.json +37 -9
  209. tccli/services/teo/v20220901/examples.json +13 -7
  210. tccli/services/thpc/v20230321/api.json +5 -5
  211. tccli/services/tke/tke_client.py +217 -58
  212. tccli/services/tke/v20180525/api.json +36 -27
  213. tccli/services/tke/v20180525/examples.json +1 -1
  214. tccli/services/tke/v20220501/api.json +176 -0
  215. tccli/services/tke/v20220501/examples.json +24 -0
  216. tccli/services/tmt/v20180321/api.json +38 -8
  217. tccli/services/trp/v20210515/api.json +86 -74
  218. tccli/services/trp/v20210515/examples.json +65 -65
  219. tccli/services/trro/v20220325/api.json +72 -71
  220. tccli/services/trro/v20220325/examples.json +8 -8
  221. tccli/services/trtc/trtc_client.py +8 -61
  222. tccli/services/trtc/v20190722/api.json +72 -30
  223. tccli/services/trtc/v20190722/examples.json +3 -11
  224. tccli/services/tse/tse_client.py +110 -4
  225. tccli/services/tse/v20201207/api.json +122 -7
  226. tccli/services/tse/v20201207/examples.json +25 -9
  227. tccli/services/vclm/v20240523/api.json +225 -82
  228. tccli/services/vclm/v20240523/examples.json +13 -19
  229. tccli/services/vod/v20180717/api.json +431 -4
  230. tccli/services/vod/v20180717/examples.json +25 -5
  231. tccli/services/vod/v20240718/api.json +11 -11
  232. tccli/services/vod/v20240718/examples.json +4 -4
  233. tccli/services/vod/vod_client.py +53 -0
  234. tccli/services/vpc/v20170312/api.json +1090 -862
  235. tccli/services/vpc/v20170312/examples.json +74 -66
  236. tccli/services/vpc/vpc_client.py +61 -8
  237. tccli/services/waf/v20180125/api.json +2540 -2177
  238. tccli/services/waf/v20180125/examples.json +216 -284
  239. tccli/services/waf/waf_client.py +172 -119
  240. tccli/services/wav/v20210129/api.json +48 -48
  241. tccli/services/wav/v20210129/examples.json +4 -4
  242. tccli/services/wedata/v20210820/api.json +909 -25
  243. tccli/services/wedata/v20210820/examples.json +28 -4
  244. tccli/services/wedata/wedata_client.py +159 -0
  245. tccli/services/weilingwith/v20230427/api.json +6 -6
  246. tccli/services/weilingwith/v20230427/examples.json +3 -3
  247. tccli/sso.py +229 -0
  248. {tccli-3.0.1216.1.dist-info → tccli-3.0.1217.1.dist-info}/METADATA +2 -2
  249. {tccli-3.0.1216.1.dist-info → tccli-3.0.1217.1.dist-info}/RECORD +252 -235
  250. {tccli-3.0.1216.1.dist-info → tccli-3.0.1217.1.dist-info}/WHEEL +0 -0
  251. {tccli-3.0.1216.1.dist-info → tccli-3.0.1217.1.dist-info}/entry_points.txt +0 -0
  252. {tccli-3.0.1216.1.dist-info → tccli-3.0.1217.1.dist-info}/license_files/LICENSE +0 -0
@@ -3,7 +3,7 @@
3
3
  "AddAndPublishNetworkFirewallPolicyDetail": [
4
4
  {
5
5
  "document": "",
6
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"xx\",\n \"CustomPolicy\": [\n {\n \"Peer\": \"xx\",\n \"Direction\": \"xx\",\n \"Ports\": \"xx\"\n }\n ],\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"xx\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"xx\"\n}",
6
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"rptest\",\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"describe content\",\n \"ClusterId\": \"cls-new\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
7
7
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
8
8
  "title": "容器网络创建网络策略添加并发布任务示例"
9
9
  }
@@ -11,22 +11,16 @@
11
11
  "AddAndPublishNetworkFirewallPolicyYamlDetail": [
12
12
  {
13
13
  "document": "",
14
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"xx\",\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"Yaml\": \"xxx\"\n}",
14
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"fshduis\",\n \"Description\": \"\",\n \"ClusterId\": \"cls-hjsdfh\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
15
15
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
16
16
  "title": "容器网络创建yaml网络策略添加任务示例"
17
17
  }
18
18
  ],
19
19
  "AddAssetImageRegistryRegistryDetail": [
20
- {
21
- "document": "正常添加",
22
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Name\": \"abc\",\n \"Username\": \"abc\",\n \"Password\": \"abc\",\n \"Url\": \"abc\",\n \"RegistryType\": \"abc\",\n \"RegistryVersion\": \"abc\",\n \"NetType\": \"abc\",\n \"RegistryRegion\": \"abc\",\n \"SpeedLimit\": 0,\n \"Insecure\": 1,\n \"ConnDetectConfig\": [\n {\n \"Quuid\": \"abc\",\n \"Uuid\": \"abc\"\n }\n ]\n}",
23
- "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"\",\n \"NameRepeatErr\": \"\",\n \"RegistryId\": 8329,\n \"RequestId\": \"f8d97649-ca1b-4f94-8ed4-40052a40d426\"\n }\n}",
24
- "title": "正常添加"
25
- },
26
20
  {
27
21
  "document": "新增单个镜像仓库详细信息",
28
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Username\": \"usename\",\n \"Name\": \"test\",\n \"Url\": \"http://127.0.0.1:8080\",\n \"RegistryVersion\": \"V2\",\n \"RegistryRegion\": \"default\",\n \"NetType\": \"public\",\n \"Password\": \"xxx\",\n \"RegistryType\": \"harbor\"\n}",
29
- "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"abc\",\n \"NameRepeatErr\": \"abc\",\n \"RegistryId\": 0,\n \"RequestId\": \"abc\"\n }\n}",
22
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Username\": \"usename\",\n \"Name\": \"test\",\n \"Url\": \"http://127.0.0.1:8080\",\n \"RegistryVersion\": \"V2\",\n \"RegistryRegion\": \"default\",\n \"NetType\": \"public\",\n \"Password\": \"password\",\n \"RegistryType\": \"harbor\"\n}",
23
+ "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"\",\n \"NameRepeatErr\": \"\",\n \"RegistryId\": 0,\n \"RequestId\": \"f8d97649-ca1b-4f94-8ed4-40052a40d426\"\n }\n}",
30
24
  "title": "新增单个镜像仓库详细信息"
31
25
  }
32
26
  ],
@@ -56,50 +50,44 @@
56
50
  {
57
51
  "document": "",
58
52
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddCompliancePolicyItemToWhitelist\n<公共请求参数>\n\n{\n \"CustomerPolicyItemIdSet\": [\n 10001,\n 10002\n ]\n}",
59
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\"\n }\n}",
53
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
60
54
  "title": "忽略检测项列表"
61
55
  }
62
56
  ],
63
57
  "AddEditAbnormalProcessRule": [
64
58
  {
65
59
  "document": "",
66
- "input": "https://tcss.tencentcloudapi.com/?Action=AddEditAbnormalProcessRule\n&RuleInfo.IsEnable=true\n&RuleInfo.ImageIds.0=xxxx\n&RuleInfo.ChildRules.0.RuleMode=RULE_MODE_RELEASE\n&RuleInfo.ChildRules.0.ProcessPath=xxxx\n&RuleInfo.RuleName=xxxx\n&<公共请求参数>",
60
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEditAbnormalProcessRule\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"IsEnable\": true,\n \"RuleName\": \"customrule_20241014050108\",\n \"ImageIds\": [\n \"sha256:80d28bedfe5dec59da9ebf8e6260224ac9008ab5c11dbbe16ee3ba3e4439ac2c\",\n \"sha256:8652b9f0cb4c0599575e5a003f5906876e10c1ceb2ab9fe1786712dac14a50cf\",\n \"sha256:5d0da3dc976460b72c77d94c8a1ad043720b0416bfc16c52c45d4847e53fadb6\",\n \"sha256:84b0f3f7f6f0416a2a8ef19ac765f43887503bd1ba4c81cb6fd2a4eb3da4e867\",\n \"sha256:c059bfaa849c4d8e4aecaeb3a10c2d9b3d85f5165c66ad3a4d937758128c4d18\",\n \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"sha256:e57cb8aaa6a5a547a38bff69f54b86f1e9ed86a4ea8246f88ada3b0aa698cde0\",\n \"sha256:d41059c812a8741c15695046857b90747aef9c7f9d67733962d7bbb025b9d159\",\n \"sha256:7f8e468621fd9dc3eda2ea2294d684876c68d5df715bb18bd1caa3edabdde4b8\",\n \"sha256:1ca2c2a1b554474b067257607aa811d191bd3314cb4c31f73eee7d97bed3ff98\"\n ],\n \"RuleId\": \"670c35146a91d09858cd8398\",\n \"ChildRules\": [\n {\n \"ProcessPath\": \"/root/customrule_20241014050108.out\",\n \"RuleId\": \"670c35146a91d09858cd8399\",\n \"RuleLevel\": \"HIGH\",\n \"RuleMode\": \"RULE_MODE_ALERT\"\n }\n ]\n }\n}",
67
61
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
68
62
  "title": "添加规则"
69
63
  },
70
64
  {
71
65
  "document": "",
72
- "input": "https://tcss.tencentcloudapi.com/?Action=AddEditAbnormalProcessRule\n&RuleInfo.IsEnable=true\n&RuleInfo.ImageIds.0=xxxx\n&RuleInfo.ChildRules.0.RuleMode=RULE_MODE_RELEASE\n&RuleInfo.ChildRules.0.ProcessPath=xxxx\n&RuleInfo.ChildRules.0.RuleId=xxx\n&RuleInfo.ChildRules.0.RuleLevel=LOW\n&RuleInfo.RuleName=xxxx\n&RuleInfo.RuleId=6038e07298dab13d32bc34ec\n&<公共请求参数>",
73
- "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
66
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEditAbnormalProcessRule\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"IsEnable\": true,\n \"RuleName\": \"customrule_20241014050108\",\n \"ImageIds\": [\n \"sha256:80d28bedfe5dec59da9ebf8e6260224ac9008ab5c11dbbe16ee3ba3e4439ac2c\",\n \"sha256:8652b9f0cb4c0599575e5a003f5906876e10c1ceb2ab9fe1786712dac14a50cf\",\n \"sha256:5d0da3dc976460b72c77d94c8a1ad043720b0416bfc16c52c45d4847e53fadb6\",\n \"sha256:84b0f3f7f6f0416a2a8ef19ac765f43887503bd1ba4c81cb6fd2a4eb3da4e867\",\n \"sha256:c059bfaa849c4d8e4aecaeb3a10c2d9b3d85f5165c66ad3a4d937758128c4d18\",\n \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"sha256:e57cb8aaa6a5a547a38bff69f54b86f1e9ed86a4ea8246f88ada3b0aa698cde0\",\n \"sha256:d41059c812a8741c15695046857b90747aef9c7f9d67733962d7bbb025b9d159\",\n \"sha256:7f8e468621fd9dc3eda2ea2294d684876c68d5df715bb18bd1caa3edabdde4b8\",\n \"sha256:1ca2c2a1b554474b067257607aa811d191bd3314cb4c31f73eee7d97bed3ff98\"\n ],\n \"RuleId\": \"670c35146a91d09858cd8398\",\n \"ChildRules\": [\n {\n \"ProcessPath\": \"/root/customrule_20241014050108.out\",\n \"RuleId\": \"670c35146a91d09858cd8399\",\n \"RuleLevel\": \"HIGH\",\n \"RuleMode\": \"RULE_MODE_ALERT\"\n }\n ]\n }\n}",
67
+ "output": "{\n \"Response\": {\n \"RequestId\": \"055e66ea-9a62-4315-900c-fd7bca22b3a7\"\n }\n}",
74
68
  "title": "编辑规则"
75
69
  }
76
70
  ],
77
71
  "AddEditAccessControlRule": [
78
72
  {
79
73
  "document": "",
80
- "input": "https://tcss.tencentcloudapi.com/?Action=AddEditAccessControlRule\n&RuleInfo.IsEnable=true\n&RuleInfo.ImageIds.0=xxxx\n&RuleInfo.ChildRules.0.RuleMode=RULE_MODE_RELEASE\n&RuleInfo.ChildRules.0.ProcessPath=xxxx\n&RuleInfo.ChildRules.0.TargetFilePath=xxxx\n&RuleInfo.RuleName=xxxx\n&<公共请求参数>",
74
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEditAccessControlRule\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"IsEnable\": true,\n \"RuleName\": \"llzlu_test\",\n \"ImageIds\": [\n \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"sha256:2237821772abe2ea18714288644d774d33ea36b2017366da25f3d308c08fdea4\"\n ],\n \"RuleId\": \"66f90eec43f38f311f8e22cf\",\n \"ChildRules\": [\n {\n \"ProcessPath\": \"*/vi\",\n \"RuleId\": \"66f90eec43f38f311f8e22d0\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"TargetFilePath\": \"/home/yunjing_testing_x86/*\"\n }\n ]\n }\n}",
81
75
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
82
76
  "title": "添加规则"
83
- },
84
- {
85
- "document": "",
86
- "input": "https://tcss.tencentcloudapi.com/?Action=AddEditAccessControlRule\n&RuleInfo.IsEnable=true\n&RuleInfo.ImageIds.0=xxxx\n&RuleInfo.ChildRules.0.RuleMode=RULE_MODE_RELEASE\n&RuleInfo.ChildRules.0.ProcessPath=xxxx\n&RuleInfo.ChildRules.0.TargetFilePath=xxxx\n&RuleInfo.ChildRules.0.RuleId=xxx\n&RuleInfo.RuleName=xxxx\n&RuleInfo.RuleId=6038e07298dab13d32bc34ec\n&<公共请求参数>",
87
- "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
88
- "title": "编辑规则"
89
77
  }
90
78
  ],
91
79
  "AddEditImageAutoAuthorizedRule": [
92
80
  {
93
81
  "document": "",
94
- "input": "https://tcss.tencentcloudapi.com/?Action=AddEditImageAutoAuthorizedRule\n&RangeType=\"MANUAL\"\n&HostIdSet.0=\"xx\"\n&MaxDailyCount=1\n&RuleId=1\n&IsEnabled=1\n&<公共请求参数>",
95
- "output": "{\n \"Response\": {\n \"RequestId\": \"aaa\"\n }\n}",
82
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddEditImageAutoAuthorizedRule\n&RangeType=\"MANUAL\"\n&HostIdSet.0=\"be119857-7949-4650-aef5-9591b54091d0\"\n&MaxDailyCount=1\n&RuleId=1\n&IsEnabled=1\n&<公共请求参数>",
83
+ "output": "{\n \"Response\": {\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb9b65c768\"\n }\n}",
96
84
  "title": "新增或编辑本地镜像自动授权规则"
97
85
  }
98
86
  ],
99
87
  "AddEditReverseShellWhiteList": [
100
88
  {
101
89
  "document": "",
102
- "input": "https://tcss.tencentcloudapi.com/?Action=AddEditReverseShellWhiteList\n&WhiteListInfo.DstIp=127.0.0.1\n&WhiteListInfo.ImageIds.0=sha256:xxxx\n&WhiteListInfo.DstPort=12345\n&WhiteListInfo.ProcessName=test\n&<公共请求参数>",
90
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddEditReverseShellWhiteList\n&WhiteListInfo.DstIp=127.0.0.1\n&WhiteListInfo.ImageIds.0=sha256:dabduwouo\n&WhiteListInfo.DstPort=12245\n&WhiteListInfo.ProcessName=test\n&<公共请求参数>",
103
91
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
104
92
  "title": "添加反弹shell白名单"
105
93
  }
@@ -107,8 +95,8 @@
107
95
  "AddEditRiskSyscallWhiteList": [
108
96
  {
109
97
  "document": "",
110
- "input": "https://tcss.tencentcloudapi.com/?Action=AddEditRiskSyscallWhiteList\n&WhiteListInfo.ImageIds.0=sha256:xx\n&WhiteListInfo.SyscallNames.0=chroot\n&WhiteListInfo.ProcessPath=/test/test\n&<公共请求参数>",
111
- "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
98
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddEditRiskSyscallWhiteList\n&WhiteListInfo.ImageIds.0=sha256:27501aa\n&WhiteListInfo.SyscallNames.0=chroot\n&WhiteListInfo.ProcessPath=/test/test\n&<公共请求参数>",
99
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
112
100
  "title": "添加高危系统调用白名单"
113
101
  }
114
102
  ],
@@ -123,23 +111,23 @@
123
111
  "AddEscapeWhiteList": [
124
112
  {
125
113
  "document": "",
126
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEscapeWhiteList\n<公共请求参数>\n\n{\n \"ImageIDs\": [\n \"xx\"\n ],\n \"EventType\": [\n \"\\\"ESCAPE_DOCKER_API\\\"\"\n ]\n}",
127
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
114
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEscapeWhiteList\n<公共请求参数>\n\n{\n \"ImageIDs\": [\n \"045513497bb2\"\n ],\n \"EventType\": [\n \"\\\"ESCAPE_DOCKER_API\\\"\"\n ]\n}",
115
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
128
116
  "title": "新增逃逸白名单"
129
117
  }
130
118
  ],
131
119
  "AddIgnoreVul": [
132
120
  {
133
121
  "document": "",
134
- "input": "https://tcss.tencentcloudapi.com/?Action=AddIgnoreVul\n&List.0.PocID=\"xx\"\n&List.0.ImageIDs.0=\"xx\"\n&List.0.ImageType=\"xx\"\n&<公共请求参数>",
135
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
122
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddIgnoreVul\n&List.0.PocID=\"pcmgr-70064\"\n&List.0.ImageIDs.0=\"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\"\n&List.0.ImageType=\"1\"\n&<公共请求参数>",
123
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
136
124
  "title": "新增漏洞扫描忽略漏洞"
137
125
  }
138
126
  ],
139
127
  "AddNetworkFirewallPolicyDetail": [
140
128
  {
141
129
  "document": "",
142
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"xx\",\n \"CustomPolicy\": [\n {\n \"Peer\": \"xx\",\n \"Direction\": \"xx\",\n \"Ports\": \"xx\"\n }\n ],\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"xx\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"xx\"\n}",
130
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"test-2\",\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"\",\n \"ClusterId\": \"cls-fsdfw\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
143
131
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
144
132
  "title": "容器网络创建网络策略添加任务示例"
145
133
  }
@@ -147,7 +135,7 @@
147
135
  "AddNetworkFirewallPolicyYamlDetail": [
148
136
  {
149
137
  "document": "",
150
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"xx\",\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"Yaml\": \"xxx\"\n}",
138
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"dfsdfsd\",\n \"Description\": \"\",\n \"ClusterId\": \"cls-dsfsdf\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
151
139
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
152
140
  "title": "容器网络创建yaml网络策略添加任务示例"
153
141
  }
@@ -155,7 +143,7 @@
155
143
  "CheckNetworkFirewallPolicyYaml": [
156
144
  {
157
145
  "document": "",
158
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckNetworkFirewallPolicyYaml\n<公共请求参数>\n\n{\n \"PolicyName\": \"xx\",\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"Yaml\": \"xxx\"\n}",
146
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckNetworkFirewallPolicyYaml\n<公共请求参数>\n\n{\n \"PolicyName\": \"sdfhuiwhiw\",\n \"Description\": \"\",\n \"ClusterId\": \"cls-shuiwf\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
159
147
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
160
148
  "title": "容器网络创建检查Yaml网络策略任务示例"
161
149
  }
@@ -163,15 +151,15 @@
163
151
  "CheckRepeatAssetImageRegistry": [
164
152
  {
165
153
  "document": "",
166
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckRepeatAssetImageRegistry\n<公共请求参数>\n\n{\n \"Name\": \"xxx\"\n}",
167
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"IsRepeat\": true\n }\n}",
154
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckRepeatAssetImageRegistry\n<公共请求参数>\n\n{\n \"Name\": \"test-name\"\n}",
155
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"IsRepeat\": true\n }\n}",
168
156
  "title": "检查单个镜像仓库名是否重复"
169
157
  }
170
158
  ],
171
159
  "ConfirmNetworkFirewallPolicy": [
172
160
  {
173
161
  "document": "",
174
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ConfirmNetworkFirewallPolicy\n<公共请求参数>\n\n{\n \"ClusterId\": \"xx\",\n \"Id\": [\n 1\n ]\n}",
162
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ConfirmNetworkFirewallPolicy\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-1324\",\n \"Id\": [\n 1\n ]\n}",
175
163
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
176
164
  "title": "容器网络创建网络策略确认任务示例"
177
165
  }
@@ -233,8 +221,8 @@
233
221
  "CreateAssetImageVirusExportJob": [
234
222
  {
235
223
  "document": "",
236
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageVirusExportJob\n<公共请求参数>\n\n{\n \"By\": \"xx\",\n \"ExportField\": [\n \"xx\"\n ],\n \"Limit\": 1,\n \"Filters\": [\n {\n \"Values\": [\n \"xx\"\n ],\n \"Name\": \"xx\",\n \"ExactMatch\": true\n }\n ],\n \"Offset\": 1,\n \"ImageID\": \"xx\",\n \"Order\": \"xx\"\n}",
237
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
224
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageVirusExportJob\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"Name\": \"RiskLevel\",\n \"Values\": [\n \"1\"\n ],\n \"ExactMatch\": true\n }\n ],\n \"Limit\": 1,\n \"Offset\": 1,\n \"By\": \"RiskLevel\",\n \"Order\": \"desc\",\n \"ExportField\": [\n \"FileName\",\n \"RiskLevel\",\n \"Path\",\n \"Size\",\n \"VirusName\",\n \"Tags\"\n ],\n \"ImageID\": \"sha256:3cd27ee8bd44dc55e2efecf499e0e8c26216cf535c45891a9b1805fbc39d60a3\"\n}",
225
+ "output": "{\n \"Response\": {\n \"JobId\": \"8ddb3db7-6d50-48ee-bdcb-9cc37d49aa3c\",\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
238
226
  "title": "创建主机列表导出任务"
239
227
  }
240
228
  ],
@@ -250,7 +238,7 @@
250
238
  {
251
239
  "document": "",
252
240
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateClusterCheckTask\n<公共请求参数>\n\n{\n \"ClusterCheckTaskList\": [\n {\n \"ClusterId\": \"cls-0zmsjvko\",\n \"ClusterRegion\": \"ap-guangzho\"\n }\n ]\n}",
253
- "output": "{\n \"Response\": {\n \"TaskId\": 1,\n \"CreateResult\": \"abc\",\n \"NewTaskID\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
241
+ "output": "{\n \"Response\": {\n \"CreateResult\": \"Succ\",\n \"NewTaskID\": \"4647204fb0f965430b999ffb1f8d974d\",\n \"RequestId\": \"c3a11cce-91df-4fbb-a935-ac85e162c31a\",\n \"TaskId\": 0\n }\n}",
254
242
  "title": "创建集群扫描任务示例"
255
243
  }
256
244
  ],
@@ -258,15 +246,15 @@
258
246
  {
259
247
  "document": "",
260
248
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateComplianceTask\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINER\"\n ]\n}",
261
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TaskId\": 12345\n }\n}",
249
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
262
250
  "title": "创建合规检查任务"
263
251
  }
264
252
  ],
265
253
  "CreateComponentExportJob": [
266
254
  {
267
255
  "document": "",
268
- "input": "https://tcss.tencentcloudapi.com/?Action=CreateComponentExportJob\n&ImageID=xx\n&Limit=10\n&Offset=0\n&ExportField.0=xxx\n&<公共请求参数>",
269
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
256
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateComponentExportJob\n<公共请求参数>\n\n{\n \"ImageID\": \"10001\"\n}",
257
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"JobId\": \"10001\"\n }\n}",
270
258
  "title": "查询本地镜像组件列表导出"
271
259
  }
272
260
  ],
@@ -274,7 +262,7 @@
274
262
  {
275
263
  "document": "",
276
264
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateDefenceVulExportJob\n<公共请求参数>\n\n{}",
277
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
265
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"JobId\": \"27501aaed5e639693783321219989889\"\n }\n}",
278
266
  "title": "创建支持防御的漏洞导出任务"
279
267
  }
280
268
  ],
@@ -282,15 +270,15 @@
282
270
  {
283
271
  "document": "",
284
272
  "input": "https://tcss.tencentcloudapi.com/?Action=CreateEmergencyVulExportJob\n&<公共请求参数>",
285
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
273
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"JobId\": \"10001\"\n }\n}",
286
274
  "title": "创建应急漏洞导出任务"
287
275
  }
288
276
  ],
289
277
  "CreateEscapeEventsExportJob": [
290
278
  {
291
279
  "document": "",
292
- "input": "https://tcss.tencentcloudapi.com/?Action=CreateEscapeEventsExportJob\n&ExportField.0=xxx\n&<公共请求参数>",
293
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
280
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateEscapeEventsExportJob\n&ExportField.0=Name\n&<公共请求参数>",
281
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\",\n \"JobId\": \"29b37d86-adcd-43d1-b21a-640e82965199\"\n }\n}",
294
282
  "title": "创建逃逸事件导出异步任务"
295
283
  }
296
284
  ],
@@ -298,23 +286,23 @@
298
286
  {
299
287
  "document": "",
300
288
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateEscapeWhiteListExportJob\n<公共请求参数>\n\n{}",
301
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
289
+ "output": "{\n \"Response\": {\n \"JobId\": \"73805b97-0e40-4249-8fe5-f1e38de1c28a\",\n \"RequestId\": \"78382c9e-92c7-42bb-8a2a-04d406903d94\"\n }\n}",
302
290
  "title": "创建逃逸白名单导出任务"
303
291
  }
304
292
  ],
305
293
  "CreateExportComplianceStatusListJob": [
306
294
  {
307
295
  "document": "",
308
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateExportComplianceStatusListJob\n<公共请求参数>\n\n{\n \"AssetType\": \"ASSET_CONTAINER\",\n \"ExportByAsset\": false,\n \"ExportAll\": true\n}",
309
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"JobId\": \"xxxx\"\n }\n}",
296
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateExportComplianceStatusListJob\n<公共请求参数>\n\n{\n \"AssetType\": \"ASSET_CONTAINER\",\n \"ExportByAsset\": false,\n \"ExportAll\": false,\n \"IdList\": []\n}",
297
+ "output": "{\n \"Response\": {\n \"JobId\": \"e4409223-8e92-45db-a857-11b1ff547c79\",\n \"RequestId\": \"3e6756ce-6512-498d-a9fd-8572ef4ce7d3\"\n }\n}",
310
298
  "title": "创建一个导出安全合规信息的任务"
311
299
  }
312
300
  ],
313
301
  "CreateHostExportJob": [
314
302
  {
315
303
  "document": "",
316
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateHostExportJob\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"xxx\"\n ]\n}",
317
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
304
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateHostExportJob\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"HostName\",\n \"HostIP\",\n \"PublicIp\",\n \"Group\",\n \"InstanceID\",\n \"MachineType\",\n \"Status\",\n \"DockerVersion\",\n \"ContainerdVersion\",\n \"DockerFileSystemDriver\",\n \"ImageCnt\",\n \"ContainerCnt\"\n ]\n}",
305
+ "output": "{\n \"Response\": {\n \"JobId\": \"73805b97-0e40-4249-8fe5-f1e38de1c28a\",\n \"RequestId\": \"78382c9e-92c7-42bb-8a2a-04d406903d94\"\n }\n}",
318
306
  "title": "创建主机列表导出任务"
319
307
  }
320
308
  ],
@@ -322,7 +310,7 @@
322
310
  {
323
311
  "document": "",
324
312
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateImageExportJob\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"ImageName\"\n ]\n}",
325
- "output": "{\n \"Response\": {\n \"DownloadUrl\": \"sfsfsfsfsfs\",\n \"JobId\": \"xxx\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
313
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"sfsfsfsfsfs\",\n \"JobId\": \"test-jobid\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
326
314
  "title": "创建镜像导出任务"
327
315
  }
328
316
  ],
@@ -345,8 +333,8 @@
345
333
  "CreateK8sApiAbnormalRuleInfo": [
346
334
  {
347
335
  "document": "",
348
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateK8sApiAbnormalRuleInfo\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"Status\": true,\n \"RuleInfoList\": [\n {\n \"Action\": \"xx\",\n \"Scope\": \"xx\",\n \"RiskLevel\": \"xx\",\n \"IsDelete\": true,\n \"Status\": true\n }\n ],\n \"EffectClusterIDSet\": [\n \"xx\"\n ],\n \"RuleID\": \"xx\",\n \"RuleType\": \"xx\",\n \"EffectAllCluster\": true,\n \"RuleName\": \"xx\"\n },\n \"CopySrcRuleID\": \"xx\"\n}",
349
- "output": "{\n \"Response\": {\n \"RuleID\": \"xxx\",\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\"\n }\n}",
336
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateK8sApiAbnormalRuleInfo\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"RuleName\": \"rulename1\",\n \"Status\": true,\n \"RuleInfoList\": [\n {\n \"Scope\": \"{\\\"RequestURI\\\":\\\"/apis/cowsajhhoa.k8s.io/v\\\",\\\"RequestUser\\\":\\\"“name”:”sanpasahsad-contaosaer-leader”)\\\\\\\"\\\",\\\"ResponseStatusCode\\\":\\\"200\\\",\\\"SourceIPS\\\":\\\"10.255.0.43\\\",\\\"UserAgent\\\":\\\"snapshot-controller\\\",\\\"Verb\\\":\\\"update\\\"}\",\n \"Action\": \"RULE_MODE_ALERT\",\n \"RiskLevel\": \"NOTICE\",\n \"Status\": true,\n \"IsDelete\": false\n }\n ],\n \"EffectClusterIDSet\": [],\n \"RuleType\": \"USER_DEFINED_RULE\",\n \"EffectAllCluster\": true,\n \"RuleID\": \"rule-id\"\n },\n \"CopySrcRuleID\": \"src-rule-id\",\n \"EventID\": 1\n}",
337
+ "output": "{\n \"Response\": {\n \"RequestId\": \"4a0dd046-0be4-434b-b212-f1a96636cc09\",\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\"\n }\n}",
350
338
  "title": "创建k8sapi异常事件规则"
351
339
  }
352
340
  ],
@@ -361,7 +349,7 @@
361
349
  "CreateNetworkFirewallPolicyDiscover": [
362
350
  {
363
351
  "document": "",
364
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPolicyDiscover\n<公共请求参数>\n\n{\n \"ClusterId\": \"xx\"\n}",
352
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPolicyDiscover\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-1342\"\n}",
365
353
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
366
354
  "title": "容器网络集群网络策略创建自动发现任务示例"
367
355
  }
@@ -369,7 +357,7 @@
369
357
  "CreateNetworkFirewallPublish": [
370
358
  {
371
359
  "document": "",
372
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"xx\",\n \"Id\": [\n 1\n ]\n}",
360
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-sdhfisdf\",\n \"Id\": [\n 1\n ]\n}",
373
361
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
374
362
  "title": "容器网络创建网络策略发布任务示例"
375
363
  }
@@ -377,7 +365,7 @@
377
365
  "CreateNetworkFirewallUndoPublish": [
378
366
  {
379
367
  "document": "",
380
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallUndoPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"xx\",\n \"Id\": [\n 1\n ]\n}",
368
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallUndoPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"test-clusterid\",\n \"Id\": [\n 1\n ]\n}",
381
369
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
382
370
  "title": "容器网络创建网络策略撤销任务示例"
383
371
  }
@@ -386,15 +374,15 @@
386
374
  {
387
375
  "document": "",
388
376
  "input": "https://tcss.tencentcloudapi.com/?Action=CreateOrModifyPostPayCores\n&CoresCnt=500\n&<公共请求参数>",
389
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
377
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
390
378
  "title": "创建或者编辑弹性计费上限"
391
379
  }
392
380
  ],
393
381
  "CreateProcessEventsExportJob": [
394
382
  {
395
383
  "document": "",
396
- "input": "https://tcss.tencentcloudapi.com/?Action=CreateProcessEventsExportJob\n&ExportField.0=xxx\n&<公共请求参数>",
397
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
384
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateProcessEventsExportJob\n&<公共请求参数>",
385
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
398
386
  "title": "创建异常进程事件导出异步任务"
399
387
  }
400
388
  ],
@@ -402,15 +390,15 @@
402
390
  {
403
391
  "document": "创建刷新任务示例",
404
392
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateRefreshTask\n<公共请求参数>\n\n{}",
405
- "output": "{\n \"Response\": {\n \"TaskId\": 1,\n \"CreateResult\": \"abc\",\n \"NewTaskID\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
393
+ "output": "{\n \"Response\": {\n \"CreateResult\": \"Succ\",\n \"NewTaskID\": \"1730270334918953395\",\n \"RequestId\": \"547f3e18-d5af-47ba-a67a-be34ac9df697\",\n \"TaskId\": 0\n }\n}",
406
394
  "title": "创建刷新任务示例"
407
395
  }
408
396
  ],
409
397
  "CreateRiskDnsEventExportJob": [
410
398
  {
411
399
  "document": "",
412
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateRiskDnsEventExportJob\n<公共请求参数>\n\n{\n \"Order\": \"xx\",\n \"Limit\": 10000,\n \"By\": \"xx\",\n \"Filters\": [\n {\n \"Values\": [\n \"xx\"\n ],\n \"Name\": \"xx\",\n \"ExactMatch\": true\n }\n ],\n \"Offset\": 0\n}",
413
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
400
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateRiskDnsEventExportJob\n<公共请求参数>\n\n{}",
401
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"JobId\": \"10001\"\n }\n}",
414
402
  "title": "创建恶意请求事件导出任务"
415
403
  }
416
404
  ],
@@ -426,7 +414,7 @@
426
414
  {
427
415
  "document": "",
428
416
  "input": "https://tcss.tencentcloudapi.com/?Action=CreateSystemVulExportJob\n&<公共请求参数>",
429
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
417
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
430
418
  "title": "创建系统漏洞导出任务"
431
419
  }
432
420
  ],
@@ -434,7 +422,7 @@
434
422
  {
435
423
  "document": "",
436
424
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVirusScanAgain\n<公共请求参数>\n\n{\n \"TaskId\": \"\",\n \"ContainerIds\": []\n}",
437
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\"\n }\n}",
425
+ "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
438
426
  "title": "运行时文件查杀重新检测"
439
427
  }
440
428
  ],
@@ -450,7 +438,7 @@
450
438
  {
451
439
  "document": "",
452
440
  "input": "https://tcss.tencentcloudapi.com/?Action=CreateVulContainerExportJob\n&PocID=1\n&<公共请求参数>",
453
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
441
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
454
442
  "title": "创建受漏洞影响的容器导出任务"
455
443
  }
456
444
  ],
@@ -458,7 +446,7 @@
458
446
  {
459
447
  "document": "",
460
448
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVulDefenceEventExportJob\n<公共请求参数>\n\n{}",
461
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
449
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"JobId\": \"fsdfhu23eje34\"\n }\n}",
462
450
  "title": "创建漏洞防御导出任务"
463
451
  }
464
452
  ],
@@ -466,15 +454,15 @@
466
454
  {
467
455
  "document": "",
468
456
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVulDefenceHostExportJob\n<公共请求参数>\n\n{}",
469
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
457
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"JobId\": \"a9ca70d0-9a89-47f2-b87e-b158e4ceba9a\"\n }\n}",
470
458
  "title": "创建漏洞防御主机导出任务"
471
459
  }
472
460
  ],
473
461
  "CreateVulExportJob": [
474
462
  {
475
463
  "document": "",
476
- "input": "https://tcss.tencentcloudapi.com/?Action=CreateVulExportJob\n&ImageID=xx\n&Limit=10\n&Offset=0\n&ExportField.0=xxx\n&<公共请求参数>",
477
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
464
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateVulExportJob\n&ImageID=sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\n&Limit=10\n&Offset=0\n&ExportField.0=CVEID\n&<公共请求参数>",
465
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
478
466
  "title": "查询本地镜像组件列表导出"
479
467
  }
480
468
  ],
@@ -482,7 +470,7 @@
482
470
  {
483
471
  "document": "",
484
472
  "input": "https://tcss.tencentcloudapi.com/?Action=CreateVulImageExportJob\n&PocID=1\n&<公共请求参数>",
485
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
473
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
486
474
  "title": "创建受漏洞影响的镜像导出任务"
487
475
  }
488
476
  ],
@@ -490,7 +478,7 @@
490
478
  {
491
479
  "document": "",
492
480
  "input": "https://tcss.tencentcloudapi.com/?Action=CreateVulScanTask\n&LocalImageScanType=ALL\n&RegistryImageScanType=ALL\n&<公共请求参数>",
493
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"LocalTaskID\": 0,\n \"RegistryTaskID\": 0\n }\n}",
481
+ "output": "{\n \"Response\": {\n \"LocalTaskID\": 36002,\n \"RegistryTaskID\": 0,\n \"RequestId\": \"5d02bef4-9f93-4d9d-90a9-47d7be4c8fc0\"\n }\n}",
494
482
  "title": "创建漏洞扫描任务"
495
483
  }
496
484
  ],
@@ -498,23 +486,23 @@
498
486
  {
499
487
  "document": "",
500
488
  "input": "https://tcss.tencentcloudapi.com/?Action=CreateWebVulExportJob\n&<公共请求参数>",
501
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
489
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
502
490
  "title": "创建web漏洞导出任务"
503
491
  }
504
492
  ],
505
493
  "DeleteAbnormalProcessRules": [
506
494
  {
507
495
  "document": "",
508
- "input": "https://tcss.tencentcloudapi.com/?Action=DeleteAbnormalProcessRules\n&RuleIdSet.0=xxx\n&<公共请求参数>",
509
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
496
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteAbnormalProcessRules\n<公共请求参数>\n\n{\n \"RuleIdSet\": [\n \"1114\"\n ]\n}",
497
+ "output": "{\n \"Response\": {\n \"RequestId\": \"bcf438a3-8035-4a31-bc34-6afc9b0901ff\"\n }\n}",
510
498
  "title": "删除运行异常进程策略"
511
499
  }
512
500
  ],
513
501
  "DeleteAccessControlRules": [
514
502
  {
515
503
  "document": "",
516
- "input": "https://tcss.tencentcloudapi.com/?Action=DeleteAccessControlRules\n&RuleIdSet.0=xxx\n&<公共请求参数>",
517
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
504
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteAccessControlRules\n&RuleIdSet.0=10001\n&<公共请求参数>",
505
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
518
506
  "title": "删除运行时访问控制策略"
519
507
  }
520
508
  ],
@@ -544,7 +532,7 @@
544
532
  {
545
533
  "document": "",
546
534
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteCompliancePolicyItemFromWhitelist\n<公共请求参数>\n\n{\n \"WhitelistIdSet\": [\n 10001,\n 10002\n ]\n}",
547
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\"\n }\n}",
535
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
548
536
  "title": "取消忽略检测项列表"
549
537
  }
550
538
  ],
@@ -559,8 +547,8 @@
559
547
  "DeleteIgnoreVul": [
560
548
  {
561
549
  "document": "",
562
- "input": "https://tcss.tencentcloudapi.com/?Action=DeleteIgnoreVul\n&List.0.PocID=\"xx\"\n&List.0.ImageIDs.0=\"xx\"\n&List.0.ImageType=\"xx\"\n&<公共请求参数>",
563
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
550
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteIgnoreVul\n&List.0.PocID=\"poc_id\"\n&<公共请求参数>",
551
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
564
552
  "title": "取消漏洞扫描忽略漏洞"
565
553
  }
566
554
  ],
@@ -575,15 +563,15 @@
575
563
  "DeleteMachine": [
576
564
  {
577
565
  "document": "",
578
- "input": "https://tcss.tencentcloudapi.com/?Action=DeleteMachine\n&Uuid=xx\n&<公共请求参数>",
579
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
566
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteMachine\n&Uuid=\"7c9e719e-aaaa-bbbb-9005-20c9b9a1f6b1\"\n&<公共请求参数>",
567
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
580
568
  "title": "卸载Agent客户端"
581
569
  }
582
570
  ],
583
571
  "DeleteNetworkFirewallPolicyDetail": [
584
572
  {
585
573
  "document": "",
586
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"ClusterId\": \"xx\",\n \"Id\": [\n 1\n ]\n}",
574
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"ClusterId\": \"test-clusterId\",\n \"Id\": [\n 1\n ]\n}",
587
575
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
588
576
  "title": "容器网络创建网络策略删除任务示例"
589
577
  }
@@ -591,32 +579,32 @@
591
579
  "DeleteReverseShellEvents": [
592
580
  {
593
581
  "document": "",
594
- "input": "https://tcss.tencentcloudapi.com/?Action=DeleteReverseShellEvents\n&EventIdSet.0=xxx\n&<公共请求参数>",
595
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
582
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteReverseShellEvents\n&EventIdSet.0=\"id1\"\n&<公共请求参数>",
583
+ "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
596
584
  "title": "删除运行时反弹shell事件"
597
585
  }
598
586
  ],
599
587
  "DeleteReverseShellWhiteLists": [
600
588
  {
601
589
  "document": "",
602
- "input": "https://tcss.tencentcloudapi.com/?Action=DeleteReverseShellWhiteLists\n&WhiteListIdSet.0=xxx\n&<公共请求参数>",
603
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
590
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteReverseShellWhiteLists\n&WhiteListIdSet.0=\"id1\"\n&<公共请求参数>",
591
+ "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
604
592
  "title": "删除运行时反弹shell白名单"
605
593
  }
606
594
  ],
607
595
  "DeleteRiskSyscallEvents": [
608
596
  {
609
597
  "document": "",
610
- "input": "https://tcss.tencentcloudapi.com/?Action=DeleteRiskSyscallEvents\n&EventIdSet.0=xxx\n&<公共请求参数>",
611
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
598
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteRiskSyscallEvents\n&EventIdSet.0=10001\n&<公共请求参数>",
599
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
612
600
  "title": "删除运行时高危系统调用事件"
613
601
  }
614
602
  ],
615
603
  "DeleteRiskSyscallWhiteLists": [
616
604
  {
617
605
  "document": "",
618
- "input": "https://tcss.tencentcloudapi.com/?Action=DeleteRiskSyscallWhiteLists\n&WhiteListIdSet.0=xxx\n&<公共请求参数>",
619
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
606
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteRiskSyscallWhiteLists\n&WhiteListIdSet.0=10001\n&<公共请求参数>",
607
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
620
608
  "title": "删除运行时高危系统调用白名单"
621
609
  }
622
610
  ],
@@ -639,8 +627,8 @@
639
627
  "DescribeAbnormalProcessDetail": [
640
628
  {
641
629
  "document": "运行时异常进程事件详细信息",
642
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAbnormalProcessDetail\n<公共请求参数>\n\n{\n \"EventId\": \"abc\"\n}",
643
