tccli 3.0.1289.1__py2.py3-none-any.whl → 3.0.1291.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (88) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/antiddos/v20200309/api.json +132 -103
  3. tccli/services/antiddos/v20200309/examples.json +5 -5
  4. tccli/services/bi/v20220105/api.json +1 -1
  5. tccli/services/bi/v20220105/examples.json +1 -1
  6. tccli/services/billing/v20180709/api.json +16 -16
  7. tccli/services/billing/v20180709/examples.json +1 -1
  8. tccli/services/cam/v20190116/api.json +39 -33
  9. tccli/services/cam/v20190116/examples.json +1 -1
  10. tccli/services/cbs/v20170312/api.json +24 -20
  11. tccli/services/cdb/cdb_client.py +53 -0
  12. tccli/services/cdb/v20170320/api.json +64 -0
  13. tccli/services/cdb/v20170320/examples.json +8 -0
  14. tccli/services/cdwch/v20200915/api.json +204 -199
  15. tccli/services/cdwch/v20200915/examples.json +11 -11
  16. tccli/services/ckafka/v20190819/api.json +273 -268
  17. tccli/services/clb/v20180317/api.json +31 -22
  18. tccli/services/cls/cls_client.py +18 -230
  19. tccli/services/cls/v20201016/api.json +285 -687
  20. tccli/services/cls/v20201016/examples.json +2 -34
  21. tccli/services/cvm/v20170312/api.json +10 -0
  22. tccli/services/cynosdb/v20190107/api.json +97 -97
  23. tccli/services/dbbrain/v20191016/api.json +54 -51
  24. tccli/services/dbbrain/v20210527/api.json +125 -125
  25. tccli/services/dcdb/v20180411/api.json +48 -48
  26. tccli/services/dnspod/dnspod_client.py +466 -307
  27. tccli/services/dnspod/v20210323/api.json +391 -0
  28. tccli/services/dnspod/v20210323/examples.json +24 -0
  29. tccli/services/domain/v20180808/api.json +8 -8
  30. tccli/services/dsgc/dsgc_client.py +0 -53
  31. tccli/services/dsgc/v20190723/api.json +0 -24
  32. tccli/services/dsgc/v20190723/examples.json +0 -8
  33. tccli/services/ess/v20201111/api.json +1 -1
  34. tccli/services/essbasic/v20210526/api.json +1 -1
  35. tccli/services/fmu/v20191213/api.json +2 -2
  36. tccli/services/goosefs/v20220519/api.json +2 -2
  37. tccli/services/gwlb/v20240906/api.json +1 -1
  38. tccli/services/iotcloud/v20210408/api.json +66 -66
  39. tccli/services/iotcloud/v20210408/examples.json +13 -13
  40. tccli/services/iotvideoindustry/v20201201/api.json +542 -523
  41. tccli/services/iotvideoindustry/v20201201/examples.json +15 -15
  42. tccli/services/lighthouse/v20200324/api.json +8 -8
  43. tccli/services/lke/v20231130/api.json +10 -0
  44. tccli/services/lowcode/v20210108/api.json +2 -2
  45. tccli/services/mariadb/v20170312/api.json +42 -42
  46. tccli/services/mariadb/v20170312/examples.json +12 -0
  47. tccli/services/mmps/v20200710/api.json +95 -95
  48. tccli/services/monitor/monitor_client.py +53 -0
  49. tccli/services/monitor/v20180724/api.json +144 -0
  50. tccli/services/monitor/v20180724/examples.json +8 -0
  51. tccli/services/mps/mps_client.py +501 -24
  52. tccli/services/mps/v20190612/api.json +2071 -282
  53. tccli/services/mps/v20190612/examples.json +72 -0
  54. tccli/services/mqtt/v20240516/api.json +1 -1
  55. tccli/services/mqtt/v20240516/examples.json +1 -1
  56. tccli/services/postgres/v20170312/api.json +308 -283
  57. tccli/services/redis/redis_client.py +53 -0
  58. tccli/services/redis/v20180412/api.json +34 -0
  59. tccli/services/redis/v20180412/examples.json +8 -0
  60. tccli/services/svp/v20240125/api.json +66 -66
  61. tccli/services/svp/v20240125/examples.json +1 -1
  62. tccli/services/tcb/tcb_client.py +53 -53
  63. tccli/services/tcb/v20180608/api.json +220 -263
  64. tccli/services/tcb/v20180608/examples.json +8 -8
  65. tccli/services/tcbr/v20220217/examples.json +1 -1
  66. tccli/services/tcss/tcss_client.py +224 -277
  67. tccli/services/tcss/v20201101/api.json +4618 -4329
  68. tccli/services/tcss/v20201101/examples.json +207 -221
  69. tccli/services/tdmq/tdmq_client.py +0 -53
  70. tccli/services/tdmq/v20200217/api.json +379 -374
  71. tccli/services/tdmq/v20200217/examples.json +1 -9
  72. tccli/services/teo/teo_client.py +53 -0
  73. tccli/services/teo/v20220901/api.json +82 -11
  74. tccli/services/teo/v20220901/examples.json +8 -0
  75. tccli/services/thpc/v20211109/api.json +8 -8
  76. tccli/services/thpc/v20220401/api.json +8 -8
  77. tccli/services/thpc/v20230321/api.json +11 -10
  78. tccli/services/tke/v20180525/api.json +60 -60
  79. tccli/services/tke/v20220501/api.json +34 -34
  80. tccli/services/vpc/v20170312/api.json +44 -44
  81. tccli/services/waf/v20180125/api.json +9 -0
  82. tccli/services/wedata/v20210820/api.json +73 -0
  83. tccli/services/weilingwith/v20230427/api.json +997 -997
  84. {tccli-3.0.1289.1.dist-info → tccli-3.0.1291.1.dist-info}/METADATA +2 -2
  85. {tccli-3.0.1289.1.dist-info → tccli-3.0.1291.1.dist-info}/RECORD +88 -88
  86. {tccli-3.0.1289.1.dist-info → tccli-3.0.1291.1.dist-info}/WHEEL +0 -0
  87. {tccli-3.0.1289.1.dist-info → tccli-3.0.1291.1.dist-info}/entry_points.txt +0 -0
  88. {tccli-3.0.1289.1.dist-info → tccli-3.0.1291.1.dist-info}/license_files/LICENSE +0 -0
@@ -3,7 +3,7 @@
3
3
  "AddAndPublishNetworkFirewallPolicyDetail": [
4
4
  {
5
5
  "document": "",
6
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"rptest\",\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"describe content\",\n \"ClusterId\": \"cls-new\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
6
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"NewStrategy\",\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"describe content\",\n \"ClusterId\": \"cls-new\",\n \"FromPolicyRule\": 1,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 2,\n \"PodSelector\": \"a=b\"\n}",
7
7
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
8
8
  "title": "容器网络创建网络策略添加并发布任务示例"
9
9
  }
@@ -11,7 +11,7 @@
11
11
  "AddAndPublishNetworkFirewallPolicyYamlDetail": [
12
12
  {
13
13
  "document": "",
14
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"fshduis\",\n \"Description\": \"\",\n \"ClusterId\": \"cls-hjsdfh\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
14
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"fshduis\",\n \"Description\": \"desc of network firewall policy\",\n \"ClusterId\": \"cls-hjsdfh\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
15
15
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
16
16
  "title": "容器网络创建yaml网络策略添加任务示例"
17
17
  }
@@ -19,15 +19,15 @@
19
19
  "AddAssetImageRegistryRegistryDetail": [
20
20
  {
21
21
  "document": "新增单个镜像仓库详细信息",
22
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Username\": \"usename\",\n \"Name\": \"test\",\n \"Url\": \"http://127.0.0.1:8080\",\n \"RegistryVersion\": \"V2\",\n \"RegistryRegion\": \"default\",\n \"NetType\": \"public\",\n \"Password\": \"password\",\n \"RegistryType\": \"harbor\"\n}",
23
- "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"\",\n \"NameRepeatErr\": \"\",\n \"RegistryId\": 0,\n \"RequestId\": \"f8d97649-ca1b-4f94-8ed4-40052a40d426\"\n }\n}",
22
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Username\": \"usename\",\n \"Name\": \"admin\",\n \"Url\": \"http://127.0.0.1:8080\",\n \"RegistryVersion\": \"V2\",\n \"RegistryRegion\": \"default\",\n \"NetType\": \"public\",\n \"Password\": \"password\",\n \"RegistryType\": \"harbor\"\n}",
23
+ "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"connect closed\",\n \"NameRepeatErr\": \"name repeat err\",\n \"RegistryId\": 1002,\n \"RequestId\": \"f8d97649-ca1b-4f94-8ed4-40052a40d426\"\n }\n}",
24
24