- "output": "{\n \"Response\": {\n \"EventBaseInfo\": {\n \"EventId\": \"abc\",\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"ContainerId\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ImageId\": \"abc\",\n \"ImageName\": \"abc\",\n \"NodeName\": \"abc\",\n \"Status\": \"abc\",\n \"EventName\": \"abc\",\n \"EventType\": \"abc\",\n \"EventCount\": 0,\n \"LatestFoundTime\": \"abc\",\n \"HostIP\": \"abc\",\n \"ClientIP\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"NodeID\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeSubNetID\": \"abc\",\n \"NodeSubNetName\": \"abc\",\n \"NodeSubNetCIDR\": \"abc\",\n \"PodName\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodStatus\": \"abc\",\n \"ClusterID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"HostID\": \"abc\",\n \"Namespace\": \"abc\",\n \"WorkloadType\": \"abc\"\n },\n \"ProcessInfo\": {\n \"ProcessName\": \"abc\",\n \"ProcessAuthority\": \"abc\",\n \"ProcessId\": 1,\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessTree\": \"abc\",\n \"ProcessMd5\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"ParentProcessInfo\": {\n \"ProcessName\": \"abc\",\n \"ProcessId\": 1,\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"EventDetail\": {\n \"Description\": \"abc\",\n \"Solution\": \"abc\",\n \"Remark\": \"abc\",\n \"MatchRule\": {\n \"RuleId\": \"abc\",\n \"RuleMode\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"RuleLevel\": \"abc\"\n },\n \"RuleName\": \"abc\",\n \"RuleId\": \"abc\",\n \"OperationTime\": \"abc\",\n \"GroupName\": \"abc\"\n },\n \"AncestorProcessInfo\": {\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"RequestId\": \"abc\"\n }\n}",
630
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAbnormalProcessDetail\n<公共请求参数>\n\n{\n \"EventId\": \"5202566\"\n}",
631
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"-port 22\",\n \"ProcessPath\": \"/usr/local/bin/sshd\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"106.55.163.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"111411411475fe59dbd61071f16d6165480d381e5fb3663d176d53669b\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/adoring_ishizaka\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 2,\n \"EventId\": \"10302329\",\n \"EventName\": \"异常进程事件-告警\",\n \"EventType\": \"FILE_ABNORMAL_READ\",\n \"FoundTime\": \"2024-10-21 15:55:45\",\n \"HostID\": \"1414-18a1-4775-9e3f-cdfc89845157\",\n \"HostIP\": \"172.16.0.34\",\n \"ImageId\": \"sha256:1413413431fd9255658c128086395d3fa0aedd5a41ab6b034fd649d1a9260\",\n \"ImageName\": \"alpine:latest\",\n \"LatestFoundTime\": \"2024-10-21 20:57:12\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"-\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"-\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_DEALED\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"检测到疑似反弹shell命令执行\",\n \"GroupName\": \"SYSTEM_DEFINED_RULE\",\n \"MatchRule\": {\n \"ProcessPath\": \"-\",\n \"RuleId\": \"100000000000000000000004\",\n \"RuleLevel\": \"HIGH\",\n \"RuleMode\": \"RULE_MODE_ALERT\"\n },\n \"OperationTime\": \"2024-10-23 17:38:12\",\n \"Remark\": \"\",\n \"RuleId\": \"124\",\n \"RuleName\": \"REVERSE_SHELL\",\n \"Solution\": \"排查反弹shell行为及目标地址是否为业务正常需要\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 0,\n \"ProcessName\": \"\",\n \"ProcessParam\": \"\",\n \"ProcessPath\": \"\",\n \"ProcessStartUser\": \"\",\n \"ProcessUserGroup\": \"\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"\",\n \"ProcessName\": \"-\",\n \"ProcessParam\": \"sh -c \\\"bash >&1\\\"\",\n \"ProcessPath\": \"-\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"-\",\n \"ProcessUserGroup\": \"\"\n },\n \"RequestId\": \"280ebb84-63c5-417e-95bd-e3160f6c8cdc\"\n }\n}",
644
632
  "title": "运行时异常进程事件详细信息"
645
633
  }
646
634
  ],
@@ -648,7 +636,7 @@
648
636
  {
649
637
  "document": "",
650
638
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessEventTendency\n&EndTime=2021-05-01\n&StartTime=2021-05-07\n&<公共请求参数>",
651
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ProxyToolEventCount\": 0,\n \"RiskCmdEventCount\": 0,\n \"AttackCmdEventCount\": 0,\n \"UserDefinedRuleEventCount\": 0,\n \"TransferControlEventCount\": 0,\n \"AbnormalChildProcessEventCount\": 0,\n \"ReverseShellEventCount\": 0,\n \"FilelessEventCount\": 0,\n \"Date\": \"2020-09-22\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
639
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ProxyToolEventCount\": 0,\n \"RiskCmdEventCount\": 0,\n \"AttackCmdEventCount\": 0,\n \"UserDefinedRuleEventCount\": 0,\n \"TransferControlEventCount\": 0,\n \"AbnormalChildProcessEventCount\": 0,\n \"ReverseShellEventCount\": 0,\n \"FilelessEventCount\": 0,\n \"Date\": \"2020-09-22\"\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
652
640
  "title": "查询待处理异常进程事件趋势"
653
641
  }
654
642
  ],
@@ -656,7 +644,7 @@
656
644
  {
657
645
  "document": "运行时异常进程列表",
658
646
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAbnormalProcessEvents\n<公共请求参数>\n\n{}",
659
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"EventSet\": [\n {\n \"ProcessPath\": \"abc\",\n \"EventType\": \"abc\",\n \"MatchRuleName\": \"abc\",\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"ContainerName\": \"abc\",\n \"ImageName\": \"abc\",\n \"Behavior\": \"abc\",\n \"Status\": \"abc\",\n \"Id\": \"abc\",\n \"ImageId\": \"abc\",\n \"ContainerId\": \"abc\",\n \"Solution\": \"abc\",\n \"Description\": \"abc\",\n \"MatchRuleId\": \"abc\",\n \"MatchAction\": \"abc\",\n \"MatchProcessPath\": \"abc\",\n \"RuleExist\": true,\n \"EventCount\": 0,\n \"LatestFoundTime\": \"2020-09-22 00:00:00\",\n \"RuleId\": \"abc\",\n \"MatchGroupName\": \"abc\",\n \"MatchRuleLevel\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"ContainerStatus\": \"abc\",\n \"ClusterID\": \"abc\",\n \"NodeType\": \"abc\",\n \"PodName\": \"abc\",\n \"PodIP\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
647
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"2dc265571ad62064781574cb7f854bf25886660c3c99ae677d5c85528409f82d\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"containner1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"检测到敏感服务异常子进程启动\",\n \"EventCount\": 51,\n \"EventType\": \"MALICE_PROCESS_START\",\n \"FoundTime\": \"2020-10-29 00:05:02\",\n \"HostID\": \"8d2fqqq4-8f23-46ba-94ae-da11039e82d3\",\n \"HostIP\": \"10.0.86.119\",\n \"Id\": \"2961418\",\n \"ImageId\": \"sha256:736beeb0cd4edd4e1d3be51d5120eeced04eb50b61fc4a24c54a79ea66e40345\",\n \"ImageName\": \"image1\",\n \"LatestFoundTime\": \"2020-10-29 23:57:45\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchGroupName\": \"SYSTEM_DEFINED_RULE\",\n \"MatchProcessPath\": \"/bin/bash\",\n \"MatchRuleId\": \"100000000000000000000007\",\n \"MatchRuleLevel\": \"MIDDLE\",\n \"MatchRuleName\": \"ABNORMAL_CHILD_PROC\",\n \"NodeID\": \"\",\n \"NodeName\": \"qsh4-k8s-sh-prod4-202206287zr4r-47\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessPath\": \"/bin/bash\",\n \"PublicIP\": \"\",\n \"RuleExist\": true,\n \"RuleId\": \"111111111111111111111111\",\n \"Solution\": \"排查是否为正常业务需要的命令执行,\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"e8a7b8e9-1894-4715-9201-67e0f74692db\",\n \"TotalCount\": 1000\n }\n}",
660
648
  "title": "运行时异常进程列表"
661
649
  }
662
650
  ],
@@ -672,32 +660,32 @@
672
660
  {
673
661
  "document": "",
674
662
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessLevelSummary\n&<公共请求参数>",
675
- "output": "{\n \"Response\": {\n \"MediumLevelEventCount\": 0,\n \"HighLevelEventCount\": 0,\n \"RequestId\": \"xx\",\n \"LowLevelEventCount\": 0\n }\n}",
663
+ "output": "{\n \"Response\": {\n \"MediumLevelEventCount\": 0,\n \"HighLevelEventCount\": 0,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"LowLevelEventCount\": 0\n }\n}",
676
664
  "title": "统计异常进程各威胁等级待处理事件数"
677
665
  }
678
666
  ],
679
667
  "DescribeAbnormalProcessRuleDetail": [
680
668
  {
681
669
  "document": "",
682
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&RuleId=xxx\n&Limit=10\n&Offset=0\n&<公共请求参数>",
670
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&RuleId=6045892534b9a9000c4ae5ba\n&Limit=10\n&Offset=0\n&<公共请求参数>",
683
671
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6045892534b9a9000c4ae5ba\",\n \"IsEnable\": true,\n \"RuleName\": \"9999\",\n \"ChildRules\": [\n {\n \"RuleId\": \"6020e81134b9a9000c50b56a\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/bin/ptest\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60212ddd98dab16785dfeab2\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/ps\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"6021472934b9a9000c358fa3\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/top\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"602f603d34b9a9000cb2b405\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/tail\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60326e4434b9a9000c0897a8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/busybox\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60337df034b9a9000c2240c8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/sss\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n ]\n }\n }\n}",
684
672
  "title": "根据规则ID查询规则详情(用户策略)"
685
673
  },
686
674
  {
687
675
  "document": "",
688
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&RuleId=xxx\n&Limit=10\n&Offset=0\n&<公共请求参数>",
676
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&RuleId=6045892534b9a9000c4ae5ba\n&Limit=10\n&Offset=0\n&<公共请求参数>",
689
677
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6048403bd620f3f9012c521d\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"系统策略\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"100000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"PROXY_TOOL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"TRANSFER_CONTROL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ATTACK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000004\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"REVERSE_SHELL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000005\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"FILELESS\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000006\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"RISK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000007\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ABNORMAL_CHILD_PROC\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n ]\n }\n }\n}",
690
678
  "title": "根据规则ID查询规则详情(系统策略)"
691
679
  },
692
680
  {
693
681
  "document": "",
694
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&ImageId=xxx\n&Limit=10\n&Offset=0\n&<公共请求参数>",
682
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
695
683
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6045892534b9a9000c4ae5ba\",\n \"IsEnable\": true,\n \"RuleName\": \"9999\",\n \"ChildRules\": [\n {\n \"RuleId\": \"6020e81134b9a9000c50b56a\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/bin/ptest\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60212ddd98dab16785dfeab2\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/ps\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"6021472934b9a9000c358fa3\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/top\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"602f603d34b9a9000cb2b405\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/tail\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60326e4434b9a9000c0897a8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/busybox\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60337df034b9a9000c2240c8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/sss\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n ]\n }\n }\n}",
696
684
  "title": "根据事件的镜像ID,查询当前镜像的规则详情(用户策略)"
697
685
  },
698
686
  {
699
687
  "document": "",
700
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&ImageId=xxx\n&Limit=10\n&Offset=0\n&<公共请求参数>",
688
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
701
689
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6048403bd620f3f9012c521d\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"系统策略\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"100000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"PROXY_TOOL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"TRANSFER_CONTROL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ATTACK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000004\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"REVERSE_SHELL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000005\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"FILELESS\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000006\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"RISK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000007\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ABNORMAL_CHILD_PROC\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n ]\n }\n }\n}",
702
690
  "title": "根据事件的镜像ID,查询当前镜像的规则详情(系统策略)"
703
691
  }
@@ -706,7 +694,7 @@
706
694
  {
707
695
  "document": "",
708
696
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRules\n&Limit=10\n&Offset=0\n&<公共请求参数>",
709
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RuleSet\": [\n {\n \"UpdateTime\": \"xx\",\n \"IsEnable\": true,\n \"RuleId\": \"xx\",\n \"EffectImageCount\": 1,\n \"EditUserName\": \"xx\",\n \"RuleName\": \"xx\",\n \"IsDefault\": true\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
697
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RuleSet\": [\n {\n \"UpdateTime\": \"2022-01-01 00:00:00\",\n \"IsEnable\": true,\n \"RuleId\": \"10001\",\n \"EffectImageCount\": 1,\n \"EditUserName\": \"admin\",\n \"RuleName\": \"rule_name\",\n \"IsDefault\": true\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
710
698
  "title": "运行时异常进程策略列表"
711
699
  }
712
700
  ],
@@ -721,8 +709,8 @@
721
709
  "DescribeAccessControlDetail": [
722
710
  {
723
711
  "document": "运行时访问控制事件详细信息",
724
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAccessControlDetail\n<公共请求参数>\n\n{\n \"EventId\": \"abc\"\n}",
725
- "output": "{\n \"Response\": {\n \"EventBaseInfo\": {\n \"EventId\": \"abc\",\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"ContainerId\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ImageId\": \"abc\",\n \"ImageName\": \"abc\",\n \"NodeName\": \"abc\",\n \"Status\": \"abc\",\n \"EventName\": \"abc\",\n \"EventType\": \"abc\",\n \"EventCount\": 0,\n \"LatestFoundTime\": \"abc\",\n \"HostIP\": \"abc\",\n \"ClientIP\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"NodeID\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeSubNetID\": \"abc\",\n \"NodeSubNetName\": \"abc\",\n \"NodeSubNetCIDR\": \"abc\",\n \"PodName\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodStatus\": \"abc\",\n \"ClusterID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"HostID\": \"abc\",\n \"Namespace\": \"abc\",\n \"WorkloadType\": \"abc\"\n },\n \"ProcessInfo\": {\n \"ProcessName\": \"abc\",\n \"ProcessAuthority\": \"abc\",\n \"ProcessId\": 1,\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessTree\": \"abc\",\n \"ProcessMd5\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"TamperedFileInfo\": {\n \"FileName\": \"abc\",\n \"FileType\": \"abc\",\n \"FileSize\": 1,\n \"FilePath\": \"abc\",\n \"FileCreateTime\": \"2020-09-22 00:00:00\",\n \"LatestTamperedFileMTime\": \"2020-09-22 00:00:00\",\n \"NewFile\": \"abc\",\n \"FileDiff\": \"abc\"\n },\n \"EventDetail\": {\n \"Description\": \"abc\",\n \"Solution\": \"abc\",\n \"Remark\": \"abc\",\n \"MatchRule\": {\n \"RuleId\": \"abc\",\n \"RuleMode\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"TargetFilePath\": \"abc\"\n },\n \"RuleName\": \"abc\",\n \"RuleId\": \"abc\",\n \"OperationTime\": \"abc\"\n },\n \"ParentProcessInfo\": {\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"AncestorProcessInfo\": {\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"RequestId\": \"abc\"\n }\n}",
712
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAccessControlDetail\n<公共请求参数>\n\n{\n \"EventId\": \"5202566\"\n}",
713
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"/usr/bin/containerd-shim-runc-v2 -namespace moby -address /run/containerd/containerd.sock\",\n \"ProcessPath\": \"/usr/bin/containerd-shim-runc-v2\",\n \"ProcessStartUser\": \"0\",\n \"ProcessUserGroup\": \"0\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"43.138.142.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"111411141114758f9ec06e76011da529da15bafdc83f2012d95ffa6382\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/sweet_darwin\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"5202566\",\n \"EventName\": \"访问控制-告警\",\n \"EventType\": \"ACCESS_CONTROL_ALERT\",\n \"FoundTime\": \"2024-10-11 11:03:00\",\n \"HostID\": \"11141114-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"ImageId\": \"sha256:11141114111403bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-10-11 11:03:00\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"--\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"检测到系统命令被篡改\",\n \"MatchRule\": {\n \"ProcessPath\": \"/home/yunjing_testing_x86/events_trigger_x86\",\n \"RuleId\": \"200000000000000000000002\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"TargetFilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\"\n },\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"\",\n \"RuleId\": \"222222222222222222222222\",\n \"RuleName\": \"系统策略\",\n \"Solution\": \"排查是否为正常业务需要的系统命令替换\"\n },\n \"ParentProcessInfo\": {\n \"ProcessParam\": \"\",\n \"ProcessPath\": \"\",\n \"ProcessStartUser\": \"\",\n \"ProcessUserGroup\": \"\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2252097,\n \"ProcessMd5\": \"\",\n \"ProcessName\": \"\",\n \"ProcessParam\": \"./events_trigger_x86 tamper_sys\",\n \"ProcessPath\": \"/home/yunjing_testing_x86/events_trigger_x86\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"events_trigger_x86(2252097)|bash(2247285)|containerd-shim-runc-v2(2247257)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"a8db49cf-2c9a-492c-96e0-a87dcf75be23\",\n \"TamperedFileInfo\": {\n \"FileCreateTime\": \"2024-10-11 11:02:58\",\n \"FileDiff\": \"\",\n \"FileName\": \"pwnkit.so:.\",\n \"FilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\",\n \"FileSize\": 24,\n \"FileType\": \"UNKNOWN\",\n \"LatestTamperedFileMTime\": \"2024-10-11 11:02:58\",\n \"NewFile\": \"\"\n }\n }\n}",
726
714
  "title": "运行时访问控制事件详细信息"
727
715
  }
728
716
  ],
@@ -730,40 +718,40 @@
730
718
  {
731
719
  "document": "运行时访问控制事件列表",
732
720
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAccessControlEvents\n<公共请求参数>\n\n{}",
733
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"EventSet\": [\n {\n \"ProcessName\": \"abc\",\n \"MatchRuleName\": \"abc\",\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"ContainerName\": \"abc\",\n \"ImageName\": \"abc\",\n \"Behavior\": \"abc\",\n \"Status\": \"abc\",\n \"Id\": \"abc\",\n \"FileName\": \"abc\",\n \"EventType\": \"abc\",\n \"ImageId\": \"abc\",\n \"ContainerId\": \"abc\",\n \"Solution\": \"abc\",\n \"Description\": \"abc\",\n \"MatchRuleId\": \"abc\",\n \"MatchAction\": \"abc\",\n \"MatchProcessPath\": \"abc\",\n \"MatchFilePath\": \"abc\",\n \"FilePath\": \"abc\",\n \"RuleExist\": true,\n \"EventCount\": 0,\n \"LatestFoundTime\": \"abc\",\n \"RuleId\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"ContainerStatus\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeName\": \"abc\",\n \"ClusterID\": \"abc\",\n \"PodName\": \"abc\",\n \"PodIP\": \"abc\",\n \"NodeUniqueID\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
721
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"a41351f3384159740167f25d83fcb206ffa154ab31d50c6594580ca6bac0b2cf\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"container1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"STOPPED\",\n \"Description\": \"检测到系统计划任务被修改\",\n \"EventCount\": 1,\n \"EventType\": \"\",\n \"FileName\": \"cron.update\",\n \"FilePath\": \"/etc/crontabs/cron.update\",\n \"FoundTime\": \"2020-10-29 18:11:10\",\n \"HostID\": \"f5a89f72-aaad-bbbc-cccc-eb3b3b74c2f0\",\n \"HostIP\": \"10.86.68.35\",\n \"Id\": \"4904016\",\n \"ImageId\": \"sha256:3926aaa0fe2ece5cbe51aaaf242b074c211beb8e046c9d4db4959c220be0171f\",\n \"ImageName\": \"iamge1\",\n \"LatestFoundTime\": \"2020-10-29 18:11:10\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchFilePath\": \"/etc/crontabs/cron.update\",\n \"MatchProcessPath\": \"/bin/busybox\",\n \"MatchRuleId\": \"200000000000000000000001\",\n \"MatchRuleName\": \"系统策略\",\n \"NodeID\": \"\",\n \"NodeName\": \"host1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"/bin/busybox\",\n \"PublicIP\": \"\",\n \"RuleExist\": true,\n \"RuleId\": \"222222222222222222222222\",\n \"Solution\": \"排查是否为正常业务需要的计划任务修改\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"098ea687-eba5-4b30-9c05-d3ee0749d0a7\",\n \"TotalCount\": 13\n }\n}",
734
722
  "title": "运行时访问控制事件列表"
735
723
  }
736
724
  ],
737
725
  "DescribeAccessControlEventsExport": [
738
726
  {
739
727
  "document": "查询运行时访问控制事件列表导出",
740
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlEventsExport\n&ExportField.0=xxx\n&<公共请求参数>",
741
- "output": "{\n \"Response\": {\n \"DownloadUrl\": \"abc\",\n \"JobId\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
728
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlEventsExport\n&ExportField.0=filed_name\n&<公共请求参数>",
729
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"\",\n \"JobId\": \"10001\",\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
742
730
  "title": "查询运行时访问控制事件列表导出"
743
731
  }
744
732
  ],
745
733
  "DescribeAccessControlRuleDetail": [
746
734
  {
747
735
  "document": "",
748
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=xxx\n&Limit=10\n&Offset=0\n&<公共请求参数>",
749
- "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"6045899634b9a9000c4ae5bb\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [\n {\n \"RuleId\": \"603279ba34b9a9000c0897ae\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.txt\"\n },\n {\n \"RuleId\": \"60327a7b34b9a9000c0897af\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test2.txt\"\n },\n {\n \"RuleId\": \"6033081234b9a9000c0897b0\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/coreutils\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60337e1034b9a9000c2240c9\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60361e8234b9a9000cf7a3ee\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"603772d334b9a9000cd92ae8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/iv\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"6045899634b9a9000c4ae5bc\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"/1.txt\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
736
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e\n&Limit=10\n&Offset=0\n&<公共请求参数>",
737
+ "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"6045899634b9a9000c4ae5bb\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [\n {\n \"RuleId\": \"603279ba34b9a9000c0897ae\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.txt\"\n },\n {\n \"RuleId\": \"60327a7b34b9a9000c0897af\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test2.txt\"\n },\n {\n \"RuleId\": \"6033081114b9a9000c0897b0\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/coreutils\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60337e1034b9a9000c2240c9\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60361e8234b9a9000cf7a3ee\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"603772d334b9a9000cd92ae8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/iv\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"6045899634b9a9000c4ae5bc\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"/1.txt\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
750
738
  "title": "根据规则ID查询规则详情(用户策略)"
751
739
  },
752
740
  {
753
741
  "document": "",
754
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=xxx\n&Limit=10\n&Offset=0\n&<公共请求参数>",
742
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e&Limit=10\n&Offset=0\n&<公共请求参数>",
755
743
  "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"60484042d620f3f9012c521e\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"200000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_CRONTAB\"\n },\n {\n \"RuleId\": \"200000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_SYS_BIN\"\n },\n {\n \"RuleId\": \"200000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_USRCFG\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
756
744
  "title": "根据规则ID查询规则详情(系统策略)"
757
745
  },
758
746
  {
759
747
  "document": "",
760
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&ImageId=xxx\n&Limit=10\n&Offset=0\n&<公共请求参数>",
761
- "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"6045899634b9a9000c4ae5bb\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [\n {\n \"RuleId\": \"603279ba34b9a9000c0897ae\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.txt\"\n },\n {\n \"RuleId\": \"60327a7b34b9a9000c0897af\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test2.txt\"\n },\n {\n \"RuleId\": \"6033081234b9a9000c0897b0\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/coreutils\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60337e1034b9a9000c2240c9\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60361e8234b9a9000cf7a3ee\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"603772d334b9a9000cd92ae8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/iv\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"6045899634b9a9000c4ae5bc\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"/1.txt\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
748
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
749
+ "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"6045899634b9a9000c4ae5bb\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [\n {\n \"RuleId\": \"603279ba34b9a9000c0897ae\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.txt\"\n },\n {\n \"RuleId\": \"60327a7b34b9a9000c0897af\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test2.txt\"\n },\n {\n \"RuleId\": \"6033081114b9a9000c0897b0\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/coreutils\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60337e1034b9a9000c2240c9\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60361e8234b9a9000cf7a3ee\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"603772d334b9a9000cd92ae8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/iv\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"6045899634b9a9000c4ae5bc\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"/1.txt\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
762
750
  "title": "根据事件的镜像ID,查询当前镜像的规则详情(用户策略)"
763
751
  },
764
752
  {
765
753
  "document": "",
766
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=xxx\n&Limit=10\n&Offset=0\n&<公共请求参数>",
754
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e\n&Limit=10\n&Offset=0\n&<公共请求参数>",
767
755
  "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"60484042d620f3f9012c521e\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"200000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_CRONTAB\"\n },\n {\n \"RuleId\": \"200000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_SYS_BIN\"\n },\n {\n \"RuleId\": \"200000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_USRCFG\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
768
756
  "title": "根据事件的镜像ID,查询当前镜像的规则详情(系统策略)"
769
757
  }
@@ -772,7 +760,7 @@
772
760
  {
773
761
  "document": "",
774
762
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRules\n&Limit=10\n&Offset=0\n&<公共请求参数>",
775
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RuleSet\": [\n {\n \"UpdateTime\": \"xx\",\n \"IsEnable\": true,\n \"RuleId\": \"xx\",\n \"EffectImageCount\": 1,\n \"EditUserName\": \"xx\",\n \"RuleName\": \"xx\",\n \"IsDefault\": true\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
763
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RuleSet\": [\n {\n \"UpdateTime\": \"2022-01-01 00:00:00\",\n \"IsEnable\": true,\n \"RuleId\": \"10001\",\n \"EffectImageCount\": 1,\n \"EditUserName\": \"admin\",\n \"RuleName\": \"rule_name\",\n \"IsDefault\": true\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
776
764
  "title": "运行时访问控制策略列表"
777
765
  }
778
766
  ],
@@ -803,8 +791,8 @@
803
791
  "DescribeAffectedWorkloadList": [
804
792
  {
805
793
  "document": "",
806
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedWorkloadList\n<公共请求参数>\n\n{\n \"CheckItemId\": \"1\"\n}",
807
- "output": "{\n \"Response\": {\n \"RequestId\": \"ea73ee35-ec93-4d94-b2fc-979a58f34be1\",\n \"TotalCount\": 0,\n \"AffectedWorkloadList\": []\n }\n}",
794
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedWorkloadList\n<公共请求参数>\n\n{\n \"CheckItemId\": 10071,\n \"Filters\": [],\n \"Limit\": 10,\n \"Offset\": 0\n}",
795
+ "output": "{\n \"Response\": {\n \"AffectedWorkloadList\": [\n {\n \"ClusterId\": \"test-clusterid\",\n \"ClusterName\": \"benben-tcss\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"yunjing-agent set image tag \\\"latest\\\"\",\n \"WorkloadName\": \"tcss/yunjing-agent\",\n \"WorkloadType\": \"DaemonSet\"\n }\n ],\n \"RequestId\": \"299deeb1-48aa-449d-980c-1f46e2375cec\",\n \"TotalCount\": 111\n }\n}",
808
796
  "title": "查询workload类型的影响范围示例"
809
797
  }
810
798
  ],
@@ -812,7 +800,7 @@
812
800
  {
813
801
  "document": "查询平行容器安装命令",
814
802
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAgentDaemonSetCmd\n&IsCloud=true\n&NetType=\"basic\"\n&<公共请求参数>",
815
- "output": "{\n \"Response\": {\n \"Command\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
803
+ "output": "{\n \"Response\": {\n \"Command\": \"install command'\",\n \"FileContent\": \"fakecontent\",\n \"RequestId\": \"0adc9022-1364-4b4b-b3e7-2e37930af279\",\n \"URL\": \"https://1.2.3.4/a\"\n }\n}",
816
804
  "title": "查询平行容器安装命令"
817
805
  }
818
806
  ],
@@ -820,7 +808,7 @@
820
808
  {
821
809
  "document": "",
822
810
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAgentInstallCommand\n&IsCloud=true\n&NetType=\"basic\"\n&<公共请求参数>",
823
- "output": "{\n \"Response\": {\n \"WindowsCommand\": \"xx\",\n \"LinuxCommand\": \"xx\",\n \"WindowsDownloadUrl\": \"xx\",\n \"RequestId\": \"xx\",\n \"WindowsStepOne\": \"xx\",\n \"WindowsStepTwo\": \"xx\"\n }\n}",
811
+ "output": "{\n \"Response\": {\n \"ARMCommand\": \"wget http://a.com/ydeyes_linux64_aarch64.tar.gz -O ydeyes_linux64_aarch64.tar.gz && tar -zxvf ydeyes_linux64_aarch64.tar.gz && ./self_cloud_install_linux64.sh\",\n \"LinuxCommand\": \"wget http://a.comydeyes_linux64.tar.gz -O ydeyes_linux64.tar.gz && tar -zxvf ydeyes_linux64.tar.gz && ./self_cloud_install_linux64.sh\",\n \"RequestId\": \"751c2a46-7ef4-4932-ac06-5ccc2faa74fb\",\n \"WindowsCommand\": \"powershell -executionpolicy bypass -c \\\"(New-Object Net.WebClient).DownloadFile('http://a.com/ydeyes_win32.exe', $ExecutionContext.SessionState.Path.GetUnresolvedProviderPathFromPSPath('.\\\\ydeyes_win32.exe'))\\\"; \\\"./ydeyes_win32.exe\\\"\",\n \"WindowsDownloadUrl\": \"https://a.com/ydeyes_win32.exe\",\n \"WindowsStepOne\": \"http://a.com/ydeyes_win32.exe\",\n \"WindowsStepTwo\": \"ydeyes_win32.exe\"\n }\n}",
824
812
  "title": "查询agent安装命令"
825
813
  }
826
814
  ],
@@ -828,7 +816,7 @@
828
816
  {
829
817
  "document": "查询app服务列表",
830
818
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetAppServiceList\n<公共请求参数>\n\n{}",
831
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ServiceID\": \"abc\",\n \"HostID\": \"abc\",\n \"HostIP\": \"abc\",\n \"ContainerName\": \"abc\",\n \"Type\": \"abc\",\n \"Version\": \"abc\",\n \"RunAs\": \"abc\",\n \"Listen\": [\n \"abc\"\n ],\n \"Config\": \"abc\",\n \"ProcessCnt\": 1,\n \"AccessLog\": \"abc\",\n \"ErrorLog\": \"abc\",\n \"DataPath\": \"abc\",\n \"WebRoot\": \"abc\",\n \"Pids\": [\n 1\n ],\n \"MainType\": \"abc\",\n \"Exe\": \"abc\",\n \"Parameter\": \"abc\",\n \"ContainerId\": \"abc\",\n \"HostName\": \"abc\",\n \"PublicIp\": \"abc\",\n \"NodeID\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodName\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeUniqueID\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
819
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"\",\n \"Config\": \"\",\n \"ContainerId\": \"3a37fab5d1d330a0bc243607d5091649c7546495fdb39f009db49ac062f3b143\",\n \"ContainerName\": \"/k8s_k8s-csp-osd-container_csp-pod-osd-1_tcs-system_6e47070d-360a-49e6-b10e-91daa81162aa_1\",\n \"DataPath\": \"\",\n \"ErrorLog\": \"\",\n \"Exe\": \"/usr/sbin/rpcbind\",\n \"HostID\": \"e1c1db55-3752-4f4e-b88a-158a87549991\",\n \"HostIP\": \"10.0.0.142\",\n \"HostName\": \"tcs-test2\",\n \"Listen\": [\n \"tcp://:::111\",\n \"tcp://0.0.0.0:111\"\n ],\n \"MainType\": \"app\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"Parameter\": \"/sbin/rpcbind -w\",\n \"Pids\": [\n 66771\n ],\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"1.2.3.4\",\n \"RunAs\": \"rpc:rpc\",\n \"ServiceID\": \"fe72109ce260dbb137e60e1f20401c011256299843\",\n \"Type\": \"rpcbind\",\n \"Version\": \"\",\n \"WebRoot\": \"\"\n }\n ],\n \"RequestId\": \"66fccb1f-f7cf-4020-ba91-e60d78d77c71\",\n \"TotalCount\": 1212\n }\n}",
832
820
  "title": "查询app服务列表"
833
821
  }
834
822
  ],
@@ -836,7 +824,7 @@
836
824
  {
837
825
  "document": "",
838
826
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetClusterList\n<公共请求参数>\n\n{}",
839
- "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"TotalCount\": 0\n }\n}",
827
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"BindRuleName\": \"piper\",\n \"ClusterID\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ClusterVersion\": \"\",\n \"CpuLimit\": 0,\n \"MemLimit\": 0,\n \"Status\": \"CSR_RUNNING\"\n }\n ],\n \"RequestId\": \"bb39b643-b0e1-4c79-b006-7d62083227a8\",\n \"TotalCount\": 15\n }\n}",
840
828
  "title": "查询集群列表"
841
829
  }
842
830
  ],
@@ -852,7 +840,7 @@
852
840
  {
853
841
  "document": "查询容器信息",
854
842
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetContainerDetail\n<公共请求参数>\n\n{\n \"ContainerId\": \"cndajlhcklanca\"\n}",
855
- "output": "{\n \"Response\": {\n \"HostID\": \"abc\",\n \"HostIP\": \"abc\",\n \"ContainerName\": \"abc\",\n \"Status\": \"abc\",\n \"RunAs\": \"abc\",\n \"Cmd\": \"abc\",\n \"CPUUsage\": 1,\n \"RamUsage\": 1,\n \"ImageName\": \"abc\",\n \"ImageID\": \"abc\",\n \"POD\": \"abc\",\n \"K8sMaster\": \"abc\",\n \"ProcessCnt\": 1,\n \"PortCnt\": 1,\n \"ComponentCnt\": 1,\n \"AppCnt\": 1,\n \"WebServiceCnt\": 1,\n \"Mounts\": [\n {\n \"Type\": \"abc\",\n \"Source\": \"abc\",\n \"Destination\": \"abc\",\n \"Mode\": \"abc\",\n \"RW\": true,\n \"Propagation\": \"abc\",\n \"Name\": \"abc\",\n \"Driver\": \"abc\"\n }\n ],\n \"Network\": {\n \"EndpointID\": \"abc\",\n \"Mode\": \"abc\",\n \"Name\": \"abc\",\n \"NetworkID\": \"abc\",\n \"Gateway\": \"abc\",\n \"Ipv4\": \"abc\",\n \"Ipv6\": \"abc\",\n \"MAC\": \"abc\"\n },\n \"CreateTime\": \"abc\",\n \"ImageCreateTime\": \"abc\",\n \"ImageSize\": 1,\n \"HostStatus\": \"abc\",\n \"NetStatus\": \"abc\",\n \"NetSubStatus\": \"abc\",\n \"IsolateSource\": \"abc\",\n \"IsolateTime\": \"abc\",\n \"NodeID\": \"abc\",\n \"NodeName\": \"abc\",\n \"NodeSubNetID\": \"abc\",\n \"NodeSubNetName\": \"abc\",\n \"NodeSubNetCIDR\": \"abc\",\n \"PodName\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodStatus\": \"abc\",\n \"ClusterID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"PublicIP\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
843
+ "output": "{\n \"Response\": {\n \"AppCnt\": 0,\n \"CPUUsage\": 0,\n \"ClusterID\": \"cls-5555555\",\n \"ClusterName\": \"集群名称\",\n \"Cmd\": \"\",\n \"ComponentCnt\": 0,\n \"ContainerName\": \"容器名称\",\n \"CreateTime\": \"2024-10-24 19:36:24\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostStatus\": \"ONLINE\",\n \"ImageCreateTime\": \"0001-01-01 08:05:43\",\n \"ImageID\": \"sha256:563af\",\n \"ImageName\": \"image:latest\",\n \"ImageSize\": 0,\n \"IsolateSource\": \"\",\n \"IsolateTime\": \"1970-01-01 00:00:01\",\n \"K8sMaster\": \"\",\n \"Mounts\": [],\n \"NetStatus\": \"NORMAL\",\n \"NetSubStatus\": \"NONE\",\n \"Network\": {\n \"EndpointID\": \"\",\n \"Gateway\": \"\",\n \"Ipv4\": \"\",\n \"Ipv6\": \"\",\n \"MAC\": \"\",\n \"Mode\": \"\",\n \"Name\": \"\",\n \"NetworkID\": \"\"\n },\n \"NodeID\": \"eks-111111\",\n \"NodeName\": \"节点名称\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"27501aaed5e639693783321219989889\",\n \"POD\": \"tcss-aset-11-321\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"tcss-asset-124321\",\n \"PodStatus\": \"Running\",\n \"PortCnt\": 0,\n \"ProcessCnt\": 0,\n \"PublicIP\": \"\",\n \"RamUsage\": 0,\n \"RequestId\": \"6954374b-bfcd-4751-8358-3e3682551514\",\n \"RunAs\": \"\",\n \"Status\": \"RUNNING\",\n \"WebServiceCnt\": 0\n }\n}",
856
844
  "title": "查询容器信息"
857
845
  }
858
846
  ],
@@ -860,7 +848,7 @@
860
848
  {
861
849
  "document": "搜索查询容器列表",
862
850
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetContainerList\n<公共请求参数>\n\n{}",
863
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ContainerID\": \"abc\",\n \"ContainerName\": \"abc\",\n \"Status\": \"abc\",\n \"CreateTime\": \"abc\",\n \"RunAs\": \"abc\",\n \"Cmd\": \"abc\",\n \"CPUUsage\": 1,\n \"RamUsage\": 1,\n \"ImageName\": \"abc\",\n \"ImageID\": \"abc\",\n \"POD\": \"abc\",\n \"HostID\": \"abc\",\n \"HostIP\": \"abc\",\n \"UpdateTime\": \"abc\",\n \"HostName\": \"abc\",\n \"PublicIp\": \"abc\",\n \"NetStatus\": \"abc\",\n \"NetSubStatus\": \"abc\",\n \"IsolateSource\": \"abc\",\n \"IsolateTime\": \"abc\",\n \"NodeID\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodName\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"PodCpu\": 0,\n \"PodMem\": 0,\n \"ClusterName\": \"abc\",\n \"ClusterID\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
851