  "title": "新增单个镜像仓库详细信息"
25
25
  }
26
26
  ],
27
27
  "AddComplianceAssetPolicySetToWhitelist": [
28
28
  {
29
29
  "document": "",
30
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddComplianceAssetPolicySetToWhitelist\n<公共请求参数>\n\n{\n \"AssetPolicySetList\": [\n {\n \"CustomerPolicyItemIdSet\": [\n 1\n ],\n \"CustomerAssetItemId\": 1\n }\n ]\n}",
30
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddComplianceAssetPolicySetToWhitelist\n<公共请求参数>\n\n{\n \"AssetPolicySetList\": [\n {\n \"CustomerPolicyItemIdSet\": [\n 13\n ],\n \"CustomerAssetItemId\": 15\n }\n ]\n}",
31
31
  "output": "{\n \"Response\": {\n \"RequestId\": \"eac6b301-a322-493a-8e36-83b295459397\"\n }\n}",
32
32
  "title": "忽略检测项+资产列表"
33
33
  },
@@ -87,7 +87,7 @@
87
87
  "AddEditReverseShellWhiteList": [
88
88
  {
89
89
  "document": "",
90
- "input": "https://tcss.tencentcloudapi.com/?Action=AddEditReverseShellWhiteList\n&WhiteListInfo.DstIp=127.0.0.1\n&WhiteListInfo.ImageIds.0=sha256:dabduwouo\n&WhiteListInfo.DstPort=12245\n&WhiteListInfo.ProcessName=test\n&<公共请求参数>",
90
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddEditReverseShellWhiteList\n&WhiteListInfo.DstIp=127.0.0.1\n&WhiteListInfo.ImageIds.0=sha256:dabduwouo\n&WhiteListInfo.DstPort=12245\n&WhiteListInfo.ProcessName=processName\n&<公共请求参数>",
91
91
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
92
92
  "title": "添加反弹shell白名单"
93
93
  }
@@ -119,7 +119,7 @@
119
119
  "AddIgnoreVul": [
120
120
  {
121
121
  "document": "",
122
- "input": "https://tcss.tencentcloudapi.com/?Action=AddIgnoreVul\n&List.0.PocID=\"pcmgr-70064\"\n&List.0.ImageIDs.0=\"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\"\n&List.0.ImageType=\"1\"\n&<公共请求参数>",
122
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddIgnoreVul\n&List.0.PocID=\"pcmgr-70064\"\n&List.0.ImageIDs.0=\"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\"\n&List.0.ImageType=\"2\"\n&<公共请求参数>",
123
123
  "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
124
124
  "title": "新增漏洞扫描忽略漏洞"
125
125
  }
@@ -127,7 +127,7 @@
127
127
  "AddNetworkFirewallPolicyDetail": [
128
128
  {
129
129
  "document": "",
130
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"test-2\",\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"\",\n \"ClusterId\": \"cls-fsdfw\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
130
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"test-2\",\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"description1\",\n \"ClusterId\": \"cls-fsdfw\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
131
131
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
132
132
  "title": "容器网络创建网络策略添加任务示例"
133
133
  }
@@ -135,7 +135,7 @@
135
135
  "AddNetworkFirewallPolicyYamlDetail": [
136
136
  {
137
137
  "document": "",
138
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"dfsdfsd\",\n \"Description\": \"\",\n \"ClusterId\": \"cls-dsfsdf\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
138
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"policyname\",\n \"Description\": \"describe content\",\n \"ClusterId\": \"cls-dsfsdf\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
139
139
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
140
140
  "title": "容器网络创建yaml网络策略添加任务示例"
141
141
  }
@@ -143,7 +143,7 @@
143
143
  "CheckNetworkFirewallPolicyYaml": [
144
144
  {
145
145
  "document": "",
146
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckNetworkFirewallPolicyYaml\n<公共请求参数>\n\n{\n \"PolicyName\": \"sdfhuiwhiw\",\n \"Description\": \"\",\n \"ClusterId\": \"cls-shuiwf\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
146