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CPUUsage\": 0,\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"Cmd\": \"--controllers=*,-everest-csi-local-volume --leader-elect=true --leader-elect-resource-lock=endpoints --leader-elect-resource-namespace=kube-system --feature-gates=Topology=true,DistributeAttacher=false --provision-with-strict-topology=true --csi-attacher-worker-threads=60 --csi-attacher-detach-worker-threads=60 --csi-attacher-should-reconcile-va=false\",\n \"ContainerID\": \"8eaffb2a09728b130020b7fe33d87fe3a45856a2ff39eab57873c34815461b22\",\n \"ContainerName\": \"/k8s_everest-csi-controller_everest-csi-controller-7b7df58489-9v9pf_kube-system_3b5f2feb-af96-4c0b-84f0-4e86d0671ae8_2\",\n \"CreateTime\": \"2023-08-30 14:48:19\",\n \"HostID\": \"ed7bcc17-3ad7-455d-b2f6-1712c005ced0\",\n \"HostIP\": \"10.0.4.74\",\n \"HostName\": \"ecs-suanfa-0001\",\n \"ImageID\": \"sha256:3cdeb1036c11af9e7f906ed2a0535056c71f3f53522242fa24a5aa2022b83f2c\",\n \"ImageName\": \"swr.cn-south-1.myhuaweicloud.com/hwofficial/everest:2.1.13\",\n \"IsolateSource\": \"\",\n \"IsolateTime\": \"1970-01-01 00:00:01\",\n \"NetStatus\": \"NORMAL\",\n \"NetSubStatus\": \"NONE\",\n \"NodeID\": \"\",\n \"NodeType\": \"\",\n \"NodeUniqueID\": \"\",\n \"POD\": \"\",\n \"PodCpu\": 0,\n \"PodIP\": \"\",\n \"PodMem\": 0,\n \"PodName\": \"\",\n \"PodUid\": \"\",\n \"PublicIp\": \"116.205.224.125\",\n \"RamUsage\": 99728,\n \"RunAs\": \"paas\",\n \"Status\": \"RUNNING\",\n \"UpdateTime\": \"2024-07-15 16:05:20\"\n }\n ],\n \"RequestId\": \"05844ae1-7f46-41f2-a521-0b6a011cc16d\",\n \"TotalCount\": 1\n }\n}",
864
852
  "title": "搜索查询容器列表"
865
853
  }
866
854
  ],
@@ -868,7 +856,7 @@
868
856
  {
869
857
  "document": "查询db服务列表",
870
858
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetDBServiceList\n<公共请求参数>\n\n{}",
871
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ServiceID\": \"abc\",\n \"HostID\": \"abc\",\n \"HostIP\": \"abc\",\n \"ContainerName\": \"abc\",\n \"Type\": \"abc\",\n \"Version\": \"abc\",\n \"RunAs\": \"abc\",\n \"Listen\": [\n \"abc\"\n ],\n \"Config\": \"abc\",\n \"ProcessCnt\": 1,\n \"AccessLog\": \"abc\",\n \"ErrorLog\": \"abc\",\n \"DataPath\": \"abc\",\n \"WebRoot\": \"abc\",\n \"Pids\": [\n 1\n ],\n \"MainType\": \"abc\",\n \"Exe\": \"abc\",\n \"Parameter\": \"abc\",\n \"ContainerId\": \"abc\",\n \"HostName\": \"abc\",\n \"PublicIp\": \"abc\",\n \"NodeID\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodName\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeUniqueID\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
859
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"\",\n \"Config\": \"\",\n \"ContainerId\": \"3c0a1bc138f982b187549237eb3fc02f99616bb93be3d1b65a5f14f0649591be\",\n \"ContainerName\": \"/k8s_redis_redis-tce-redis-support-ss-0_sso_ad389998-b0ab-4d43-8b25-2c96cac55ecf_0\",\n \"DataPath\": \"\",\n \"ErrorLog\": \"\",\n \"Exe\": \"/usr/local/bin/redis-server\",\n \"HostID\": \"a9365a64-7ffa-4e6e-ab27-1a0475e65070\",\n \"HostIP\": \"10.0.0.98\",\n \"HostName\": \"tcs-pre3\",\n \"Listen\": [\n \"tcp://0.0.0.0:6379\"\n ],\n \"MainType\": \"db\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"Parameter\": \"redis-server 0.0.0.0:6379 \",\n \"Pids\": [\n 338552\n ],\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"43.138.193.64\",\n \"RunAs\": \"root:root\",\n \"ServiceID\": \"fd1a1b7d9c4bc8168949b4e3ee5e9cd91256299843\",\n \"Type\": \"redis\",\n \"Version\": \"\",\n \"WebRoot\": \"\"\n }\n ],\n \"RequestId\": \"57ab9e09-70b3-40ab-b42b-cd2d422dcb9d\",\n \"TotalCount\": 89\n }\n}",
872
860
  "title": "查询db服务列表"
873
861
  }
874
862
  ],
@@ -876,7 +864,7 @@
876
864
  {
877
865
  "document": "查询主机详细信息",
878
866
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetHostDetail\n<公共请求参数>\n\n{\n \"HostId\": \"dskaldjskld\"\n}",
879
- "output": "{\n \"Response\": {\n \"UUID\": \"abc\",\n \"UpdateTime\": \"abc\",\n \"HostName\": \"abc\",\n \"Group\": \"abc\",\n \"HostIP\": \"abc\",\n \"OsName\": \"abc\",\n \"AgentVersion\": \"abc\",\n \"KernelVersion\": \"abc\",\n \"DockerVersion\": \"abc\",\n \"DockerAPIVersion\": \"abc\",\n \"DockerGoVersion\": \"abc\",\n \"DockerFileSystemDriver\": \"abc\",\n \"DockerRootDir\": \"abc\",\n \"ImageCnt\": 1,\n \"ContainerCnt\": 1,\n \"K8sMasterIP\": \"abc\",\n \"K8sVersion\": \"abc\",\n \"KubeProxyVersion\": \"abc\",\n \"Status\": \"abc\",\n \"IsContainerd\": true,\n \"MachineType\": \"abc\",\n \"PublicIp\": \"abc\",\n \"InstanceID\": \"abc\",\n \"RegionID\": 0,\n \"Project\": {\n \"ProjectName\": \"abc\",\n \"ProjectID\": 0\n },\n \"Tags\": [\n {\n \"TagKey\": \"abc\",\n \"TagValue\": \"abc\"\n }\n ],\n \"ClusterID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"ClusterAccessedStatus\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
867
+ "output": "{\n \"Response\": {\n \"AgentVersion\": \"5.2.1.105\",\n \"ClusterAccessedStatus\": \"AccessedNone\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerCnt\": 1,\n \"DockerAPIVersion\": \"1.43\",\n \"DockerFileSystemDriver\": \"overlay2\",\n \"DockerGoVersion\": \"go1.20.7\",\n \"DockerRootDir\": \"/var/lib/docker\",\n \"DockerVersion\": \"24.0.6\",\n \"Group\": \"\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"ImageCnt\": 10,\n \"InstanceID\": \"ins-8bc803fd\",\n \"IsContainerd\": false,\n \"K8sMasterIP\": \"\",\n \"K8sVersion\": \"\",\n \"KernelVersion\": \"3.10.0-1160.102.1.el7.x86_64\",\n \"KubeProxyVersion\": \"\",\n \"MachineType\": \"CVM\",\n \"OsName\": \"CentOS Linux release 7.9.2009 (Core)\",\n \"Project\": {\n \"ProjectID\": 0,\n \"ProjectName\": \"默认项目\"\n },\n \"PublicIp\": \"1.1.1.1\",\n \"RegionID\": 1,\n \"RequestId\": \"342475fc-76eb-4199-998f-780f9921a5f2\",\n \"Status\": \"ONLINE\",\n \"Tags\": [],\n \"UUID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"UpdateTime\": \"2024-10-30 10:26:52\"\n }\n}",
880
868
  "title": "查询主机详细信息"
881
869
  }
882
870
  ],
@@ -884,7 +872,7 @@
884
872
  {
885
873
  "document": "查询主机列表",
886
874
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetHostList\n<公共请求参数>\n\n{}",
887
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"HostID\": \"abc\",\n \"HostIP\": \"abc\",\n \"HostName\": \"abc\",\n \"Group\": \"abc\",\n \"DockerVersion\": \"abc\",\n \"DockerFileSystemDriver\": \"abc\",\n \"ImageCnt\": 1,\n \"ContainerCnt\": 1,\n \"Status\": \"abc\",\n \"IsContainerd\": true,\n \"MachineType\": \"abc\",\n \"PublicIp\": \"abc\",\n \"Uuid\": \"abc\",\n \"InstanceID\": \"abc\",\n \"RegionID\": 0,\n \"Project\": {\n \"ProjectName\": \"abc\",\n \"ProjectID\": 0\n },\n \"Tags\": [\n {\n \"TagKey\": \"abc\",\n \"TagValue\": \"abc\"\n }\n ],\n \"ClusterID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"ClusterAccessedStatus\": \"abc\",\n \"ChargeCoresCnt\": 1,\n \"DefendStatus\": \"abc\",\n \"CoresCnt\": 1\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
875
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"HostID\": \"223e6323-1db6-42cf-8094-200916841684\",\n \"HostIP\": \"10.0.0.11\",\n \"HostName\": \"ins-1684ad1f2\",\n \"Group\": \"staffs\",\n \"DockerVersion\": \"1.0.0\",\n \"DockerFileSystemDriver\": \"ZFS\",\n \"ImageCnt\": 1,\n \"ContainerCnt\": 1,\n \"Status\": \"ONLINE\",\n \"IsContainerd\": true,\n \"MachineType\": \"CVM\",\n \"PublicIp\": \"112.46.12.11\",\n \"Uuid\": \"223e6323-1db6-42cf-8094-200916841684\",\n \"InstanceID\": \"ins-1684ad1f2\",\n \"RegionID\": 1,\n \"Project\": {\n \"ProjectName\": \"ap-beijing\",\n \"ProjectID\": 0\n },\n \"Tags\": [\n {\n \"TagKey\": \"adone\",\n \"TagValue\": \"mark\"\n }\n ],\n \"ClusterID\": \"csbd-cawfdfafd\",\n \"ClusterName\": \"cls-test1\",\n \"ClusterAccessedStatus\": \"1\",\n \"ChargeCoresCnt\": 1,\n \"DefendStatus\": \"running\",\n \"CoresCnt\": 1\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
888
876
  "title": "查询主机列表"
889
877
  }
890
878
  ],
@@ -892,7 +880,7 @@
892
880
  {
893
881
  "document": "",
894
882
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAssetImageBindRuleInfo\n&Limit=10\n&Offset=0\n&<公共请求参数>",
895
- "output": "{\n \"Response\": {\n \"ImageBindRuleSet\": [\n {\n \"ImageSize\": 0,\n \"RuleId\": \"xx\",\n \"ScanTime\": \"xx\",\n \"ImageId\": \"xx\",\n \"ImageName\": \"xx\",\n \"RuleName\": \"xx\",\n \"ContainerCnt\": 0\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"xx\"\n }\n}",
883
+ "output": "{\n \"Response\": {\n \"ImageBindRuleSet\": [\n {\n \"ImageSize\": 0,\n \"RuleId\": \"10001\",\n \"ScanTime\": \"2022-01-1 00:00:00\",\n \"ImageId\": \"image-id\",\n \"ImageName\": \"image-name\",\n \"RuleName\": \"rule_name\",\n \"ContainerCnt\": 0\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
896
884
  "title": "镜像绑定规则列表"
897
885
  }
898
886
  ],
@@ -900,7 +888,7 @@
900
888
  {
901
889
  "document": "查询镜像详细信息",
902
890
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageDetail\n<公共请求参数>\n\n{\n \"ImageID\": \"dskaldjskld\"\n}",
903
- "output": "{\n \"Response\": {\n \"ImageID\": \"abc\",\n \"ImageName\": \"abc\",\n \"CreateTime\": \"abc\",\n \"Size\": 1,\n \"HostCnt\": 1,\n \"ContainerCnt\": 1,\n \"ScanTime\": \"abc\",\n \"VulCnt\": 1,\n \"RiskCnt\": 1,\n \"SensitiveInfoCnt\": 1,\n \"IsTrustImage\": true,\n \"OsName\": \"abc\",\n \"AgentError\": \"abc\",\n \"ScanError\": \"abc\",\n \"Architecture\": \"abc\",\n \"Author\": \"abc\",\n \"BuildHistory\": \"abc\",\n \"ScanVirusProgress\": 1,\n \"ScanVulProgress\": 1,\n \"ScanRiskProgress\": 1,\n \"ScanVirusError\": \"abc\",\n \"ScanVulError\": \"abc\",\n \"ScanRiskError\": \"abc\",\n \"ScanStatus\": \"abc\",\n \"VirusCnt\": 1,\n \"Status\": 1,\n \"RemainScanTime\": 1,\n \"IsAuthorized\": 0,\n \"ImageDigest\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
891
+ "output": "{\n \"Response\": {\n \"AgentError\": \"\",\n \"Architecture\": \"\",\n \"Author\": \"\",\n \"BuildHistory\": \"# create_time:2021-09-15 18:20:05 tags:docker.io/centos:latest,yancyw:1,yancyw:2,yancyw:3, ADD file:1114113413411342942e068863ce2a8491bb71522c652f31fb466 in / \",\n \"ContainerCnt\": 51,\n \"CreateTime\": \"2021-09-16 02:20:05\",\n \"HostCnt\": 24,\n \"ImageDigest\": \"sha256:113411341134134ab9dfb7c8571c40d67d534bbdee55bd6c473f432b177\",\n \"ImageID\": \"sha256:13413413413494c8a1ad043720b0416bfc16c52c45d4847e53fadb6\",\n \"ImageName\": \"docker.io/centos:latest\",\n \"IsAuthorized\": 1,\n \"IsTrustImage\": true,\n \"OsName\": \"centos:8.4.2105\",\n \"RemainScanTime\": 0,\n \"RequestId\": \"113411341134-1037-46b4-a9fc-b17f3a8f0b03\",\n \"RiskCnt\": 211,\n \"ScanError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanRiskProgress\": 0,\n \"ScanStatus\": \"\",\n \"ScanTime\": \"2024-10-25 16:13:39\",\n \"ScanVirusError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulError\": \"\",\n \"ScanVulProgress\": 0,\n \"SensitiveInfoCnt\": 0,\n \"Size\": 231268856,\n \"Status\": 5,\n \"VirusCnt\": 0,\n \"VulCnt\": 230\n }\n}",
904
892
  "title": "查询镜像详细信息"
905
893
  }
906
894
  ],
@@ -932,7 +920,7 @@
932
920
  {
933
921
  "document": "",
934
922
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryAssetStatus\n<公共请求参数>\n\n{}",
935
- "output": "{\n \"Response\": {\n \"Status\": \"abc\",\n \"Err\": \"abc\",\n \"LatestSyncSuccessTime\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
923
+ "output": "{\n \"Response\": {\n \"Status\": \"doing\",\n \"Err\": \"\",\n \"LatestSyncSuccessTime\": \"2006-01-02 15:04:05\",\n \"RequestId\": \"abd55800-ad16-4de8-b319-a6480098e15b\"\n }\n}",
936
924
  "title": "查看镜像仓库资产更新进度状态"
937
925
  }
938
926
  ],
@@ -940,13 +928,13 @@
940
928
  {
941
929
  "document": "",
942
930
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryDetail\n<公共请求参数>\n\n{\n \"Id\": \"5427\"\n}",
943
- "output": "{\n \"Response\": {\n \"RequestId\": \"acc92f01-ee14-4eec-a1b6-e78d3ea0b7e9\",\n \"ImageDigest\": \"sha256:615475135bb705517e749767a28f6bd57199008d3e9b688efa0f73a8befccc97\",\n \"ImageId\": \"sha256:e68ba1280908f76a9e22a813b9ea0c7358e9bcf0ed616fddf88dad557e33d1ca\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/yunding/person1\",\n \"InstanceId\": \"\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"yunding\",\n \"ImageName\": \"person1\",\n \"ImageTag\": \"v1\",\n \"ImageSize\": 74866818,\n \"ScanTime\": \"2022-01-14T21:03:19+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 172,\n \"VirusCnt\": 0,\n \"RiskCnt\": 1,\n \"SentiveInfoCnt\": 1,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"\",\n \"ScanVulError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"#2020-06-17 00:22:24.918233762 +0000 UTC\\n\\n/bin/sh -c #(nop) ADD file:84700c11fcc969ac08ef25f115513d76c7b72a4118c01fbc86ef0a6056fdebeb in / \\n\\n#2020-06-17 00:22:25.276021438 +0000 UTC\\n\\n/bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200611\\n\\n#2020-06-17 00:22:25.47282687 +0000 UTC\\n\\n/bin/sh -c #(nop) CMD [\\\"/bin/bash\\\"]\\n\\n#2020-12-18 10:06:01.1576746 +0000 UTC\\n\\n/bin/sh -c echo \\\"RSYNC_PASSWORD='xxx' rsync\\\"\\n\\n\",\n \"RegistryRegion\": \"default\",\n \"ImageCreateTime\": \"2020-12-25T16:40:39+08:00\"\n }\n}",
931
+ "output": "{\n \"Response\": {\n \"RequestId\": \"acc92f01-ee14-4eec-a1b6-e78d3ea0b7e9\",\n \"ImageDigest\": \"sha256:615475135bb705517e749767a28f6bd57199008d3e9b688efa0f73a8befccc97\",\n \"ImageId\": \"sha256:e68ba1280908f76a9e22a813b9ea0c7358e9bcf0ed616fddf88dad557e33d1ca\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/yunding/person1\",\n \"InstanceId\": \"\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"yunding\",\n \"ImageName\": \"person1\",\n \"ImageTag\": \"v1\",\n \"ImageSize\": 74866818,\n \"ScanTime\": \"2022-01-14T21:03:19+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 172,\n \"VirusCnt\": 0,\n \"RiskCnt\": 1,\n \"SentiveInfoCnt\": 1,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"\",\n \"ScanVulError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"#2020-06-17 00:22:24.918233762 +0000 UTC\\n\\n/bin/sh -c #(nop) ADD file:84700c11fcc969ac08ef25f115513d76c7b72a4118c01fbc86ef0a6056fdebeb in / \\n\\n#2020-06-17 00:22:25.276021438 +0000 UTC\\n\\n/bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200611\\n\\n#2020-06-17 00:22:25.47282687 +0000 UTC\\n\\n/bin/sh -c #(nop) CMD [\\\"/bin/bash\\\"]\\n\\n#2020-12-18 10:06:01.1576746 +0000 UTC\\n\\n/bin/sh -c echo \\\"RSYNC_PASSWORD='passwd' rsync\\\"\\n\\n\",\n \"RegistryRegion\": \"default\",\n \"ImageCreateTime\": \"2020-12-25T16:40:39+08:00\"\n }\n}",
944
932
  "title": "查看仓库镜像详情"
945
933
  },
946
934
  {
947
935
  "document": "",
948
936
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryDetail\n<公共请求参数>\n\n{\n \"Id\": 3421599\n}",
949
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxx\",\n \"ImageDigest\": \"sha256:8d8faaa36c253a8745c392fc71640757d29a5f026fc0e44bb9c98d56544f5175\",\n \"ImageId\": \"sha256:bb804a9c85d7199b8fd6a0c1a34ef1d049689604046fc5ce1ee6b968de78281b\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"hkccr.ccs.tencentyun.com/mhzou/mhccrxg\",\n \"InstanceId\": \"\",\n \"InstanceName\": \"ccr-ap-hongkong\",\n \"Namespace\": \"mhzou\",\n \"ImageName\": \"mhccrxg\",\n \"ImageTag\": \"mhccrxg1\",\n \"ImageSize\": 8544764,\n \"ScanTime\": \"2022-01-19T22:58:23+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 2425,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"\",\n \"ScanVulError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"xxx\",\n \"RegistryRegion\": \"ap-hongkong\",\n \"ImageCreateTime\": \"1900-01-01T00:00:00+00:00\"\n }\n}",
937
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"ImageDigest\": \"sha256:8d8faaa36c253a8745c392fc71640757d29a5f026fc0e44bb9c98d56544f5175\",\n \"ImageId\": \"sha256:bb804a9c85d7199b8fd6a0c1a34ef1d049689604046fc5ce1ee6b968de78281b\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"hkccr.ccs.tencentyun.com/mhzou/mhccrxg\",\n \"InstanceId\": \"\",\n \"InstanceName\": \"ccr-ap-hongkong\",\n \"Namespace\": \"mhzou\",\n \"ImageName\": \"mhccrxg\",\n \"ImageTag\": \"mhccrxg1\",\n \"ImageSize\": 8544764,\n \"ScanTime\": \"2022-01-19T22:58:23+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 2425,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"\",\n \"ScanVulError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"#2020-06-17 00:22:24.918233762 +0000 UTC\\n\\n/bin/sh -c #(nop) ADD file:84700c11fcc969ac08ef25f115513d76c7b72a4118c01fbc86ef0a6056fdebeb in / \\n\\n#2020-06-17 00:22:25.276021438 +0000 UTC\\n\\n/bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200611\\n\\n#2020-06-17 00:22:25.47282687 +0000 UTC\\n\\n/bin/sh -c #(nop) CMD [\\\"/bin/bash\\\"]\\n\\n#2020-12-18 10:06:01.1576746 +0000 UTC\\n\\n/bin/sh -c echo \\\"RSYNC_PASSWORD='passwd' rsync\\\"\\n\\n\",\n \"RegistryRegion\": \"ap-hongkong\",\n \"ImageCreateTime\": \"1900-01-01T00:00:00+00:00\"\n }\n}",
950
938
  "title": "镜像仓库查询镜像仓库详情"
951
939
  }
952
940
  ],
@@ -962,7 +950,7 @@
962
950
  {
963
951
  "document": "",
964
952
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"InstanceName\",\n \"InstanceId\",\n \"RegistryType\",\n \"Namespace\",\n \"ImageName\",\n \"ImageTag\",\n \"ImageSize\",\n \"ImageDigest\",\n \"ImageId\",\n \"ImageRepoAddress\",\n \"ScanStatus\",\n \"VulCnt\",\n \"VirusCnt\",\n \"RiskCnt\",\n \"ScanStartTime\",\n \"ScanEndTime\",\n \"OsName\",\n \"IsAuthorized\",\n \"RegistryRegion\"\n ]\n}",
965
- "output": "{\n \"Response\": {\n \"RequestId\": \"c00f4492-6973-4d8f-872b-c29d22c8eee0\",\n \"DownloadUrl\": \"https://image-registory-1302977000.cos.ap-guangzhou.myqcloud.com/251011530-100015468030-ImageListExport.csv?q-sign-algorithm=sha1&q-ak=AKIDSefQCiRPhjYAW4BR9b1B9qqd4E71a63k&q-sign-time=1611991144%3B1611991204&q-key-time=1611991144%3B1611991204&q-header-list=host&q-url-param-list=&q-signature=e3fc796e87165f7401098b83208d973e8e1af6ec\"\n }\n}",
953
+ "output": "{\n \"Response\": {\n \"RequestId\": \"c00f4492-6973-4d8f-872b-c29d22c8eee0\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
966
954
  "title": "镜像仓库镜像列表导出"
967
955
  }
968
956
  ],
@@ -970,13 +958,13 @@
970
958
  {
971
959
  "document": "正常的获取",
972
960
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"RegistryId\": 8329\n}",
973
- "output": "{\n \"Response\": {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"\",\n \"ConnDetectStatus\": \"status_connected\",\n \"FailReason\": \"\",\n \"Quuid\": \"backend\",\n \"Solution\": \"\",\n \"Uuid\": \"backend\"\n }\n ],\n \"Insecure\": 1,\n \"Name\": \"test\",\n \"NetType\": \"public\",\n \"Password\": \"\",\n \"RegistryRegion\": \"ap-beijing\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v1\",\n \"RequestId\": \"ff82bfdb-f923-4b66-8c70-cba784e8be67\",\n \"SpeedLimit\": 1000,\n \"Url\": \"http://good.com.cn\",\n \"Username\": \"aaa\"\n }\n}",
961
+ "output": "{\n \"Response\": {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"\",\n \"ConnDetectStatus\": \"status_connected\",\n \"FailReason\": \"\",\n \"Quuid\": \"backend\",\n \"Solution\": \"\",\n \"Uuid\": \"backend\"\n }\n ],\n \"Insecure\": 1,\n \"Name\": \"test\",\n \"NetType\": \"public\",\n \"Password\": \"\",\n \"RegistryRegion\": \"ap-beijing\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v1\",\n \"RequestId\": \"ff82bfdb-f923-4b66-8c70-cba784e8be67\",\n \"SpeedLimit\": 1000,\n \"Url\": \"http://good.com.cn\",\n \"Username\": \"test-user-name\"\n }\n}",
974
962
  "title": "正常的获取"
975
963
  },
976
964
  {
977
965
  "document": "镜像仓库详情",
978
966
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"RegistryId\": \"10\"\n}",
979
- "output": "{\n \"Response\": {\n \"RequestId\": \"5187d432-1753-4376-81b6-12e1f7e6ecf5\",\n \"Name\": \"test\",\n \"Username\": \"xxx\",\n \"Password\": \"xxx\",\n \"Url\": \"https://127.0.0.1:8080\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v2\",\n \"NetType\": \"public\",\n \"RegistryRegion\": \"default\",\n \"SpeedLimit\": 1,\n \"Insecure\": 0\n }\n}",
967
+ "output": "{\n \"Response\": {\n \"RequestId\": \"5187d432-1753-4376-81b6-12e1f7e6ecf5\",\n \"Name\": \"test\",\n \"Username\": \"test-user\",\n \"Password\": \"test-passwd\",\n \"Url\": \"https://127.0.0.1:8080\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v2\",\n \"NetType\": \"public\",\n \"RegistryRegion\": \"default\",\n \"SpeedLimit\": 1,\n \"Insecure\": 0\n }\n}",
980
968
  "title": "镜像仓库详情"
981
969
  }
982
970
  ],
@@ -984,23 +972,23 @@
984
972
  {
985
973
  "document": "",
986
974
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRegistryList\n<公共请求参数>\n\n{\n \"Limit\": 100,\n \"Offset\": 0\n}",
987
- "output": "{\n \"Response\": {\n \"RequestId\": \"e59f97b7-87d4-4909-8289-61bd28423d2f\",\n \"TotalCount\": 15525,\n \"List\": [\n {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"\",\n \"ConnDetectStatus\": \"status_connected\",\n \"FailReason\": \"\",\n \"Quuid\": \"backend\",\n \"Solution\": \"\",\n \"Uuid\": \"backend\"\n }\n ],\n \"ConnDetectHostCount\": 1,\n \"ConnDetectType\": \"backend\",\n \"ConnectMsg\": \"\",\n \"InstanceID\": \"\",\n \"LatestSyncTime\": \"2024-10-23 03:12:50\",\n \"Name\": \"aws_public\",\n \"NetType\": \"public\",\n \"RegistryId\": 10000,\n \"RegistryRegion\": \"default\",\n \"RegistryType\": \"aws\",\n \"RegistryVersion\": \"V1\",\n \"SyncFailReason\": \"\",\n \"SyncMessage\": \"\",\n \"SyncSolution\": \"\",\n \"SyncStatus\": \"success\",\n \"Url\": \"https://public.xxx.aws/xxxxxxxx\"\n }\n ]\n }\n}",
975
+ "output": "{\n \"Response\": {\n \"RequestId\": \"e59f97b7-87d4-4909-8289-61bd28423d2f\",\n \"TotalCount\": 15525,\n \"List\": [\n {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"\",\n \"ConnDetectStatus\": \"status_connected\",\n \"FailReason\": \"\",\n \"Quuid\": \"backend\",\n \"Solution\": \"\",\n \"Uuid\": \"backend\"\n }\n ],\n \"ConnDetectHostCount\": 1,\n \"ConnDetectType\": \"backend\",\n \"ConnectMsg\": \"\",\n \"InstanceID\": \"\",\n \"LatestSyncTime\": \"2024-10-23 03:12:50\",\n \"Name\": \"aws_public\",\n \"NetType\": \"public\",\n \"RegistryId\": 10000,\n \"RegistryRegion\": \"default\",\n \"RegistryType\": \"aws\",\n \"RegistryVersion\": \"V1\",\n \"SyncFailReason\": \"\",\n \"SyncMessage\": \"\",\n \"SyncSolution\": \"\",\n \"SyncStatus\": \"success\",\n \"Url\": \"https://public.aws\"\n }\n ]\n }\n}",
988
976
  "title": "镜像仓库查询镜像仓库列表"
989
977
  }
990
978
  ],
991
979
  "DescribeAssetImageRegistryRiskInfoList": [
992
980
  {
993
981
  "document": "",
994
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRiskInfoList\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"ExactMatch\": false,\n \"Name\": \"Level\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"Behavior\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"Type\",\n \"Values\": [\n \"all\"\n ]\n }\n ],\n \"Id\": 6947411,\n \"Limit\": 10,\n \"Offset\": 0\n}",
995
- "output": "{\n \"Response\": {\n \"RequestId\": \"c283b995-d932-436d-8deb-11d2b7eb216c\",\n \"List\": [],\n \"TotalCount\": 0\n }\n}",
982
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRiskInfoList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"Level\",\n \"Values\": [\n \"all\"\n ],\n \"ExactMatch\": false\n },\n {\n \"Name\": \"Behavior\",\n \"Values\": [\n \"all\"\n ],\n \"ExactMatch\": false\n },\n {\n \"Name\": \"Type\",\n \"Values\": [\n \"all\"\n ],\n \"ExactMatch\": false\n }\n ],\n \"Id\": 100078461\n}",
983
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:49:58\\n/bin/sh -c #(nop) ENV ROOTPASSWD=2473\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:10\\n/bin/sh -c #(nop) ENV ROOTPASSWD=17666\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:08\\n/bin/sh -c #(nop) ENV ROOTPASSWD=17065\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:05\\n/bin/sh -c #(nop) ENV ROOTPASSWD=20419\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:03\\n/bin/sh -c #(nop) ENV ROOTPASSWD=6079\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:00\\n/bin/sh -c #(nop) ENV ROOTPASSWD=31991\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:49:53\\n/bin/sh -c #(nop) ENV ROOTPASSWD=19826\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:49:49\\n/bin/sh -c #(nop) ENV ROOTPASSWD=25831\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:49:51\\n/bin/sh -c #(nop) ENV ROOTPASSWD=19978\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:12\\n/bin/sh -c #(nop) ENV ROOTPASSWD=4883\",\n \"Level\": \"3\",\n \"Type\": 2\n }\n ],\n \"RequestId\": \"1c23b3e4-ea15-4705-990d-fe63890dc992\",\n \"TotalCount\": 658\n }\n}",
996
984
  "title": "镜像仓库查询镜像高危行为列表"
997
985
  }
998
986
  ],
999
987
  "DescribeAssetImageRegistryRiskListExport": [
1000
988
  {
1001
989
  "document": "",
1002
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRiskListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"Category\",\n \"VirusName\",\n \"Tags\"\n ],\n \"Id\": 123\n}",
1003
- "output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://xxx\"\n }\n}",
990
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRiskListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"Category\",\n \"VirusName\",\n \"Tags\"\n ],\n \"Id\": 1001\n}",
991
+ "output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
1004
992
  "title": "镜像仓库敏感信息列表导出"
1005
993
  }
1006
994
  ],
@@ -1013,16 +1001,16 @@
1013
1001
  },
1014
1002
  {
1015
1003
  "document": "镜像仓库查询一键镜像扫描状态",
1016
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryScanStatusOneKey\n<公共请求参数>\n\n{\n \"All\": true,\n \"TaskID\": 1\n}",
1017
- "output": "{\n \"Response\": {\n \"ImageTotal\": 1,\n \"ImageScanCnt\": 1,\n \"ImageStatus\": [\n {\n \"ImageId\": \"abc\",\n \"RegistryType\": \"abc\",\n \"ImageRepoAddress\": \"abc\",\n \"InstanceId\": \"abc\",\n \"InstanceName\": \"abc\",\n \"Namespace\": \"abc\",\n \"ImageName\": \"abc\",\n \"ImageTag\": \"abc\",\n \"ScanStatus\": \"abc\",\n \"CveProgress\": 1,\n \"RiskProgress\": 1,\n \"VirusProgress\": 1\n }\n ],\n \"SuccessCount\": 1,\n \"RiskCount\": 1,\n \"Schedule\": 1,\n \"Status\": \"abc\",\n \"ScanRemainTime\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1004
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryScanStatusOneKey\n<公共请求参数>\n\n{\n \"All\": true,\n \"TaskID\": 2257\n}",
1005
+ "output": "{\n \"Response\": {\n \"ImageScanCnt\": 0,\n \"ImageStatus\": [],\n \"ImageTotal\": 1,\n \"RequestId\": \"2d6532f3-28b8-4a99-863b-e178b3c5c416\",\n \"RiskCount\": 1,\n \"ScanRemainTime\": 0,\n \"Schedule\": 100,\n \"Status\": \"SCAN_TIMEOUT\",\n \"SuccessCount\": 0\n }\n}",
1018
1006
  "title": "镜像仓库查询一键镜像扫描状态"
1019
1007
  }
1020
1008
  ],
1021
1009
  "DescribeAssetImageRegistrySummary": [
1022
1010
  {
1023
1011
  "document": "",
1024
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistrySummary\n<公共请求参数>\n\n{}",
1025
- "output": "{\n \"Response\": {\n \"UnScannedImageCnt\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1012
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistrySummary\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"Name\": \"OnlyShowLatest\",\n \"ExactMatch\": true,\n \"Values\": [\n \"1\"\n ]\n }\n ]\n}",
1013
+ "output": "{\n \"Response\": {\n \"RequestId\": \"84bdc033-18ce-443a-9d61-8d5a099e6063\",\n \"UnScannedImageCnt\": 2\n }\n}",
1026
1014
  "title": "镜像仓库查询镜像统计信息"
1027
1015
  }
1028
1016
  ],
@@ -1037,8 +1025,8 @@
1037
1025
  "DescribeAssetImageRegistryVirusListExport": [
1038
1026
  {
1039
1027
  "document": "",
1040
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVirusListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"Category\",\n \"VirusName\",\n \"Tags\"\n ],\n \"Id\": 123\n}",
1041
- "output": "{\n \"Response\": {\n \"RequestId\": \"62e5c0e8-2cae-410a-8240-9cefbd419e08\",\n \"DownloadUrl\": \"https://xxx\"\n }\n}",
1028
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVirusListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"Category\",\n \"VirusName\",\n \"Tags\"\n ],\n \"Id\": 1001\n}",
1029
+ "output": "{\n \"Response\": {\n \"RequestId\": \"62e5c0e8-2cae-410a-8240-9cefbd419e08\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
1042
1030
  "title": "镜像仓库木马信息列表导出"
1043
1031
  }
1044
1032
  ],
@@ -1046,15 +1034,15 @@
1046
1034
  {
1047
1035
  "document": "",
1048
1036
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVulList\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"ExactMatch\": false,\n \"Name\": \"Level\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"Tag\",\n \"Values\": [\n \"all\"\n ]\n }\n ],\n \"Id\": 1929935,\n \"Limit\": 10,\n \"Offset\": 0\n}",
1049
- "output": "{\n \"Response\": {\n \"RequestId\": \"4ffca7b7-3d73-4317-8a76-a2b00e90f3b2\",\n \"List\": [],\n \"TotalCount\": 0\n }\n}",
1037
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AttackLevel\": 0,\n \"CVEID\": \"CVE-2019-5827\",\n \"Category\": \"OUT_OF_BOUNDS_WRITE\",\n \"CategoryType\": \"SYSTEM\",\n \"Component\": \"sqlite-libs\",\n \"Components\": [\n {\n \"FixedVersion\": \"0:3.26.0-15.el8\",\n \"Name\": \"sqlite-libs\",\n \"Path\": \"\",\n \"Type\": \"SYSTEM\",\n \"Version\": \"3.26.0-13.el8\"\n }\n ],\n \"CvssScore\": \"8.8\",\n \"CvssVector\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\n \"DefenseSolution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\",\n \"Des\": \"GoogleChrome是美国谷歌(Google)公司的一款Web浏览器。GoogleChrome74.0.3729.131之前版本中的SQLite存在安全漏洞。攻击者可借助特制的HTML页面利用该漏洞损坏堆。\",\n \"FixedVersions\": \"0:3.26.0-15.el8\",\n \"IsSuggest\": \"true\",\n \"LayerInfos\": [\n {\n \"LayerCmd\": \"/bin/sh -c #(nop) ADD file:805cb5e15fb6e0bb0326ca33fd2942e068863ce2a8491bb71522c652f31fb466 in / \",\n \"LayerId\": \"sha256:a1d0c75327776413fa0db9ed3adcdbadedc95a662eb1d360dad82bb913f8a1d1\"\n }\n ],\n \"Level\": \"3\",\n \"Name\": \"Google Chrome 输入验证错误漏洞\",\n \"OfficialSolution\": \"升级到最新无漏洞版本\",\n \"POCID\": \"pcmgr-209472\",\n \"Reference\": \"[\\\"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html\\\", \\\"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\\\", \\\"https://crbug.com/952406\\\", \\\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/\\\", \\\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/\\\", \\\"https://seclists.org/bugtraq/2019/Aug/19\\\", \\\"https://security.gentoo.org/glsa/202003-16\\\", \\\"https://usn.ubuntu.com/4205-1/\\\", \\\"https://www.debian.org/security/2019/dsa-4500\\\"]\",\n \"SubmitTime\": \"2019-06-28 09:15:00\",\n \"Tag\": [\n \"NETWORK\",\n \"SYS\",\n \"APP\"\n ],\n \"Version\": \"3.26.0-13.el8\"\n }\n ],\n \"RequestId\": \"c6abad1d-0c32-4fcc-af55-df63bf986470\",\n \"TotalCount\": 211\n }\n}",
1050
1038
  "title": "镜像仓库查询镜像漏洞列表"
1051
1039
  }
1052
1040
  ],
1053
1041
  "DescribeAssetImageRegistryVulListExport": [
1054
1042
  {
1055
1043
  "document": "",
1056
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVulListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"CVEId\",\n \"POCId\",\n \"Name\",\n \"Components\",\n \"Category\",\n \"CategoryType\",\n \"Level\",\n \"Des\",\n \"OfficialSolution\",\n \"Reference\",\n \"DefenseSolution\",\n \"SubmitTime\",\n \"CVSS_Score\",\n \"CVSS_Desc\"\n ],\n \"Id\": 123\n}",
1057
- "output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://xxx\"\n }\n}",
1044
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVulListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"CVEId\",\n \"POCId\",\n \"Name\",\n \"Components\",\n \"Category\",\n \"CategoryType\",\n \"Level\",\n \"Des\",\n \"OfficialSolution\",\n \"Reference\",\n \"DefenseSolution\",\n \"SubmitTime\",\n \"CVSS_Score\",\n \"CVSS_Desc\"\n ],\n \"Id\": 121\n}",
1045
+ "output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
1058
1046
  "title": "镜像仓库漏洞列表导出"
1059
1047
  }
1060
1048
  ],
@@ -1062,7 +1050,7 @@
1062
1050
  {
1063
1051
  "document": "查询镜像风险列表",
1064
1052
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRiskList\n<公共请求参数>\n\n{\n \"ImageID\": \"dskaldjskld\"\n}",
1065
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Behavior\": 3,\n \"Level\": 3,\n \"Type\": 2,\n \"Desc\": \"Dockerfile中存在账号密码、认证凭据等敏感信息\",\n \"InstructionContent\": \"/bin/sh -c #(nop) ENV PWD=postgresql://1.1.1.1:xxx@yyy\"\n },\n {\n \"Behavior\": 3,\n \"Level\": 3,\n \"Type\": 2,\n \"Desc\": \"Dockerfile中存在账号密码、认证凭据等敏感信息\",\n \"InstructionContent\": \"/bin/sh -c echo root:654321 | chpasswd\"\n }\n ],\n \"RequestId\": \"ff49ad4b-fe52-4f9d-8810-ba377eab9124\",\n \"TotalCount\": 6\n }\n}",
1053
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Behavior\": 3,\n \"Level\": 3,\n \"Type\": 2,\n \"Desc\": \"Dockerfile中存在账号密码、认证凭据等敏感信息\",\n \"InstructionContent\": \"/bin/sh -c #(nop) ENV PWD=postgresql\"\n },\n {\n \"Behavior\": 3,\n \"Level\": 3,\n \"Type\": 2,\n \"Desc\": \"Dockerfile中存在账号密码、认证凭据等敏感信息\",\n \"InstructionContent\": \"/bin/sh -c echo root:654321 | chpasswd\"\n }\n ],\n \"RequestId\": \"ff49ad4b-fe52-4f9d-8810-ba377eab9124\",\n \"TotalCount\": 6\n }\n}",
1066
1054
  "title": "查询镜像风险列表"
1067
1055
  }
1068
1056
  ],
@@ -1094,7 +1082,7 @@
1094
1082
  {
1095
1083
  "document": "查询正在一键扫描的镜像扫描taskid",
1096
1084
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageScanTask\n<公共请求参数>\n\n{}",
1097
- "output": "{\n \"Response\": {\n \"TaskID\": \"abc\",\n \"LastScanTime\": \"abc\",\n \"Status\": \"abc\",\n \"SubStatus\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
1085
+ "output": "{\n \"Response\": {\n \"LastScanTime\": \"2024-10-11 14:34:15\",\n \"RequestId\": \"ebdffbc4-bf83-4e25-bc4c-8ada17cc0481\",\n \"Status\": \"END\",\n \"SubStatus\": \"Cancel\",\n \"TaskID\": \"10000504\"\n }\n}",
1098
1086
  "title": "查询正在一键扫描的镜像扫描taskid"
1099
1087
  }
1100
1088
  ],
@@ -1110,7 +1098,7 @@
1110
1098
  {
1111
1099
  "document": "查询镜像病毒列表",
1112
1100
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageVirusList\n<公共请求参数>\n\n{\n \"ImageID\": \"dskaldjskld\"\n}",
1113
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"FirstScanTime\": \"xx\",\n \"Tags\": [\n \"xx\"\n ],\n \"RiskLevel\": 1,\n \"VirusName\": \"xx\",\n \"Solution\": \"xx\",\n \"FileName\": \"xx\",\n \"Md5\": \"xx\",\n \"LatestScanTime\": \"xx\",\n \"Path\": \"xx\",\n \"Size\": 1,\n \"Desc\": \"xx\",\n \"CheckPlatform\": [\n \"xx\"\n ]\n }\n ],\n \"RequestId\": \"xx\",\n \"VirusScanStatus\": 1\n }\n}",
1101
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"CheckPlatform\": [],\n \"Desc\": \"发现容器上存在恶意木马,您的容器可能已经失陷。\\n恶意木马通常会执行挖矿、文件删除、信息窃取和网络攻击等恶意行为。\",\n \"FileName\": \"webshell_2.php\",\n \"FirstScanTime\": \"2024-09-02 07:36:15\",\n \"LatestScanTime\": \"2024-10-23 16:40:54\",\n \"Md5\": \"27501aaed5e639693783321219989889\",\n \"Path\": \"/root/webshell_2.php\",\n \"RiskLevel\": 4,\n \"Size\": 51,\n \"Solution\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [],\n \"VirusName\": \"Php.Trojan.Php.Ssmw\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"VirusScanStatus\": 1\n }\n}",
1114
1102
  "title": "查询镜像病毒列表"
1115
1103
  }
1116
1104
  ],
@@ -1126,7 +1114,7 @@
1126
1114
  {
1127
1115
  "document": "",
1128
1116
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageVulList\n<公共请求参数>\n\n{\n \"ImageID\": \"csnjkcnshj\"\n}",
1129
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"Category\": \"xx\",\n \"CVEID\": \"xx\",\n \"Tag\": [\n \"xx\"\n ],\n \"Name\": \"xx\",\n \"Reference\": \"xx\",\n \"Level\": 1,\n \"FixedVersions\": \"xx\",\n \"CVSSV3Score\": 10,\n \"Des\": \"xx\",\n \"Component\": \"xx\",\n \"IsSuggest\": true,\n \"SubmitTime\": \"xx\",\n \"Version\": \"xx\",\n \"DefenseSolution\": \"xx\",\n \"OfficialSolution\": \"xx\",\n \"CategoryType\": \"xx\",\n \"CVSSV3Desc\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1117
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"AttackLevel\": 0,\n \"CVEID\": \"CVE-2016-5131\",\n \"CVSSV3Desc\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\n \"CVSSV3Score\": 8.8,\n \"Category\": \"CODE_INJECTION\",\n \"CategoryType\": \"SYSTEM\",\n \"Component\": \"libxml2\",\n \"DefenseSolution\": \"建议您更新当前系统或软件至最新版,完成漏洞的修复。\",\n \"Des\": \"GoogleChrome是美国谷歌(Google)公司开发的一款Web浏览器。Libxml2是其中的一个基于C语言的用来解析XML文档的函数库组件。GoogleChrome52.0.2743.82之前版本中使用的libxml22.9.4及之前的版本存在释放后重用漏洞。远程攻击者可利用该漏洞造成拒绝服务。\",\n \"FixedVersions\": \"0:2.9.1-6.tl2.4\",\n \"IsSuggest\": true,\n \"Level\": 2,\n \"Name\": \"libxml2 释放后重用漏洞 (CVE-2016-5131)\",\n \"OfficialSolution\": \"升级到最新无漏洞版本\",\n \"Reference\": \"[\\\"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html\\\", \\\"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html\\\", \\\"http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html\\\", \\\"http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html\\\", \\\"http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html\\\", \\\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html\\\", \\\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html\\\", \\\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html\\\", \\\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html\\\", \\\"http://rhn.redhat.com/errata/RHSA-2016-1485.html\\\", \\\"http://www.debian.org/security/2016/dsa-3637\\\", \\\"http://www.securityfocus.com/bid/92053\\\", \\\"http://www.securitytracker.com/id/1036428\\\", \\\"http://www.securitytracker.com/id/1038623\\\", \\\"http://www.ubuntu.com/usn/USN-3041-1\\\", \\\"https://bugzilla.redhat.com/show_bug.cgi?id=1358641\\\", \\\"https://codereview.chromiu\\\"]\",\n \"SubmitTime\": \"2016-07-24T11:59:00+08:00\",\n \"Tag\": [\n \"NETWORK\"\n ],\n \"Version\": \"2.9.1-6.tl2.3\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1130
1118
  "title": "查询镜像漏洞列表"
1131
1119
  }
1132
1120
  ],
@@ -1142,7 +1130,7 @@
1142
1130
  {
1143
1131
  "document": "查询端口占用列表",
1144
1132
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetPortList\n<公共请求参数>\n\n{}",
1145
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Type\": \"abc\",\n \"PublicIP\": \"abc\",\n \"PublicPort\": 1,\n \"ContainerPort\": 1,\n \"ContainerPID\": 1,\n \"ContainerName\": \"abc\",\n \"HostID\": \"abc\",\n \"HostIP\": \"abc\",\n \"ProcessName\": \"abc\",\n \"ListenContainer\": \"abc\",\n \"ListenHost\": \"abc\",\n \"RunAs\": \"abc\",\n \"HostName\": \"abc\",\n \"PublicIp\": \"abc\",\n \"NodeID\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodName\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeUniqueID\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1133
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ContainerName\": \"容器名称\",\n \"ContainerPID\": 1,\n \"ContainerPort\": 8080,\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"tke_cls-111111\",\n \"ListenContainer\": \"tcp://:::8080\",\n \"ListenHost\": \"\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"sh\",\n \"PublicIP\": \"-\",\n \"PublicIp\": \"1.1.1.1\",\n \"PublicPort\": 0,\n \"RunAs\": \"root:root\",\n \"Type\": \"tcp\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1146
1134
  "title": "查询端口占用列表"
1147
1135
  }
1148
1136
  ],
@@ -1150,7 +1138,7 @@
1150
1138
  {
1151
1139
  "document": "查询进程列表",
1152
1140
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetProcessList\n<公共请求参数>\n\n{}",
1153
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"StartTime\": \"abc\",\n \"RunAs\": \"abc\",\n \"CmdLine\": \"abc\",\n \"Exe\": \"abc\",\n \"PID\": 1,\n \"ContainerPID\": 1,\n \"ContainerName\": \"abc\",\n \"HostID\": \"abc\",\n \"HostIP\": \"abc\",\n \"ProcessName\": \"abc\",\n \"HostName\": \"abc\",\n \"PublicIp\": \"abc\",\n \"NodeID\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodName\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeUniqueID\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1141
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CmdLine\": \"/bin/bash\",\n \"ContainerName\": \"/srv_test\",\n \"ContainerPID\": 1,\n \"Exe\": \"/usr/bin/bash\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PID\": 834,\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"bash\",\n \"PublicIp\": \"1.1.1.1\",\n \"RunAs\": \"root:root\",\n \"StartTime\": \"2024-10-17 15:00:47 +0000 UTC\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1154
1142
  "title": "查询进程列表"
1155
1143
  }
1156
1144
  ],
@@ -1158,7 +1146,7 @@
1158
1146
  {
1159
1147
  "document": "查询账户容器、镜像等统计信息",
1160
1148
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetSummary\n<公共请求参数>\n\n{}",
1161
- "output": "{\n \"Response\": {\n \"AppCnt\": 1,\n \"ContainerCnt\": 1,\n \"ContainerPause\": 1,\n \"ContainerRunning\": 1,\n \"ContainerStop\": 1,\n \"CreateTime\": \"abc\",\n \"DbCnt\": 1,\n \"ImageCnt\": 1,\n \"HostOnline\": 1,\n \"HostCnt\": 1,\n \"ImageHasRiskInfoCnt\": 1,\n \"ImageHasVirusCnt\": 1,\n \"ImageHasVulsCnt\": 1,\n \"ImageUntrustCnt\": 1,\n \"ListenPortCnt\": 1,\n \"ProcessCnt\": 1,\n \"WebServiceCnt\": 1,\n \"LatestImageScanTime\": \"abc\",\n \"ImageUnsafeCnt\": 1,\n \"HostUnInstallCnt\": 1,\n \"SuperNodeCnt\": 1,\n \"SuperNodeRunningCnt\": 1,\n \"TodayNewImageCnt\": 1,\n \"TodayUnsafeImageCnt\": 1,\n \"RecommendedFixImageCnt\": 1,\n \"ScannedImageCnt\": 1,\n \"UnScannedImageCnt\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1149
+ "output": "{\n \"Response\": {\n \"AppCnt\": 926,\n \"ContainerCnt\": 1453849,\n \"ContainerPause\": 239,\n \"ContainerRunning\": 1275740,\n \"ContainerStop\": 175512,\n \"CreateTime\": \"2021-06-04 17:24:40\",\n \"DbCnt\": 41,\n \"HostCnt\": 57,\n \"HostOnline\": 42,\n \"HostUnInstallCnt\": 2,\n \"ImageCnt\": 6859,\n \"ImageHasRiskInfoCnt\": 33,\n \"ImageHasVirusCnt\": 196,\n \"ImageHasVulsCnt\": 1833,\n \"ImageUnsafeCnt\": 1833,\n \"ImageUntrustCnt\": 6246,\n \"LatestImageScanTime\": \"2024-10-30 02:02:24\",\n \"ListenPortCnt\": 1390,\n \"ProcessCnt\": 4398,\n \"RecommendedFixImageCnt\": 12,\n \"RequestId\": \"c409c2f3-eaa0-4732-8f2b-e585c2515f3e\",\n \"ScannedImageCnt\": 733,\n \"SuperNodeCnt\": 30,\n \"SuperNodeRunningCnt\": 30,\n \"TodayNewImageCnt\": 0,\n \"TodayUnsafeImageCnt\": 0,\n \"UnScannedImageCnt\": 12,\n \"WebServiceCnt\": 35\n }\n}",
1162
1150
  "title": "查询账户容器、镜像等统计信息"
1163
1151
  }
1164
1152
  ],
@@ -1166,7 +1154,7 @@
1166
1154
  {
1167
1155
  "document": "查询超级节点列表",
1168
1156
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetSuperNodeList\n<公共请求参数>\n\n{}",
1169
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"NodeID\": \"abc\",\n \"NodeName\": \"abc\",\n \"ClusterName\": \"abc\",\n \"ClusterID\": \"abc\",\n \"Status\": \"abc\",\n \"SubNetID\": \"abc\",\n \"SubNetName\": \"abc\",\n \"SubNetCidr\": \"abc\",\n \"ZoneID\": \"abc\",\n \"Zone\": \"abc\",\n \"CreateTime\": \"abc\",\n \"RelatePodCount\": 1,\n \"RelateContainerCount\": 1,\n \"AgentStatus\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"ClusterAccessedStatus\": \"abc\",\n \"ChargeCoresCnt\": 1,\n \"DefendStatus\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1157
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"NodeID\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"NodeName\": \"web-node1\",\n \"ClusterName\": \"web-cluster\",\n \"ClusterID\": \"cls-sdfsdf\",\n \"Status\": \"Running\",\n \"SubNetID\": \"subnet-sdfsd\",\n \"SubNetName\": \"web-node1\",\n \"SubNetCidr\": \"10.0.1.0/24\",\n \"ZoneID\": \"ap-guangzhou-6\",\n \"Zone\": \"ap-guangzhou\",\n \"CreateTime\": \"2024-10-30 10:40:41\",\n \"RelatePodCount\": 1,\n \"RelateContainerCount\": 1,\n \"AgentStatus\": \"UNINSTALL\",\n \"NodeUniqueID\": \"392f05bd-bf86-4911-8cf9-b8c2afd445cd4\",\n \"ClusterAccessedStatus\": \"AccessedDefended\",\n \"ChargeCoresCnt\": 1,\n \"DefendStatus\": \"Defended\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb9b65c768\"\n }\n}",
1170
1158
  "title": "DescribeAssetSuperNodeList"
1171
1159
  }
1172
1160
  ],
@@ -1174,7 +1162,7 @@
1174
1162
  {
1175
1163
  "document": "",
1176
1164
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAssetSyncLastTime\n&<公共请求参数>",
1177
- "output": "{\n \"Response\": {\n \"AssetSyncLastTime\": \"abc\",\n \"TaskStatus\": \"abc\",\n \"TaskProcess\": 0,\n \"RequestId\": \"abc\"\n }\n}",
1165
+ "output": "{\n \"Response\": {\n \"AssetSyncLastTime\": \"2024-10-30 11:48:49\",\n \"TaskStatus\": \"PROCESSED\",\n \"TaskProcess\": 10,\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb918846666\"\n }\n}",
1178
1166
  "title": "查询资产同步最近时间"
1179
1167
  }
1180
1168
  ],
@@ -1182,7 +1170,7 @@
1182
1170
  {
1183
1171
  "document": "查询web服务列表",
1184
1172
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetWebServiceList\n<公共请求参数>\n\n{}",
1185
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ServiceID\": \"abc\",\n \"HostID\": \"abc\",\n \"HostIP\": \"abc\",\n \"ContainerName\": \"abc\",\n \"Type\": \"abc\",\n \"Version\": \"abc\",\n \"RunAs\": \"abc\",\n \"Listen\": [\n \"abc\"\n ],\n \"Config\": \"abc\",\n \"ProcessCnt\": 1,\n \"AccessLog\": \"abc\",\n \"ErrorLog\": \"abc\",\n \"DataPath\": \"abc\",\n \"WebRoot\": \"abc\",\n \"Pids\": [\n 1\n ],\n \"MainType\": \"abc\",\n \"Exe\": \"abc\",\n \"Parameter\": \"abc\",\n \"ContainerId\": \"abc\",\n \"HostName\": \"abc\",\n \"PublicIp\": \"abc\",\n \"NodeID\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodName\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeUniqueID\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1173
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"\",\n \"Config\": \"/etc/nginx/nginx.conf\",\n \"ContainerId\": \"dbbd1295d632365\",\n \"ContainerName\": \"/container_name\",\n \"DataPath\": \"\",\n \"ErrorLog\": \"\",\n \"Exe\": \"/usr/sbin/nginx\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"Listen\": [\n \"tcp://0.0.0.0:8080\"\n ],\n \"MainType\": \"web\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"Parameter\": \"nginx: master process nginx -g daemon off;\",\n \"Pids\": [\n 1,\n 2\n ],\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"1.1.1.1\",\n \"RunAs\": \":\",\n \"ServiceID\": \"27501aaed5e639693783321219989889\",\n \"Type\": \"Nginx\",\n \"Version\": \"1.22.0\",\n \"WebRoot\": \"/usr/share/nginx/html\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1186
1174
  "title": "查询web服务列表"
1187
1175
  }
1188
1176
  ],
@@ -1190,15 +1178,15 @@
1190
1178
  {
1191
1179
  "document": "",
1192
1180
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAutoAuthorizedRuleHost\n&RuleId=1\n&<公共请求参数>",
1193
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"Status\": \"xx\",\n \"PublicIp\": \"xx\",\n \"HostID\": \"xx\",\n \"MachineType\": \"xx\",\n \"DockerVersion\": \"xx\",\n \"InstanceID\": \"xx\",\n \"HostName\": \"xx\",\n \"ImageCnt\": 1,\n \"HostIP\": \"xx\",\n \"ContainerCnt\": 1\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1181
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"ContainerCnt\": 2,\n \"DockerVersion\": \"19.03.9\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"ImageCnt\": 1,\n \"InstanceID\": \"ins-8bc803fd\",\n \"MachineType\": \"CVM\",\n \"PublicIp\": \"1.1.1.1\",\n \"Status\": \"ONLINE\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1194
1182
  "title": "查询自动授权规则授权范围主机信息"
1195
1183
  }
1196
1184
  ],
1197
1185
  "DescribeCheckItemList": [
1198
1186
  {
1199
1187
  "document": "",
1200
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCheckItemList\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1201
- "output": "{\n \"Response\": {\n \"ClusterCheckItems\": [\n {\n \"CheckItemId\": 0,\n \"Name\": \"abc\",\n \"ItemDetail\": \"abc\",\n \"RiskLevel\": \"abc\",\n \"RiskTarget\": \"abc\",\n \"RiskType\": \"abc\",\n \"RiskAttribute\": \"abc\",\n \"RiskProperty\": \"abc\",\n \"CVENumber\": \"abc\",\n \"DiscoverTime\": \"abc\",\n \"Solution\": \"abc\",\n \"CVSS\": \"abc\",\n \"CVSSScore\": \"abc\",\n \"RelateLink\": \"abc\",\n \"AffectedType\": \"abc\",\n \"AffectedVersion\": \"abc\",\n \"IgnoredAssetNum\": 0,\n \"IsIgnored\": true,\n \"RiskAssessment\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1188
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCheckItemList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": []\n}",
1189
+ "output": "{\n \"Response\": {\n \"ClusterCheckItems\": [\n {\n \"AffectedType\": \"Workload\",\n \"AffectedVersion\": \"所有\",\n \"CVENumber\": \"\",\n \"CVSS\": \"\",\n \"CVSSScore\": \"0\",\n \"CheckItemId\": 10280,\n \"DiscoverTime\": \"2023-08-11 11:18:23\",\n \"IgnoredAssetNum\": 0,\n \"IsIgnored\": false,\n \"ItemDetail\": \"default ServiceAccount禁止授予写入/修改权限\",\n \"Name\": \"禁止授予ServiceAccount default写入/修改权限\",\n \"RelateLink\": \"\",\n \"RiskAssessment\": \"\",\n \"RiskAttribute\": \"MaliciousTampering\",\n \"RiskLevel\": \"High\",\n \"RiskProperty\": \"\",\n \"RiskTarget\": \"RBAC\",\n \"RiskType\": \"ConfigRisk\",\n \"Solution\": \"确保 default 名称的ServiceAccount禁止授予写入/修改权限\"\n }\n ],\n \"RequestId\": \"3d286d4b-8df0-4247-af69-02b510fac784\",\n \"TotalCount\": 163\n }\n}",
1202
1190
  "title": "查询所有检查项示例"
1203
1191
  }
1204
1192
  ],
@@ -1206,15 +1194,15 @@
1206
1194
  {
1207
1195
  "document": "查询集群的详细信息",
1208
1196
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterDetail\n<公共请求参数>\n\n{\n \"ClusterId\": \"b6ebf065d08563396da66bf0950cba8c\"\n}",
1209
- "output": "{\n \"Response\": {\n \"RequestId\": \"6c4a3216-1849-48d1-b02c-bb83801044b6\",\n \"ClusterId\": \"b6ebf065d08563396da66bf0950cba8c\",\n \"ClusterName\": \"wk-usercluster-test\",\n \"ScanTaskProgress\": 0,\n \"ClusterVersion\": \"v1.20.6-tke.12\",\n \"ContainerRuntime\": \"docker://19.3.9\",\n \"ClusterNodeNum\": 4,\n \"ClusterStatus\": \"Running\",\n \"DefenderStatus\": \"Defender_Normal\",\n \"ClusterType\": \"Kubernetes\",\n \"Region\": \"ap-guangzhou\",\n \"SeriousRiskCount\": 0,\n \"HighRiskCount\": 0,\n \"MiddleRiskCount\": 0,\n \"HintRiskCount\": 0,\n \"CheckStatus\": \"Task_Running\",\n \"TaskCreateTime\": \"2022-05-06 11:03:19\",\n \"NetworkType\": \"PublicNetwork\",\n \"ApiServerAddress\": \"https://xxxx:60002\",\n \"NodeCount\": 4,\n \"NamespaceCount\": 0,\n \"WorkloadCount\": 0,\n \"PodCount\": 0,\n \"ServiceCount\": 0,\n \"IngressCount\": 0,\n \"MasterIps\": \"127.0.0.1;127.0.0.2;\"\n }\n}",
1197
+ "output": "{\n \"Response\": {\n \"ApiServerAddress\": \"\",\n \"CheckStatus\": \"HasRisk\",\n \"ClusterId\": \"57153b3ea9483f46f5dd9a0052cad265\",\n \"ClusterName\": \"benben-tcss\",\n \"ClusterNodeNum\": 1,\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterSubStatus\": \"\",\n \"ClusterType\": \"USER_CREATE_CLUSTER\",\n \"ClusterVersion\": \"v1.25.13\",\n \"ContainerRuntime\": \"docker://26.1.4\",\n \"DefenderStatus\": \"\",\n \"HighRiskCount\": 8,\n \"HintRiskCount\": 3,\n \"IngressCount\": 0,\n \"MasterIps\": \"172.16.64.12;\",\n \"MiddleRiskCount\": 9,\n \"NamespaceCount\": 7,\n \"NetworkType\": \"\",\n \"NodeCount\": 1,\n \"PodCount\": 15,\n \"Region\": \"ap-guangzhou\",\n \"RequestId\": \"7d65a8f8-2a92-4291-9e18-10a9d6a31382\",\n \"ScanTaskProgress\": 100,\n \"SeriousRiskCount\": 0,\n \"ServiceCount\": 2,\n \"TaskCreateTime\": \"2024-10-29 12:59:55\",\n \"WorkloadCount\": 10\n }\n}",
1210
1198
  "title": "查询集群详情"
1211
1199
  }
1212
1200
  ],
1213
1201
  "DescribeClusterNodes": [
1214
1202
  {
1215
1203
  "document": "查询集群节点信息",
1216
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterNodes\n<公共请求参数>\n\n{\n \"ClusterId\": \"abc\",\n \"Offset\": 1,\n \"Limit\": 1,\n \"Filters\": [\n {\n \"Name\": \"abc\",\n \"Values\": [\n \"abc\"\n ],\n \"ExactMatch\": true\n }\n ],\n \"By\": \"abc\",\n \"Order\": \"abc\"\n}",
1217
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"ClusterNodeList\": [\n {\n \"InstanceId\": \"abc\",\n \"PrivateIpAddresses\": \"abc\",\n \"InstanceRole\": \"abc\",\n \"InstanceState\": \"abc\",\n \"NodeName\": \"abc\",\n \"AgentStatus\": \"abc\",\n \"PublicIP\": \"abc\",\n \"HostID\": \"abc\",\n \"MachineType\": \"abc\",\n \"NodeType\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
1204
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterNodes\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"ClusterId\": \"cls-abhq0j4o\",\n \"Filters\": []\n}",
1205
+ "output": "{\n \"Response\": {\n \"ClusterNodeList\": [\n {\n \"AgentStatus\": \"ONLINE\",\n \"ChargeCoresCnt\": 0,\n \"DefendStatus\": \"UnDefended\",\n \"HostID\": \"d4cfa6cc-a6a5-49da-a050-cb5892f60e3f\",\n \"InstanceId\": \"ins-qj24hgj0\",\n \"InstanceRole\": \"MASTER\",\n \"InstanceState\": \"Running\",\n \"MachineType\": \"CVM\",\n \"NodeName\": \"tke_cls-abhq0j4o_master_etcd1\",\n \"NodeType\": \"NORMAL\",\n \"PrivateIpAddresses\": \"10.0.0.14\",\n \"PublicIP\": \"119.29.217.177\",\n \"UUID\": \"d4cfa6cc-a6a5-49da-a050-cb5892f60e3f\"\n }\n ],\n \"RequestId\": \"c803edab-2a2d-4274-917c-8dd0a806e53d\",\n \"TotalCount\": 4\n }\n}",
1218
1206
  "title": "查询集群节点信息"
1219
1207
  }
1220
1208
  ],
@@ -1222,7 +1210,7 @@
1222
1210
  {
1223
1211
  "document": "查询用户集群资产总览示例",
1224
1212
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterSummary\n<公共请求参数>\n\n{}",
1225
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RiskClusterCount\": 1,\n \"UncheckClusterCount\": 1,\n \"ManagedClusterCount\": 1,\n \"IndependentClusterCount\": 1,\n \"NoRiskClusterCount\": 1,\n \"CheckedClusterCount\": 1,\n \"AutoCheckClusterCount\": 1,\n \"ManualCheckClusterCount\": 1,\n \"FailedClusterCount\": 1,\n \"NotImportedClusterCount\": 1,\n \"ServerlessClusterCount\": 1,\n \"TkeClusterCount\": 1,\n \"UserCreateTencentClusterCount\": 1,\n \"UserCreateHybridClusterCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1213
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RiskClusterCount\": 1,\n \"UncheckClusterCount\": 1,\n \"ManagedClusterCount\": 1,\n \"IndependentClusterCount\": 1,\n \"NoRiskClusterCount\": 1,\n \"CheckedClusterCount\": 1,\n \"AutoCheckClusterCount\": 1,\n \"ManualCheckClusterCount\": 1,\n \"FailedClusterCount\": 1,\n \"NotImportedClusterCount\": 1,\n \"ServerlessClusterCount\": 1,\n \"TkeClusterCount\": 1,\n \"UserCreateTencentClusterCount\": 1,\n \"UserCreateHybridClusterCount\": 1,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
1226
1214
  "title": "查询用户集群资产总览示例"
1227
1215
  }
1228
1216
  ],
@@ -1237,8 +1225,8 @@
1237
1225
  "DescribeComplianceAssetList": [
1238
1226
  {
1239
1227
  "document": "",
1240
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceAssetList\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINDER\"\n ],\n \"Offset\": 0,\n \"Limit\": 10\n}",
1241
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TotalCount\": 1,\n \"AssetInfoList\": [\n {\n \"CustomerAssetId\": 123456789,\n \"AssetType\": \"ASSET_CONTAINDER\",\n \"AssetName\": \"happy-jekins\",\n \"NodeName\": \"worker-node-1\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"LastCheckTime\": \"2021-04-02 16:42:00\",\n \"PassedPolicyItemCount\": 100,\n \"FailedPolicyItemCount\": 10,\n \"CheckResult\": \"RESULT_PASSED\"\n }\n ]\n }\n}",
1228
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceAssetList\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINDER\"\n ],\n \"Offset\": 0,\n \"Limit\": 1\n}",
1229
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"AssetInfoList\": [\n {\n \"CustomerAssetId\": 14343206,\n \"AssetType\": \"ASSET_CONTAINER\",\n \"AssetName\": \"name-asset\",\n \"ImageTag\": \"latest\",\n \"HostIP\": \"172.16.0.1\",\n \"NodeName\": \"node-1\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"PassedPolicyItemCount\": 1,\n \"FailedPolicyItemCount\": 1,\n \"LastCheckTime\": \"2020-09-22 00:00:00\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"InstanceId\": \"ins-busi1\",\n \"ImageRegistryInfo\": {\n \"Name\": \"registry1\",\n \"Type\": \"habor\",\n \"Address\": \"http://1.1.1.2\"\n },\n \"ClusterID\": \"cluster-busi1\",\n \"ClusterName\": \"cluster1\"\n }\n ],\n \"RequestId\": \"1e6c6a5d-740b-40f5-8685-47467df4df45\"\n }\n}",
1242
1230
  "title": "查询某类资产的列表"
1243
1231
  }
1244
1232
  ],
@@ -1254,23 +1242,23 @@
1254
1242
  {
1255
1243
  "document": "基线设置 查询定时任务列表",
1256
1244
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePeriodTaskList\n<公共请求参数>\n\n{\n \"AssetType\": \"ASSET_CONTAINER\",\n \"Offset\": 0,\n \"Limit\": 2\n}",
1257
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TotalCount\": 1,\n \"PeriodTaskSet\": [\n {\n \"PeriodTaskId\": 123,\n \"AssetType\": \"xxxx\",\n \"PeriodRule\": {\n \"ExecutionTime\": \"xx\",\n \"Frequency\": 1\n },\n \"LastTriggerTime\": \"YYYY-MM-DD HH:mm:SS\",\n \"TotalPolicyItemCount\": 123,\n \"BenchmarkStandardSet\": [\n {\n \"StandardId\": 12345,\n \"Name\": \"CIS Docker\",\n \"Description\": \"CIS Docker\",\n \"PolicyItemCount\": 123,\n \"Enabled\": true\n }\n ]\n }\n ]\n }\n}",
1245
+ "output": "{\n \"Response\": {\n \"RequestId\": \"3e6756ce-6512-498d-a9fd-8572ef4ce7d3\",\n \"TotalCount\": 1,\n \"PeriodTaskSet\": [\n {\n \"PeriodTaskId\": 456,\n \"AssetType\": \"ASSET_CONTAINER\",\n \"PeriodRule\": {\n \"ExecutionTime\": \"2006-01-02 15:04:05\",\n \"Frequency\": 1\n },\n \"LastTriggerTime\": \"2006-01-02 15:04:05\",\n \"TotalPolicyItemCount\": 345634,\n \"BenchmarkStandardSet\": [\n {\n \"StandardId\": 2342,\n \"Name\": \"CIS Docker\",\n \"Description\": \"CIS Docker\",\n \"PolicyItemCount\": 666,\n \"Enabled\": true\n }\n ]\n }\n ]\n }\n}",
1258
1246
  "title": "查询定时任务列表"
1259
1247
  }
1260
1248
  ],
1261
1249
  "DescribeCompliancePolicyItemAffectedAssetList": [
1262
1250
  {
1263
1251
  "document": "",
1264
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePolicyItemAffectedAssetList\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 12345,\n \"Offset\": 1000,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"NodeName\",\n \"Values\": [\n \"node-1\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
1265
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TotalCount\": 10,\n \"AffectedAssetList\": [\n {\n \"CustomerAssetId\": 10001,\n \"AssetName\": \"happy-jenkins\",\n \"AssetType\": \"ASSET_CONTAINDER\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"NodeName\": \"worker-node-1\",\n \"LastCheckTime\": \"2021-04-02 16:42:00\",\n \"CheckResult\": \"RESULT_PASSED\"\n }\n ]\n }\n}",
1252
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePolicyItemAffectedAssetList\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 45675,\n \"Offset\": 1000,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"NodeName\",\n \"Values\": [\n \"node-1\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
1253
+ "output": "{\n \"Response\": {\n \"AffectedAssetList\": [\n {\n \"AssetName\": \"hyperkube\",\n \"AssetType\": \"ASSET_IMAGE\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"ClusterID\": \"cls-5licssbi\",\n \"ClusterName\": \"piper-容器告警接入安全中心测试\",\n \"CustomerAssetId\": 1001005017196,\n \"HostIP\": \"172.17.1.53\",\n \"ImageRegistryInfo\": {\n \"Address\": \"\",\n \"Name\": \"\",\n \"Type\": \"\"\n },\n \"ImageTag\": \"v1.22.5-tke.27-rc1\",\n \"InstanceId\": \"ins-4bi3i496\",\n \"LastCheckTime\": \"2024-10-29 02:02:18\",\n \"NodeName\": \"as-tke-np-7lmwo8pi\",\n \"VerifyInfo\": \"sha256:f5b7776211ac931c484d203db03ed67e8b2dd44e0697119d02796a7d50041bcf:User=\"\n }\n ],\n \"RequestId\": \"dce87f72-d7ad-4ed4-8cd4-688a8464aad3\",\n \"TotalCount\": 186\n }\n}",
1266
1254
  "title": "查询检测项影响的资产列表"
1267
1255
  }
1268
1256
  ],
1269
1257
  "DescribeCompliancePolicyItemAffectedSummary": [
1270
1258
  {
1271
1259
  "document": "",
1272
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePolicyItemAffectedSummary\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 12345\n}",
1273
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"PolicyItemSummary\": {\n \"CustomerPolicyItemId\": 10001,\n \"BasePolicyItemId\": 1,\n \"Name\": \"审计Docker文件和目录\",\n \"Category\": \"xxx\",\n \"BenchmarkStandardName\": \"CIS_Docker\",\n \"BenchmarkStandardId\": 123,\n \"RiskLevel\": \"xx\",\n \"AssetType\": \"xxx\",\n \"CheckStatus\": \"\",\n \"CheckResult\": \"xx\",\n \"LastCheckTime\": \"2020-09-22 00:00:00\",\n \"PassedAssetCount\": 100,\n \"FailedAssetCount\": 20,\n \"WhitelistId\": 12345,\n \"FixSuggestion\": \"xxxx\"\n }\n }\n}",
1260
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePolicyItemAffectedSummary\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 474567\n}",
1261
+ "output": "{\n \"Response\": {\n \"PolicyItemSummary\": {\n \"ApplicableVersion\": \"docker 1.11-1.13, 17.12-20.10.2\",\n \"AssetType\": \"ASSET_IMAGE\",\n \"AuditProcedure\": \"执行以下命令审计\\ndocker ps --quiet | xargs --max-args=1 -I{} docker exec {} cat /proc/1/status | grep '^Uid:' | awk '{print $3}'\",\n \"BasePolicyItemId\": 178,\n \"BenchmarkStandardId\": 2,\n \"BenchmarkStandardName\": \"CIS Docker\",\n \"Category\": \"CATEGORY_DOCKER_IMAGES_BUILD_FILE\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerPolicyItemId\": 5914,\n \"Description\": \"在可能的情况下,最好以非root用户的身份运行容器。\",\n \"FailedAssetCount\": 208,\n \"FixSuggestion\": \"确保容器镜像的Dockerfile包含以下指令:USER <用户名或ID> 其中用户名或ID是指可以在容器基础镜像中找到的用户。 如果在容器基础镜像中没有创建特定用户,则在USER指令之前添加useradd命令以添加特定用户。例如,在Dockerfile中创建用户:RUN useradd -d /home/username -m -s /bin/bash username USER username注意:如果镜像中有容器不需要的用户,请考虑删除它们。 删除这些用户后,提交镜像,然后生成新的容器实例以供使用。\",\n \"IsEnable\": 0,\n \"LastCheckTime\": \"2024-10-30 02:02:09\",\n \"Name\": \"确保创建使用容器的用户\",\n \"PassedAssetCount\": 0,\n \"RiskLevel\": \"1\",\n \"WhitelistId\": 0\n },\n \"RequestId\": \"3e8b4c60-58ba-4acc-97fc-33f086c7a3bb\"\n }\n}",
1274
1262
  "title": "查询某检测项影响的信息"
1275
1263
  }
1276
1264
  ],
@@ -1278,7 +1266,7 @@
1278
1266
  {
1279
1267
  "document": "",
1280
1268
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceScanFailedAssetList\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINER\"\n ],\n \"Offset\": 0,\n \"Limit\": 10\n}",
1281
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TotalCount\": 1,\n \"ScanFailedAssetList\": [\n {\n \"CustomerAssetId\": 123456789,\n \"AssetType\": \"ASSET_CONTAINDER\",\n \"AssetName\": \"happy-jenkins\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CheckTime\": \"2021-04-02 16:42:00\",\n \"FailureReason\": \"发生一些预料之外的情况\",\n \"Suggestion\": \"尝试重试\"\n }\n ]\n }\n}",
1269
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TotalCount\": 1,\n \"ScanFailedAssetList\": [\n {\n \"CustomerAssetId\": 111456789,\n \"AssetType\": \"ASSET_CONTAINDER\",\n \"AssetName\": \"happy-jenkins\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CheckTime\": \"2021-04-02 16:42:00\",\n \"FailureReason\": \"发生一些预料之外的情况\",\n \"Suggestion\": \"尝试重试\"\n }\n ]\n }\n}",
1282
1270
  "title": "查询上次检测失败的资产的列表"
1283
1271
  }
1284
1272
  ],
@@ -1286,15 +1274,15 @@
1286
1274
  {
1287
1275
  "document": "",
1288
1276
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceTaskAssetSummary\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINER\"\n ]\n}",
1289
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"Status\": \"USER_NORMAL\",\n \"AssetSummaryList\": [\n {\n \"AssetType\": \"ASSET_CONTAINER\",\n \"IsCustomerFirstCheck\": true,\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"LastCheckTime\": \"2021-04-02 16:42:00\",\n \"CheckCostTime\": 300,\n \"CheckProgress\": 100,\n \"PeriodRule\": {\n \"ExecutionTime\": \"xx\",\n \"Frequency\": 1\n },\n \"PassedPolicyItemCount\": 100,\n \"FailedPolicyItemCount\": 10,\n \"FailedCriticalPolicyItemCount\": 1,\n \"FailedHighRiskPolicyItemCount\": 2,\n \"FailedMediumRiskPolicyItemCount\": 1,\n \"FailedLowRiskPolicyItemCount\": 1,\n \"NoticePolicyItemCount\": 1,\n \"PassedAssetCount\": 1000,\n \"FailedAssetCount\": 100,\n \"AssetPassedRate\": 91,\n \"ScanFailedAssetCount\": 1\n }\n ]\n }\n}",
1277
+ "output": "{\n \"Response\": {\n \"Status\": \"USER_NORMAL\",\n \"AssetSummaryList\": [\n {\n \"AssetType\": \"ASSET_CONTAINER\",\n \"IsCustomerFirstCheck\": true,\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CheckProgress\": 0,\n \"PassedPolicyItemCount\": 1,\n \"FailedPolicyItemCount\": 1,\n \"FailedCriticalPolicyItemCount\": 1,\n \"FailedHighRiskPolicyItemCount\": 1,\n \"FailedMediumRiskPolicyItemCount\": 1,\n \"FailedLowRiskPolicyItemCount\": 1,\n \"NoticePolicyItemCount\": 1,\n \"PassedAssetCount\": 1,\n \"FailedAssetCount\": 1,\n \"AssetPassedRate\": 0,\n \"ScanFailedAssetCount\": 1,\n \"CheckCostTime\": 0,\n \"LastCheckTime\": \"2020-09-22 00:00:00\",\n \"PeriodRule\": {\n \"Frequency\": 1,\n \"ExecutionTime\": \"21:00\",\n \"Enable\": true\n },\n \"OpenPolicyItemCount\": 1,\n \"IgnoredPolicyItemCount\": 1,\n \"TotalPolicyItemCount\": 1,\n \"DetectHostCount\": 1,\n \"LeftTime\": 1\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
1290
1278
  "title": "查询上次任务的资产通过率汇总信息"
1291
1279
  }
1292
1280
  ],
1293
1281
  "DescribeComplianceTaskPolicyItemSummaryList": [
1294
1282
  {
1295
1283
  "document": "",
1296
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceTaskPolicyItemSummaryList\n<公共请求参数>\n\n{\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
1297
- "output": "{\n \"Response\": {\n \"TaskId\": 1,\n \"TotalCount\": 1,\n \"PolicyItemSummaryList\": [\n {\n \"CustomerPolicyItemId\": 1,\n \"BasePolicyItemId\": 1,\n \"Name\": \"abc\",\n \"Category\": \"abc\",\n \"BenchmarkStandardName\": \"abc\",\n \"RiskLevel\": \"abc\",\n \"AssetType\": \"abc\",\n \"LastCheckTime\": \"2020-09-22 00:00:00\",\n \"CheckStatus\": \"abc\",\n \"CheckResult\": \"abc\",\n \"PassedAssetCount\": 1,\n \"FailedAssetCount\": 1,\n \"WhitelistId\": 1,\n \"FixSuggestion\": \"abc\",\n \"BenchmarkStandardId\": 1,\n \"ApplicableVersion\": \"abc\",\n \"Description\": \"abc\",\n \"AuditProcedure\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
1284
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceTaskPolicyItemSummaryList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"RiskLevel\",\n \"Values\": [\n \"3\",\n \"2\",\n \"1\",\n \"0\"\n ],\n \"ExactMatch\": true\n },\n {\n \"Name\": \"ItemType\",\n \"Values\": [\n \"CATEGORY_DOCKER_RUNTIME\"\n ],\n \"ExactMatch\": true\n }\n ],\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
1285
+ "output": "{\n \"Response\": {\n \"PolicyItemSummaryList\": [\n {\n \"ApplicableVersion\": \"docker 1.11-1.13, 17.12-20.10.2\",\n \"AssetType\": \"ASSET_CONTAINER\",\n \"AuditProcedure\": \"运行以下命令执行检查\\ndocker ps --quiet --all | xargs docker inspect --format '{{ .Id }}: Privileged={{ .HostConfig.Privileged }}'\",\n \"BasePolicyItemId\": 1,\n \"BenchmarkStandardId\": 1,\n \"BenchmarkStandardName\": \"CIS Docker\",\n \"Category\": \"CATEGORY_DOCKER_RUNTIME\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerPolicyItemId\": 6190,\n \"Description\": \"开启了privileged权限之后,会让容器拥有底层主机的大部分权限,不应该在创建容器时使用该参数\",\n \"FailedAssetCount\": 29,\n \"FixSuggestion\": \"不要运行带有--privileged标志的容器。 例如,不要启动如下容器:docker run --interactive --tty --privileged centos/bin/bash。\",\n \"IsEnable\": 1,\n \"LastCheckTime\": \"2024-10-30 02:02:27\",\n \"Name\": \"确保不使用特权容器\",\n \"PassedAssetCount\": 210,\n \"RiskLevel\": \"3\",\n \"WhitelistId\": 0\n }\n ],\n \"RequestId\": \"a9aae028-b4f8-4ec3-8f77-5c102c4b5fcf\",\n \"TaskId\": 0,\n \"TotalCount\": 33\n }\n}",
1298
1286
  "title": "查询上次任务的检测项的汇总信息列表"
1299
1287
  }
1300
1288
  ],
@@ -1302,7 +1290,7 @@
1302
1290
  {
1303
1291
  "document": "",
1304
1292
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceWhitelistItemList\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_IMAGE\"\n ],\n \"Offset\": 0,\n \"Limit\": 10\n}",
1305
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TotalCount\": 1,\n \"WhitelistItemSet\": [\n {\n \"WhitelistItemId\": 123,\n \"CustomerPolicyItemId\": 456,\n \"Name\": \"xxxx\",\n \"StandardId\": 123,\n \"StandardName\": \"CIS Docker\",\n \"AffectedAssetCount\": 100,\n \"LastUpdateTime\": \"2021-04-02 16:00:00\",\n \"InsertTime\": \"2021-04-02 16:00:00\"\n }\n ]\n }\n}",
1293
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TotalCount\": 1,\n \"WhitelistItemSet\": [\n {\n \"WhitelistItemId\": 1001,\n \"CustomerPolicyItemId\": 456,\n \"Name\": \"test-name\",\n \"StandardId\": 11222,\n \"StandardName\": \"CIS Docker\",\n \"AffectedAssetCount\": 100,\n \"LastUpdateTime\": \"2021-04-02 16:00:00\",\n \"InsertTime\": \"2021-04-02 16:00:00\"\n }\n ]\n }\n}",
1306
1294
  "title": "查询白名单列表"
1307
1295
  }
1308
1296
  ],
@@ -1310,7 +1298,7 @@
1310
1298
  {
1311
1299
  "document": "查询容器资产信息",
1312
1300
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeContainerAssetSummary\n<公共请求参数>\n\n{}",
1313
- "output": "{\n \"Response\": {\n \"ContainerTotalCnt\": 1,\n \"ContainerRunningCnt\": 1,\n \"ContainerPauseCnt\": 1,\n \"ContainerStopped\": 1,\n \"ImageCnt\": 1,\n \"HostCnt\": 1,\n \"HostRunningCnt\": 1,\n \"HostOfflineCnt\": 1,\n \"ImageRegistryCnt\": 1,\n \"ImageTotalCnt\": 1,\n \"HostUnInstallCnt\": 1,\n \"HostSuperNodeCnt\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1301
+ "output": "{\n \"Response\": {\n \"ContainerTotalCnt\": 1,\n \"ContainerRunningCnt\": 1,\n \"ContainerPauseCnt\": 1,\n \"ContainerStopped\": 1,\n \"ImageCnt\": 1,\n \"HostCnt\": 1,\n \"HostRunningCnt\": 1,\n \"HostOfflineCnt\": 1,\n \"ImageRegistryCnt\": 1,\n \"ImageTotalCnt\": 1,\n \"HostUnInstallCnt\": 1,\n \"HostSuperNodeCnt\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1314
1302
  "title": "查询容器资产信息"
1315
1303
  }
1316
1304
  ],
@@ -1318,7 +1306,7 @@
1318
1306
  {
1319
1307
  "document": "",
1320
1308
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeContainerSecEventSummary\n<公共请求参数>\n\n{}",
1321
- "output": "{\n \"Response\": {\n \"UnhandledFileCnt\": 1,\n \"UnhandledEscapeCnt\": 1,\n \"UnhandledRiskSyscallCnt\": 1,\n \"RequestId\": \"xx\",\n \"UnhandledReverseShellCnt\": 1,\n \"UnhandledAbnormalProcessCnt\": 1,\n \"UnhandledVirusEventCnt\": 1,\n \"UnhandledMaliciousConnectionEventCnt\": 1,\n \"UnhandledK8sApiEventCnt\": 1\n }\n}",
1309
+ "output": "{\n \"Response\": {\n \"UnhandledFileCnt\": 1,\n \"UnhandledEscapeCnt\": 1,\n \"UnhandledRiskSyscallCnt\": 1,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"UnhandledReverseShellCnt\": 1,\n \"UnhandledAbnormalProcessCnt\": 1,\n \"UnhandledVirusEventCnt\": 1,\n \"UnhandledMaliciousConnectionEventCnt\": 1,\n \"UnhandledK8sApiEventCnt\": 1\n }\n}",
1322
1310
  "title": "查询待处理安全事件"
1323
1311
  }
1324
1312
  ],
@@ -1341,16 +1329,16 @@
1341
1329
  "DescribeEmergencyVulList": [
1342
1330
  {
1343
1331
  "document": "",
1344
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEmergencyVulList\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
1345
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"Category\": \"xx\",\n \"Status\": \"xx\",\n \"CVEID\": \"xx\",\n \"DefenceScope\": \"xx\",\n \"Name\": \"xx\",\n \"Level\": \"xx\",\n \"CVSSV3Score\": 0.0,\n \"Tags\": [\n \"xx\"\n ],\n \"DefenceStatus\": \"xx\",\n \"SubmitTime\": \"xx\",\n \"DefendedCount\": 0,\n \"PocID\": \"xx\",\n \"LatestFoundTime\": \"xx\",\n \"ID\": 0,\n \"DefenceHostCount\": 0\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1332
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEmergencyVulList\n<公共请求参数>\n\n{\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
1333
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2024-47176\",\n \"CVSSV3Score\": 0,\n \"Category\": \"OTHER\",\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"\",\n \"DefenceStatus\": \"\",\n \"DefendedCount\": 0,\n \"ID\": 0,\n \"LatestFoundTime\": \"\",\n \"Level\": \"HIGH\",\n \"Name\": \"cups-browsed 远程代码执行漏洞\",\n \"PocID\": \"pcmgr-521425\",\n \"Status\": \"NOT_SCAN\",\n \"SubmitTime\": \"2024-09-27 06:15:00\",\n \"Tags\": [\n \"POC\",\n \"SYS\"\n ]\n }\n ],\n \"RequestId\": \"a3fbabbb-7c7b-45dd-9219-a0b3ca9bc932\",\n \"TotalCount\": 241\n }\n}",
1346
1334
  "title": "查询应急漏洞列表"
1347
1335
  }
1348
1336
  ],
1349
1337
  "DescribeEscapeEventDetail": [
1350
1338
  {
1351
1339
  "document": " 查询容器逃逸事件详情",
1352
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeEventDetail\n<公共请求参数>\n\n{\n \"EventId\": \"abc\"\n}",
1353
- "output": "{\n \"Response\": {\n \"EventBaseInfo\": {\n \"EventId\": \"abc\",\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"ContainerId\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ImageId\": \"abc\",\n \"ImageName\": \"abc\",\n \"NodeName\": \"abc\",\n \"Status\": \"abc\",\n \"EventName\": \"abc\",\n \"EventType\": \"abc\",\n \"EventCount\": 0,\n \"LatestFoundTime\": \"abc\",\n \"HostIP\": \"abc\",\n \"ClientIP\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"NodeID\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeSubNetID\": \"abc\",\n \"NodeSubNetName\": \"abc\",\n \"NodeSubNetCIDR\": \"abc\",\n \"PodName\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodStatus\": \"abc\",\n \"ClusterID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"HostID\": \"abc\",\n \"Namespace\": \"abc\",\n \"WorkloadType\": \"abc\"\n },\n \"ProcessInfo\": {\n \"ProcessName\": \"abc\",\n \"ProcessAuthority\": \"abc\",\n \"ProcessId\": 1,\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessTree\": \"abc\",\n \"ProcessMd5\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"EventDetail\": {\n \"Description\": \"abc\",\n \"Solution\": \"abc\",\n \"Remark\": \"abc\",\n \"OperationTime\": \"abc\"\n },\n \"ParentProcessInfo\": {\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"AncestorProcessInfo\": {\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"RequestId\": \"abc\"\n }\n}",
1340
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeEventDetail\n<公共请求参数>\n\n{\n \"EventId\": \"dsfhuyh2r\"\n}",
1341
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"/usr/lib/systemd/systemd --switched-root --system --deserialize 18 \",\n \"ProcessPath\": \"systemd\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"159.75.90.111\",\n \"ClusterID\": \"cls-sdfw3f3\",\n \"ClusterName\": \"web-cluster\",\n \"ContainerId\": \"a960d85856c7a77cb504b638c56f59a28057\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"node1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"12486\",\n \"EventName\": \"敏感路径挂载\",\n \"EventType\": \"MOUNT_SENSITIVE_PTAH\",\n \"FoundTime\": \"2024-10-23 17:13:51\",\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"HostIP\": \"172.17.1.6\",\n \"ImageId\": \"sha256:b760a4831f5aab71c711f7537a107b751d0d0ce90dd32d8b358df3c5da385426\",\n \"ImageName\": \"-\",\n \"LatestFoundTime\": \"2024-10-23 17:13:51\",\n \"Namespace\": \"default\",\n \"NodeID\": \"web-node1\",\n \"NodeName\": \"VM-1-6-tencentos\",\n \"NodeSubNetCIDR\": \"172.16.0.0/24\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"kube-system/cilium-m2gkw\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"容器(ID:5893711bb2...)挂载了敏感目录/lib/modules,/proc/sys/net,/proc/sys/kernel,存在容器逃逸的风险,当攻击者攻破容器后,可通过篡改该目录下的敏感文件,从而实现容器逃逸,获得宿主机系统的控制权限,威胁宿主机上其它容器及内网的安全。\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"\",\n \"Solution\": \"修改挂载路径,只将必须的路径挂载到容器中,避免挂载敏感路径。\"\n },\n \"ParentProcessInfo\": {\n \"ProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 613d6792485871ca66ab6dc4d1c24e827e1ff4ae6aff87b187e40059cd3ba3b9 -address /run/containerd/containerd.sock \",\n \"ProcessPath\": \"containerd-shim-runc-v2\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"\",\n \"ProcessId\": 2743103,\n \"ProcessMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"ProcessName\": \"runc\",\n \"ProcessParam\": \"cilium-agent --config-dir=/tmp/cilium/config-map\",\n \"ProcessPath\": \"/opt/containerd/bin/runc\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"runc(2743103)|containerd-shim-runc-v2(289436)|systemd(1)\",\n \"ProcessUserGroup\": \"root\"\n },\n \"RequestId\": \"c544fc31-7576-43aa-a4f3-b4c40656f67a\"\n }\n}",
1354
1342
  "title": "DescribeEscapeEventDetail"
1355
1343
  }
1356
1344
  ],
@@ -1358,7 +1346,7 @@
1358
1346
  {
1359
1347
  "document": "查询容器逃逸事件列表",
1360
1348
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeEventInfo\n<公共请求参数>\n\n{}",
1361
- "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"EventType\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ImageName\": \"abc\",\n \"Status\": \"abc\",\n \"EventId\": \"abc\",\n \"NodeName\": \"abc\",\n \"PodName\": \"abc\",\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"EventName\": \"abc\",\n \"ImageId\": \"abc\",\n \"ContainerId\": \"abc\",\n \"Solution\": \"abc\",\n \"Description\": \"abc\",\n \"EventCount\": 0,\n \"LatestFoundTime\": \"2020-09-22 00:00:00\",\n \"NodeIP\": \"abc\",\n \"HostID\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"ContainerStatus\": \"abc\",\n \"ClusterID\": \"abc\",\n \"NodeType\": \"abc\",\n \"PodIP\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"PublicIP\": \"abc\",\n \"NodeID\": \"abc\",\n \"HostIP\": \"abc\",\n \"ClusterName\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1349