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckNetworkFirewallPolicyYaml\n<公共请求参数>\n\n{\n \"PolicyName\": \"sdfhuiwhiw\",\n \"Description\": \"description1\",\n \"ClusterId\": \"cls-shuiwf\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
147
147
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
148
148
  "title": "容器网络创建检查Yaml网络策略任务示例"
149
149
  }
@@ -168,7 +168,7 @@
168
168
  {
169
169
  "document": "",
170
170
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAbnormalProcessRulesExportJob\n<公共请求参数>\n\n{}",
171
- "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"\"\n }\n}",
171
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"f8be02cc-5c2f-49d8-9bbf-79fcf5ac****\"\n }\n}",
172
172
  "title": "创建异常进程规则导出任务"
173
173
  }
174
174
  ],
@@ -176,7 +176,7 @@
176
176
  {
177
177
  "document": "",
178
178
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAccessControlsRuleExportJob\n<公共请求参数>\n\n{}",
179
- "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"\"\n }\n}",
179
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"7e509aa8-24a6-4d7c-8e77-4222be2e****\"\n }\n}",
180
180
  "title": "创建k8sApi异常规则导出任务"
181
181
  }
182
182
  ],
@@ -213,7 +213,7 @@
213
213
  "CreateAssetImageScanTask": [
214
214
  {
215
215
  "document": "",
216
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageScanTask \n<公共请求参数>\n\n{\n \"ScanVirus\": true,\n \"ScanRisk\": true,\n \"ScanVul\": true,\n \"All\": true,\n \"Images\": []\n}",
216
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageScanTask\n<公共请求参数>\n\n{\n \"ScanVirus\": true,\n \"ScanRisk\": true,\n \"ScanVul\": true,\n \"All\": true,\n \"Images\": []\n}",
217
217
  "output": "{\n \"Response\": {\n \"RequestId\": \"a6d8d540-940f-47d9-8d7f-daac832ba5b4\",\n \"TaskID\": \"6013a6c334b9a9000cf519be\"\n }\n}",
218
218
  "title": "创建镜像扫描任务"
219
219
  }
@@ -310,7 +310,7 @@
310
310
  {
311
311
  "document": "",
312
312
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateImageExportJob\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"ImageName\"\n ]\n}",
313
- "output": "{\n \"Response\": {\n \"DownloadUrl\": \"sfsfsfsfsfs\",\n \"JobId\": \"test-jobid\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
313
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"sfsfsfsfsfs\",\n \"JobId\": \"jobid-dafdhj\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
314
314
  "title": "创建镜像导出任务"
315
315
  }
316
316
  ],
@@ -318,7 +318,7 @@
318
318
  {
319
319
  "document": "",
320
320
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateK8sApiAbnormalEventExportJob\n<公共请求参数>\n\n{}",
321
- "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"\"\n }\n}",
321
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"06ac844d-4f9d-43f8-b00e-45bc74dd****\"\n }\n}",
322
322
  "title": "创建k8s api异常事件导出任务"
323
323
  }
324
324
  ],
@@ -326,7 +326,7 @@
326
326
  {
327
327
  "document": "",
328
328
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateK8sApiAbnormalRuleExportJob\n<公共请求参数>\n\n{}",
329
- "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"\"\n }\n}",
329
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"a3ce7861-e09f-44a2-a4b2-e7649a93****\"\n }\n}",
330
330
  "title": "创建k8sApi异常规则导出任务"
331
331
  }
332
332
  ],
@@ -349,7 +349,7 @@
349
349
  "CreateNetworkFirewallPolicyDiscover": [
350
350
  {
351
351
  "document": "",
352
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPolicyDiscover\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-1342\"\n}",
352
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPolicyDiscover\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-gsdgs\"\n}",
353
353
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
354
354
  "title": "容器网络集群网络策略创建自动发现任务示例"
355
355
  }
@@ -357,7 +357,7 @@
357
357
  "CreateNetworkFirewallPublish": [