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"9294ea00cf80469f3604e2a38e725bf77c5a3ea522ce23bbf4d4dba8b4e149c9\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/test1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"容器(ID: 9294ea00cf...) 中的进程bash对cgroup下的文件notify_on_release进行了修改,通过篡改该文件,可以实现容器逃逸,获得宿主机系统权限。\",\n \"EventCount\": 1,\n \"EventId\": \"33705186\",\n \"EventName\": \"利用cgroup机制逃逸\",\n \"EventType\": \"ESCAPE_CGROUPS\",\n \"FoundTime\": \"2024-08-23 16:41:03\",\n \"HostID\": \"3253189e-a107-4892-9bb9-03ad9d3e6990\",\n \"HostIP\": \"172.16.48.74\",\n \"ImageId\": \"sha256:5d0da3dc976460b72c77d94c8a1ad043720b0416bfc16c52c45d4847e53fadb6\",\n \"ImageName\": \"centos:8\",\n \"LatestFoundTime\": \"2024-08-23 16:41:03\",\n \"NodeID\": \"\",\n \"NodeIP\": \"172.16.48.74\",\n \"NodeName\": \"VM-48-74-centos\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"\",\n \"PodName\": \"--\",\n \"PublicIP\": \"101.33.227.64\",\n \"Solution\": \"检查容器对应镜像是否存在漏洞或木马。修改容器启动参数,以普通权限启动容器。检查容器挂载目录,避免将/sys/fs/cgroup挂载到容器中。\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"53e7bf79-dd62-40f9-be45-5849b1a372af\",\n \"TotalCount\": 1\n }\n}",
1362
1350
  "title": "DescribeEscapeEventInfo"
1363
1351
  }
1364
1352
  ],
@@ -1366,7 +1354,7 @@
1366
1354
  {
1367
1355
  "document": "",
1368
1356
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeEventTendency\n&EndTime=2021-05-01\n&StartTime=2021-05-07\n&<公共请求参数>",
1369
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Date\": \"2020-09-22\",\n \"ContainerEscapeEventCount\": 0,\n \"ProcessPrivilegeEventCount\": 0,\n \"RiskContainerEventCount\": 0\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1357
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Date\": \"2020-09-22\",\n \"ContainerEscapeEventCount\": 0,\n \"ProcessPrivilegeEventCount\": 0,\n \"RiskContainerEventCount\": 1\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1370
1358
  "title": "查询待处理逃逸事件趋势"
1371
1359
  }
1372
1360
  ],
@@ -1374,7 +1362,7 @@
1374
1362
  {
1375
1363
  "document": "",
1376
1364
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeEventTypeSummary\n&<公共请求参数>",
1377
- "output": "{\n \"Response\": {\n \"RiskContainerEventCount\": 0,\n \"ProcessPrivilegeEventCount\": 0,\n \"ContainerEscapeEventCount\": 0,\n \"RequestId\": \"xx\",\n \"PendingEscapeEventCount\": 0\n }\n}",
1365
+ "output": "{\n \"Response\": {\n \"RiskContainerEventCount\": 0,\n \"ProcessPrivilegeEventCount\": 0,\n \"ContainerEscapeEventCount\": 0,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\",\n \"PendingEscapeEventCount\": 0\n }\n}",
1378
1366
  "title": "统计容器逃逸各事件类型和待处理事件数"
1379
1367
  }
1380
1368
  ],
@@ -1390,7 +1378,7 @@
1390
1378
  {
1391
1379
  "document": "",
1392
1380
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeRuleInfo\n&<公共请求参数>",
1393
- "output": "{\n \"Response\": {\n \"RuleSet\": [\n {\n \"Group\": \"xx\",\n \"Type\": \"xx\",\n \"Name\": \"xx\",\n \"IsEnable\": true\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1381
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d8663c94-1030-4256-8e10-a3822d7b5e10\",\n \"RuleSet\": [\n {\n \"Group\": \"PROCESS_PRIVILEGE\",\n \"IsEnable\": true,\n \"Name\": \"突破namespace限制\",\n \"Type\": \"PRIVILEGE\"\n },\n {\n \"Group\": \"RISK_CONTAINER\",\n \"IsEnable\": true,\n \"Name\": \"敏感路径挂载\",\n \"Type\": \"MOUNT_SENSITIVE_PTAH\"\n },\n {\n \"Group\": \"CONTAINER_ESCAPE\",\n \"IsEnable\": true,\n \"Name\": \"逃逸漏洞利用\",\n \"Type\": \"ESCAPE_VUL_OCCURRED\"\n },\n {\n \"Group\": \"CONTAINER_ESCAPE\",\n \"IsEnable\": true,\n \"Name\": \"访问Docker API接口逃逸\",\n \"Type\": \"ESCAPE_DOCKER_API\"\n },\n {\n \"Group\": \"CONTAINER_ESCAPE\",\n \"IsEnable\": true,\n \"Name\": \"篡改敏感文件逃逸\",\n \"Type\": \"ESCAPE_TAMPER_SENSITIVE_FILE\"\n },\n {\n \"Group\": \"CONTAINER_ESCAPE\",\n \"IsEnable\": true,\n \"Name\": \"利用cgroup机制逃逸\",\n \"Type\": \"ESCAPE_CGROUPS\"\n }\n ]\n }\n}",
1394
1382
  "title": "getescapeRule"
1395
1383
  }
1396
1384
  ],
@@ -1398,7 +1386,7 @@
1398
1386
  {
1399
1387
  "document": "",
1400
1388
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeSafeState\n&<公共请求参数>",
1401
- "output": "{\n \"Response\": {\n \"IsSafe\": \"xx\",\n \"RequestId\": \"xx\"\n }\n}",
1389
+ "output": "{\n \"Response\": {\n \"IsSafe\": \"Unsafe\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1402
1390
  "title": "查询容器逃逸安全状态"
1403
1391
  }
1404
1392
  ],
@@ -1406,23 +1394,23 @@
1406
1394
  {
1407
1395
  "document": "",
1408
1396
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeWhiteList\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
1409
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"UpdateTime\": \"xx\",\n \"ImageSize\": 0,\n \"EventType\": [\n \"xx\"\n ],\n \"HostCount\": 0,\n \"ImageID\": \"xx\",\n \"ImageName\": \"xx\",\n \"ContainerCount\": 0,\n \"InsertTime\": \"xx\",\n \"ID\": 0\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1397
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ContainerCount\": 0,\n \"EventType\": [\n \"MOUNT_SENSITIVE_PTAH\"\n ],\n \"HostCount\": 4,\n \"ID\": 7172,\n \"ImageID\": \"sha256:a24bb4013296f61e89ba57005a7b3e52274d8edd3ae2077d04395f806b63d83e\",\n \"ImageName\": \"alpine:3.12.0\",\n \"ImageSize\": 10000000,\n \"InsertTime\": \"2024-10-17 22:31:18\",\n \"UpdateTime\": \"2024-10-27 08:51:02\"\n }\n ],\n \"RequestId\": \"ef5c9885-aaaa-bbbb-cccc-4fccf03883cf\",\n \"TotalCount\": 1\n }\n}",
1410
1398
  "title": "查询逃逸白名单"
1411
1399
  }
1412
1400
  ],
1413
1401
  "DescribeEventEscapeImageList": [
1414
1402
  {
1415
1403
  "document": "",
1416
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskContainerList\n<公共请求参数>\n\n{\n \"Limit\": 1,\n \"Offset\": 1,\n \"Filters\": [\n {\n \"Name\": \"abc\",\n \"Values\": [\n \"abc\"\n ],\n \"ExactMatch\": true\n }\n ],\n \"Order\": \"abc\",\n \"By\": \"abc\"\n}",
1417
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"EventType\": \"abc\",\n \"OriginEventType\": \"abc\",\n \"ImageName\": \"abc\",\n \"ContainerCount\": 0,\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"LatestFoundTime\": \"2020-09-22 00:00:00\",\n \"EventCount\": 0,\n \"Status\": \"abc\",\n \"Description\": \"abc\",\n \"Solution\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1404
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskContainerList\n<公共请求参数>\n\n{\n \"Limit\": 1,\n \"Offset\": 1,\n \"Filters\": [\n {\n \"Name\": \"EventType\",\n \"Values\": [\n \"MOUNT_SENSITIVE_PTAH\"\n ],\n \"ExactMatch\": true\n }\n ],\n \"Order\": \"asc\",\n \"By\": \"Status\"\n}",
1405
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageId\": \"sha256:9aae1601d6832af6c69ef257f09\",\n \"EventType\": \"local\",\n \"OriginEventType\": \"MOUNT_SENSITIVE_PTAH\",\n \"UniqueKey\": \"1398abd1-98x71134\",\n \"ImageName\": \"centos-7.6\",\n \"ContainerCount\": 0,\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"LatestFoundTime\": \"2020-09-22 00:00:00\",\n \"EventCount\": 0,\n \"Status\": \"EVENT_INGNORE\",\n \"Description\": \"\",\n \"Solution\": \"\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1418
1406
  "title": "查询风险容器镜像列表"
1419
1407
  }
1420
1408
  ],
1421
1409
  "DescribeExportJobDownloadURL": [
1422
1410
  {
1423
1411
  "document": "",
1424
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobDownloadURL\n<公共请求参数>\n\n{\n \"JobID\": \"xxx\"\n}",
1425
- "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"DownloadURL\": \"xxx\"\n }\n}",
1412
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobDownloadURL\n<公共请求参数>\n\n{\n \"JobID\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n}",
1413
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"DownloadURL\": \"http://1.2.3.4/result.csv\"\n }\n}",
1426
1414
  "title": "查询导出任务下载URL"
1427
1415
  }
1428
1416
  ],
@@ -1430,15 +1418,15 @@
1430
1418
  {
1431
1419
  "document": "",
1432
1420
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobManageList\n<公共请求参数>\n\n{}",
1433
- "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"TotalCount\": 0\n }\n}",
1421
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ExportProgress\": 0,\n \"ExportStatus\": \"RUNNING\",\n \"FailureMsg\": \"\",\n \"InsertTime\": \"2024-10-30 10:47:57\",\n \"JobID\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"JobName\": \"LocalImage-253332865-343433341-1\",\n \"Source\": \"LocalImage\",\n \"Timeout\": \"2024-10-30 10:47:57\"\n }\n ],\n \"RequestId\": \"b0990d92-0eff-4bc3-8484-ffd61d8daa89\",\n \"TotalCount\": 11\n }\n}",
1434
1422
  "title": "查询导出任务管理列表"
1435
1423
  }
1436
1424
  ],
1437
1425
  "DescribeExportJobResult": [
1438
1426
  {
1439
- "document": "",
1440
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobResult\n<公共请求参数>\n\n{\n \"JobId\": \"xxxx\"\n}",
1441
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"ExportStatus\": \"RUNNING\",\n \"ExportProgress\": 90,\n \"DownloadURL\": \"\",\n \"FailureMsg\": \"\"\n }\n}",
1427
+ "document": "查询导出任务的结果",
1428
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobResult\n<公共请求参数>\n\n{\n \"JobId\": \"e4409223-8e92-45db-a857-11b1ff547c79\"\n}",
1429
+ "output": "{\n \"Response\": {\n \"DownloadURL\": \"https://yunjing.cos.ap-guangzhou.myqcloud.com\",\n \"ExportProgress\": 100,\n \"ExportStatus\": \"SUCCESS\",\n \"FailureMsg\": \"\",\n \"RequestId\": \"c66b2b1f-9c85-481a-8eea-1a254ffd61df\"\n }\n}",
1442
1430
  "title": "查询导出任务的结果"
1443
1431
  }
1444
1432
  ],
@@ -1446,7 +1434,7 @@
1446
1434
  {
1447
1435
  "document": "",
1448
1436
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageAuthorizedInfo\n&<公共请求参数>",
1449
- "output": "{\n \"Response\": {\n \"TotalAuthorizedCnt\": 1,\n \"UsedAuthorizedCnt\": 1,\n \"ScannedImageCnt\": 1,\n \"NotScannedImageCnt\": 1,\n \"NotScannedLocalImageCnt\": 1,\n \"TrialAuthorizedCnt\": 1,\n \"UsedTrialAuthorizedCnt\": 1,\n \"PurchasedAuthorizedCnt\": 1,\n \"UsedPurchasedAuthorizedCnt\": 1,\n \"CanApplyFreeImageAuthorize\": true,\n \"ImageScanInquireInfo\": {\n \"InquireKey\": \"abc\",\n \"Capcity\": 1,\n \"Useage\": 1,\n \"StartTime\": \"abc\",\n \"EndTime\": \"abc\",\n \"PurchaseStatus\": \"abc\",\n \"ResourceID\": \"abc\"\n },\n \"RepeatImageIdCnt\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1437
+ "output": "{\n \"Response\": {\n \"CanApplyFreeImageAuthorize\": false,\n \"ImageScanInquireInfo\": {\n \"Capcity\": 18601,\n \"EndTime\": \"2024-12-24 13:01:18\",\n \"InquireKey\": \"sv_yunjing_cssil_image\",\n \"PurchaseStatus\": \"Normal\",\n \"ResourceID\": \"427c59056cbd64e30b3990e8d7b25c19\",\n \"StartTime\": \"2024-09-24 13:01:18\",\n \"Useage\": 17365\n },\n \"NotScannedImageCnt\": 38,\n \"NotScannedLocalImageCnt\": 12,\n \"PurchasedAuthorizedCnt\": 300000,\n \"RepeatImageIdCnt\": 2,\n \"RequestId\": \"0ad4465e-cf84-411f-bd10-75bbb3a9c9aa\",\n \"ScannedImageCnt\": 11687,\n \"TotalAuthorizedCnt\": 300000,\n \"TrialAuthorizedCnt\": 0,\n \"UsedAuthorizedCnt\": 300000,\n \"UsedPurchasedAuthorizedCnt\": 300000,\n \"UsedTrialAuthorizedCnt\": 0\n }\n}",
1450
1438
  "title": "查询镜像授权信息"
1451
1439
  }
1452
1440
  ],
@@ -1454,7 +1442,7 @@
1454
1442
  {
1455
1443
  "document": "",
1456
1444
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageAutoAuthorizedLogList\n&TaskId=1\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1457
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"xx\",\n \"List\": [\n {\n \"Status\": \"SUCCESS\",\n \"AuthorizedTime\": \"xx\",\n \"ImageName\": \"xx\",\n \"IsAuthorized\": 1,\n \"ImageId\": \"xx\"\n }\n ]\n }\n}",
1445
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"List\": [\n {\n \"Status\": \"SUCCESS\",\n \"AuthorizedTime\": \"2022-01-01 00:00:00\",\n \"ImageName\": \"镜像名称\",\n \"IsAuthorized\": 1,\n \"ImageId\": \"镜像id image-id\"\n }\n ]\n }\n}",
1458
1446
  "title": "查询镜像自动授权结果列表"
1459
1447
  }
1460
1448
  ],
@@ -1462,7 +1450,7 @@
1462
1450
  {
1463
1451
  "document": "",
1464
1452
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageAutoAuthorizedRule\n&<公共请求参数>",
1465
- "output": "{\n \"Response\": {\n \"MaxDailyCount\": 0,\n \"RangeType\": \"ALL\",\n \"RuleId\": 1,\n \"HostCount\": 0,\n \"RequestId\": \"abc\",\n \"IsEnabled\": 0\n }\n}",
1453
+ "output": "{\n \"Response\": {\n \"MaxDailyCount\": 0,\n \"RangeType\": \"ALL\",\n \"RuleId\": 1,\n \"HostCount\": 0,\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\",\n \"IsEnabled\": 0\n }\n}",
1466
1454
  "title": "查询本地镜像自动授权规则"
1467
1455
  }
1468
1456
  ],
@@ -1470,15 +1458,15 @@
1470
1458
  {
1471
1459
  "document": "",
1472
1460
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageAutoAuthorizedTaskList\n&StartTime=2022-01-01\n&EndTime=2022-01-07\n\n&<公共请求参数>",
1473
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"LastAuthorizedTime\": \"xx\",\n \"AuthorizedDate\": \"2020-09-22\",\n \"LatestFailCode\": \"xx\",\n \"SuccessCount\": 0,\n \"FailCount\": 0,\n \"Source\": \"xx\",\n \"TaskId\": 1,\n \"Type\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1461
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"LastAuthorizedTime\": \"2020-09-22\",\n \"AuthorizedDate\": \"2020-09-22\",\n \"LatestFailCode\": \"REACH_LIMIT\",\n \"SuccessCount\": 0,\n \"FailCount\": 0,\n \"Source\": \"LOCAL\",\n \"TaskId\": 1,\n \"Type\": \"AUTO\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1474
1462
  "title": "DescribeImageAutoAuthorizedTaskList"
1475
1463
  }
1476
1464
  ],
1477
1465
  "DescribeImageComponentList": [
1478
1466
  {
1479
1467
  "document": "",
1480
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageComponentList\n&ImageID=xx\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1481
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"Name\": \"xx\",\n \"ImageID\": \"xx\",\n \"Version\": \"xx\",\n \"VulCount\": 1,\n \"Path\": \"xx\",\n \"Type\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1468
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageComponentList\n&ImageID=image-id\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1469
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"ImageID\": \"sha256:2ebe27d\",\n \"Name\": \"name\",\n \"Path\": \"\",\n \"Type\": \"SYSTEM_COMPONENT\",\n \"Version\": \"2.2.51-12.el7\",\n \"VulCount\": 0\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1482
1470
  "title": "查询本地镜像组件列表"
1483
1471
  }
1484
1472
  ],
@@ -1486,7 +1474,7 @@
1486
1474
  {
1487
1475
  "document": "",
1488
1476
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeImageRegistryNamespaceList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10\n}",
1489
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TotalCount\": 2,\n \"NamespaceList\": [\n \"online\",\n \"test\"\n ]\n }\n}",
1477
+ "output": "{\n \"Response\": {\n \"NamespaceDetail\": [\n {\n \"ImageCnt\": 54,\n \"Namespace\": \"os_images\",\n \"RegistryCnt\": 1,\n \"RiskImageCnt\": 50\n }\n ],\n \"NamespaceList\": [\n \"adadadadmin\"\n ],\n \"RequestId\": \"fe6d6a40-fe7e-43d9-818e-e0afd7975663\",\n \"TotalCount\": 33\n }\n}",
1490
1478
  "title": "查询用户仓库的项目空间列表"
1491
1479
  }
1492
1480
  ],
@@ -1502,7 +1490,7 @@
1502
1490
  {
1503
1491
  "document": "",
1504
1492
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageRiskSummary\n&<公共请求参数>",
1505
- "output": "{\n \"Response\": {\n \"RiskCnt\": [\n {\n \"Cnt\": 1,\n \"Level\": \"xx\"\n }\n ],\n \"VulnerabilityCnt\": [\n {\n \"Cnt\": 1,\n \"Level\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\",\n \"MalwareVirusCnt\": [\n {\n \"Cnt\": 1,\n \"Level\": \"xx\"\n }\n ]\n }\n}",
1493
+ "output": "{\n \"Response\": {\n \"RiskCnt\": [\n {\n \"Cnt\": 1,\n \"Level\": \"HIGH\"\n }\n ],\n \"VulnerabilityCnt\": [\n {\n \"Cnt\": 1,\n \"Level\": \"HIGH\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"MalwareVirusCnt\": [\n {\n \"Cnt\": 1,\n \"Level\": \"HIGH\"\n }\n ]\n }\n}",
1506
1494
  "title": "查询本地镜像风险概览"
1507
1495
  }
1508
1496
  ],
@@ -1510,7 +1498,7 @@
1510
1498
  {
1511
1499
  "document": "",
1512
1500
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageRiskTendency\n&EndTime=2020-09-22\n&StartTime=2020-09-22\n&<公共请求参数>",
1513
- "output": "{\n \"Response\": {\n \"ImageRiskTendencySet\": [\n {\n \"ImageRiskSet\": [\n {\n \"Cnt\": 1,\n \"CurTime\": \"2020-09-22\"\n }\n ],\n \"ImageRiskType\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1501
+ "output": "{\n \"Response\": {\n \"ImageRiskTendencySet\": [\n {\n \"ImageRiskSet\": [\n {\n \"Cnt\": 1,\n \"CurTime\": \"2020-09-22\"\n }\n ],\n \"ImageRiskType\": \"IRT_VULNERABILITY\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1514
1502
  "title": "获取运行时安全事件新增趋势"
1515
1503
  }
1516
1504
  ],
@@ -1518,7 +1506,7 @@
1518
1506
  {
1519
1507
  "document": "",
1520
1508
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageSimpleList\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1521
- "output": "{\n \"Response\": {\n \"ImageCnt\": 1,\n \"ImageList\": [\n {\n \"Size\": 1,\n \"ImageName\": \"xx\",\n \"ContainerCnt\": 0,\n \"ImageType\": \"xx\",\n \"ImageID\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1509
+ "output": "{\n \"Response\": {\n \"ImageCnt\": 1,\n \"ImageList\": [\n {\n \"Size\": 1,\n \"ImageName\": \"centos:7.6\",\n \"ContainerCnt\": 0,\n \"ImageType\": \"\",\n \"ImageID\": \"c826b9fa-68b5-4603-bf25-a5eb9b65c768\"\n }\n ],\n \"RequestId\": \"965c55c5-8ab1-4e32-8425-4c44acb5edec\"\n }\n}",
1522
1510
  "title": "查询全部镜像列表"
1523
1511
  }
1524
1512
  ],
@@ -1534,7 +1522,7 @@
1534
1522
  {
1535
1523
  "document": "",
1536
1524
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeInspectionReport\n<公共请求参数>\n\n{}",
1537
- "output": "{\n \"Response\": {\n \"ReportName\": \"xxx\",\n \"ReportUrl\": \"xxx\",\n \"RequestId\": \"xx\"\n }\n}",
1525
+ "output": "{\n \"Response\": {\n \"ReportName\": \"\",\n \"ReportUrl\": \"\",\n \"RequestId\": \"d1be9e4b-99db-47cb-8aa1-11b4c4b7becd\"\n }\n}",
1538
1526
  "title": "查询检查报告"
1539
1527
  }
1540
1528
  ],
@@ -1542,7 +1530,7 @@
1542
1530
  {
1543
1531
  "document": "",
1544
1532
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalEventInfo\n<公共请求参数>\n\n{\n \"ID\": 10\n}",
1545
- "output": "{\n \"Response\": {\n \"Info\": {\n \"Status\": \"xx\",\n \"MatchRuleName\": \"xx\",\n \"ClusterMasterIP\": \"xx\",\n \"MatchRule\": {\n \"Action\": \"xx\",\n \"Scope\": \"xx\",\n \"RiskLevel\": \"xx\",\n \"IsDelete\": true,\n \"Status\": true\n },\n \"ClusterRunningStatus\": \"xx\",\n \"K8sVersion\": \"xx\",\n \"RiskLevel\": \"xx\",\n \"ClusterID\": \"xx\",\n \"Suggestion\": \"xx\",\n \"HighLightFields\": [\n \"xx\"\n ],\n \"ClusterName\": \"xx\",\n \"MatchRuleID\": \"xx\",\n \"Info\": \"xx\",\n \"RunningComponent\": [\n \"xx\"\n ],\n \"FirstCreateTime\": \"xx\",\n \"MatchRuleType\": \"xx\",\n \"LastCreateTime\": \"xx\",\n \"AlarmCount\": 1,\n \"Desc\": \"xx\"\n },\n \"RequestId\": \"xx\"\n }\n}",
1533
+ "output": "{\n \"Response\": {\n \"Info\": {\n \"AlarmCount\": 1,\n \"ClusterID\": \"cls-abhq0j4o-666\",\n \"ClusterMasterIP\": \"\",\n \"ClusterName\": \"\",\n \"ClusterRunningStatus\": \"\",\n \"Desc\": \"检测到您的K8s API Server存在匿名用户访问请求,攻击者可利用匿名用户,通过API Server访问集群资源,如进入容器执行命令等。\",\n \"FirstCreateTime\": \"2024-10-22T11:00:45Z\",\n \"HighLightFields\": [\n \"RequestUser\"\n ],\n \"Info\": \"{\\\"Verb\\\": \\\"list\\\", \\\"AuditID\\\": \\\"4e477a26-b171-4702-a2ac-1ac494ae8c85\\\", \\\"PodNameIP\\\": \\\"\\\", \\\"SourceIPS\\\": \\\"[\\\\\\\"10.0.0.4\\\\\\\"]\\\", \\\"UserAgent\\\": \\\"tcss_agent_cluster/v0.0.0 (linux/amd64) kubernetes/$Format\\\", \\\"RequestURI\\\": \\\"/api/v1/namespaces?limit=1\\\", \\\"RequestUser\\\": \\\"{\\\\\\\"groups\\\\\\\":\\\\\\\"[\\\\\\\\\\\\\\\"system:unauthenticated\\\\\\\\\\\\\\\"]\\\\\\\",\\\\\\\"uid\\\\\\\":\\\\\\\"\\\\\\\",\\\\\\\"username\\\\\\\":\\\\\\\"system:anonymous\\\\\\\"}\\\", \\\"MountHostDir\\\": \\\"\\\", \\\"RequestObject\\\": \\\"{\\\\\\\"metadata\\\\\\\":\\\\\\\"\\\\\\\"}\\\", \\\"ResponseObject\\\": \\\"{\\\\\\\"metadata\\\\\\\":\\\\\\\"\\\\\\\"}\\\", \\\"ResponseStatusCode\\\": \\\"200\\\"}\",\n \"K8sVersion\": \"\",\n \"LastCreateTime\": \"2024-10-22T11:00:45Z\",\n \"MatchRule\": {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"HIGH\",\n \"Scope\": \"{\\\"RequestUser\\\": \\\"system:anonymous\\\", \\\"RequestUserGroups\\\": \\\"system:anonymous\\\"}\",\n \"Status\": false\n },\n \"MatchRuleID\": \"SYSTEM\",\n \"MatchRuleName\": \"系统规则\",\n \"MatchRuleType\": \"ANONYMOUS_ACCESS\",\n \"RiskLevel\": \"HIGH\",\n \"RunningComponent\": [],\n \"Status\": \"EVENT_UNDEAL\",\n \"Suggestion\": \"启用匿名用户存在较高的风险,建议您及时停用匿名用户,避免被攻击者利用;并排查来源IP和操作的资源是否属于正常运维操作。\\n1、修改API Server 配置文件(如:/etc/kubernetes/manifests/kube-apiserver.yaml)将anonymous-auth改为false;并修改bind-address,避免监听在0.0.0.0,或使用安全组限制;去掉insecure-port配置。\\n2、禁用kubelet的匿名认证功能,如去除kubelet服务配置文件中的anonymous-auth配置。\\n建议修改配置前,确认是否为业务所需;在修改配置文件前,做好备份。\"\n },\n \"RequestId\": \"8d8d41ab-6dfd-4f66-ad09-4a882485e733\"\n }\n}",
1546
1534
  "title": "查询k8s api 异常事件详情"
1547
1535
  }
1548
1536
  ],
@@ -1550,15 +1538,15 @@
1550
1538
  {
1551
1539
  "document": "",
1552
1540
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalEventList\n<公共请求参数>\n\n{}",
1553
- "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"TotalCount\": 0\n }\n}",
1541
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AlarmCount\": 1,\n \"ClusterID\": \"cls-abhq0j4o-666\",\n \"ClusterName\": \"\",\n \"ClusterRunningStatus\": \"\",\n \"Desc\": \"检测到您的K8s API Server存在匿名用户访问请求,攻击者可利用匿名用户,通过API Server访问集群资源,如进入容器执行命令等。\",\n \"FirstCreateTime\": \"2024-10-22T11:00:45Z\",\n \"ID\": 501472,\n \"LastCreateTime\": \"2024-10-22T11:00:45Z\",\n \"MatchRule\": {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"HIGH\",\n \"Scope\": \"{\\\"RequestUser\\\": \\\"system:anonymous\\\", \\\"RequestUserGroups\\\": \\\"system:anonymous\\\"}\",\n \"Status\": false\n },\n \"MatchRuleType\": \"ANONYMOUS_ACCESS\",\n \"RiskLevel\": \"HIGH\",\n \"RuleName\": \"系统规则\",\n \"RuleType\": \"SYSTEM_DEFINED_RULE\",\n \"Status\": \"EVENT_UNDEAL\",\n \"Suggestion\": \"启用匿名用户存在较高的风险,建议您及时停用匿名用户,避免被攻击者利用;并排查来源IP和操作的资源是否属于正常运维操作。\\n1、修改API Server 配置文件(如:/etc/kubernetes/manifests/kube-apiserver.yaml)将anonymous-auth改为false;并修改bind-address,避免监听在0.0.0.0,或使用安全组限制;去掉insecure-port配置。\\n2、禁用kubelet的匿名认证功能,如去除kubelet服务配置文件中的anonymous-auth配置。\\n建议修改配置前,确认是否为业务所需;在修改配置文件前,做好备份。\"\n }\n ],\n \"RequestId\": \"74b6dcb5-f38e-45f4-9f3f-be848b52466f\",\n \"TotalCount\": 218\n }\n}",
1554
1542
  "title": "查询k8s api异常事件列表"
1555
1543
  }
1556
1544
  ],
1557
1545
  "DescribeK8sApiAbnormalRuleInfo": [
1558
1546
  {
1559
1547
  "document": "",
1560
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalRuleInfo\n<公共请求参数>\n\n{\n \"RuleID\": \"xxx\"\n}",
1561
- "output": "{\n \"Response\": {\n \"Info\": {\n \"Status\": true,\n \"RuleInfoList\": [\n {\n \"Action\": \"xx\",\n \"Scope\": \"xx\",\n \"RiskLevel\": \"xx\",\n \"IsDelete\": true,\n \"Status\": true\n }\n ],\n \"EffectClusterIDSet\": [\n \"xx\"\n ],\n \"RuleID\": \"xx\",\n \"EffectAllCluster\": true,\n \"RuleName\": \"xx\"\n },\n \"RequestId\": \"xx\"\n }\n}",
1548
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalRuleInfo\n<公共请求参数>\n\n{\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\"\n}",
1549
+ "output": "{\n \"Response\": {\n \"Info\": {\n \"Status\": true,\n \"RuleType\": \"USER_DEFINED_RULE\",\n \"RuleInfoList\": [\n {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"NOTICE\",\n \"Scope\": \"{\\\"RequestURI\\\":\\\"/apis/cowsajhhoa.k8s.io/v\\\",\\\"RequestUser\\\":\\\"“name”:”sanpasahsad-contaosaer-leader”)\\\\\\\"\\\",\\\"ResponseStatusCode\\\":\\\"200\\\",\\\"SourceIPS\\\":\\\"10.255.0.43\\\",\\\"UserAgent\\\":\\\"snapshot-controller\\\",\\\"Verb\\\":\\\"update\\\"}\",\n \"Status\": true\n }\n ],\n \"EffectClusterIDSet\": [],\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"EffectAllCluster\": true,\n \"RuleName\": \"rulename-test\"\n },\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1562
1550
  "title": "查询k8sapi异常请求规则详情"
1563
1551
  }
1564
1552
  ],
@@ -1573,8 +1561,8 @@
1573
1561
  "DescribeK8sApiAbnormalRuleScopeList": [
1574
1562
  {
1575
1563
  "document": "",
1576
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalRuleScopeList\n<公共请求参数>\n\n{\n \"Offset\": 1,\n \"Limit\": 1,\n \"RuleID\": \"xxx\",\n \"Filters\": []\n}",
1577
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"Action\": \"xx\",\n \"Scope\": \"xx\",\n \"RiskLevel\": \"xx\",\n \"IsDelete\": true,\n \"Status\": true\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1564
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalRuleScopeList\n<公共请求参数>\n\n{\n \"Offset\": 1,\n \"Limit\": 1,\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"Filters\": []\n}",
1565
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"NOTICE\",\n \"Scope\": \"{\\\"RequestURI\\\":\\\"/apis/cowsajhhoa.k8s.io/v\\\",\\\"RequestUser\\\":\\\"“name”:”sanpasahsad-contaosaer-leader”)\\\\\\\"\\\",\\\"ResponseStatusCode\\\":\\\"200\\\",\\\"SourceIPS\\\":\\\"10.255.0.43\\\",\\\"UserAgent\\\":\\\"snapshot-controller\\\",\\\"Verb\\\":\\\"update\\\"}\",\n \"Status\": true\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1578
1566
  "title": "查询k8sapi异常规则中范围列表"
1579
1567
  }
1580
1568
  ],
@@ -1582,7 +1570,7 @@
1582
1570
  {
1583
1571
  "document": "",
1584
1572
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalSummary\n<公共请求参数>\n\n{}",
1585
- "output": "{\n \"Response\": {\n \"UnhandleEventCount\": 1,\n \"UnhandleHighLevelEventCount\": 1,\n \"UnhandleNoticeLevelEventCount\": 1,\n \"UnhandleLowLevelEventCount\": 1,\n \"RequestId\": \"xx\",\n \"UnhandleMediumLevelEventCount\": 1\n }\n}",
1573
+ "output": "{\n \"Response\": {\n \"UnhandleEventCount\": 1,\n \"UnhandleHighLevelEventCount\": 1,\n \"UnhandleNoticeLevelEventCount\": 1,\n \"UnhandleLowLevelEventCount\": 1,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\",\n \"UnhandleMediumLevelEventCount\": 1\n }\n}",
1586
1574
  "title": "查询k8sapi异常事件统计"
1587
1575
  }
1588
1576
  ],
@@ -1606,7 +1594,7 @@
1606
1594
  {
1607
1595
  "document": "",
1608
1596
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallAuditRecord\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1609
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"AuditList\": [\n {\n \"ClusterName\": \"xx\",\n \"Region\": \"xx\",\n \"ClusterId\": \"xx\",\n \"Uin\": \"xx\",\n \"NetworkPolicyName\": \"xx\",\n \"AppId\": 0,\n \"Action\": \"xx\",\n \"Operation\": \"xx\",\n \"OperationTime\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1597
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"AuditList\": [\n {\n \"ClusterName\": \"tke_test\",\n \"Region\": \"ap-guangzhou\",\n \"ClusterId\": \" cls-jvrv0kf2\",\n \"Uin\": \"10023234334\",\n \"NetworkPolicyName\": \"test\",\n \"AppId\": 346456456,\n \"PolicyId\": \"54645\",\n \"Action\": \"add\",\n \"Operation\": \"Running\",\n \"OperationTime\": \"2024-10-30 12:21:51\"\n }\n ],\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\"\n }\n}",
1610
1598
  "title": "查询集群策略审计列表示例"
1611
1599
  }
1612
1600
  ],
@@ -1614,7 +1602,7 @@
1614
1602
  {
1615
1603
  "document": "",
1616
1604
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallClusterList\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1617
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"ClusterInfoList\": [\n {\n \"ClusterVersion\": \"xx\",\n \"EnableRuleCount\": 8,\n \"ClusterName\": \"xx\",\n \"NetworkPolicyPluginError\": \"xx\",\n \"Region\": \"xx\",\n \"ClusterId\": \"xx\",\n \"ClusterType\": \"xx\",\n \"NetworkPolicyPlugin\": \"xx\",\n \"NetworkPolicyPluginStatus\": \"xx\",\n \"ClusterStatus\": \"xx\",\n \"ClusterOs\": \"xx\",\n \"TotalRuleCount\": 5\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1605
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"ClusterInfoList\": [\n {\n \"ClusterVersion\": \"1.0.0\",\n \"EnableRuleCount\": 8,\n \"ClusterName\": \"tke_test\",\n \"NetworkPolicyPluginError\": \" 网络插件运行状态非RUNNING\",\n \"Region\": \"ap-guangzhou\",\n \"ClusterId\": \"cls-jvrv0kf2\",\n \"ClusterType\": \"MANAGED_CLUSTER\",\n \"NetworkPolicyPlugin\": \" Kube-router\",\n \"NetworkPolicyPluginStatus\": \"Running\",\n \"ClusterStatus\": \"Running\",\n \"ClusterOs\": \" ubuntu18.04.1x86_64\",\n \"ClusterNetworkSettings\": \"Cilium-Overlay\",\n \"TotalRuleCount\": 5\n }\n ],\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\"\n }\n}",
1618
1606
  "title": "查询结果"
1619
1607
  }
1620
1608
  ],
@@ -1660,7 +1648,7 @@
1660
1648
  {
1661
1649
  "document": "",
1662
1650
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 1\n}",
1663
- "output": "{\n \"Response\": {\n \"PolicyName\": \"xx\",\n \"CustomPolicy\": [\n {\n \"Peer\": [\n {\n \"NamespaceSelector\": \"xx\",\n \"PeerType\": \"xx\",\n \"PodSelector\": \"xx\",\n \"IPBlock\": \"xx\"\n }\n ],\n \"Direction\": \"xx\",\n \"Ports\": [\n {\n \"Protocol\": \"xx\",\n \"Port\": \"xx\"\n }\n ]\n }\n ],\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"FromPolicyRule\": 0,\n \"PublishResult\": \"xx\",\n \"Namespace\": \"xx\",\n \"NetworkPolicyPlugin\": \"xx\",\n \"PodSelector\": \"xx\",\n \"PublishStatus\": \"xx\",\n \"ToPolicyRule\": 0,\n \"RequestId\": \"xx\",\n \"PolicyCreateTime\": \"xx\",\n \"PolicySourceType\": \"xx\"\n }\n}",
1651
+ "output": "{\n \"Response\": {\n \"PolicyName\": \"test\",\n \"CustomPolicy\": [\n {\n \"Peer\": [\n {\n \"NamespaceSelector\": \"default\",\n \"PeerType\": \"\",\n \"PodSelector\": \"\",\n \"IPBlock\": \"\"\n }\n ],\n \"Direction\": \"FROM\",\n \"Ports\": [\n {\n \"Protocol\": \"tcp\",\n \"Port\": \"80\"\n }\n ]\n }\n ],\n \"Description\": \"\",\n \"ClusterId\": \"cls-dsfhuisdhfis\",\n \"FromPolicyRule\": 0,\n \"PublishResult\": \"\",\n \"Namespace\": \"default\",\n \"NetworkPolicyPlugin\": \"\",\n \"PodSelector\": \"a=b\",\n \"PublishStatus\": \"running\",\n \"ToPolicyRule\": 0,\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\",\n \"PolicyCreateTime\": \"2024-10-30 12:27:01\",\n \"PolicySourceType\": \"\"\n }\n}",
1664
1652
  "title": "容器网络集群查看策略详情示例"
1665
1653
  }
1666
1654
  ],
@@ -1673,12 +1661,6 @@
1673
1661
  }
1674
1662
  ],
1675
1663
  "DescribeNetworkFirewallPolicyList": [
1676
- {
1677
- "document": "",
1678
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-ee\",\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1679
- "output": "{\n \"Response\": {\n \"RequestId\": \"a6405e01-bf4f-4044-abe9-4458783a3066\",\n \"TotalCount\": 9,\n \"NetPolicy\": [\n {\n \"PolicySourceType\": \"xx\",\n \"FromPolicyRule\": 0,\n \"PublishResult\": \"xx\",\n \"Namespace\": \"xx\",\n \"NetworkPolicyPlugin\": \"xx\",\n \"PolicyCreateTime\": \"xx\",\n \"PublishStatus\": \"xx\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"xx\",\n \"Description\": \"xx\",\n \"Id\": 1,\n \"Name\": \"xx\"\n }\n ]\n }\n}",
1680
- "title": "查询结果"
1681
- },
1682
1664
  {
1683
1665
  "document": "",
1684
1666
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-o9mfjg0i\"\n}",
@@ -1690,7 +1672,7 @@
1690
1672
  {
1691
1673
  "document": "",
1692
1674
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyStatus\n<公共请求参数>\n\n{\n \"TaskId\": \"34702\"\n}",
1693
- "output": "{\n \"Response\": {\n \"RequestId\": \"ed202021-696e-4c03-a726-ca459c47c4ea\",\n \"TaskResult\": [\n \"xx\"\n ],\n \"TaskStatus\": \"Task_Succ\"\n }\n}",
1675
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ed202021-696e-4c03-a726-ca459c47c4ea\",\n \"TaskResult\": [\n \"NameRepeat\"\n ],\n \"TaskStatus\": \"Task_Succ\"\n }\n}",
1694
1676
  "title": "容器网络查询网络策略策略执行状态示例"
1695
1677
  }
1696
1678
  ],
@@ -1698,7 +1680,7 @@
1698
1680
  {
1699
1681
  "document": "",
1700
1682
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Id\": 1\n}",
1701
- "output": "{\n \"Response\": {\n \"PolicyName\": \"xx\",\n \"PolicySourceType\": \"xx\",\n \"NetworkPolicyPlugin\": \"xx\",\n \"PublishResult\": \"xx\",\n \"ClusterId\": \"xx\",\n \"Yaml\": \"xx\",\n \"PublishStatus\": \"xx\",\n \"RequestId\": \"xx\",\n \"PolicyCreateTime\": \"xx\",\n \"Description\": \"xx\"\n }\n}",
1683
+ "output": "{\n \"Response\": {\n \"PolicyName\": \"test\",\n \"PolicySourceType\": \"System\",\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishResult\": \"\",\n \"ClusterId\": \"cls-jvrv0kf2\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\",\n \"PublishStatus\": \"PublishedNoConfirm\",\n \"RequestId\": \"965c55c5-8ab1-4e32-8425-4c44acb5edec\",\n \"PolicyCreateTime\": \"2024-10-30 14:35:57\",\n \"Description\": \"\"\n }\n}",
1702
1684
  "title": "容器网络集群查看Yaml网络策略详情示例"
1703
1685
  }
1704
1686
  ],
@@ -1706,7 +1688,7 @@
1706
1688
  {
1707
1689
  "document": "",
1708
1690
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeNewestVul\n&<公共请求参数>",
1709
- "output": "{\n \"Response\": {\n \"Status\": \"xx\",\n \"CVEID\": \"xx\",\n \"VulName\": \"xx\",\n \"SubmitTime\": \"xx\",\n \"RequestId\": \"xx\",\n \"PocID\": \"xx\"\n }\n}",
1691
+ "output": "{\n \"Response\": {\n \"CVEID\": \"pcmgr-515959\",\n \"PocID\": \"pcmgr-515959\",\n \"RequestId\": \"5da5a2f4-2945-47d1-8b41-84a151fcc007\",\n \"Status\": \"SCANNED\",\n \"SubmitTime\": \"2024-08-27 09:55:12\",\n \"VulName\": \"Nacos Jraft 远程代码执行漏洞\"\n }\n}",
1710
1692
  "title": "查询最新披露漏洞列表"
1711
1693
  }
1712
1694
  ],
@@ -1714,7 +1696,7 @@
1714
1696
  {
1715
1697
  "document": "",
1716
1698
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribePostPayDetail\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1717
- "output": "{\n \"Response\": {\n \"SoftQuotaDayDetail\": [\n {\n \"PayTime\": \"xx\",\n \"CoresCnt\": 1\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1699
+ "output": "{\n \"Response\": {\n \"SoftQuotaDayDetail\": [\n {\n \"PayTime\": \"2024-10-30 10:02:45\",\n \"CoresCnt\": 1\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1718
1700
  "title": "查询后付费详情"
1719
1701
  }
1720
1702
  ],
@@ -1722,7 +1704,7 @@
1722
1704
  {
1723
1705
  "document": "",
1724
1706
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeProVersionInfo\n&<公共请求参数>",
1725
- "output": "{\n \"Response\": {\n \"EndTime\": \"2021-05-01 00:00:00\",\n \"CoresCnt\": 1,\n \"MaxPostPayCoresCnt\": 1,\n \"StartTime\": \"2021-05-31 00:00:00\",\n \"ResourceId\": \"xx\",\n \"BuyStatus\": \"Normal\",\n \"IsPurchased\": false,\n \"RequestId\": \"xx\"\n }\n}",
1707
+ "output": "{\n \"Response\": {\n \"BuyStatus\": \"Normal\",\n \"CoresCnt\": 0,\n \"EndTime\": \"2024-11-19 17:06:40\",\n \"IsPurchased\": false,\n \"MaxPostPayCoresCnt\": 5000,\n \"RequestId\": \"393d941b-835e-44ac-998e-49c07465132a\",\n \"ResourceId\": \"144d0c4a5b622359fd8a382ca914ddd4\",\n \"StartTime\": \"2024-05-19 17:06:40\"\n }\n}",
1726
1708
  "title": "查询专业版需购买信息"
1727
1709
  }
1728
1710
  ],
@@ -1730,7 +1712,7 @@
1730
1712
  {
1731
1713
  "document": "",
1732
1714
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribePromotionActivity\n<公共请求参数>\n\n{\n \"ActiveID\": 10\n}",
1733
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"MonthNum\": 1,\n \"ProfessionalDiscount\": 1,\n \"CoresCountLimit\": 1,\n \"ImageAuthorizationNum\": 1\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1715
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"MonthNum\": 1,\n \"ProfessionalDiscount\": 1,\n \"CoresCountLimit\": 1,\n \"ImageAuthorizationNum\": 1\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
1734
1716
  "title": "查询促销活动"
1735
1717
  }
1736
1718
  ],
@@ -1746,7 +1728,7 @@
1746
1728
  {
1747
1729
  "document": "",
1748
1730
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribePurchaseStateInfo\n<公共请求参数>\n\n{}",
1749
- "output": "{\n \"Response\": {\n \"State\": 0,\n \"AllCoresCnt\": 1,\n \"CoresCnt\": 1,\n \"UndefendCoresCnt\": 1,\n \"AuthorizedCoresCnt\": 1,\n \"GivenAuthorizedCoresCnt\": 0,\n \"CurrentFlexibleCoresCnt\": 1,\n \"ImageCnt\": 1,\n \"AuthorizedImageCnt\": 1,\n \"ExpirationTime\": \"abc\",\n \"PurchasedAuthorizedCnt\": 1,\n \"AutomaticRenewal\": 0,\n \"GivenAuthorizedCnt\": 1,\n \"BeginTime\": \"abc\",\n \"SubState\": \"abc\",\n \"InquireKey\": \"abc\",\n \"DefendPolicy\": \"abc\",\n \"FlexibleCoresLimit\": 1,\n \"DefendClusterCoresCnt\": 1,\n \"DefendHostCoresCnt\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1731
+ "output": "{\n \"Response\": {\n \"AllCoresCnt\": 154,\n \"AuthorizedCoresCnt\": 147,\n \"AuthorizedImageCnt\": 287756,\n \"AutomaticRenewal\": 1,\n \"BeginTime\": \"2024-09-24 13:01:18\",\n \"CoresCnt\": 68,\n \"CurrentFlexibleCoresCnt\": 0,\n \"DefendClusterCoresCnt\": 48,\n \"DefendHostCoresCnt\": 20,\n \"DefendPolicy\": \"Part\",\n \"ExpirationTime\": \"2024-12-24 13:01:18\",\n \"FlexibleCoresLimit\": 5000,\n \"GivenAuthorizedCnt\": 0,\n \"GivenAuthorizedCoresCnt\": 0,\n \"ImageCnt\": 291209,\n \"InquireKey\": \"sv_yunjing_css_pem\",\n \"PurchasedAuthorizedCnt\": 300000,\n \"RequestId\": \"e40cad09-f295-42a8-914d-ea84767fb6f1\",\n \"State\": 3,\n \"SubState\": \"\",\n \"UndefendCoresCnt\": 86\n }\n}",
1750
1732
  "title": "查询容器安全服务已购买信息"
1751
1733
  }
1752
1734
  ],
@@ -1761,8 +1743,8 @@
1761
1743
  "DescribeReverseShellDetail": [
1762
1744
  {
1763
1745
  "document": "",
1764
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellDetail\n&EventId=xxx\n&<公共请求参数>",
1765
- "output": "{\n \"Response\": {\n \"EventBaseInfo\": {\n \"EventId\": \"xx\",\n \"ContainerName\": \"xx\",\n \"ContainerId\": \"xx\",\n \"EventCount\": 0,\n \"EventType\": \"xx\",\n \"HostIP\": \"xx\",\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"Status\": \"xx\",\n \"EventName\": \"xx\",\n \"ImageId\": \"xx\",\n \"ImageName\": \"xx\",\n \"PodName\": \"xx\",\n \"ClientIP\": \"xx\",\n \"LatestFoundTime\": \"xx\",\n \"NodeName\": \"xx\",\n \"ContainerNetStatus\": \"xx\",\n \"ContainerNetSubStatus\": \"xx\",\n \"ContainerIsolateOperationSrc\": \"xx\"\n },\n \"ProcessInfo\": {\n \"ProcessPath\": \"xx\",\n \"ProcessTree\": \"xx\",\n \"ProcessId\": 1,\n \"ProcessAuthority\": \"xx\",\n \"ProcessUserGroup\": \"xx\",\n \"ProcessName\": \"xx\",\n \"ProcessParam\": \"xx\",\n \"ProcessMd5\": \"xx\",\n \"ProcessStartUser\": \"xx\"\n },\n \"EventDetail\": {\n \"DstAddress\": \"xx\",\n \"Remark\": \"xx\",\n \"Description\": \"xx\",\n \"Solution\": \"xx\",\n \"OperationTime\": \"xx\"\n },\n \"AncestorProcessInfo\": {\n \"ProcessPath\": \"xx\",\n \"ProcessParam\": \"xx\",\n \"ProcessStartUser\": \"xx\",\n \"ProcessUserGroup\": \"xx\"\n },\n \"RequestId\": \"xx\",\n \"ParentProcessInfo\": {\n \"ProcessPath\": \"xx\",\n \"ProcessId\": 1,\n \"ProcessUserGroup\": \"xx\",\n \"ProcessName\": \"xx\",\n \"ProcessParam\": \"xx\",\n \"ProcessStartUser\": \"xx\"\n }\n }\n}",
1746
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellDetail\n&EventId=100\n&<公共请求参数>",
1747