358
358
  {
359
359
  "document": "",
360
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-sdhfisdf\",\n \"Id\": [\n 1\n ]\n}",
360
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-sdhfisdf\",\n \"Id\": [\n 1002\n ]\n}",
361
361
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
362
362
  "title": "容器网络创建网络策略发布任务示例"
363
363
  }
@@ -365,7 +365,7 @@
365
365
  "CreateNetworkFirewallUndoPublish": [
366
366
  {
367
367
  "document": "",
368
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallUndoPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"test-clusterid\",\n \"Id\": [\n 1\n ]\n}",
368
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallUndoPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"test-clusterid\",\n \"Id\": [\n 1021\n ]\n}",
369
369
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
370
370
  "title": "容器网络创建网络策略撤销任务示例"
371
371
  }
@@ -421,7 +421,7 @@
421
421
  "CreateVirusScanAgain": [
422
422
  {
423
423
  "document": "",
424
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVirusScanAgain\n<公共请求参数>\n\n{\n \"TaskId\": \"\",\n \"ContainerIds\": []\n}",
424
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVirusScanAgain\n<公共请求参数>\n\n{\n \"TaskId\": \"6177adf5f95e94a76635****\",\n \"ContainerIds\": []\n}",
425
425
  "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
426
426
  "title": "运行时文件查杀重新检测"
427
427
  }
@@ -430,7 +430,7 @@
430
430
  {
431
431
  "document": "运行时文件查杀一键扫描",
432
432
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVirusScanTask\n<公共请求参数>\n\n{\n \"ScanRangeAll\": true,\n \"ScanPathAll\": true,\n \"ScanRangeType\": 1,\n \"ScanPathMode\": \"SCAN_PATH_DEFAULT\",\n \"Timeout\": 2\n}",
433
- "output": "{\n \"Response\": {\n \"RequestId\": \"a6d8d540-940f-47d9-8d7f-daac832ba5b4\",\n \"TaskID\": \"6013a6c334b9a9000cf519be\"\n }\n}",
433
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a6d8d540-940f-47d9-8d7f-daac832ba5b4\",\n \"TaskID\": \"356276635\"\n }\n}",
434
434
  "title": "运行时文件查杀一键扫描"
435
435
  }
436
436
  ],
@@ -507,23 +507,23 @@
507
507
  }
508
508
  ],
509
509
  "DeleteComplianceAssetPolicySetFromWhitelist": [
510
- {
511
- "document": "",
512
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteComplianceAssetPolicySetFromWhitelist\n<公共请求参数>\n\n{\n \"AssetItemId\": 10001,\n \"CustomerPolicyItemIdSet\": [\n 10001,\n 10002\n ]\n}",
513
- "output": "{\n \"Response\": {\n \"RequestId\": \"eac6b301-a322-493a-8e36-83b295459397\"\n }\n}",
514
- "title": "忽略检测项+资产列表"
515
- },
516
510
  {
517
511
  "document": "取消资产忽略项",
518
512
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteComplianceAssetPolicySetFromWhitelist\n<公共请求参数>\n\n{\n \"AssetItemId\": 2202462,\n \"CustomerPolicyItemIdSet\": [\n 2809\n ],\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
519
513
  "output": "{\n \"Response\": {\n \"RequestId\": \"925e6419-1fb8-4169-a96c-020e3ae9171e\"\n }\n}",
520
514
  "title": "取消资产忽略项"
515
+ },
516
+ {
517
+ "document": "",
518
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteComplianceAssetPolicySetFromWhitelist\n<公共请求参数>\n\n{\n \"AssetItemId\": 10001,\n \"CustomerPolicyItemIdSet\": [\n 10001,\n 10002\n ]\n}",
519
+ "output": "{\n \"Response\": {\n \"RequestId\": \"eac6b301-a322-493a-8e36-83b295459397\"\n }\n}",
520
+ "title": "忽略检测项+资产列表"
521
521
  }
522
522
  ],
523
523
  "DeleteCompliancePolicyAssetSetFromWhitelist": [
524
524
  {
525
525
  "document": "",
526
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteCompliancePolicyAssetSetFromWhitelist\n<公共请求参数>\n\n{\n \"PolicyAssetSetList\": [\n {\n \"CustomerPolicyItemId\": 1,\n \"CustomerAssetItemIdSet\": [\n 1\n ]\n }\n ]\n}",
526
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteCompliancePolicyAssetSetFromWhitelist\n<公共请求参数>\n\n{\n \"PolicyAssetSetList\": [\n {\n \"CustomerPolicyItemId\": 12,\n \"CustomerAssetItemIdSet\": [\n 15\n ]\n }\n ]\n}",
527
527
  "output": "{\n \"Response\": {\n \"RequestId\": \"eac6b301-a322-493a-8e36-83b295459397\"\n }\n}",
528
528
  "title": "忽略检测项+资产列表"
529
529
  }
@@ -571,15 +571,23 @@
571
571
  "DeleteNetworkFirewallPolicyDetail": [
572
572
  {
573
573
  "document": "",
574
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"ClusterId\": \"test-clusterId\",\n \"Id\": [\n 1\n ]\n}",
574
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls_fdts***\",\n \"Id\": [\n 1\n ]\n}",
575
575
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
576
576
  "title": "容器网络创建网络策略删除任务示例"
577
577
  }
578
578
  ],
579
+ "DeleteRaspRules": [
580
+ {
581
+ "document": "删除漏洞防御白名单",
582
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteRaspRules\n<公共请求参数>\n\n{\n \"IDs\": [\n 32\n ]\n}",
583
+ "output": "{\n \"Response\": {\n \"RequestId\": \"6c0fd9e1-8d54-4cf4-b339-7b5dc3afeb81\"\n }\n}",
584
+ "title": "删除漏洞防御白名单"
585
+ }
586
+ ],
579
587
  "DeleteReverseShellEvents": [
580
588
  {
581
589
  "document": "",
582
- "input": "https://tcss.tencentcloudapi.com/?Action=DeleteReverseShellEvents\n&EventIdSet.0=\"id1\"\n&<公共请求参数>",
590
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteReverseShellEvents\n&EventIdSet.0=\"1002\"\n&<公共请求参数>",
583
591
  "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
584
592
  "title": "删除运行时反弹shell事件"
585
593
  }
@@ -628,7 +636,7 @@
628
636
  {
629
637
  "document": "运行时异常进程事件详细信息",
630
638
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAbnormalProcessDetail\n<公共请求参数>\n\n{\n \"EventId\": \"5202566\"\n}",
631
- "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"-port 22\",\n \"ProcessPath\": \"/usr/local/bin/sshd\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"106.55.163.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"111411411475fe59dbd61071f16d6165480d381e5fb3663d176d53669b\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/adoring_ishizaka\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 2,\n \"EventId\": \"10302329\",\n \"EventName\": \"异常进程事件-告警\",\n \"EventType\": \"FILE_ABNORMAL_READ\",\n \"FoundTime\": \"2024-10-21 15:55:45\",\n \"HostID\": \"1414-18a1-4775-9e3f-cdfc89845157\",\n \"HostIP\": \"172.16.0.34\",\n \"ImageId\": \"sha256:1413413431fd9255658c128086395d3fa0aedd5a41ab6b034fd649d1a9260\",\n \"ImageName\": \"alpine:latest\",\n \"LatestFoundTime\": \"2024-10-21 20:57:12\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"-\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"-\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_DEALED\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"检测到疑似反弹shell命令执行\",\n \"GroupName\": \"SYSTEM_DEFINED_RULE\",\n \"MatchRule\": {\n \"ProcessPath\": \"-\",\n \"RuleId\": \"100000000000000000000004\",\n \"RuleLevel\": \"HIGH\",\n \"RuleMode\": \"RULE_MODE_ALERT\"\n },\n \"OperationTime\": \"2024-10-23 17:38:12\",\n \"Remark\": \"\",\n \"RuleId\": \"124\",\n \"RuleName\": \"REVERSE_SHELL\",\n \"Solution\": \"排查反弹shell行为及目标地址是否为业务正常需要\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 0,\n \"ProcessName\": \"\",\n \"ProcessParam\": \"\",\n \"ProcessPath\": \"\",\n \"ProcessStartUser\": \"\",\n \"ProcessUserGroup\": \"\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"\",\n \"ProcessName\": \"-\",\n \"ProcessParam\": \"sh -c \\\"bash >&1\\\"\",\n \"ProcessPath\": \"-\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"-\",\n \"ProcessUserGroup\": \"\"\n },\n \"RequestId\": \"280ebb84-63c5-417e-95bd-e3160f6c8cdc\"\n }\n}",
639