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"bash\",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"43.138.142.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"464567\",\n \"EventName\": \"反弹shell\",\n \"EventType\": \"REVERSE_SHELL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-09 10:17:07\",\n \"HostID\": \"45641324-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"ImageId\": \"sha256:345234541324b561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-10-09 10:17:07\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"--\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"/fervent_goodall容器(ID:b18a9a3726...)内存在疑似反弹shell行为\",\n \"DstAddress\": \"175.178.80.251:3387\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 737356,\n \"ProcessName\": \"bash\",\n \"ProcessParam\": \"sh -c bash \",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"\",\n \"ProcessUserGroup\": \"\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 737357,\n \"ProcessMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"ProcessName\": \"bash\",\n \"ProcessParam\": \"bash -i\",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"bash(737357)|bash(737356)|bash(733933)|containerd-shim-runc-v2(2178890)|systemd(1)\",\n \"ProcessUserGroup\": \"root\"\n },\n \"RequestId\": \"a14b6d46-6fa0-48bb-829f-acfa7a58b47a\"\n }\n}",
1766
1748
  "title": "运行时反弹shell事件详细信息"
1767
1749
  }
1768
1750
  ],
@@ -1770,23 +1752,23 @@
1770
1752
  {
1771
1753
  "document": "运行时反弹shell列表",
1772
1754
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellEvents\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1773
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"EventSet\": [\n {\n \"ProcessName\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ImageId\": \"abc\",\n \"ContainerId\": \"abc\",\n \"ImageName\": \"abc\",\n \"ContainerName\": \"abc\",\n \"FoundTime\": \"abc\",\n \"Solution\": \"abc\",\n \"Description\": \"abc\",\n \"Status\": \"abc\",\n \"EventId\": \"abc\",\n \"Remark\": \"abc\",\n \"PProcessName\": \"abc\",\n \"EventCount\": 0,\n \"LatestFoundTime\": \"abc\",\n \"DstAddress\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"ContainerStatus\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
1755
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"b49a9fd917d30b736e76bff07a81e016bb1ced7bd9428b5d076628c80f8c62fd\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"policy\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"policy1\",\n \"DstAddress\": \"10.145.120.27:9000\",\n \"EventCount\": 1,\n \"EventId\": \"5075001\",\n \"FoundTime\": \"2024-10-24 08:38:49\",\n \"HostID\": \"0c4f6c1d-8215-43e2-8dcf-a4fb1db12f41\",\n \"HostIP\": \"10.150.14.152\",\n \"ImageId\": \"sha256:8415e883970de94c3131ff24ffaf9943ea81b3eca0c3d8d747b98581730bcdb6\",\n \"ImageName\": \"registry-cn-shanghai-vpc.ack.aliyuncs.com/acs/terway:v1.8.13\",\n \"LatestFoundTime\": \"2020-10-24 08:38:49\",\n \"NodeID\": \"\",\n \"NodeName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PProcessName\": \"socat\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"dash\",\n \"ProcessPath\": \"/usr/bin/dash\",\n \"PublicIP\": \"\",\n \"Remark\": \"\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\",\n \"Status\": \"EVENT_UNDEAL\"\n },\n {\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"b15e610a7f62b5873902923dfeee2d3ab642f76bd7f1777b3f628158c5b39586\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"policy\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"policy1\",\n \"DstAddress\": \"100.127.196.56:10556\",\n \"EventCount\": 1,\n \"EventId\": \"5067003\",\n \"FoundTime\": \"2020-10-24 08:03:10\",\n \"HostID\": \"fc472648-37ed-4946-a4c9-d72c75e162c4\",\n \"HostIP\": \"10.144.49.213\",\n \"ImageId\": \"sha256:41481aae5e2d135b2624fc09aa1875eb84c6472eaa0929f6d827699e67edd041\",\n \"ImageName\": \"registry\",\n \"LatestFoundTime\": \"2020-10-24 08:03:10\",\n \"NodeID\": \"\",\n \"NodeName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PProcessName\": \"socat\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"dash\",\n \"ProcessPath\": \"/usr/bin/dash\",\n \"PublicIP\": \"\",\n \"Remark\": \"\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"c73a7252-0f68-4203-8b18-52037ab5efd1\",\n \"TotalCount\": 253\n }\n}",
1774
1756
  "title": "运行时反弹shell列表"
1775
1757
  }
1776
1758
  ],
1777
1759
  "DescribeReverseShellEventsExport": [
1778
1760
  {
1779
1761
  "document": "",
1780
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellEventsExport\n&ExportField.0=xxx\n&<公共请求参数>",
1781
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"DownloadUrl\": \"xx\",\n \"JobId\": \"xxx\"\n }\n}",
1762
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellEventsExport\n&<公共请求参数>",
1763
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"\",\n \"JobId\": \"94b72f91-5827-4314-bc65-6b07c0d77a9c\",\n \"RequestId\": \"2f5665c4-6bf5-4d99-a3b5-ee16d5f9bae9\"\n }\n}",
1782
1764
  "title": "查询运行时反弹shell事件列表信息导出"
1783
1765
  }
1784
1766
  ],
1785
1767
  "DescribeReverseShellWhiteListDetail": [
1786
1768
  {
1787
1769
  "document": "",
1788
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellWhiteListDetail\n&WhiteListId=xxx\n&<公共请求参数>",
1789
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"WhiteListDetailInfo\": {\n \"ImageIds\": [\n \"xx\"\n ],\n \"ProcessName\": \"xx\",\n \"DstIp\": \"xx\",\n \"Id\": \"xx\",\n \"DstPort\": \"xx\"\n }\n }\n}",
1770
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellWhiteListDetail\n&WhiteListId=3hg7edh873hf\n&<公共请求参数>",
1771
+ "output": "{\n \"Response\": {\n \"RequestId\": \"6281f7822403e60601d1dba6\",\n \"WhiteListDetailInfo\": {\n \"ImageIds\": [\n \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\"\n ],\n \"ProcessName\": \"/bin/apitest\",\n \"DstIp\": \"1.1.1.1\",\n \"Id\": \"3hg7edh873hf\",\n \"DstPort\": \"1222\"\n }\n }\n}",
1790
1772
  "title": "运行时反弹shell白名单详细信息"
1791
1773
  }
1792
1774
  ],
@@ -1794,7 +1776,7 @@
1794
1776
  {
1795
1777
  "document": "",
1796
1778
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellWhiteLists\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1797
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"xx\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"ImageIds\": [\n \"xx\"\n ],\n \"IsGlobal\": true,\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessName\": \"xx\",\n \"DstIp\": \"xx\",\n \"DstPort\": \"xx\",\n \"Id\": \"xx\",\n \"ImageCount\": 1\n }\n ]\n }\n}",
1779
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"ImageIds\": [\n \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\"\n ],\n \"IsGlobal\": true,\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessName\": \"/bin/apitest\",\n \"DstIp\": \"1.1.1.1\",\n \"DstPort\": \"1222\",\n \"Id\": \"6281f7822403e60601d1dba6\",\n \"ImageCount\": 1\n }\n ]\n }\n}",
1798
1780
  "title": "运行时反弹shell白名单列表"
1799
1781
  }
1800
1782
  ],
@@ -1802,7 +1784,7 @@
1802
1784
  {
1803
1785
  "document": "查询恶意请求事件详情",
1804
1786
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDnsEventDetail\n<公共请求参数>\n\n{\n \"EventID\": \"1\"\n}",
1805
- "output": "{\n \"Response\": {\n \"EventID\": 1,\n \"EventType\": \"abc\",\n \"EventCount\": 1,\n \"FoundTime\": \"abc\",\n \"LatestFoundTime\": \"abc\",\n \"ContainerID\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"ImageID\": \"abc\",\n \"ImageName\": \"abc\",\n \"HostName\": \"abc\",\n \"HostIP\": \"abc\",\n \"PublicIP\": \"abc\",\n \"PodName\": \"abc\",\n \"Description\": \"abc\",\n \"Solution\": \"abc\",\n \"Reference\": [\n \"abc\"\n ],\n \"Address\": \"abc\",\n \"City\": \"abc\",\n \"MatchRuleType\": \"abc\",\n \"FeatureLabel\": \"abc\",\n \"ProcessAuthority\": \"abc\",\n \"ProcessMd5\": \"abc\",\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessTree\": \"abc\",\n \"ProcessParam\": \"abc\",\n \"ParentProcessStartUser\": \"abc\",\n \"ParentProcessUserGroup\": \"abc\",\n \"ParentProcessPath\": \"abc\",\n \"ParentProcessParam\": \"abc\",\n \"AncestorProcessStartUser\": \"abc\",\n \"AncestorProcessUserGroup\": \"abc\",\n \"AncestorProcessPath\": \"abc\",\n \"AncestorProcessParam\": \"abc\",\n \"HostID\": \"abc\",\n \"EventStatus\": \"abc\",\n \"OperationTime\": \"abc\",\n \"Remark\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeName\": \"abc\",\n \"NodeSubNetID\": \"abc\",\n \"NodeSubNetName\": \"abc\",\n \"NodeSubNetCIDR\": \"abc\",\n \"ClusterID\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodStatus\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"NodeID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"Namespace\": \"abc\",\n \"WorkloadType\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
1787
+ "output": "{\n \"Response\": {\n \"Address\": \"www.iuyiyo.cc\",\n \"AncestorProcessParam\": \"/usr/bin/containerd-shim-runc-v2 -namespace moby -id b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5 -address /run/containerd/containerd.sock\",\n \"AncestorProcessPath\": \"/usr/bin/containerd-shim-runc-v2\",\n \"AncestorProcessStartUser\": \"\",\n \"AncestorProcessUserGroup\": \"0:0\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"\",\n \"ContainerStatus\": \"\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 1,\n \"EventID\": 306602,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FeatureLabel\": \"\",\n \"FoundTime\": \"2024-09-29 17:27:15\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:27:15\",\n \"MatchRuleType\": \"USER\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"OperationTime\": \"2024-09-29 17:27:17\",\n \"ParentProcessParam\": \"/bin/bash\",\n \"ParentProcessPath\": \"/usr/bin/bash\",\n \"ParentProcessStartUser\": \"\",\n \"ParentProcessUserGroup\": \"root:root\",\n \"PodIP\": \"\",\n \"PodName\": \"/\",\n \"PodStatus\": \"\",\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessMd5\": \"b8b1ce2ef81accb7febb8ab7f56c1576\",\n \"ProcessParam\": \"curl www.iuyiyo.cc\",\n \"ProcessPath\": \"/usr/bin/curl\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"curl(2206566)_bash(2178914)_containerd-shim-runc-v2(2178890)_systemd(1)\",\n \"ProcessUserGroup\": \"root:root\",\n \"PublicIP\": \"43.138.142.208\",\n \"Reference\": [\n \"暂无\"\n ],\n \"Remark\": \"\",\n \"RequestId\": \"52fe1ea9-4826-4f8e-bc8b-61faae09683b\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\",\n \"WorkloadType\": \"\"\n }\n}",
1806
1788
  "title": "查询恶意请求事件详情"
1807
1789
  }
1808
1790
  ],
@@ -1810,7 +1792,7 @@
1810
1792
  {
1811
1793
  "document": "查询恶意请求事件列表",
1812
1794
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDnsList\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
1813
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"EventID\": 1,\n \"EventType\": \"abc\",\n \"Address\": \"abc\",\n \"ContainerID\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"ImageID\": \"abc\",\n \"ImageName\": \"abc\",\n \"FoundTime\": \"abc\",\n \"LatestFoundTime\": \"abc\",\n \"EventStatus\": \"abc\",\n \"EventCount\": 0,\n \"Description\": \"abc\",\n \"Solution\": \"abc\",\n \"City\": \"abc\",\n \"HostName\": \"abc\",\n \"HostID\": \"abc\",\n \"HostIP\": \"abc\",\n \"PublicIP\": \"abc\",\n \"NodeType\": \"SUPER\",\n \"NodeName\": \"abc\",\n \"ClusterID\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodName\": \"abc\"\n }\n ],\n \"TotalCount\": 0,\n \"RequestId\": \"abc\"\n }\n}",
1795
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Address\": \"www.iuyiyo.cc\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 1,\n \"EventID\": 306602,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FoundTime\": \"2024-09-29 17:27:15\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:27:15\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"/\",\n \"PublicIP\": \"43.138.142.208\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\"\n },\n {\n \"Address\": \"www.baidu.com\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 3,\n \"EventID\": 306601,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FoundTime\": \"2024-09-29 17:15:41\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:19:18\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"/\",\n \"PublicIP\": \"43.138.142.208\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\"\n }\n ],\n \"RequestId\": \"8edec175-6938-41a7-80e1-b685cc37154c\",\n \"TotalCount\": 2\n }\n}",
1814
1796
  "title": "查询恶意请求事件列表"
1815
1797
  }
1816
1798
  ],
@@ -1818,15 +1800,15 @@
1818
1800
  {
1819
1801
  "document": "",
1820
1802
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-0zmsjvko\",\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1821
- "output": "{\n \"Response\": {\n \"RequestId\": \"ada3da6c-7aa9-48a7-9bdd-c9ae192fef65\",\n \"TotalCount\": 18,\n \"ClusterRiskItems\": [\n {\n \"CheckItem\": {\n \"CheckItemId\": 1,\n \"Name\": \"runc 安全漏洞\",\n \"ItemDetail\": \"runc是一款用于根据OCI规范生成和运行容器的CLI(命令行界面)工具。runc存在安全漏洞,攻击者可利用该漏洞将主机文件系统绑定到容器中。\",\n \"RiskLevel\": \"Serious\",\n \"RiskTarget\": \"runC\",\n \"RiskType\": \"CVERisk\",\n \"RiskAttribute\": \"PrivilegePromotion\",\n \"RiskProperty\": \"ExistPOC ExistEXP RemoteExploit ServerRestart\",\n \"CVENumber\": \"CVE-2021-30465\",\n \"DiscoverTime\": \"2021-05-27 21:15:00\",\n \"Solution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r\",\n \"CVSS\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\n \"CVSSScore\": \"8.5\",\n \"RelateLink\": \"https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r https://github.com/opencontainers/runc/releases http://www.openwall.com/lists/oss-security/2021/05/19/2\",\n \"AffectedType\": \"Node\",\n \"AffectedVersion\": \"\"\n },\n \"VerifyInfo\": \"\",\n \"ErrorMessage\": \"\",\n \"AffectedClusterCount\": 1,\n \"AffectedNodeCount\": 2\n },\n {\n \"CheckItem\": {\n \"CheckItemId\": 2,\n \"Name\": \"Apache containerd 安全漏洞\",\n \"ItemDetail\": \"containerd是美国阿帕奇(Apache)基金会的一个容器守护进程。该进程根据RunCOCI规范负责控制宿主机上容器的完整周期。containerd1.3.9之前版本和1.4.3版本存在安全漏洞,该漏洞源于containerd-shimAPI被不正确地公开给主机网络容器。shimsAPI套接字的访问控制验证了连接进程的有效UID为0,但是没有限制对抽象Unix域套接字的访问。这将允许在与shim相同的网络名称空间中运行的恶意容器,其有效UID为0,但在其他方面减少了特权,从而导致使用elevat运行新进程。\",\n \"RiskLevel\": \"Middle\",\n \"RiskTarget\": \"Containerd\",\n \"RiskType\": \"CVERisk\",\n \"RiskAttribute\": \"PrivilegePromotion\",\n \"RiskProperty\": \"ExistPOC ExistEXP ServerRestart\",\n \"CVENumber\": \"CVE-2020-15257\",\n \"DiscoverTime\": \"2020-12-01 11:15:00\",\n \"Solution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad\",\n \"CVSS\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N\",\n \"CVSSScore\": \"5.2\",\n \"RelateLink\": \"https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad https://github.com/containerd/containerd/releases/tag/v1.4.3 https://github.com/containerd/containerd/security/advisories/GHSA-36xw-fx78-c5r4\",\n \"AffectedType\": \"Node\",\n \"AffectedVersion\": \"\"\n },\n \"VerifyInfo\": \"\",\n \"ErrorMessage\": \"\",\n \"AffectedClusterCount\": 1,\n \"AffectedNodeCount\": 2\n }\n ]\n }\n}",
1803
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ada3da6c-7aa9-48a7-9bdd-c9ae192fef65\",\n \"TotalCount\": 18,\n \"ClusterRiskItems\": [\n {\n \"CheckItem\": {\n \"CheckItemId\": 2,\n \"Name\": \"Apache containerd 安全漏洞\",\n \"ItemDetail\": \"containerd是美国阿帕奇(Apache)基金会的一个容器守护进程。该进程根据RunCOCI规范负责控制宿主机上容器的完整周期。containerd1.3.9之前版本和1.4.3版本存在安全漏洞,该漏洞源于containerd-shimAPI被不正确地公开给主机网络容器。shimsAPI套接字的访问控制验证了连接进程的有效UID为0,但是没有限制对抽象Unix域套接字的访问。这将允许在与shim相同的网络名称空间中运行的恶意容器,其有效UID为0,但在其他方面减少了特权,从而导致使用elevat运行新进程。\",\n \"RiskLevel\": \"Middle\",\n \"RiskTarget\": \"Containerd\",\n \"RiskType\": \"CVERisk\",\n \"RiskAttribute\": \"PrivilegePromotion\",\n \"RiskProperty\": \"ExistPOC ExistEXP ServerRestart\",\n \"CVENumber\": \"CVE-2020-15257\",\n \"DiscoverTime\": \"2020-12-01 11:15:00\",\n \"Solution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad\",\n \"CVSS\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N\",\n \"CVSSScore\": \"5.2\",\n \"RelateLink\": \"https://\",\n \"AffectedType\": \"Node\",\n \"AffectedVersion\": \"\",\n \"IgnoredAssetNum\": 0,\n \"IsIgnored\": true,\n \"RiskAssessment\": \"test\"\n },\n \"VerifyInfo\": \"\",\n \"ErrorMessage\": \"\",\n \"AffectedClusterCount\": 1,\n \"AffectedNodeCount\": 2\n }\n ]\n }\n}",
1822
1804
  "title": "查询集群风险项列表示例"
1823
1805
  }
1824
1806
  ],
1825
1807
  "DescribeRiskSyscallDetail": [
1826
1808
  {
1827
1809
  "document": "运行时高危系统调用事件详细信息",
1828
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskSyscallDetail\n<公共请求参数>\n\n{\n \"EventId\": \"abc\"\n}",
1829
- "output": "{\n \"Response\": {\n \"EventBaseInfo\": {\n \"EventId\": \"abc\",\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"ContainerId\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ImageId\": \"abc\",\n \"ImageName\": \"abc\",\n \"NodeName\": \"abc\",\n \"Status\": \"abc\",\n \"EventName\": \"abc\",\n \"EventType\": \"abc\",\n \"EventCount\": 0,\n \"LatestFoundTime\": \"abc\",\n \"HostIP\": \"abc\",\n \"ClientIP\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"NodeID\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeSubNetID\": \"abc\",\n \"NodeSubNetName\": \"abc\",\n \"NodeSubNetCIDR\": \"abc\",\n \"PodName\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodStatus\": \"abc\",\n \"ClusterID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"HostID\": \"abc\",\n \"Namespace\": \"abc\",\n \"WorkloadType\": \"abc\"\n },\n \"ProcessInfo\": {\n \"ProcessName\": \"abc\",\n \"ProcessAuthority\": \"abc\",\n \"ProcessId\": 1,\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessTree\": \"abc\",\n \"ProcessMd5\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"ParentProcessInfo\": {\n \"ProcessName\": \"abc\",\n \"ProcessId\": 1,\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"EventDetail\": {\n \"Description\": \"abc\",\n \"Solution\": \"abc\",\n \"Remark\": \"abc\",\n \"SyscallName\": \"abc\",\n \"OperationTime\": \"abc\"\n },\n \"AncestorProcessInfo\": {\n \"ProcessStartUser\": \"abc\",\n \"ProcessUserGroup\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessParam\": \"abc\"\n },\n \"RequestId\": \"abc\"\n }\n}",
1810
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskSyscallDetail\n<公共请求参数>\n\n{\n \"EventId\": \"ad134-cdadfa\"\n}",
1811
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"containerd --config /var/run/docker/containerd/containerd.toml --log-level warn\",\n \"ProcessPath\": \"/usr/bin/containerd\",\n \"ProcessStartUser\": \"0\",\n \"ProcessUserGroup\": \"0\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"175.178.113.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"11141114111402dedad4deccf17c7b307dbd6b47d31114111411141324\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/k8s_xenon_mysql-tce-cwp-mysql-2_sso_c9fdfba4-e31a-46bc-a43a-111411141114_0\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 130,\n \"EventId\": \"5124493\",\n \"EventName\": \"高危系统调用\",\n \"EventType\": \"RISK_SYSCALL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-23 00:05:17\",\n \"HostID\": \"11141114-66fd-4171-93eb-2f4fc36ef1e1\",\n \"HostIP\": \"10.0.0.105\",\n \"ImageId\": \"sha256:11141114e95dce36e8455cf657e1e54d74bb8fac6111411141114\",\n \"ImageName\": \"registry.tce.com/service-vendors/mysql-xenon:8.0.32-20240524-155426-11141114.rhel.amd64\",\n \"LatestFoundTime\": \"2024-10-23 17:02:47\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"tcs-10-0-0-105\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"--\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"sergid会导致运行进程的账号权限变更,可能带来安全风险\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"\",\n \"Solution\": \"使用存在潜在风险的系统调用,可能导致容器逃逸。建议对于不常用的系统调用,禁止容器使用,并及时更新宿主机的系统漏洞\",\n \"SyscallName\": \"\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 330852,\n \"ProcessName\": \"containerd-shim\",\n \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\",\n \"ProcessPath\": \"/usr/bin/containerd-shim\",\n \"ProcessStartUser\": \"\",\n \"ProcessUserGroup\": \"\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2907621,\n \"ProcessMd5\": \"\",\n \"ProcessName\": \"xenoncli\",\n \"ProcessParam\": \"xenoncli xenon ping\",\n \"ProcessPath\": \"/usr/local/bin/xenoncli\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"d1dd6ed1-0424-4dc8-a3e1-6e6b17fed637\"\n }\n}",
1830
1812
  "title": "运行时高危系统调用事件详细信息"
1831
1813
  }
1832
1814
  ],
@@ -1834,15 +1816,15 @@
1834
1816
  {
1835
1817
  "document": "运行时高危系统调用接口",
1836
1818
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskSyscallEvents\n<公共请求参数>\n\n{}",
1837
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"EventSet\": [\n {\n \"ProcessName\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ImageId\": \"abc\",\n \"ContainerId\": \"abc\",\n \"ImageName\": \"abc\",\n \"ContainerName\": \"abc\",\n \"FoundTime\": \"abc\",\n \"Solution\": \"abc\",\n \"Description\": \"abc\",\n \"SyscallName\": \"abc\",\n \"Status\": \"abc\",\n \"EventId\": \"abc\",\n \"NodeName\": \"abc\",\n \"PodName\": \"abc\",\n \"Remark\": \"abc\",\n \"RuleExist\": true,\n \"EventCount\": 0,\n \"LatestFoundTime\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"ContainerStatus\": \"abc\",\n \"NodeType\": \"abc\",\n \"ClusterID\": \"abc\",\n \"PodIP\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"PublicIP\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
1819
+ "output": "{\n \"Response\": {\n \"EventSet\": [],\n \"RequestId\": \"48d997cd-353a-4457-929f-dc9183161462\",\n \"TotalCount\": 0\n }\n}",
1838
1820
  "title": "运行时高危系统调用接口"
1839
1821
  }
1840
1822
  ],
1841
1823
  "DescribeRiskSyscallEventsExport": [
1842
1824
  {
1843
1825
  "document": "",
1844
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallEventsExport\n&ExportField.0=xxx\n&<公共请求参数>",
1845
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"DownloadUrl\": \"xx\",\n \"JobId\": \"xx\"\n }\n}",
1826
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallEventsExport\n&ExportField.0=filed_name\n&<公共请求参数>",
1827
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"DownloadUrl\": \"\",\n \"JobId\": \"10001\"\n }\n}",
1846
1828
  "title": "查询运行时异常进程事件列表信息导出"
1847
1829
  }
1848
1830
  ],
@@ -1850,15 +1832,15 @@
1850
1832
  {
1851
1833
  "document": "",
1852
1834
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallNames\n&<公共请求参数>",
1853
- "output": "{\n \"Response\": {\n \"SyscallNames\": [\n \"chroot\"\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"xx\"\n }\n}",
1835
+ "output": "{\n \"Response\": {\n \"SyscallNames\": [\n \"chroot\"\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1854
1836
  "title": "运行时高危系统调用系统名称列表"
1855
1837
  }
1856
1838
  ],
1857
1839
  "DescribeRiskSyscallWhiteListDetail": [
1858
1840
  {
1859
1841
  "document": "",
1860
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallWhiteListDetail\n&WhiteListId=xxx\n&<公共请求参数>",
1861
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"WhiteListDetailInfo\": {\n \"SyscallNames\": [\n \"chroot\"\n ],\n \"ImageIds\": [\n \"xx\"\n ],\n \"Id\": \"xx\",\n \"ProcessPath\": \"xx\"\n }\n }\n}",
1842
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallWhiteListDetail\n&WhiteListId=45645\n&<公共请求参数>",
1843
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"WhiteListDetailInfo\": {\n \"SyscallNames\": [\n \"chroot\"\n ],\n \"ImageIds\": [\n \"image-id\"\n ],\n \"Id\": \"10001\",\n \"ProcessPath\": \"/bin/sh\"\n }\n }\n}",
1862
1844
  "title": "运行时高危系统调用白名单详细信息"
1863
1845
  }
1864
1846
  ],
@@ -1866,7 +1848,7 @@
1866
1848
  {
1867
1849
  "document": "",
1868
1850
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallWhiteLists\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1869
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"xx\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"SyscallNames\": [\n \"chroot\",\n \"kill\"\n ],\n \"ImageIds\": [\n \"xx\"\n ],\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessPath\": \"xx\",\n \"Id\": \"xx\",\n \"ImageCount\": 1,\n \"IsGlobal\": true\n }\n ]\n }\n}",
1851
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"SyscallNames\": [\n \"chroot\",\n \"kill\"\n ],\n \"ImageIds\": [\n \"image-id\"\n ],\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessPath\": \"/usr/bin/sh\",\n \"Id\": \"10001\",\n \"ImageCount\": 1,\n \"IsGlobal\": true\n }\n ]\n }\n}",
1870
1852
  "title": "运行时高危系统调用白名单列表"
1871
1853
  }
1872
1854
  ],
@@ -1874,7 +1856,7 @@
1874
1856
  {
1875
1857
  "document": "",
1876
1858
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeScanIgnoreVulList\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1877
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"IsIgnoreAll\": 0,\n \"CVEID\": \"xx\",\n \"RegistryImageCount\": 0,\n \"VulName\": \"xx\",\n \"UpdateTime\": \"xx\",\n \"PocID\": \"xx\",\n \"LocalImageCount\": 0\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1859
+ "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"CVEID\": \"CVE-2012-6329\",\n \"IsIgnoreAll\": 1,\n \"LocalImageCount\": 0,\n \"PocID\": \"pcmgr-171244\",\n \"RegistryImageCount\": 0,\n \"UpdateTime\": \"2024-05-21 16:56:04\",\n \"VulName\": \"Perl 任意代码执行漏洞(CVE-2012-6329)\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1878
1860
  "title": "查询扫描忽略的漏洞列表"
1879
1861
  }
1880
1862
  ],
@@ -1890,7 +1872,7 @@
1890
1872
  {
1891
1873
  "document": "",
1892
1874
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSearchLogs\n<公共请求参数>\n\n{}",
1893
- "output": "{\n \"Response\": {\n \"Data\": [\n \"test\",\n \"106.55.40.250\",\n \"106.55.35.160\"\n ],\n \"RequestId\": \"498e4cab-e95d-430b-bc4c-f5821bb278d4\"\n }\n}",
1875
+ "output": "{\n \"Response\": {\n \"Data\": [\n \"test\",\n \"test2\",\n \"test3\"\n ],\n \"RequestId\": \"498e4cab-e95d-430b-bc4c-f5821bb278d4\"\n }\n}",
1894
1876
  "title": "获取历史搜索记录"
1895
1877
  }
1896
1878
  ],
@@ -1906,7 +1888,7 @@
1906
1888
  {
1907
1889
  "document": "",
1908
1890
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeSecEventsTendency\n&EndTime=2020-09-22\n&StartTime=2020-09-22\n&<公共请求参数>",
1909
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"EventTendencySet\": [\n {\n \"EventSet\": [\n {\n \"Cnt\": 1,\n \"CurTime\": \"2020-09-22\"\n }\n ],\n \"EventType\": \"xx\"\n }\n ]\n }\n}",
1891
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"EventTendencySet\": [\n {\n \"EventSet\": [\n {\n \"Cnt\": 1,\n \"CurTime\": \"2020-09-22\"\n }\n ],\n \"EventType\": \"ET_ABNORMAL_PROCESS\"\n }\n ]\n }\n}",
1910
1892
  "title": "获取运行时安全事件新增趋势"
1911
1893
  }
1912
1894
  ],
@@ -1914,7 +1896,7 @@
1914
1896
  {
1915
1897
  "document": "",
1916
1898
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogAlertMsg\n<公共请求参数>\n\n{\n \"Type\": [\n \"log_reserve_full\"\n ]\n}",
1917
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"MsgValue\": \"xx\",\n \"MsgType\": \"xx\",\n \"State\": true\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1899
+ "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"627c34c0-e564-4352-92f8-98042f99b1f8\"\n }\n}",
1918
1900
  "title": "查询安全日志告警信息"
1919
1901
  }
1920
1902
  ],
@@ -1930,7 +1912,7 @@
1930
1912
  {
1931
1913
  "document": "",
1932
1914
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryClsOptions\n<公共请求参数>\n\n{\n \"ClsRegion\": \"\"\n}",
1933
- "output": "{\n \"Response\": {\n \"LogSetList\": [\n {\n \"LogsetName\": \"xx\",\n \"TopicList\": [\n {\n \"TopicName\": \"xx\",\n \"TopicID\": \"xx\"\n }\n ],\n \"LogsetID\": \"xx\"\n }\n ],\n \"RegionList\": [\n {\n \"Region\": \"ap-guangzhou\",\n \"RegionName\": \"广州\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1915
+ "output": "{\n \"Response\": {\n \"LogSetList\": [],\n \"RegionList\": [\n {\n \"Region\": \"ap-bangkok\",\n \"RegionName\": \"亚太东南(曼谷)\"\n },\n {\n \"Region\": \"ap-beijing\",\n \"RegionName\": \"华北地区(北京)\"\n },\n {\n \"Region\": \"ap-chengdu\",\n \"RegionName\": \"西南地区(成都)\"\n }\n ],\n \"RequestId\": \"31c5ca59-2ed8-4b22-8ebf-6ba5003caea3\"\n }\n}",
1934
1916
  "title": "查询安全日志投递cls可选项"
1935
1917
  }
1936
1918
  ],
@@ -1938,7 +1920,7 @@
1938
1920
  {
1939
1921
  "document": "",
1940
1922
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryClsSetting\n<公共请求参数>\n\n{}",
1941
- "output": "{\n \"Response\": {\n \"LogTypeList\": [\n {\n \"LogSet\": \"xx\",\n \"LogType\": \"xx\",\n \"State\": true,\n \"Region\": \"xx\",\n \"TopicID\": \"xx\"\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1923
+ "output": "{\n \"Response\": {\n \"LogTypeList\": [\n {\n \"LogSet\": \"\",\n \"LogSetName\": \"\",\n \"LogType\": \"container_bash\",\n \"Region\": \"\",\n \"State\": false,\n \"TopicID\": \"\",\n \"TopicName\": \"\"\n },\n {\n \"LogSet\": \"\",\n \"LogSetName\": \"\",\n \"LogType\": \"container_launch\",\n \"Region\": \"\",\n \"State\": false,\n \"TopicID\": \"\",\n \"TopicName\": \"\"\n },\n {\n \"LogSet\": \"\",\n \"LogSetName\": \"\",\n \"LogType\": \"k8s_api\",\n \"Region\": \"\",\n \"State\": false,\n \"TopicID\": \"\",\n \"TopicName\": \"\"\n }\n ],\n \"RequestId\": \"1279ad3b-a5aa-46ea-825d-3124cc19112a\"\n }\n}",
1942
1924
  "title": "查询安全日志投递Cls配置"
1943
1925
  }
1944
1926
  ],
@@ -1946,7 +1928,7 @@
1946
1928
  {
1947
1929
  "document": "",
1948
1930
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryKafkaOptions\n<公共请求参数>\n\n{}",
1949
- "output": "{\n \"Response\": {\n \"InstanceList\": [\n {\n \"InstanceID\": \"xx\",\n \"TopicList\": [\n {\n \"TopicID\": \"xx\",\n \"TopicName\": \"xx\"\n }\n ],\n \"RouteList\": [\n {\n \"Domain\": \"xx\",\n \"AccessType\": 0,\n \"RouteID\": 0,\n \"Vip\": \"xx\",\n \"DomainPort\": 1,\n \"VipType\": 0\n }\n ],\n \"InstanceName\": \"xx\"\n }\n ],\n \"RegionList\": [\n {\n \"Region\": \"ap-guangzhou\",\n \"RegionName\": \"广州\"\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1931
+ "output": "{\n \"Response\": {\n \"InstanceList\": [],\n \"RegionList\": [\n {\n \"Region\": \"ap-bangkok\",\n \"RegionName\": \"亚太东南(曼谷)\"\n },\n {\n \"Region\": \"ap-beijing\",\n \"RegionName\": \"华北地区(北京)\"\n },\n {\n \"Region\": \"ap-beijing-fsi\",\n \"RegionName\": \"华北地区(北京金融)\"\n },\n {\n \"Region\": \"ap-changsha-ec\",\n \"RegionName\": \"华中地区(长沙ec)\"\n },\n {\n \"Region\": \"ap-chengdu\",\n \"RegionName\": \"西南地区(成都)\"\n },\n {\n \"Region\": \"ap-chongqing\",\n \"RegionName\": \"西南地区(重庆)\"\n }\n ],\n \"RequestId\": \"a9761df9-00d1-4102-8176-0c9be0e11c59\"\n }\n}",
1950
1932
  "title": "查询安全日志投递kafka可选项"
1951
1933
  }
1952
1934
  ],
@@ -1954,7 +1936,7 @@
1954
1936
  {
1955
1937
  "document": "",
1956
1938
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryKafkaSetting\n<公共请求参数>\n\n{}",
1957
- "output": "{\n \"Response\": {\n \"InstanceID\": \"实例ID\",\n \"InstanceName\": \"实例名称\",\n \"Domain\": \"域名\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"主题ID\",\n \"TopicName\": \"主题名称\",\n \"State\": true\n }\n ],\n \"User\": \"test\",\n \"RegionID\": \"xxx\",\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1939
+ "output": "{\n \"Response\": {\n \"InstanceID\": \"实例ID\",\n \"InstanceName\": \"实例名称\",\n \"Domain\": \"域名\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"主题ID\",\n \"TopicName\": \"主题名称\",\n \"State\": true\n }\n ],\n \"User\": \"test\",\n \"RegionID\": \"ap-beijing\",\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1958
1940
  "title": "查询安全日志投递kafka配置"
1959
1941
  }
1960
1942
  ],
@@ -1962,7 +1944,7 @@
1962
1944
  {
1963
1945
  "document": "查询安全日志接入对象列表",
1964
1946
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogJoinObjectList\n<公共请求参数>\n\n{\n \"LogType\": \"container_bash\",\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"Status\",\n \"Values\": [\n \"ONLINE\",\n \"OFFLINE\",\n \"UNINSTALL\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
1965
- "output": "{\n \"Response\": {\n \"AutoJoin\": false,\n \"ExcludedCount\": 0,\n \"List\": [\n {\n \"ClusterID\": \"cls-q0bc0ed2\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"tke2\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"v1.26.1-tke.5\",\n \"ContainerCnt\": 23,\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"HostIP\": \"172.17.1.6\",\n \"HostName\": \"tke_cls-q0bc0ed2_worker\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"159.75.90.217\"\n },\n {\n \"ClusterID\": \"cls-cuszrpiu\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"测试用常驻集群_ivon\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"v1.28.3-tke.4\",\n \"ContainerCnt\": 27,\n \"HostID\": \"f4a8f409-0048-4c91-a58f-165750b2dc00\",\n \"HostIP\": \"10.0.3.211\",\n \"HostName\": \"tke_cls-cuszrpiu_worker\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"106.52.4.208\"\n },\n {\n \"ClusterID\": \"cls-5licssbi\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"piper-容器告警接入安全中心测试\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"v1.22.5-tke.25\",\n \"ContainerCnt\": 40,\n \"HostID\": \"470854d7-40ff-4a3a-a2f8-b44bf99511e5\",\n \"HostIP\": \"172.17.1.53\",\n \"HostName\": \"as-tke-np-7lmwo8pi\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"42.194.189.232\"\n },\n {\n \"ClusterID\": \"cls-7dget88s\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"飞舟测试-tmp\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"v1.28.3-tke.4\",\n \"ContainerCnt\": 17,\n \"HostID\": \"4d43d069-e9cf-49ce-9417-2cc542f6c7be\",\n \"HostIP\": \"172.17.1.56\",\n \"HostName\": \"飞舟集群测试-tmp1\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"175.178.25.145\"\n },\n {\n \"ClusterID\": \"\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"\",\n \"ContainerCnt\": 0,\n \"HostID\": \"6a874de8-c3ba-460e-99c6-5e14a6573bfc\",\n \"HostIP\": \"10.206.16.6\",\n \"HostName\": \"tcs-dev-proxy\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"118.195.143.65\"\n },\n {\n \"ClusterID\": \"\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"\",\n \"ContainerCnt\": 0,\n \"HostID\": \"192ba964-f190-4aff-8d6c-9c00251f11c3\",\n \"HostIP\": \"10.0.12.22\",\n \"HostName\": \"系统兼容性测试-ivon\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"43.136.100.158\"\n },\n {\n \"ClusterID\": \"\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"\",\n \"ContainerCnt\": 5,\n \"HostID\": \"d2f4a77b-d9c9-4161-999f-fbda13ed17fc\",\n \"HostIP\": \"172.17.1.71\",\n \"HostName\": \"v_ixnli告警测试\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"119.29.10.130\"\n },\n {\n \"ClusterID\": \"cls-7dget88s\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"飞舟测试-tmp\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"v1.28.3-tke.4\",\n \"ContainerCnt\": 17,\n \"HostID\": \"428fb819-bc1e-4b0a-8bc1-a9fc2d6ac950\",\n \"HostIP\": \"172.17.1.11\",\n \"HostName\": \"飞舟集群测试-tmp2\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"119.91.62.58\"\n },\n {\n \"ClusterID\": \"\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"\",\n \"ContainerCnt\": 1,\n \"HostID\": \"8ff28261-b2c7-4f68-9314-453a52aa1ea0\",\n \"HostIP\": \"172.16.50.116\",\n \"HostName\": \"云镜漏洞测试机-攻击机器\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"175.178.69.167\"\n },\n {\n \"ClusterID\": \"\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"\",\n \"ContainerCnt\": 12,\n \"HostID\": \"380add75-bb06-4cc4-84c5-cf806d102fba\",\n \"HostIP\": \"172.16.51.209\",\n \"HostName\": \"harborV2_yancyw\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"139.199.178.171\"\n }\n ],\n \"RangeType\": 1,\n \"RequestId\": \"a38b89a7-fbdf-4133-9981-1c09a5a94895\",\n \"TotalCount\": 55\n }\n}",
1947
+ "output": "{\n \"Response\": {\n \"AutoJoin\": false,\n \"ExcludedCount\": 0,\n \"List\": [\n {\n \"ClusterID\": \"cls-q0bc0ed2\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"tke2\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"v1.26.1-tke.5\",\n \"ContainerCnt\": 23,\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"HostIP\": \"172.17.1.6\",\n \"HostName\": \"tke_cls-q0bc0ed2_worker\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"159.75.90.217\"\n }\n ],\n \"RangeType\": 1,\n \"RequestId\": \"a38b89a7-fbdf-4133-9981-1c09a5a94895\",\n \"TotalCount\": 55\n }\n}",
1966
1948
  "title": "查询安全日志接入对象列表"
1967
1949
  }
1968
1950
  ],
@@ -1970,7 +1952,7 @@
1970
1952
  {
1971
1953
  "document": "查询安全日志接入列表",
1972
1954
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogJoinTypeList\n<公共请求参数>\n\n{}",
1973
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Count\": 1,\n \"SuperNodeCount\": 1,\n \"IsJoined\": true,\n \"LogType\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
1955
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Count\": 1,\n \"SuperNodeCount\": 1,\n \"IsJoined\": true,\n \"LogType\": \"local\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1974
1956
  "title": "查询安全日志接入列表"
1975
1957
  }
1976
1958
  ],
@@ -1978,7 +1960,7 @@
1978
1960
  {
1979
1961
  "document": "",
1980
1962
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogKafkaUIN\n<公共请求参数>\n\n{}",
1981
- "output": "{\n \"Response\": {\n \"DstUIN\": \"xxxx\",\n \"Status\": true,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1963
+ "output": "{\n \"Response\": {\n \"DstUIN\": \"34564565\",\n \"Status\": true,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1982
1964
  "title": "查询安全日志KafkaUIN"
1983
1965
  }
1984
1966
  ],
@@ -1986,7 +1968,7 @@
1986
1968
  {
1987
1969
  "document": "",
1988
1970
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogVasInfo\n<公共请求参数>\n\n{}",
1989
- "output": "{\n \"Response\": {\n \"LogSaveMonth\": 1,\n \"EndTime\": \"xxx\",\n \"StartTime\": \"xxx\",\n \"BuyStatus\": \"Pending\",\n \"LogCapacity\": 10,\n \"TrialCapacity\": 10,\n \"ResourceID\": \"xxx\",\n \"IsPurchased\": false,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1971
+ "output": "{\n \"Response\": {\n \"BuyStatus\": \"Normal\",\n \"EndTime\": \"2024-11-10 10:29:29\",\n \"IsPurchased\": true,\n \"LogCapacity\": 640,\n \"LogSaveMonth\": 13,\n \"RequestId\": \"ca51f9af-a141-4deb-a69d-0f82062946e8\",\n \"ResourceID\": \"9367de1b00589c31fab4c794a97139bf\",\n \"StartTime\": \"2023-10-10 10:29:29\",\n \"TrialCapacity\": 10\n }\n}",
1990
1972
  "title": "查询安全日志商品信息"
1991
1973
  }
1992
1974
  ],
@@ -1994,7 +1976,7 @@
1994
1976
  {
1995
1977
  "document": "查询超级节点pod列表",
1996
1978
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSuperNodePodList\n<公共请求参数>\n\n{}",
1997
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"PodName\": \"abc\",\n \"PodIP\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"Status\": \"abc\",\n \"CpuRequest\": 0,\n \"CpuLimit\": 0,\n \"MemRequest\": 0,\n \"MemLimit\": 0,\n \"Namespace\": \"abc\",\n \"DeploymentName\": \"abc\",\n \"DeploymentID\": \"abc\",\n \"StartTime\": \"abc\",\n \"CreateTime\": \"abc\",\n \"RelateContainerCount\": 1,\n \"RunningTime\": \"abc\",\n \"PodUid\": \"abc\",\n \"ChargeCoresCnt\": 1,\n \"DefendStatus\": \"abc\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
1979
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"PodName\": \"web-node1\",\n \"PodIP\": \"10.0.0.11\",\n \"NodeUniqueID\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"Status\": \"Running\",\n \"CpuRequest\": 0,\n \"CpuLimit\": 0,\n \"MemRequest\": 0,\n \"MemLimit\": 0,\n \"Namespace\": \"defalut\",\n \"DeploymentName\": \"web-node\",\n \"DeploymentID\": \"5d95adf3-b2b2-4ebe-99ab-70cd18842344\",\n \"StartTime\": \"2024-10-30 10:35:51\",\n \"CreateTime\": \"2024-10-30 10:35:55\",\n \"RelateContainerCount\": 1,\n \"RunningTime\": \"2024-10-30 10:36:02\",\n \"PodUid\": \"392f05bd-bf86-4911-8cf9-b8c34541987\",\n \"ChargeCoresCnt\": 1,\n \"DefendStatus\": \"Defended\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"5d95adf3-b2b2-4ebe-99ab-70cd24348884\"\n }\n}",
1998
1980
  "title": "DescribeSuperNodePodList"
1999
1981
  }
2000
1982
  ],
@@ -2002,15 +1984,15 @@
2002
1984
  {
2003
1985
  "document": "",
2004
1986
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSupportDefenceVul\n<公共请求参数>\n\n{}",
2005
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"CVEID\": \"xx\",\n \"Name\": \"xx\",\n \"Level\": \"xx\",\n \"CVSSV3Score\": 0.0,\n \"Tags\": [\n \"xx\"\n ],\n \"SubmitTime\": \"xx\",\n \"PocID\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1987
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2024-23897\",\n \"CVSSV3Score\": 9.8,\n \"Level\": \"CRITICAL\",\n \"Name\": \"Jenkins任意文件读取导致远程代码执行漏洞(CVE-2024-23897)\",\n \"PocID\": \"pcmgr-469627\",\n \"Status\": 1,\n \"SubmitTime\": \"2024-01-25 02:15:00\",\n \"Tags\": [\n \"NETWORK\",\n \"POC\"\n ],\n \"VulId\": 469627\n }\n ],\n \"RequestId\": \"16b04354-f64d-4d6b-821d-125b3f721d5b\",\n \"TotalCount\": 212\n }\n}",
2006
1988
  "title": "查询支持防御的漏洞列表"
2007
1989
  }
2008
1990
  ],
2009
1991
  "DescribeSystemVulList": [
2010
1992
  {
2011
1993
  "document": "",
2012
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSystemVulList\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
2013
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"Category\": \"xx\",\n \"CVEID\": \"xx\",\n \"RegistryImageCount\": 0,\n \"DefenceScope\": \"xx\",\n \"Name\": \"xx\",\n \"Level\": \"xx\",\n \"CVSSV3Score\": 0.0,\n \"Tags\": [\n \"xx\"\n ],\n \"FoundTime\": \"xx\",\n \"DefenceStatus\": \"xx\",\n \"DefendedCount\": 0,\n \"ContainerCount\": 0,\n \"PocID\": \"xx\",\n \"LocalImageCount\": 0,\n \"LatestFoundTime\": \"xx\",\n \"ID\": 0,\n \"DefenceHostCount\": 0\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
1994
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSystemVulList\n<公共请求参数>\n\n{\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
1995
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2023-3341\",\n \"CVSSV3Score\": 7.5,\n \"Category\": \"OUT_OF_BOUNDS_WRITE\",\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"\",\n \"DefenceStatus\": \"\",\n \"DefendedCount\": 0,\n \"FoundTime\": \"2024-08-10 04:34:55\",\n \"ID\": 173268083,\n \"LatestFoundTime\": \"2024-10-18 23:30:37\",\n \"Level\": \"HIGH\",\n \"LocalImageCount\": 2,\n \"Name\": \"ISC BIND 缓冲区错误漏洞\",\n \"PocID\": \"pcmgr-444379\",\n \"RegistryImageCount\": 12,\n \"Tags\": [\n \"NETWORK\"\n ]\n }\n ],\n \"RequestId\": \"5dfca22b-e7b5-408e-b3bf-a930818c5952\",\n \"TotalCount\": 836\n }\n}",
2014
1996
  "title": "查询系统漏洞列表"
2015
1997
  }
2016
1998
  ],
@@ -2018,7 +2000,7 @@
2018
2000
  {
2019
2001
  "document": "请求成功获取的实例",
2020
2002
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeTaskResultSummary\n<公共请求参数>\n\n{}",
2021
- "output": "{\n \"Response\": {\n \"SeriousRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"HighRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"MiddleRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"HintRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"RequestId\": \"xx\"\n }\n}",
2003
+ "output": "{\n \"Response\": {\n \"SeriousRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"HighRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"MiddleRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"HintRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2022
2004
  "title": "常规请求"
2023
2005
  }
2024
2006
  ],
@@ -2034,7 +2016,7 @@
2034
2016
  {
2035
2017
  "document": "",
2036
2018
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUnauthorizedCoresTendency\n<公共请求参数>\n\n{}",
2037
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"DateTime\": \"2020-09-22 00:00:00\",\n \"CoresCount\": 1\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2019
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"DateTime\": \"2020-09-22 00:00:00\",\n \"CoresCount\": 1\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2038
2020
  "title": "查询漏洞防御攻击事件趋势"
2039
2021
  }
2040
2022
  ],
@@ -2042,7 +2024,7 @@
2042
2024
  {
2043
2025
  "document": "",
2044
2026
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUnfinishRefreshTask\n<公共请求参数>\n\n{}",
2045
- "output": "{\n \"Response\": {\n \"TaskId\": 1,\n \"TaskStatus\": \"abc\",\n \"NewTaskID\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
2027
+ "output": "{\n \"Response\": {\n \"TaskId\": 1,\n \"TaskStatus\": \"AssetCheckFinished\",\n \"NewTaskID\": \"1700157600010579384\",\n \"RequestId\": \"f249013b-c9ca-444c-8430-2f97a422859a\"\n }\n}",
2046
2028
  "title": "查询是否存在未完成刷新任务示例"
2047
2029
  }
2048
2030
  ],
@@ -2050,7 +2032,7 @@
2050
2032
  {
2051
2033
  "document": "查询用户集群列表",
2052
2034
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUserCluster\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
2053
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"ClusterInfoList\": [\n {\n \"ClusterId\": \"abc\",\n \"ClusterName\": \"abc\",\n \"ClusterVersion\": \"abc\",\n \"ClusterOs\": \"abc\",\n \"ClusterType\": \"abc\",\n \"ClusterNodeNum\": 1,\n \"Region\": \"abc\",\n \"DefenderStatus\": \"abc\",\n \"ClusterStatus\": \"abc\",\n \"ClusterCheckMode\": \"abc\",\n \"ClusterAutoCheck\": true,\n \"DefenderErrorReason\": \"abc\",\n \"UnreadyNodeNum\": 1,\n \"SeriousRiskCount\": 0,\n \"HighRiskCount\": 0,\n \"MiddleRiskCount\": 0,\n \"HintRiskCount\": 0,\n \"CheckFailReason\": \"abc\",\n \"CheckStatus\": \"abc\",\n \"TaskCreateTime\": \"abc\",\n \"AccessedStatus\": \"abc\",\n \"AccessedSubStatus\": \"abc\",\n \"NodeCount\": 1,\n \"OffLineNodeCount\": 1,\n \"UnInstallAgentNodeCount\": 1,\n \"ChargeCoresCnt\": 1,\n \"MasterAddresses\": [\n \"abc\"\n ],\n \"CoresCnt\": 1\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
2035
+ "output": "{\n \"Response\": {\n \"ClusterInfoList\": [\n {\n \"AccessedStatus\": \"AccessedPartialDefence\",\n \"AccessedSubStatus\": \"AccessedSubNone\",\n \"ChargeCoresCnt\": 4000,\n \"CheckFailReason\": \"SUCCESS\",\n \"CheckStatus\": \"HasRisk\",\n \"ClusterAuditFailedInfo\": \"\",\n \"ClusterAuditStatus\": \"Opened\",\n \"ClusterAutoCheck\": false,\n \"ClusterCheckMode\": \"\",\n \"ClusterId\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterNodeNum\": 4,\n \"ClusterOs\": \"\",\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterSubStatus\": \"\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ClusterVersion\": \"1.28.3\",\n \"CoresCnt\": 12000,\n \"DefenderErrorReason\": \"\",\n \"DefenderStatus\": \"UnDefended\",\n \"HighRiskCount\": 6,\n \"HintRiskCount\": 3,\n \"MasterAddresses\": [\n \"10.0.0.11;10.0.0.14;10.0.0.4;\"\n ],\n \"MiddleRiskCount\": 7,\n \"NodeCount\": 4,\n \"OffLineNodeCount\": 0,\n \"Region\": \"ap-guangzhou\",\n \"SeriousRiskCount\": 1,\n \"TaskCreateTime\": \"2024-10-30 14:41:25\",\n \"UnInstallAgentNodeCount\": 1,\n \"UnreadyNodeNum\": 3\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TotalCount\": 7\n }\n}",
2054
2036
  "title": "查询用户集群列表"
2055
2037
  }
2056
2038
  ],
@@ -2058,7 +2040,7 @@
2058
2040
  {
2059
2041
  "document": "",
2060
2042
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUserPodList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-ane0zamq\",\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
2061
- "output": "{\n \"Response\": {\n \"PodList\": [\n {\n \"PodName\": \"abc\",\n \"Status\": \"abc\",\n \"PodIP\": \"abc\",\n \"NodeLanIP\": \"abc\",\n \"WorkloadName\": \"abc\",\n \"WorkloadKind\": \"abc\",\n \"ClusterName\": \"abc\",\n \"ClusterId\": \"abc\",\n \"Namespace\": \"abc\",\n \"Region\": \"abc\",\n \"Age\": \"abc\",\n \"StartTime\": \"abc\",\n \"Restarts\": 1,\n \"ServiceName\": \"abc\",\n \"ServiceCount\": 1,\n \"ContainerName\": \"abc\",\n \"ContainerCount\": 1,\n \"CPU\": 1,\n \"Memory\": 1,\n \"Labels\": \"abc\",\n \"ClusterStatus\": \"abc\",\n \"WorkloadLabels\": \"abc\",\n \"ContainerId\": \"abc\",\n \"HostName\": \"abc\",\n \"HostId\": \"abc\",\n \"ClusterType\": \"abc\",\n \"NodeName\": \"abc\",\n \"NodeType\": \"abc\",\n \"ChargeCoresCnt\": 1\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"abc\"\n }\n}",
2043
+ "output": "{\n \"Response\": {\n \"PodList\": [\n {\n \"Age\": \"303h45m31.069895614s\",\n \"CPU\": 0,\n \"ChargeCoresCnt\": 0,\n \"ClusterId\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ContainerCount\": 0,\n \"ContainerId\": \"\",\n \"ContainerName\": \"\",\n \"HostId\": \"ins-qj24hgj0\",\n \"HostName\": \"\",\n \"Labels\": \"\",\n \"Memory\": 0,\n \"Namespace\": \"default\",\n \"NodeLanIP\": \"10.0.0.14\",\n \"NodeName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"PodIP\": \"192.168.0.172\",\n \"PodName\": \"tiefighter\",\n \"Region\": \"ap-guangzhou\",\n \"Restarts\": 0,\n \"ServiceCount\": 0,\n \"ServiceName\": \"\",\n \"StartTime\": \"2024-10-17 23:03:42\",\n \"Status\": \"Running\",\n \"WorkloadKind\": \"\",\n \"WorkloadLabels\": \"\",\n \"WorkloadName\": \"\"\n }\n ],\n \"RequestId\": \"1d32a744-4f31-4a6b-8574-7919f034f317\",\n \"TotalCount\": 54\n }\n}",
2062
2044
  "title": "查询集群的Pod列表"
2063
2045
  }
2064
2046
  ],
@@ -2066,7 +2048,7 @@
2066
2048
  {
2067
2049
  "document": "",
2068
2050
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeValueAddedSrvInfo\n&<公共请求参数>",
2069
- "output": "{\n \"Response\": {\n \"LocalImageCnt\": 1,\n \"UnusedAuthorizedCnt\": 1,\n \"RequestId\": \"xx\",\n \"RegistryImageCnt\": 1\n }\n}",
2051
+ "output": "{\n \"Response\": {\n \"LocalImageCnt\": 1,\n \"UnusedAuthorizedCnt\": 1,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"RegistryImageCnt\": 1\n }\n}",
2070
2052
  "title": "查询增值服务需购买信息"
2071
2053
  }
2072
2054
  ],
@@ -2074,7 +2056,7 @@
2074
2056
  {
2075
2057
  "document": "",
2076
2058
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSampleDetail\n<公共请求参数>\n\n{\n \"MD5\": \"dskaldjskld\"\n}",
2077
- "output": "{\n \"Response\": {\n \"Tags\": [\n \"xx\"\n ],\n \"RiskLevel\": \"xx\",\n \"VirusName\": \"xx\",\n \"RequestId\": \"xx\",\n \"ReferenceLink\": \"xx\",\n \"MD5\": \"xx\",\n \"KillEngine\": [\n \"xx\"\n ],\n \"HarmDescribe\": \"xx\",\n \"SuggestScheme\": \"xx\",\n \"Size\": 1\n }\n}",
2059
+ "output": "{\n \"Response\": {\n \"HarmDescribe\": \"发现容器上存在恶意木马,您的容器可能已经失陷。\\n恶意木马通常会执行挖矿、文件删除、信息窃取和网络攻击等恶意行为。\",\n \"KillEngine\": [],\n \"MD5\": \"5b98800688cae1533ff965ab31baeab1\",\n \"ReferenceLink\": \"\",\n \"RequestId\": \"a8304c25-f23b-4638-b994-7bb0ba4c5156\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 52,\n \"SuggestScheme\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [],\n \"VirusName\": \"Bk.YDWebShell.Php.Small.11100534\"\n }\n}",
2078
2060
  "title": "查询木马自动隔离样本详情"
2079
2061
  }
2080
2062
  ],
@@ -2082,7 +2064,7 @@
2082
2064
  {
2083
2065
  "document": "",
2084
2066
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSampleDownloadURL\n<公共请求参数>\n\n{\n \"MD5\": \"dskaldjskld\"\n}",
2085
- "output": "{\n \"Response\": {\n \"FileUrl\": \"xx\",\n \"RequestId\": \"xx\"\n }\n}",
2067
+ "output": "{\n \"Response\": {\n \"FileUrl\": \"\",\n \"RequestId\": \"56726fc5-1a50-46ba-ba2a-eb5f7aff4cd3\"\n }\n}",
2086
2068
  "title": "查询木马自动隔离样本下载链接"
2087
2069
  }
2088
2070
  ],
@@ -2090,7 +2072,7 @@
2090
2072
  {
2091
2073
  "document": "",
2092
2074
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSampleList\n<公共请求参数>\n\n{}",
2093
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"ModifyTime\": \"2020-09-22T00:00:00+00:00\",\n \"VirusName\": \"xx\",\n \"AutoIsolateSwitch\": true,\n \"MD5\": \"xx\"\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2075
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"MD5\": \"61d7d84e979212bed18ed9aa8748defa\",\n \"VirusName\": \"virus1\",\n \"ModifyTime\": \"2020-09-22T00:00:00+00:00\",\n \"AutoIsolateSwitch\": true\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2094
2076
  "title": "查询木马自动隔离样本列表"
2095
2077
  }
2096
2078
  ],
@@ -2106,7 +2088,7 @@
2106
2088
  {
2107
2089
  "document": "运行时查询木马文件信息",
2108
2090
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusDetail\n<公共请求参数>\n\n{\n \"Id\": \"dskaldjskld\"\n}",
2109
- "output": "{\n \"Response\": {\n \"ImageId\": \"abc\",\n \"ImageName\": \"abc\",\n \"CreateTime\": \"abc\",\n \"Size\": 1,\n \"FilePath\": \"abc\",\n \"ModifyTime\": \"abc\",\n \"VirusName\": \"abc\",\n \"RiskLevel\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ContainerId\": \"abc\",\n \"HostName\": \"abc\",\n \"HostId\": \"abc\",\n \"ProcessName\": \"abc\",\n \"ProcessPath\": \"abc\",\n \"ProcessMd5\": \"abc\",\n \"ProcessId\": 1,\n \"ProcessArgv\": \"abc\",\n \"ProcessChan\": \"abc\",\n \"ProcessAccountGroup\": \"abc\",\n \"ProcessStartAccount\": \"abc\",\n \"ProcessFileAuthority\": \"abc\",\n \"SourceType\": 0,\n \"Tags\": [\n \"abc\"\n ],\n \"HarmDescribe\": \"abc\",\n \"SuggestScheme\": \"abc\",\n \"Mark\": \"abc\",\n \"FileName\": \"abc\",\n \"FileMd5\": \"abc\",\n \"EventType\": \"abc\",\n \"PodName\": \"abc\",\n \"Status\": \"abc\",\n \"SubStatus\": \"abc\",\n \"HostIP\": \"abc\",\n \"ClientIP\": \"abc\",\n \"PProcessStartUser\": \"abc\",\n \"PProcessUserGroup\": \"abc\",\n \"PProcessPath\": \"abc\",\n \"PProcessParam\": \"abc\",\n \"AncestorProcessStartUser\": \"abc\",\n \"AncestorProcessUserGroup\": \"abc\",\n \"AncestorProcessPath\": \"abc\",\n \"AncestorProcessParam\": \"abc\",\n \"OperationTime\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"CheckPlatform\": [\n \"abc\"\n ],\n \"FileAccessTime\": \"abc\",\n \"FileModifyTime\": \"abc\",\n \"NodeSubNetID\": \"abc\",\n \"NodeSubNetName\": \"abc\",\n \"NodeSubNetCIDR\": \"abc\",\n \"ClusterID\": \"abc\",\n \"PodIP\": \"abc\",\n \"PodStatus\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"Namespace\": \"abc\",\n \"WorkloadType\": \"abc\",\n \"RequestId\": \"abc\"\n }\n}",
2091
+ "output": "{\n \"Response\": {\n \"AncestorProcessParam\": \"-\",\n \"AncestorProcessPath\": \"-\",\n \"AncestorProcessStartUser\": \"-\",\n \"AncestorProcessUserGroup\": \"\",\n \"CheckPlatform\": [\n \"VDC\",\n \"TAV\"\n ],\n \"ClientIP\": \"106.55.163.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"d4c43f9268ecea2aa75b26632299df8aaf496af54e391f94ebcc62d7b2435105\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/pedantic_agnesi\",\n \"ContainerNetStatus\": \"ISOLATED\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"CreateTime\": \"2024-08-27T03:30:37Z\",\n \"EventType\": \"恶意文件告警\",\n \"FileAccessTime\": \"2018-02-28T07:45:34Z\",\n \"FileMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"FileModifyTime\": \"2018-02-28T07:45:34Z\",\n \"FileName\": \"specimen_a1193b5c213b17cfc7fd\",\n \"FilePath\": \"/home/virus/specimen_a1193b5c213b17cfc7fd\",\n \"HarmDescribe\": \"蠕虫病毒Ramnit最早出现在2010年,至今已有8年之久,因传播力强而“闻名于世”。Ramnit蠕虫病毒通过被感染的EXE、DLL、HTML、HTM文件传播,在正常电脑打开这些染毒文件时会导致新的感染发生。同时,Ramnit蠕虫病毒还会通过浏览器访问网页、写入U盘移动硬盘,创建U盘自启动等方式进行蠕虫式传播。\",\n \"HostIP\": \"172.16.0.34\",\n \"HostId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"HostName\": \"稳定性监控_ivon\",\n \"ImageId\": \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\",\n \"ImageName\": \"centos:7\",\n \"Mark\": \"just for test\",\n \"ModifyTime\": \"2024-10-21T06:42:49Z\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"wer41324-18a1-4775-9e3f-cdfc89845157\",\n \"OperationTime\": \"2024-08-27T03:30:37Z\",\n \"PProcessParam\": \"-\",\n \"PProcessPath\": \"-\",\n \"PProcessStartUser\": \"-\",\n \"PProcessUserGroup\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"/\",\n \"PodStatus\": \"\",\n \"ProcessAccountGroup\": \"\",\n \"ProcessArgv\": \"-\",\n \"ProcessChan\": \"-\",\n \"ProcessFileAuthority\": \"-\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"-\",\n \"ProcessName\": \"\",\n \"ProcessPath\": \"-\",\n \"ProcessStartAccount\": \"-\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1f1\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 332155,\n \"SourceType\": 0,\n \"Status\": \"DEAL_NONE\",\n \"SubStatus\": \"FILE_NOT_FOUND\",\n \"SuggestScheme\": \"1.在病毒尚未完全清理干净之前,暂时关闭系统文件共享功能 ,防止感染范围进一步扩大;\\n2.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n3.隔离或者删除相关的木马文件;\\n4.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [\n \"ramnit\",\n \"Worm\",\n \"窃取用户信息,感染用户本地所有的html、exe、dll等格式的文件。\"\n ],\n \"VirusName\": \"Win32.Virus.Ramnit.Qwhl\",\n \"WorkloadType\": \"\"\n }\n}",
2110
2092
  "title": "运行时查询木马文件信息"
2111
2093
  }
2112
2094
  ],
@@ -2114,7 +2096,7 @@
2114
2096
  {
2115
2097
  "document": "",
2116
2098
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusEventTendency\n<公共请求参数>\n\n{\n \"TendencyPeriod\": 7\n}",
2117
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Date\": \"2020-09-22\",\n \"PendingEventCount\": 1,\n \"RiskContainerCount\": 1,\n \"EventCount\": 1\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2099
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Date\": \"2020-09-22\",\n \"PendingEventCount\": 1,\n \"RiskContainerCount\": 1,\n \"EventCount\": 1,\n \"IsolateEventCount\": 1\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2118
2100
  "title": "运行时木马趋势数据获取"
2119
2101
  }
2120
2102
  ],
@@ -2129,7 +2111,7 @@
2129
2111
  "DescribeVirusManualScanEstimateTimeout": [
2130
2112
  {
2131
2113
  "document": "",
2132
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusManualScanEstimateTimeout\n<公共请求参数>\n\n{\n \"ScanIds\": [\n \"xx\"\n ],\n \"ScanRangeAll\": true,\n \"ScanRangeType\": 1\n}",
2114
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusManualScanEstimateTimeout\n<公共请求参数>\n\n{\n \"ScanIds\": [\n \"image-id\"\n ],\n \"ScanRangeAll\": true,\n \"ScanRangeType\": 1\n}",
2133
2115
  "output": "{\n \"Response\": {\n \"Timeout\": 5,\n \"ContainerScanConcurrencyCount\": 2,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2134
2116
  "title": "查询木马一键检测预估超时时间"
2135
2117
  }
@@ -2145,8 +2127,8 @@
2145
2127
  "DescribeVirusSampleDownloadUrl": [
2146
2128
  {
2147
2129
  "document": "",
2148
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusSampleDownloadUrl\n<公共请求参数>\n\n{\n \"ID\": \"xxx\"\n}",
2149
- "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"FileUrl\": \"xxx\"\n }\n}",
2130
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusSampleDownloadUrl\n<公共请求参数>\n\n{\n \"ID\": \"1000\"\n}",
2131
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"FileUrl\": \"http://1.2.3.4/a\"\n }\n}",
2150
2132
  "title": "查询木马样本下载url"
2151
2133
  }
2152
2134
  ],
@@ -2154,7 +2136,7 @@
2154
2136
  {
2155
2137
  "document": "运行时查询文件查杀设置",
2156
2138
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusScanSetting\n<公共请求参数>\n\n{}",
2157
- "output": "{\n \"Response\": {\n \"EnableScan\": true,\n \"Cycle\": 1,\n \"BeginScanAt\": \"xx\",\n \"ScanPathAll\": true,\n \"ScanPathType\": 1,\n \"Timeout\": 1,\n \"ScanRangeType\": 1,\n \"ScanRangeAll\": true,\n \"ScanIds\": [\n \"xx\"\n ],\n \"ScanPath\": [\n \"xx\"\n ],\n \"ClickTimeout\": 1,\n \"ScanPathMode\": \"SCAN_PATH_DEFAULT\",\n \"RequestId\": \"xx\"\n }\n}",
2139
+ "output": "{\n \"Response\": {\n \"BeginScanAt\": \"10:59:00\",\n \"ClickTimeout\": 0,\n \"Cycle\": 1,\n \"EnableScan\": true,\n \"RequestId\": \"def074cf-2ad4-4895-bc34-e1607b094a4e\",\n \"ScanIds\": [\n \"ad297b24a4f818d9da49c9bec10d54c179b6751fc362802b077f710b3638e0f0\"\n ],\n \"ScanPath\": [\n \"/tmp\"\n ],\n \"ScanPathAll\": false,\n \"ScanPathMode\": \"SCAN_PATH_USER_DEFINE\",\n \"ScanPathType\": 0,\n \"ScanRangeAll\": false,\n \"ScanRangeType\": 0,\n \"Timeout\": 5\n }\n}",
2158
2140
  "title": "运行时查询文件查杀设置"
2159
2141
  }
2160
2142
  ],
@@ -2178,14 +2160,14 @@
2178
2160
  {
2179
2161
  "document": "运行时查询木马概览信息",
2180
2162
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusSummary\n<公共请求参数>\n\n{}",
2181
- "output": "{\n \"Response\": {\n \"TaskId\": \"xx\",\n \"RiskContainerCnt\": 1,\n \"RiskCnt\": 1,\n \"VirusDataBaseModifyTime\": \"xx\",\n \"RiskContainerIncrease\": 1,\n \"RiskIncrease\": 1,\n \"IsolateIncrease\": 1,\n \"IsolateCnt\": 1,\n \"RequestId\": \"xx\"\n }\n}",
2163
+ "output": "{\n \"Response\": {\n \"IsolateCnt\": 1133,\n \"IsolateIncrease\": 0,\n \"RequestId\": \"83b45d62-7383-4257-8de5-f460a3446a2c\",\n \"RiskCnt\": 94,\n \"RiskContainerCnt\": 58,\n \"RiskContainerIncrease\": 0,\n \"RiskIncrease\": 0,\n \"TaskId\": \"67204f7cad8a5e71a40875752cc2f374\",\n \"VirusDataBaseModifyTime\": \"\"\n }\n}",
2182
2164
  "title": "运行时查询木马概览信息"
2183
2165
  }
2184
2166
  ],
2185
2167
  "DescribeVirusTaskList": [
2186
2168
  {
2187
2169
  "document": "运行时查询文件查杀任务列表",
2188
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusTaskList\n<公共请求参数>\n\n{\n \"TaskId\": \"dskaldjskld\"\n}",
2170
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusTaskList\n<公共请求参数>\n\n{\n \"TaskId\": \"faketaskid\"\n}",
2189
2171
  "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"ff49ad4b-fe52-4f9d-8810-ba377eab9124\",\n \"TotalCount\": 6\n }\n}",
2190
2172
  "title": "运行时查询文件查杀任务列表"
2191
2173
  }
@@ -2194,7 +2176,7 @@
2194
2176
  {
2195
2177
  "document": "",
2196
2178
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulContainerList\n&PocID=1\n&<公共请求参数>",
2197
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"HostID\": \"xx\",\n \"HostName\": \"xx\",\n \"ContainerID\": \"xx\",\n \"PublicIP\": \"xx\",\n \"PodIP\": \"xx\",\n \"PodName\": \"xx\",\n \"ContainerName\": \"xx\",\n \"HostIP\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2179
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ClusterID\": \"68b68a372df3394bf46f7320707ebdcd\",\n \"ClusterName\": \"default-cluster\",\n \"ContainerID\": \"0b70affcd1c495798c2fbde915a43e94df0457c204848be862ad0689aab868a6\",\n \"ContainerName\": \"containner\",\n \"HostID\": \"5c442550-bbbc-aaaa-ada3-00796bd9fefe\",\n \"HostIP\": \"10.206.64.13\",\n \"HostName\": \"tcs-sssa\",\n \"NodeID\": \"\",\n \"NodeName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"PublicIP\": \"1.2.3.4\"\n }\n ],\n \"RequestId\": \"e33b04ca-8e2f-4242-946f-2804debc5c9b\",\n \"TotalCount\": 31\n }\n}",
2198
2180
  "title": "查询受漏洞的容器列表"
2199
2181
  }
2200
2182
  ],
@@ -2202,7 +2184,7 @@
2202
2184
  {
2203
2185
  "document": "DescribeVulDefenceEvent",
2204
2186
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceEvent\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
2205
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"abc\",\n \"VulName\": \"abc\",\n \"PocID\": \"abc\",\n \"EventType\": \"abc\",\n \"SourceIP\": \"abc\",\n \"City\": \"abc\",\n \"EventCount\": 0,\n \"ContainerID\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ImageID\": \"abc\",\n \"ImageName\": \"abc\",\n \"Status\": \"abc\",\n \"EventID\": 0,\n \"CreateTime\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"MergeTime\": \"abc\",\n \"ContainerStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"QUUID\": \"abc\",\n \"HostIP\": \"abc\",\n \"HostName\": \"abc\",\n \"ClusterID\": \"abc\",\n \"NodeType\": \"abc\"\n }\n ],\n \"TotalCount\": 0,\n \"RequestId\": \"abc\"\n }\n}",
2187
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2021-44228\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"1a00d48467136a768278cbb93fb45b3a7d1cbb7e11ee906eb54cf09bf6a27e5b\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/cve-2021-44228-solr-1\",\n \"ContainerNetStatus\": \"\",\n \"ContainerNetSubStatus\": \"\",\n \"ContainerStatus\": \"\",\n \"CreateTime\": \"2023-10-08 11:07:16\",\n \"EventCount\": 4,\n \"EventID\": 20055,\n \"EventType\": \"EVENT_DEFENDED\",\n \"HostIP\": \"\",\n \"HostName\": \"\",\n \"ImageID\": \"sha256:33f2d4bf4fa944682b9c7c1ed66262fe22d488bab7028ce0f676215bade8d92e\",\n \"ImageName\": \"vulhub/solr:8.11.0\",\n \"MergeTime\": \"2023-10-08 11:07:16\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PocID\": \"pcmgr-333393\",\n \"PublicIP\": \"\",\n \"QUUID\": \"d9438d70-2689-4013-9ce1-d80edbc29edb\",\n \"SourceIP\": \"\",\n \"Status\": \"EVENT_DEALED\",\n \"VulName\": \"Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"PodName\"\n }\n ],\n \"TotalCount\": 0,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2206
2188
  "title": "查询漏洞防御事件列表"
2207
2189
  }
2208
2190
  ],
@@ -2210,7 +2192,7 @@
2210
2192
  {
2211
2193
  "document": "查询漏洞防御事件详情",
2212
2194
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceEventDetail\n<公共请求参数>\n\n{\n \"EventID\": \"0\"\n}",
2213
- "output": "{\n \"Response\": {\n \"EventDetail\": {\n \"CVEID\": \"abc\",\n \"VulName\": \"abc\",\n \"PocID\": \"abc\",\n \"EventType\": \"abc\",\n \"SourceIP\": \"abc\",\n \"City\": \"abc\",\n \"EventCount\": 0,\n \"ContainerID\": \"abc\",\n \"ContainerName\": \"abc\",\n \"ImageID\": \"abc\",\n \"ImageName\": \"abc\",\n \"Status\": \"abc\",\n \"SourcePort\": [\n \"abc\"\n ],\n \"EventID\": 0,\n \"HostName\": \"abc\",\n \"HostIP\": \"abc\",\n \"PublicIP\": \"abc\",\n \"PodName\": \"abc\",\n \"Description\": \"abc\",\n \"OfficialSolution\": \"abc\",\n \"NetworkPayload\": \"abc\",\n \"PID\": 0,\n \"MainClass\": \"abc\",\n \"StackTrace\": \"abc\",\n \"ServerAccount\": \"abc\",\n \"ServerPort\": \"abc\",\n \"ServerExe\": \"abc\",\n \"ServerArg\": \"abc\",\n \"QUUID\": \"abc\",\n \"ContainerNetStatus\": \"abc\",\n \"ContainerNetSubStatus\": \"abc\",\n \"ContainerIsolateOperationSrc\": \"abc\",\n \"ContainerStatus\": \"abc\",\n \"JNDIUrl\": \"abc\",\n \"RaspDetail\": [\n {\n \"Name\": \"abc\",\n \"Value\": \"abc\"\n }\n ],\n \"NodeSubNetName\": \"abc\",\n \"NodeSubNetCIDR\": \"abc\",\n \"PodIP\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeID\": \"abc\",\n \"NodeUniqueID\": \"abc\",\n \"NodeSubNetID\": \"abc\",\n \"ClusterID\": \"abc\",\n \"ClusterName\": \"abc\",\n \"Namespace\": \"abc\",\n \"WorkloadType\": \"abc\"\n },\n \"RequestId\": \"abc\"\n }\n}",
2195
+ "output": "{\n \"Response\": {\n \"EventDetail\": {\n \"CVEID\": \"CVE-2021-44228\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"5457113fd88a5cc8f88391f7387ad2f1b23c4b9a154f12fc725cfa8b134134\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/cve-2021-44228-solr-1\",\n \"ContainerNetStatus\": \"\",\n \"ContainerNetSubStatus\": \"\",\n \"ContainerStatus\": \"\",\n \"Description\": \"访问源(IP:)在对容器(ID:5457113fd8...)发起漏洞利用攻击\",\n \"EventCount\": 20,\n \"EventID\": 30061,\n \"EventType\": \"EVENT_DEFENDED\",\n \"HostIP\": \"172.16.51.209\",\n \"HostName\": \"harborV2_yancyw\",\n \"ImageID\": \"sha256:052794134d434bc2db0775211589beb372412af333a262d16841893418941894\",\n \"ImageName\": \"vulhub/solr:8.11.0\",\n \"JNDIUrl\": \"\",\n \"MainClass\": \"org.eclipse.jetty.start.Main\",\n \"Namespace\": \"\",\n \"NetworkPayload\": \": \\n\",\n \"NodeID\": \"\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"OfficialSolution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://logging.apache.org/log4j/2.x/security.html\",\n \"PID\": 20545,\n \"PocID\": \"pcmgr-333393\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"PublicIP\": \"139.199.178.111\",\n \"QUUID\": \"380add75-bb06-4cc4-84c5-cf806d102fba\",\n \"RaspDetail\": [\n {\n \"Name\": \"jndiurl\",\n \"Value\": \"ldap://1.8.0_102.example.com\"\n }\n ],\n \"ServerAccount\": \"\",\n \"ServerArg\": \"\",\n \"ServerExe\": \"\",\n \"ServerPort\": \"\",\n \"SourceIP\": \"\",\n \"SourcePort\": [\n \"-\"\n ],\n \"StackTrace\": \"org.apache.logging.log4j.core.lookup.JndiLookup.lookup\\norg.apache.logging.log4j.core.lookup.Interpolator.lookup\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.resolveVariable\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.substitute\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.substitute\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.replace\\norg.apache.logging.log4j.core.pattern.MessagePatternConverter.format\\norg.apache.logging.log4j.core.pattern.PatternFormatter.format\\norg.apache.logging.log4j.core.pattern.MaxLengthConverter.format\\norg.apache.logging.log4j.core.pattern.PatternFormatter.format\\n\",\n \"Status\": \"EVENT_DEFENDED\",\n \"VulName\": \"Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)\",\n \"WorkloadType\": \"\"\n },\n \"RequestId\": \"2f944254-e774-4f19-ac09-c9c1bdf311f6\"\n }\n}",
2214
2196
  "title": "查询漏洞防御事件详情"
2215
2197
  }
2216
2198
  ],
@@ -2218,7 +2200,7 @@
2218
2200
  {
2219
2201
  "document": "",
2220
2202
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceEventTendency\n<公共请求参数>\n\n{\n \"EndTime\": \"2021-05-01\",\n \"StartTime\": \"2021-05-07\"\n}",
2221
- "output": "{\n \"Response\": {\n \"AttackList\": [\n {\n \"Date\": \"2020-09-22\",\n \"EventCount\": 0\n }\n ],\n \"RequestId\": \"xx\",\n \"DefendedList\": [\n {\n \"Date\": \"2020-09-22\",\n \"EventCount\": 0\n }\n ]\n }\n}",
2203
+ "output": "{\n \"Response\": {\n \"AttackList\": [\n {\n \"Date\": \"2020-09-22\",\n \"EventCount\": 0\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"DefendedList\": [\n {\n \"Date\": \"2020-09-22\",\n \"EventCount\": 0\n }\n ]\n }\n}",
2222
2204
  "title": "查询漏洞防御攻击事件趋势"
2223
2205
  }
2224
2206
  ],
@@ -2226,15 +2208,15 @@
2226
2208
  {
2227
2209
  "document": "查询漏洞防御的主机列表",
2228
2210
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceHost\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
2229
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"HostName\": \"abc\",\n \"HostIP\": \"abc\",\n \"HostID\": \"abc\",\n \"Status\": \"abc\",\n \"PublicIP\": \"abc\",\n \"CreateTime\": \"abc\",\n \"ModifyTime\": \"abc\",\n \"NodeType\": \"abc\",\n \"NodeSubNetName\": \"abc\",\n \"NodeSubNetCIDR\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
2211
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"CreateTime\": \"2023-08-17 15:41:32\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"tcs-test\",\n \"ModifyTime\": \"2024-10-30 14:00:21\",\n \"NodeID\": \"ins-8bc803fd\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"PublicIP\": \"1.1.1.1\",\n \"Status\": \"SUCCESS\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2230
2212
  "title": "查询漏洞防御的主机列表"
2231
2213
  }
2232
2214
  ],
2233
2215
  "DescribeVulDefencePlugin": [
2234
2216
  {
2235
2217
  "document": "查询漏洞防御插件列表",
2236
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefencePlugin\n<公共请求参数>\n\n{\n \"HostID\": \"abc\",\n \"Limit\": 1,\n \"Offset\": 1,\n \"Filters\": [\n {\n \"Name\": \"abc\",\n \"Values\": [\n \"abc\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
2237
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"PID\": 0,\n \"MainClass\": \"abc\",\n \"Status\": \"abc\",\n \"ErrorLog\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
2218
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefencePlugin\n<公共请求参数>\n\n{\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"Limit\": 1,\n \"Offset\": 1,\n \"Filters\": [\n {\n \"Name\": \"Status\",\n \"Values\": [\n \"SUCCESS\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
2219
+ "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"PID\": 0,\n \"MainClass\": \"com.java.main\",\n \"Status\": \"SUCCESS\",\n \"ErrorLog\": \"\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2238
2220
  "title": "查询漏洞防御插件列表"
2239
2221
  }
2240
2222
  ],
@@ -2242,7 +2224,7 @@
2242
2224
  {
2243
2225
  "document": "查询漏洞防御设置信息",
2244
2226
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceSetting\n<公共请求参数>\n\n{}",
2245
- "output": "{\n \"Response\": {\n \"IsEnabled\": 0,\n \"Scope\": 0,\n \"HostCount\": 0,\n \"ExceptionHostCount\": 0,\n \"HostIDs\": [\n \"abc\"\n ],\n \"HostTotalCount\": 0,\n \"SupportDefenseVulCount\": 0,\n \"HostNodeCount\": 0,\n \"SuperScope\": 0,\n \"SuperNodeCount\": 0,\n \"SuperNodeIds\": [\n \"abc\"\n ],\n \"NodeTotalCount\": 0,\n \"RequestId\": \"abc\"\n }\n}",
2227
+ "output": "{\n \"Response\": {\n \"IsEnabled\": 0,\n \"Scope\": 0,\n \"HostCount\": 0,\n \"ExceptionHostCount\": 0,\n \"HostIDs\": [],\n \"HostTotalCount\": 0,\n \"SupportDefenseVulCount\": 0,\n \"HostNodeCount\": 0,\n \"SuperScope\": 0,\n \"SuperNodeCount\": 0,\n \"SuperNodeIds\": [],\n \"NodeTotalCount\": 0,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2246
2228
  "title": "查询漏洞防御设置信息"
2247
2229
  }
2248
2230
  ],
@@ -2250,31 +2232,31 @@
2250
2232
  {
2251
2233
  "document": "",
2252
2234
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDetail\n<公共请求参数>\n\n{\n \"PocID\": \"1\"\n}",
2253
- "output": "{\n \"Response\": {\n \"VulInfo\": {\n \"Category\": \"xx\",\n \"CVEID\": \"xx\",\n \"RegistryImageCount\": 0,\n \"LocalNewestImageCount\": 0,\n \"PocID\": \"xx\",\n \"CategoryType\": \"xx\",\n \"RegistryNewestImageCount\": 0,\n \"Description\": \"xx\",\n \"Tags\": [\n \"xx\"\n ],\n \"DefendedCount\": 0,\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"xx\",\n \"Name\": \"xx\",\n \"Level\": \"xx\",\n \"CVSSV3Score\": 0.0,\n \"OfficialSolution\": \"xx\",\n \"LocalImageCount\": 0,\n \"ComponentList\": [\n {\n \"Version\": [\n \"xx\"\n ],\n \"Name\": \"xx\",\n \"FixedVersion\": [\n \"xx\"\n ]\n }\n ],\n \"ScanStatus\": \"xx\",\n \"CVSSV3Desc\": \"xx\",\n \"DefenseSolution\": \"xx\",\n \"DefenceStatus\": \"xx\",\n \"SubmitTime\": \"xx\",\n \"ContainerCount\": 0,\n \"Reference\": [\n \"xx\"\n ]\n },\n \"RequestId\": \"xx\"\n }\n}",
2235
+ "output": "{\n \"Response\": {\n \"RequestId\": \"2d770ee1-8360-4c62-badc-257688f1e4de\",\n \"VulInfo\": {\n \"CVEID\": \"CVE-2023-50164\",\n \"CVSSV3Desc\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\n \"CVSSV3Score\": 9.8,\n \"Category\": \"OTHER\",\n \"CategoryType\": \"EMERGENCY\",\n \"ComponentList\": [\n {\n \"FixedVersion\": [\n \">2.3.37\",\n \"2.5.33\",\n \"6.3.0.2\"\n ],\n \"Name\": \"(apache) struts\",\n \"Version\": [\n \"2.0.0<=version<=2.3.37\",\n \"2.5.0<=version<2.5.33\",\n \"6.0.0<=version<6.3.0.2\"\n ]\n }\n ],\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 78,\n \"DefenceScope\": \"ALL\",\n \"DefenceStatus\": \"DEFENDED\",\n \"DefendedCount\": 0,\n \"DefenseSolution\": \"官方已经发布了安全版本,建议受漏洞影响的用户立即更新Apache Struts2到最新安全版本。\\n安全版本:\\nApache Struts2 >= 2.5.33\\nApache Struts2 >= 6.3.0.2\\n官方下载地址:https://struts.apache.org/download.cgi 或修改项目依赖配置文件中的版本信息。\",\n \"Description\": \"Apache Struts2框架是一个用于开发Java EE网络应用程序的Web框架,它本质上相当于一个servlet,在MVC设计模式中,Struts2作为控制器(Controller)来建立模型与视图的数据交互。漏洞源于文件上传逻辑存在缺陷,攻击者可以操纵文件上传参数来启用路径遍历,在某些情况下,这可能导致上传可用于执行远程代码执行的恶意文件。\",\n \"Level\": \"CRITICAL\",\n \"LocalImageCount\": 0,\n \"LocalNewestImageCount\": 0,\n \"Name\": \"Apache Struts2 远程代码执行漏洞(CVE-2023-50164)\",\n \"OfficialSolution\": \"建议关注厂商公告或升级到最新版本。\",\n \"PocID\": \"pcmgr-5555555\",\n \"Reference\": [\n \"https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj\"\n ],\n \"RegistryImageCount\": 0,\n \"RegistryNewestImageCount\": 0,\n \"ScanStatus\": \"SCANNED\",\n \"SubmitTime\": \"2023-12-07 17:01:30\",\n \"Tags\": [\n \"NETWORK\"\n ]\n }\n }\n}",
2254
2236
  "title": "查询漏洞详情"
2255
2237
  }
2256
2238
  ],
2257
2239
  "DescribeVulIgnoreLocalImageList": [
2258
2240
  {
2259
2241
  "document": "",
2260
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulIgnoreLocalImageList\n&PocID=\"xx\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
2261
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"PocID\": \"xx\",\n \"ID\": 0,\n \"ImageName\": \"xx\",\n \"ImageSize\": 0,\n \"ImageID\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2242
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulIgnoreLocalImageList\n&PocID=\"poc-testid\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
2243
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ID\": 10001,\n \"ImageID\": \"sha256:84a28c\",\n \"ImageName\": \"image:latest\",\n \"ImageSize\": 511144459,\n \"PocID\": \"pcmgr-10001\"\n }\n ],\n \"RequestId\": \"1549f3da-40f5-4f11-8520-b1e71d33913c\",\n \"TotalCount\": 1\n }\n}",
2262
2244
  "title": "查询漏洞扫描忽略的本地镜像列表"
2263
2245
  }
2264
2246
  ],
2265
2247
  "DescribeVulIgnoreRegistryImageList": [
2266
2248
  {
2267
2249
  "document": "",
2268
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulIgnoreRegistryImageList\n&PocID=\"xx\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
2269
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"ImageID\": \"xx\",\n \"RegistryName\": \"xx\",\n \"PocID\": \"xx\",\n \"ImageVersion\": \"xx\",\n \"RegistryPath\": \"xx\",\n \"ID\": 0\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2270
- "title": "查询漏洞扫描忽略的本地镜像列表"
2250
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulIgnoreRegistryImageList\n&PocID=\"poc-1256\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
2251
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"ID\": 10001,\n \"ImageID\": \"sha256:a77a6d2\",\n \"ImageVersion\": \"latest\",\n \"PocID\": \"pcmgr-10001\",\n \"RegistryName\": \"test-registry-name\",\n \"RegistryPath\": \"https://ctr.com/test\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2252
+ "title": "查询漏洞扫描忽略的仓库镜像列表"
2271
2253
  }
2272
2254
  ],
2273
2255
  "DescribeVulImageList": [
2274
2256
  {
2275
2257
  "document": "",
2276
2258
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulImageList\n&PocID=1\n&<公共请求参数>",
2277
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"ComponentList\": [\n {\n \"Path\": \"xx\",\n \"Version\": \"xx\",\n \"Name\": \"xx\",\n \"FixedVersion\": \"xx\"\n }\n ],\n \"HostCount\": 0,\n \"ImageName\": \"xx\",\n \"ContainerCount\": 0,\n \"ImageID\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2259
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ComponentList\": [\n {\n \"FixedVersion\": \">6.0.37,>8.0.0\",\n \"Name\": \"catalina\",\n \"Path\": \"tomcat7/apache-tomcat-7.0.34/lib/catalina.jar\",\n \"Version\": \"7.0.34\"\n }\n ],\n \"ContainerCount\": 0,\n \"HostCount\": 1,\n \"ImageID\": \"sha256:5e1476716a780a0bf6d4776d02840254257a6c0711fe0e17a7d693aba0dff8fb\",\n \"ImageName\": \"image\"\n }\n ],\n \"RequestId\": \"940b7fab-b4fc-4740-a719-6c1dd122af3f\",\n \"TotalCount\": 1\n }\n}",
2278
2260
  "title": "查询漏洞影响的镜像列表"
2279
2261
  }
2280
2262
  ],
@@ -2282,7 +2264,7 @@
2282
2264
  {
2283
2265
  "document": "",
2284
2266
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulImageSummary\n<公共请求参数>\n\n{}",
2285
- "output": "{\n \"Response\": {\n \"AllAuthorizedImageCount\": 0,\n \"VulLibraryUpdateTime\": \"xx\",\n \"WebVulCount\": 0,\n \"SupportVulTotalCount\": 0,\n \"ScannedImageCount\": 0,\n \"VulTotalCount\": 0,\n \"EmergencyVulCount\": 0,\n \"RequestId\": \"xx\",\n \"SysTemVulCount\": 0,\n \"SeriousVulImageCount\": 0\n }\n}",
2267
+ "output": "{\n \"Response\": {\n \"AllAuthorizedImageCount\": 5703,\n \"EmergencyVulCount\": 38,\n \"RequestId\": \"e06df6e9-3f54-41d0-9857-41ed365623a2\",\n \"ScannedImageCount\": 2,\n \"SeriousVulImageCount\": 2,\n \"SupportVulTotalCount\": 70678,\n \"SysTemVulCount\": 634,\n \"VulLibraryUpdateTime\": \"2024-10-29 19:42:56\",\n \"VulTotalCount\": 2086,\n \"WebVulCount\": 1442\n }\n}",
2286
2268
  "title": "查询受漏洞影响的镜像统计"
2287
2269
  }
2288
2270
  ],
@@ -2290,7 +2272,7 @@
2290
2272
  {
2291
2273
  "document": "",
2292
2274
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulLevelImageSummary\n&<公共请求参数>",
2293
- "output": "{\n \"Response\": {\n \"LowLevelVulLocalImagePercent\": 0.0,\n \"HighLevelVulLocalImagePercent\": 0.0,\n \"LocalNewestImageCount\": 0,\n \"LowLevelVulRegistryImagePercent\": 0.0,\n \"MediumLevelVulRegistryImagePercent\": 0.0,\n \"HighLevelVulRegistryImagePercent\": 0.0,\n \"MediumLevelVulLocalImagePercent\": 0.0,\n \"RequestId\": \"xx\",\n \"CriticalLevelVulLocalImagePercent\": 0.0,\n \"CriticalLevelVulRegistryImagePercent\": 0.0,\n \"RegistryNewestImageCount\": 0\n }\n}",
2275
+ "output": "{\n \"Response\": {\n \"LowLevelVulLocalImagePercent\": 0.0,\n \"HighLevelVulLocalImagePercent\": 0.0,\n \"LocalNewestImageCount\": 0,\n \"LowLevelVulRegistryImagePercent\": 0.0,\n \"MediumLevelVulRegistryImagePercent\": 0.0,\n \"HighLevelVulRegistryImagePercent\": 0.0,\n \"MediumLevelVulLocalImagePercent\": 0.0,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"CriticalLevelVulLocalImagePercent\": 0.0,\n \"CriticalLevelVulRegistryImagePercent\": 0.0,\n \"RegistryNewestImageCount\": 0\n }\n}",
2294
2276
  "title": "查询应急漏洞各威胁等级统计镜像数"
2295
2277
  }
2296
2278
  ],
@@ -2298,15 +2280,15 @@
2298
2280
  {
2299
2281
  "document": "",
2300
2282
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulLevelSummary\n&CategoryType=SYSTEM\n&<公共请求参数>",
2301
- "output": "{\n \"Response\": {\n \"MediumLevelVulCount\": 0,\n \"CriticalLevelVulCount\": 0,\n \"HighLevelVulCount\": 0,\n \"LowLevelVulCount\": 0,\n \"RequestId\": \"xx\"\n }\n}",
2283
+ "output": "{\n \"Response\": {\n \"MediumLevelVulCount\": 0,\n \"CriticalLevelVulCount\": 0,\n \"HighLevelVulCount\": 0,\n \"LowLevelVulCount\": 0,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2302
2284
  "title": "查询各类型漏洞各威胁等级统计数"
2303
2285
  }
2304
2286
  ],
2305
2287
  "DescribeVulRegistryImageList": [
2306
2288
  {
2307
2289
  "document": "",
2308
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulRegistryImageList\n&PocID=1\n&<公共请求参数>",
2309
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"ComponentList\": [\n {\n \"Path\": \"xx\",\n \"Version\": \"xx\",\n \"Name\": \"xx\",\n \"FixedVersion\": \"xx\"\n }\n ],\n \"ImageTag\": \"xx\",\n \"ImageRepoAddress\": \"xx\",\n \"Namespace\": \"xx\",\n \"ImageName\": \"xx\",\n \"ImageID\": \"xx\",\n \"IsLatestImage\": true\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2290
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulRegistryImageList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"OnlyAffectedNewestImage\",\n \"Values\": [\n \"false\"\n ],\n \"ExactMatch\": false\n }\n ],\n \"PocID\": \"pcmgr-448277\"\n}",
2291
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ComponentList\": [\n {\n \"FixedVersion\": \"0:1.33.0-5.el8_8\",\n \"Name\": \"libnghttp2\",\n \"Path\": \"\",\n \"Version\": \"1.33.0-3.el8_2.1\"\n }\n ],\n \"ImageAssetId\": 100078588,\n \"ImageID\": \"sha256:0ecdf0d66075bf978f4723e3a41dbf8f984633fb6e6f1ff525666ba58cc6770c\",\n \"ImageName\": \"yancyw999\",\n \"ImageRepoAddress\": \"139.199.178.171:8089/yancyw/yancyw999\",\n \"ImageTag\": \"999\",\n \"IsLatestImage\": true,\n \"Namespace\": \"yancyw\"\n }\n ],\n \"RequestId\": \"d7a94822-5d3c-4d15-9522-56dd70b03b5a\",\n \"TotalCount\": 1\n }\n}",
2310
2292
  "title": "查询漏洞影响的仓库镜像列表"
2311
2293
  }
2312
2294
  ],
@@ -2314,7 +2296,7 @@
2314
2296
  {
2315
2297
  "document": "",
2316
2298
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulScanAuthorizedImageSummary\n&<公共请求参数>",
2317
- "output": "{\n \"Response\": {\n \"AllAuthorizedImageCount\": 0,\n \"RequestId\": \"xx\",\n \"UnScanAuthorizedImageCount\": 0\n }\n}",
2299
+ "output": "{\n \"Response\": {\n \"AllAuthorizedImageCount\": 0,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"UnScanAuthorizedImageCount\": 0\n }\n}",
2318
2300
  "title": "统计漏洞扫描页已授权和未扫描镜像数"
2319
2301
  }
2320
2302
  ],
@@ -2322,7 +2304,7 @@
2322
2304
  {
2323
2305
  "document": "",
2324
2306
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulScanInfo\n&LocalTaskID=1\n&RegistryTaskID=1\n&<公共请求参数>",
2325
- "output": "{\n \"Response\": {\n \"Status\": \"xx\",\n \"IgnoreVulCount\": 0,\n \"LocalImageScanCount\": 1,\n \"ScanEndTime\": \"xx\",\n \"ScanProgress\": 0.0,\n \"ScanStartTime\": \"xx\",\n \"RegistryImageScanCount\": 1,\n \"RegistryTaskID\": 0,\n \"RemainingTime\": 0.0,\n \"RegistryFoundVulCount\": 0,\n \"RequestId\": \"xx\",\n \"LocalTaskID\": 0,\n \"FoundRiskImageCount\": 0,\n \"FoundVulCount\": 0\n }\n}",
2307
+ "output": "{\n \"Response\": {\n \"FoundRiskImageCount\": 0,\n \"FoundVulCount\": 0,\n \"IgnoreVulCount\": 0,\n \"LocalImageScanCount\": 0,\n \"LocalTaskID\": 0,\n \"RegistryFoundVulCount\": 0,\n \"RegistryImageScanCount\": 0,\n \"RegistryTaskID\": 0,\n \"RemainingTime\": 0,\n \"RequestId\": \"b6cffd6d-b5a4-41d2-8ffc-21e5cbdee3b5\",\n \"ScanEndTime\": \"\",\n \"ScanProgress\": 0,\n \"ScanStartTime\": \"\",\n \"Status\": \"NOT_SCAN\"\n }\n}",
2326
2308
  "title": "查询漏洞扫描任务信息"
2327
2309
  }
2328
2310
  ],
@@ -2330,7 +2312,7 @@
2330
2312
  {
2331
2313
  "document": "",
2332
2314
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulScanLocalImageList\n&TaskID=1\n&<公共请求参数>",
2333
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"MediumLevelVulCount\": 0,\n \"ScanStatus\": \"xx\",\n \"ScanEndTime\": \"xx\",\n \"ScanStartTime\": \"xx\",\n \"ErrorStatus\": \"xx\",\n \"ImageID\": \"xx\",\n \"ImageName\": \"xx\",\n \"CriticalLevelVulCount\": 0,\n \"TaskID\": 0,\n \"ScanDuration\": 0.0,\n \"HighLevelVulCount\": 0,\n \"LowLevelVulCount\": 0,\n \"Size\": 0.0\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2315
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"MediumLevelVulCount\": 0,\n \"ScanStatus\": \"SCANNING\",\n \"ScanEndTime\": \"2006-01-02 15:04:05\",\n \"ScanStartTime\": \"2006-01-02 15:04:05\",\n \"ErrorStatus\": \"0\",\n \"ImageID\": \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\",\n \"ImageName\": \"ImageName\",\n \"CriticalLevelVulCount\": 0,\n \"TaskID\": 0,\n \"ScanDuration\": 0.0,\n \"HighLevelVulCount\": 0,\n \"LowLevelVulCount\": 0,\n \"Size\": 0.0\n }\n ],\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\"\n }\n}",
2334
2316
  "title": "查询漏洞扫描任务的本地镜像列表"
2335
2317
  }
2336
2318
  ],
@@ -2338,7 +2320,7 @@
2338
2320
  {
2339
2321
  "document": "查询漏洞风险统计概览",
2340
2322
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulSummary\n<公共请求参数>\n\n{}",
2341
- "output": "{\n \"Response\": {\n \"VulTotalCount\": 0,\n \"SeriousVulCount\": 0,\n \"SuggestVulCount\": 0,\n \"PocExpLevelVulCount\": 0,\n \"RemoteExpLevelVulCount\": 0,\n \"SeriousVulNewestImageCount\": 0,\n \"SystemVulnerabilityFocusCount\": 0,\n \"WebVulnerabilityFocusCount\": 0,\n \"SeriousVulnerabilityLocalImageCount\": 0,\n \"SeriousVulnerabilityRegistryImageCount\": 0,\n \"EmergencyVulnerabilityCount\": 0,\n \"RequestId\": \"abc\"\n }\n}",
2323
+ "output": "{\n \"Response\": {\n \"EmergencyVulnerabilityCount\": 53,\n \"PocExpLevelVulCount\": 761,\n \"RemoteExpLevelVulCount\": 29,\n \"RequestId\": \"4cfc5e95-49f3-4c71-8048-0db454ed49b7\",\n \"SeriousVulCount\": 2924,\n \"SeriousVulNewestImageCount\": 296,\n \"SeriousVulnerabilityLocalImageCount\": 169,\n \"SeriousVulnerabilityRegistryImageCount\": 127,\n \"SuggestVulCount\": 2013,\n \"SystemVulnerabilityFocusCount\": 1536,\n \"VulTotalCount\": 5513,\n \"WebVulnerabilityFocusCount\": 477\n }\n}",
2342
2324
  "title": "查询漏洞风险统计概览"
2343
2325
  }
2344
2326
  ],
@@ -2346,7 +2328,7 @@
2346
2328
  {
2347
2329
  "document": "",
2348
2330
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulTendency\n&EndTime=2020-09-22\n&StartTime=2020-09-22\n&SphereOfInfluence=LATEST\n&<公共请求参数>",
2349
- "output": "{\n \"Response\": {\n \"VulTendencySet\": [\n {\n \"VulSet\": [\n {\n \"Cnt\": 1,\n \"CurTime\": \"2020-09-22\"\n }\n ],\n \"ImageType\": \"Local\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2331
+ "output": "{\n \"Response\": {\n \"VulTendencySet\": [\n {\n \"VulSet\": [\n {\n \"Cnt\": 1,\n \"CurTime\": \"2020-09-22\"\n }\n ],\n \"ImageType\": \"Local\"\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2350
2332
  "title": "严重&高危的漏洞趋势"
2351
2333
  }
2352
2334
  ],
@@ -2354,7 +2336,7 @@
2354
2336
  {
2355
2337
  "document": "",
2356
2338
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulTopRanking\n&CategoryType=SYSTEM\n&<公共请求参数>",
2357
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Level\": \"xx\",\n \"AffectedImageCount\": 0,\n \"VulName\": \"xx\",\n \"PocID\": \"xx\",\n \"AffectedContainerCount\": 0,\n \"ID\": 0\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2339
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AffectedContainerCount\": 0,\n \"AffectedImageCount\": 1,\n \"ID\": 1027671,\n \"Level\": \"HIGH\",\n \"PocID\": \"pcmgr-166817\",\n \"VulName\": \"Telnetd encrypt_keyid: Remote Root function pointer overwrite\"\n }\n ],\n \"RequestId\": \"ce6b8df8-5cc6-4ab5-8401-1394483c0fec\"\n }\n}",
2358
2340
  "title": "查询漏洞Top排名列表"
2359
2341
  }
2360
2342
  ],
@@ -2369,8 +2351,8 @@
2369
2351
  "DescribeWebVulList": [
2370
2352
  {
2371
2353
  "document": "",
2372
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeWebVulList\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
2373
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"Category\": \"xx\",\n \"CVEID\": \"xx\",\n \"RegistryImageCount\": 0,\n \"DefenceScope\": \"xx\",\n \"Name\": \"xx\",\n \"Level\": \"xx\",\n \"CVSSV3Score\": 0.0,\n \"Tags\": [\n \"xx\"\n ],\n \"FoundTime\": \"xx\",\n \"DefenceStatus\": \"xx\",\n \"DefendedCount\": 0,\n \"ContainerCount\": 0,\n \"PocID\": \"xx\",\n \"LocalImageCount\": 0,\n \"LatestFoundTime\": \"xx\",\n \"ID\": 0,\n \"DefenceHostCount\": 0\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
2354
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeWebVulList\n<公共请求参数>\n\n{\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
2355
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2022-23302\",\n \"CVSSV3Score\": 8.8,\n \"Category\": \"DESERIALIZATION_OF_UNTRUSTED_DATA\",\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"\",\n \"DefenceStatus\": \"\",\n \"DefendedCount\": 0,\n \"FoundTime\": \"2024-10-29 11:56:21\",\n \"ID\": 173840040,\n \"LatestFoundTime\": \"2024-10-29 11:56:21\",\n \"Level\": \"HIGH\",\n \"LocalImageCount\": 0,\n \"Name\": \"Apache log4j JMSSink反序列化代码执行漏洞(CVE-2022-23302)\",\n \"PocID\": \"pcmgr-335818\",\n \"RegistryImageCount\": 1,\n \"Tags\": [\n \"NETWORK\",\n \"POC\"\n ]\n }\n ],\n \"RequestId\": \"e8f59b70-321a-423d-9f8a-a587451c19dd\",\n \"TotalCount\": 33\n }\n}",
2374
2356
  "title": "查询web应用漏洞列表"
2375
2357
  }
2376
2358
  ],
@@ -2386,14 +2368,14 @@
2386
2368
  {
2387
2369
  "document": "在用户首次进入合规安全功能的场景下,调用此接口为用户初始化环境,分配资源和数据。",
2388
2370
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: InitializeUserComplianceEnvironment\n<公共请求参数>\n\n{}",
2389
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\"\n }\n}",
2371
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2390
2372
  "title": "初始化用户的合规基线检环境"
2391
2373
  }
2392
2374
  ],
2393
2375
  "ModifyAbnormalProcessRuleStatus": [
2394
2376
  {
2395
2377
  "document": "",
2396
- "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAbnormalProcessRuleStatus\n&IsEnable=true\n&RuleIdSet.0=xxxx\n&<公共请求参数>",
2378
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAbnormalProcessRuleStatus\n<公共请求参数>\n\n{\n \"RuleIdSet\": [\n \"5202566\"\n ],\n \"IsEnable\": true\n}",
2397
2379
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
2398
2380
  "title": "修改规则状态"
2399
2381
  }
@@ -2401,15 +2383,15 @@
2401
2383
  "ModifyAbnormalProcessStatus": [
2402
2384
  {
2403
2385
  "document": "",
2404
- "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAbnormalProcessStatus\n&EventIdSet.0=xx\n&Status=xx\n&Remark=xx\n&<公共请求参数>",
2405
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2386
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAbnormalProcessStatus\n&EventIdSet.0=10001\n&Status= EVENT_DEALED\n&Remark=无\n&<公共请求参数>",
2387
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2406
2388
  "title": "修改异常进程事件状态"
2407
2389
  }
2408
2390
  ],
2409
2391
  "ModifyAccessControlRuleStatus": [
2410
2392
  {
2411
2393
  "document": "",
2412
- "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAccessControlRuleStatus\n&IsEnable=true\n&RuleIdSet.0=xxxx\n&<公共请求参数>",
2394
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAccessControlRuleStatus\n<公共请求参数>\n\n{\n \"RuleIdSet\": [\n \"111\"\n ],\n \"IsEnable\": true\n}",
2413
2395
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
2414
2396
  "title": "修改规则状态"
2415
2397
  }
@@ -2417,8 +2399,8 @@
2417
2399
  "ModifyAccessControlStatus": [
2418
2400
  {
2419
2401
  "document": "",
2420
- "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAccessControlStatus\n&EventIdSet.0=xx\n&Status=xx\n&Remark=xx\n&<公共请求参数>",
2421
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2402
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAccessControlStatus\n&EventIdSet.0=10001\n&Status=EVENT_DEALED\n&Remark=无\n&<公共请求参数>",
2403
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2422
2404
  "title": "修改运行时访问控制事件状态"
2423
2405
  }
2424
2406
  ],
@@ -2469,15 +2451,15 @@
2469
2451
  "ModifyCompliancePeriodTask": [
2470
2452
  {
2471
2453
  "document": "",
2472
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyCompliancePeriodTask\n<公共请求参数>\n\n{\n \"PeriodTaskId\": 12345,\n \"PeriodRule\": {\n \"ExecutionTime\": \"04:00:00\",\n \"Frequency\": 1\n },\n \"StandardSettings\": [\n {\n \"StandardId\": 12345,\n \"Enable\": false\n }\n ]\n}",
2473
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\"\n }\n}",
2454
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyCompliancePeriodTask\n<公共请求参数>\n\n{\n \"PeriodTaskId\": 1001,\n \"PeriodRule\": {\n \"ExecutionTime\": \"04:00:00\",\n \"Frequency\": 1\n },\n \"StandardSettings\": [\n {\n \"StandardId\": 1001,\n \"Enable\": false\n }\n ]\n}",
2455
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2474
2456
  "title": "编辑定时任务"
2475
2457
  }
2476
2458
  ],
2477
2459
  "ModifyContainerNetStatus": [
2478
2460
  {
2479
2461
  "document": "",
2480
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyContainerNetStatus\n<公共请求参数>\n\n{\n \"ContainerID\": \"xxxx\",\n \"Status\": \"EVENT_ISOLATE_CONTAINER\"\n}",
2462
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyContainerNetStatus\n<公共请求参数>\n\n{\n \"ContainerID\": \"289899476e81\",\n \"Status\": \"EVENT_ISOLATE_CONTAINER\"\n}",
2481
2463
  "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2482
2464
  "title": "隔离容器网络状态"
2483
2465
  }
@@ -2485,8 +2467,8 @@
2485
2467
  "ModifyEscapeEventStatus": [
2486
2468
  {
2487
2469
  "document": "",
2488
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyEscapeEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"xx\",\n \"Remark\": \"xx\",\n \"EventIdSet\": [\n \"xx\"\n ]\n}",
2489
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2470
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyEscapeEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"EVENT_IGNORE\",\n \"EventIdSet\": [\n \"33705186\"\n ]\n}",
2471
+ "output": "{\n \"Response\": {\n \"RequestId\": \"3c3b5c8a-727b-4e32-b679-bcb5d6530c67\"\n }\n}",
2490
2472
  "title": "修改容器逃逸扫描事件状态"
2491
2473
  }
2492
2474
  ],
@@ -2494,7 +2476,7 @@
2494
2476
  {
2495
2477
  "document": "",
2496
2478
  "input": "https://tcss.tencentcloudapi.com/?Action=ModifyEscapeRule\n&RuleSet.0.Type=\"ESCAPE_HOST_ACESS_FILE\"\n&RuleSet.0.IsEnable=true\n&RuleSet.1.Type=\"ESCAPE_MOUNT_NAMESPACE\"\n&RuleSet.1.IsEnable=true\n&RuleSet.2.Type=\"ESCAPE_PRIVILEDGE\"\n&RuleSet.2.IsEnable=true\n&RuleSet.3.Type=\"ESCAPE_PRIVILEDGE_CONTAINER_START\"\n&RuleSet.3.IsEnable=true\n&RuleSet.4.Type=\"ESCAPE_MOUNT_SENSITIVE_PTAH\"\n&RuleSet.4.IsEnable=true\n&RuleSet.5.Type=\"ESCAPE_SYSCALL\"\n&RuleSet.5.IsEnable=true\n&<公共请求参数>",
2497
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2479
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2498
2480
  "title": "updataEscape"
2499
2481
  }
2500
2482
  ],
@@ -2502,22 +2484,22 @@
2502
2484
  {
2503
2485
  "document": "",
2504
2486
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyEscapeWhiteList\n<公共请求参数>\n\n{\n \"EventType\": [\n \"\\\"ESCAPE_DOCKER_API\\\"\"\n ],\n \"IDSet\": [\n \"1\"\n ]\n}",
2505
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2487
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2506
2488
  "title": "修改逃逸白名单"
2507
2489
  }
2508
2490
  ],
2509
2491
  "ModifyImageAuthorized": [
2510
2492
  {
2511
2493
  "document": "",
2512
- "input": "https://tcss.tencentcloudapi.com/?Action=ModifyImageAuthorized\n&AllLocalImages=false\n&UpdatedLocalImageCnt=1\n&LocalImageIds.0=xx\n&AllRegistryImages=false\n&UpdatedRegistryImageCnt=1\n&RegistryImageIds.0=xx\n&ImageSourceType=ASSETIMAGE\n&<公共请求参数>",
2513
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2494
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyImageAuthorized\n<公共请求参数>\n\n{\n \"AllLocalImages\": false,\n \"AllRegistryImages\": false,\n \"ImageSourceType\": \"ASSETIMAGE\",\n \"LocalImageIds\": [\n \"sha256:aaad346fbeab5768b61c75f016128c9189b7d0135053d308ef02958a8c80e6cd\"\n ],\n \"OnlyShowLatest\": true,\n \"UpdatedLocalImageCnt\": 100,\n \"UpdatedRegistryImageCnt\": 0\n}",
2495
+ "output": "{\n \"Response\": {\n \"RequestId\": \"e55bf3cb-f38f-4697-8638-a1e22efe8bb1\"\n }\n}",
2514
2496
  "title": "批量授权镜像扫描V2.0"
2515
2497
  }
2516
2498
  ],
2517
2499
  "ModifyK8sApiAbnormalEventStatus": [
2518
2500
  {
2519
2501
  "document": "",
2520
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyK8sApiAbnormalEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"xx\",\n \"Remark\": \"xx\",\n \"EventIDSet\": [\n 1\n ]\n}",
2502
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyK8sApiAbnormalEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"EVENT_DEALED\",\n \"Remark\": \"Remark\",\n \"EventIDSet\": [\n 1\n ]\n}",
2521
2503
  "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\"\n }\n}",
2522
2504
  "title": "修改k8sapi异常事件状态"
2523
2505
  }
@@ -2525,7 +2507,7 @@
2525
2507
  "ModifyK8sApiAbnormalRuleInfo": [
2526
2508
  {
2527
2509
  "document": "",
2528
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyK8sApiAbnormalRuleInfo\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"Status\": true,\n \"RuleInfoList\": [\n {\n \"Action\": \"xx\",\n \"Scope\": \"xx\",\n \"RiskLevel\": \"xx\",\n \"IsDelete\": true,\n \"Status\": true\n }\n ],\n \"EffectClusterIDSet\": [\n \"xx\"\n ],\n \"RuleID\": \"xx\",\n \"RuleType\": \"xx\",\n \"EffectAllCluster\": true,\n \"RuleName\": \"xx\"\n }\n}",
2510
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyK8sApiAbnormalRuleInfo\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"Status\": true,\n \"RuleInfoList\": [\n {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"NOTICE\",\n \"Scope\": \"{\\\"RequestURI\\\":\\\"/apis/cowsajhhoa.k8s.io/v\\\",\\\"RequestUser\\\":\\\"“name”:”sanpasahsad-contaosaer-leader”)\\\\\\\"\\\",\\\"ResponseStatusCode\\\":\\\"200\\\",\\\"SourceIPS\\\":\\\"10.255.0.43\\\",\\\"UserAgent\\\":\\\"snapshot-controller\\\",\\\"Verb\\\":\\\"update\\\"}\",\n \"Status\": true\n }\n ],\n \"EffectClusterIDSet\": [],\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"RuleType\": \"USER_DEFINED_RULE\",\n \"EffectAllCluster\": true,\n \"RuleName\": \"rulename-test\"\n }\n}",
2529
2511
  "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\"\n }\n}",
2530
2512
  "title": "修改k8sapi异常规则信息"
2531
2513
  }
@@ -2533,7 +2515,7 @@
2533
2515
  "ModifyK8sApiAbnormalRuleStatus": [
2534
2516
  {
2535
2517
  "document": "",
2536
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyK8sApiAbnormalRuleStatus\n<公共请求参数>\n\n{\n \"RuleID\": \"xxx\",\n \"Status\": true\n}",
2518
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyK8sApiAbnormalRuleStatus\n<公共请求参数>\n\n{\n \"RuleID\": \"dsfsdfee2f4f\",\n \"Status\": true\n}",
2537
2519
  "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\"\n }\n}",
2538
2520
  "title": "修改k8sapi异常事件规则状态"
2539
2521
  }
@@ -2541,8 +2523,8 @@
2541
2523
  "ModifyReverseShellStatus": [
2542
2524
  {
2543
2525
  "document": "",
2544
- "input": "https://tcss.tencentcloudapi.com/?Action=ModifyReverseShellStatus\n&EventIdSet.0=xx\n&Status=xx\n&Remark=xx\n&<公共请求参数>",
2545
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2526
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyReverseShellStatus\n&EventIdSet.0=\"365456\"\n&Status=EVENT_DEALED\n&Remark=\"删除原因\"\n&<公共请求参数>",
2527
+ "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
2546
2528
  "title": "修改反弹shell事件状态"
2547
2529
  }
2548
2530
  ],
@@ -2550,7 +2532,7 @@
2550
2532
  {
2551
2533
  "document": "",
2552
2534
  "input": "https://tcss.tencentcloudapi.com/?Action=ModifyRiskSyscallStatus\n&EventIdSet.0=61c396cb85a03485f10c353e\n&Status=EVENT_INGNORE\n&Remark=备注\n&<公共请求参数>",
2553
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2535
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2554
2536
  "title": "修改高危系统调用事件状态"
2555
2537
  }
2556
2538
  ],
@@ -2565,7 +2547,7 @@
2565
2547
  "ModifySecLogDeliveryClsSetting": [
2566
2548
  {
2567
2549
  "document": "",
2568
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogDeliveryClsSetting\n<公共请求参数>\n\n{\n \"List\": [\n {\n \"LogType\": \"xx\",\n \"State\": true,\n \"LogSet\": \"xx\",\n \"Region\": \"xx\",\n \"TopicID\": \"xx\"\n }\n ]\n}",
2550
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogDeliveryClsSetting\n<公共请求参数>\n\n{\n \"List\": [\n {\n \"LogSet\": \"01992e90-8d72-4a4e-b88f-1fd988bfc215\",\n \"LogSetName\": \"audit_k8s\",\n \"LogType\": \"container_launch\",\n \"Region\": \"ap-beijing\",\n \"State\": true,\n \"TopicID\": \"aabb7847-261a-4717-becb-ce37c1689a0a\",\n \"TopicName\": \"audit_container\"\n }\n ]\n}",
2569
2551
  "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2570
2552
  "title": "更新安全日志-日志投递cls配置"
2571
2553
  }
@@ -2573,7 +2555,7 @@
2573
2555
  "ModifySecLogDeliveryKafkaSetting": [
2574
2556
  {
2575
2557
  "document": "",
2576
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogDeliveryKafkaSetting\n<公共请求参数>\n\n{\n \"InstanceID\": \"实例ID\",\n \"InstanceName\": \"实例名称\",\n \"Domain\": \"域名\",\n \"User\": \"用户名\",\n \"Password\": \"密码\",\n \"RegionID\": \"xxx\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"主题ID\",\n \"TopicName\": \"主题名称\",\n \"State\": true\n }\n ]\n}",
2558
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogDeliveryKafkaSetting\n<公共请求参数>\n\n{\n \"InstanceID\": \"实例ID\",\n \"InstanceName\": \"实例名称\",\n \"Domain\": \"域名\",\n \"User\": \"用户名\",\n \"Password\": \"密码\",\n \"RegionID\": \"ap-beijing\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"主题ID\",\n \"TopicName\": \"主题名称\",\n \"State\": true\n }\n ]\n}",
2577
2559
  "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2578
2560
  "title": "更新安全日志投递kafka设置"
2579
2561
  }
@@ -2597,7 +2579,7 @@
2597
2579
  "ModifySecLogKafkaUIN": [
2598
2580
  {
2599
2581
  "document": "",
2600
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogKafkaUIN\n<公共请求参数>\n\n{\n \"DstUIN\": \"xxxx\"\n}",
2582
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogKafkaUIN\n<公共请求参数>\n\n{\n \"DstUIN\": \"2684754534\"\n}",
2601
2583
  "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2602
2584
  "title": "修改安全日志KafkaUIN"
2603
2585
  }
@@ -2605,7 +2587,7 @@
2605
2587
  "ModifyVirusAutoIsolateExampleSwitch": [
2606
2588
  {
2607
2589
  "document": "",
2608
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusAutoIsolateExampleSwitch\n<公共请求参数>\n\n{\n \"MD5\": \"xxxxxxxxxxxx\",\n \"Status\": true\n}",
2590
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusAutoIsolateExampleSwitch\n<公共请求参数>\n\n{\n \"MD5\": \"61d7d84e979212bed18ed9aa8748defa\",\n \"Status\": true\n}",
2609
2591
  "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2610
2592
  "title": "修改木马自动隔离样本开关"
2611
2593
  }
@@ -2637,7 +2619,7 @@
2637
2619
  "ModifyVirusScanSetting": [
2638
2620
  {
2639
2621
  "document": "运行时更新文件查杀设置",
2640
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusScanSetting\n<公共请求参数>\n\n{\n \"BeginScanAt\": \"xx\",\n \"EnableScan\": true,\n \"ScanPathType\": 1,\n \"ScanRangeType\": 1,\n \"ScanPathAll\": true,\n \"Timeout\": 1,\n \"ScanIds\": [\n \"xx\"\n ],\n \"ScanPath\": [\n \"xx\"\n ],\n \"ScanRangeAll\": true,\n \"Cycle\": 1,\n \"ScanPathMode\": \"SCAN_PATH_ALL\"\n}",
2622
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusScanSetting\n<公共请求参数>\n\n{\n \"Timeout\": 5,\n \"BeginScanAt\": \"10:59:00\",\n \"Cycle\": 1,\n \"ScanPath\": [\n \"/tmp\"\n ],\n \"ScanPathAll\": false,\n \"ScanRangeAll\": false,\n \"EnableScan\": true,\n \"ScanIds\": [\n \"ad297b24a4f818d9da49c9bec10d54c179b6751fc362802b077f710b3638e0f0\"\n ],\n \"ScanPathType\": 0,\n \"ScanRangeType\": 0\n}",
2641
2623
  "output": "{\n \"Response\": {\n \"RequestId\": \"b9cd345d-9d88-4e3b-86b6-e0e5c971731a\"\n }\n}",
2642
2624
  "title": "运行时更新文件查杀设置"
2643
2625
  }
@@ -2654,7 +2636,7 @@
2654
2636
  {
2655
2637
  "document": "",
2656
2638
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVulDefenceEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"EVENT_DEALED\",\n \"EventIDs\": [\n \"1\"\n ]\n}",
2657
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2639
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2658
2640
  "title": "修改漏洞防御事件状态"
2659
2641
  }
2660
2642
  ],
@@ -2662,7 +2644,7 @@
2662
2644
  {
2663
2645
  "document": "编辑漏洞防御设置",
2664
2646
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVulDefenceSetting\n<公共请求参数>\n\n{\n \"Scope\": \"1\",\n \"IsEnabled\": \"1\"\n}",
2665
- "output": "{\n \"Response\": {\n \"RequestId\": \"abc\"\n }\n}",
2647
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2666
2648
  "title": "编辑漏洞防御设置"
2667
2649
  }
2668
2650
  ],
@@ -2670,7 +2652,7 @@
2670
2652
  {
2671
2653
  "document": "",
2672
2654
  "input": "https://tcss.tencentcloudapi.com/?Action=OpenTcssTrial\n&<公共请求参数>",
2673
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"EndTime\": \"xx\",\n \"StartTime\": \"xx\"\n }\n}",
2655
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"EndTime\": \"2022-11-22 00:00:00\",\n \"StartTime\": \"2024-10-30 10:01:11\"\n }\n}",
2674
2656
  "title": "开通容器安全服务试用"
2675
2657
  }
2676
2658
  ],
@@ -2678,15 +2660,15 @@
2678
2660
  {
2679
2661
  "document": "",
2680
2662
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: RemoveAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"RegistryId\": \"1\"\n}",
2681
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2663
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2682
2664
  "title": "删除单个镜像仓库详细信息"
2683
2665
  }
2684
2666
  ],
2685
2667
  "RenewImageAuthorizeState": [
2686
2668
  {
2687
2669
  "document": "",
2688
- "input": "https://tcss.tencentcloudapi.com/?Action=RenewImageAuthorizeState\n&AllImages=false\n&ImageIds.0=aaa\n&<公共请求参数>",
2689
- "output": "{\n \"Response\": {\n \"RequestId\": \"aaa\"\n }\n}",
2670
+ "input": "https://tcss.tencentcloudapi.com/?Action=RenewImageAuthorizeState\n&AllImages=false\n&ImageIds.0=test-image-id\n&<公共请求参数>",
2671
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2690
2672
  "title": "授权镜像扫描"
2691
2673
  }
2692
2674
  ],
@@ -2701,8 +2683,8 @@
2701
2683
  "ScanComplianceAssets": [
2702
2684
  {
2703
2685
  "document": "",
2704
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 123,\n 456,\n 789\n ]\n}",
2705
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TaskId\": 123\n }\n}",
2686
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 111,\n 456,\n 789\n ]\n}",
2687
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
2706
2688
  "title": "重新扫描指定的资产"
2707
2689
  },
2708
2690
  {
@@ -2715,8 +2697,8 @@
2715
2697
  "ScanComplianceAssetsByPolicyItem": [
2716
2698
  {
2717
2699
  "document": "",
2718
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceAssetsByPolicyItem\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 10001,\n \"CustomerAssetIdSet\": [\n 123,\n 456,\n 789\n ]\n}",
2719
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TaskId\": 123\n }\n}",
2700
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceAssetsByPolicyItem\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 10001,\n \"CustomerAssetIdSet\": [\n 111,\n 456,\n 789\n ]\n}",
2701
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
2720
2702
  "title": "用指定的检测项重新检测选定的资产"
2721
2703
  },
2722
2704
  {
@@ -2729,16 +2711,16 @@
2729
2711
  "ScanCompliancePolicyItems": [
2730
2712
  {
2731
2713
  "document": "",
2732
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanCompliancePolicyItems\n<公共请求参数>\n\n{\n \"CustomerPolicyItemIdSet\": [\n 123,\n 456,\n 789\n ]\n}",
2733
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TaskId\": 123\n }\n}",
2714
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanCompliancePolicyItems\n<公共请求参数>\n\n{\n \"CustomerPolicyItemIdSet\": [\n 111,\n 456,\n 789\n ]\n}",
2715
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
2734
2716
  "title": "重新检测选定的检测项"
2735
2717
  }
2736
2718
  ],
2737
2719
  "ScanComplianceScanFailedAssets": [
2738
2720
  {
2739
2721
  "document": "",
2740
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceScanFailedAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 123,\n 456,\n 789\n ]\n}",
2741
- "output": "{\n \"Response\": {\n \"RequestId\": \"xxxxx\",\n \"TaskId\": 123\n }\n}",
2722
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceScanFailedAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 111,\n 456,\n 789\n ]\n}",
2723
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
2742
2724
  "title": "重新检测上次检测失败的资产"
2743
2725
  },
2744
2726
  {
@@ -2759,8 +2741,8 @@
2759
2741
  "StopVirusScanTask": [
2760
2742
  {
2761
2743
  "document": "",
2762
- "input": "https://tcss.tencentcloudapi.com/?Action=StopVirusScanTask\n&TaskId=xxx\n&<公共请求参数>",
2763
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2744
+ "input": "https://tcss.tencentcloudapi.com/?Action=StopVirusScanTask\n&TaskId=task-id\n&<公共请求参数>",
2745
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2764
2746
  "title": "运行时停止木马查杀任务"
2765
2747
  }
2766
2748
  ],
@@ -2768,7 +2750,7 @@
2768
2750
  {
2769
2751
  "document": "",
2770
2752
  "input": "https://tcss.tencentcloudapi.com/?Action=StopVulScanTask\n&LocalTaskID=1\n&RegistryTaskID=1\n&<公共请求参数>",
2771
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2753
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2772
2754
  "title": "停止漏洞扫描任务"
2773
2755
  }
2774
2756
  ],
@@ -2776,14 +2758,14 @@
2776
2758
  {
2777
2759
  "document": "",
2778
2760
  "input": "https://tcss.tencentcloudapi.com/?Action=SwitchImageAutoAuthorizedRule\n&IsEnabled=1\n&RuleId=1\n\n&<公共请求参数>",
2779
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\"\n }\n}",
2761
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2780
2762
  "title": "编辑本地镜像自动授权开关"
2781
2763
  }
2782
2764
  ],
2783
2765
  "SyncAssetImageRegistryAsset": [
2784
2766
  {
2785
2767
  "document": "",
2786
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SyncAssetImageRegistryAsset\n<公共请求参数>\n\n{}",
2768
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SyncAssetImageRegistryAsset\n<公共请求参数>\n\n{\n \"All\": false,\n \"RegistryIds\": [\n 29115\n ]\n}",
2787
2769
  "output": "{\n \"Response\": {\n \"RequestId\": \"33ec689a-e026-4700-8dc4-b559b97f0667\"\n }\n}",
2788
2770
  "title": "镜像仓库资产刷新"
2789
2771
  }
@@ -2791,7 +2773,7 @@
2791
2773
  "UpdateAndPublishNetworkFirewallPolicyDetail": [
2792
2774
  {
2793
2775
  "document": "",
2794
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Peer\": \"xx\",\n \"Direction\": \"xx\",\n \"Ports\": \"xx\"\n }\n ],\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"xx\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"xx\"\n}",
2776
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"\",\n \"ClusterId\": \"cls-dfdsfd\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
2795
2777
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2796
2778
  "title": "容器网络创建网络策略更新并发布任务示例"
2797
2779
  }
@@ -2799,7 +2781,7 @@
2799
2781
  "UpdateAndPublishNetworkFirewallPolicyYamlDetail": [
2800
2782
  {
2801
2783
  "document": "",
2802
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"Id\": 1,\n \"Yaml\": \"xxx\"\n}",
2784
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"\",\n \"ClusterId\": \"cls-dfddf\",\n \"Id\": 1,\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
2803
2785
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2804
2786
  "title": "容器网络更新Yaml网络策略并发布任务任务示例"
2805
2787
  }
@@ -2807,23 +2789,23 @@
2807
2789
  "UpdateAssetImageRegistryRegistryDetail": [
2808
2790
  {
2809
2791
  "document": "更新单个镜像仓库详细信息",
2810
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Name\": \"test\",\n \"NetType\": \"public\",\n \"Password\": \"xxx\",\n \"RegistryRegion\": \"default\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"V2\",\n \"Url\": \"http://127.0.0.1:8080\",\n \"Username\": \"username\"\n}",
2811
- "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"abc\",\n \"NameRepeatErr\": \"abc\",\n \"RegistryId\": 0,\n \"RequestId\": \"abc\"\n }\n}",
2792
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Name\": \"private_aws\",\n \"Username\": \"AKIAVHDIU6R7C3BD\",\n \"Password\": \"password\",\n \"Url\": \"https://dkr.ecr.us-east-119.amazonaws.com\",\n \"RegistryType\": \"aws\",\n \"RegistryVersion\": \"V1\",\n \"NetType\": \"public\",\n \"RegistryRegion\": \"default\",\n \"SpeedLimit\": 0,\n \"Insecure\": 0,\n \"ConnDetectConfig\": [\n {\n \"Quuid\": \"backend\",\n \"Uuid\": \"backend\"\n }\n ]\n}",
2793
+ "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"\",\n \"NameRepeatErr\": \"\",\n \"RegistryId\": 29113,\n \"RequestId\": \"47d03bf3-6ea3-4e79-a7f0-70eae99717bc\"\n }\n}",
2812
2794
  "title": "更新单个镜像仓库详细信息"
2813
2795
  }
2814
2796
  ],
2815
2797
  "UpdateImageRegistryTimingScanTask": [
2816
2798
  {
2817
2799
  "document": "扫描全部已授权的最新版本镜像,扫描类型:漏洞",
2818
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateImageRegistryTimingScanTask\n<公共请求参数>\n\n{\n \"ScanPeriod\": 1,\n \"ScanType\": [\n \"CVE\"\n ],\n \"Images\": [\n {\n \"ImageDigest\": \"abc\",\n \"RegistryType\": \"abc\",\n \"ImageRepoAddress\": \"abc\",\n \"InstanceId\": \"abc\",\n \"InstanceName\": \"abc\",\n \"Namespace\": \"abc\",\n \"ImageName\": \"abc\",\n \"ImageTag\": \"abc\",\n \"Force\": \"abc\"\n }\n ],\n \"All\": true,\n \"Latest\": true,\n \"Enable\": true,\n \"ScanTime\": \"04:00:00\",\n \"Id\": [\n 1\n ]\n}",
2819
- "output": "{\n \"Response\": {\n \"RequestId\": \"abc\"\n }\n}",
2800
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateImageRegistryTimingScanTask\n<公共请求参数>\n\n{\n \"Enable\": true,\n \"ScanPeriod\": 1,\n \"ScanTime\": \"18:10\",\n \"ScanEndTime\": \"20:00\",\n \"ScanScope\": 2,\n \"ContainerRunning\": false,\n \"Id\": [],\n \"Namespace\": [\n \"tke-images\"\n ],\n \"RegistryType\": [\n \"ccr\"\n ],\n \"Latest\": true,\n \"ScanType\": [\n \"CVE\",\n \"VIRUS\",\n \"RISK\"\n ],\n \"ExcludeImageAssetIds\": []\n}",
2801
+ "output": "{\n \"Response\": {\n \"RequestId\": \"5f2acb2d-2775-4ef4-8230-03df2762b1d1\"\n }\n}",
2820
2802
  "title": "定时扫描-扫描全部已授权的最新版本镜像"
2821
2803
  }
2822
2804
  ],
2823
2805
  "UpdateNetworkFirewallPolicyDetail": [
2824
2806
  {
2825
2807
  "document": "",
2826
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Peer\": \"xx\",\n \"Direction\": \"xx\",\n \"Ports\": \"xx\"\n }\n ],\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"xx\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"xx\"\n}",
2808
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"\",\n \"ClusterId\": \"cls-sdfdsf\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
2827
2809
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2828
2810
  "title": "容器网络创建网络策略更新任务示例"
2829
2811
  }
@@ -2831,7 +2813,7 @@
2831
2813
  "UpdateNetworkFirewallPolicyYamlDetail": [
2832
2814
  {
2833
2815
  "document": "",
2834
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"xx\",\n \"ClusterId\": \"xx\",\n \"Id\": 1,\n \"Yaml\": \"xxx\"\n}",
2816
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"\",\n \"ClusterId\": \"cls-67898\",\n \"Id\": 1,\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
2835
2817
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2836
2818
  "title": "容器网络更新Yaml网络策略任务示例"
2837
2819
  }