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"-port 22\",\n \"ProcessPath\": \"/usr/local/bin/sshd\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"106.55.163.***\",\n \"ClusterID\": \"cls-13nfdn****\",\n \"ClusterName\": \"demo-dev\",\n \"ContainerId\": \"1***5fe59dbd61071f16d6165480d381********\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"/adoring_ishizaka\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 2,\n \"EventId\": \"10302329\",\n \"EventName\": \"异常进程事件-告警\",\n \"EventType\": \"FILE_ABNORMAL_READ\",\n \"FoundTime\": \"2024-10-21 15:55:45\",\n \"HostID\": \"1414-18a1-4775-9e3f-cdfc898********\",\n \"HostIP\": \"172.16.0.34\",\n \"ImageId\": \"sha256:1413413431fd9255658c128086395d3********\",\n \"ImageName\": \"alpine:latest\",\n \"LatestFoundTime\": \"2024-10-21 20:57:12\",\n \"Namespace\": \"default\",\n \"NodeID\": \"d41d8cd98f00******\",\n \"NodeName\": \"d41d8cd98f00*****\",\n \"NodeSubNetCIDR\": \"fe80::8132:1b51:52******\",\n \"NodeSubNetID\": \"sub-fn4nf***\",\n \"NodeSubNetName\": \"dev\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"fe8dfjf2d2****\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"pod-dev\",\n \"PodStatus\": \"RUNNING\",\n \"Status\": \"EVENT_DEALED\",\n \"WorkloadType\": \"StatefulSet\"\n },\n \"EventDetail\": {\n \"Description\": \"检测到疑似反弹shell命令执行\",\n \"GroupName\": \"SYSTEM_DEFINED_RULE\",\n \"MatchRule\": {\n \"ProcessPath\": \"/usr/bin\",\n \"RuleId\": \"100000000000000000000004\",\n \"RuleLevel\": \"HIGH\",\n \"RuleMode\": \"RULE_MODE_ALERT\"\n },\n \"OperationTime\": \"2024-10-23 17:38:12\",\n \"Remark\": \"for dev\",\n \"RuleId\": \"124\",\n \"RuleName\": \"REVERSE_SHELL\",\n \"Solution\": \"排查反弹shell行为及目标地址是否为业务正常需要\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 330852,\n \"ProcessName\": \"containerd-shim\",\n \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\",\n \"ProcessPath\": \"/usr/bin/containerd-shim\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2907621,\n \"ProcessMd5\": \"8a5772dee965c8223aebc1225e*****\",\n \"ProcessName\": \"xenoncli\",\n \"ProcessParam\": \"xenoncli xenon ping\",\n \"ProcessPath\": \"/usr/local/bin/xenoncli\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"280ebb84-63c5-417e-95bd-e3160f6c8cdc\"\n }\n}",
632
640
  "title": "运行时异常进程事件详细信息"
633
641
  }
634
642
  ],
@@ -644,18 +652,10 @@
644
652
  {
645
653
  "document": "运行时异常进程列表",
646
654
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAbnormalProcessEvents\n<公共请求参数>\n\n{}",
647
- "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"2dc265571ad62064781574cb7f854bf25886660c3c99ae677d5c85528409f82d\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"containner1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"检测到敏感服务异常子进程启动\",\n \"EventCount\": 51,\n \"EventType\": \"MALICE_PROCESS_START\",\n \"FoundTime\": \"2020-10-29 00:05:02\",\n \"HostID\": \"8d2fqqq4-8f23-46ba-94ae-da11039e82d3\",\n \"HostIP\": \"10.0.86.119\",\n \"Id\": \"2961418\",\n \"ImageId\": \"sha256:736beeb0cd4edd4e1d3be51d5120eeced04eb50b61fc4a24c54a79ea66e40345\",\n \"ImageName\": \"image1\",\n \"LatestFoundTime\": \"2020-10-29 23:57:45\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchGroupName\": \"SYSTEM_DEFINED_RULE\",\n \"MatchProcessPath\": \"/bin/bash\",\n \"MatchRuleId\": \"100000000000000000000007\",\n \"MatchRuleLevel\": \"MIDDLE\",\n \"MatchRuleName\": \"ABNORMAL_CHILD_PROC\",\n \"NodeID\": \"\",\n \"NodeName\": \"qsh4-k8s-sh-prod4-202206287zr4r-47\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessPath\": \"/bin/bash\",\n \"PublicIP\": \"\",\n \"RuleExist\": true,\n \"RuleId\": \"111111111111111111111111\",\n \"Solution\": \"排查是否为正常业务需要的命令执行,\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"e8a7b8e9-1894-4715-9201-67e0f74692db\",\n \"TotalCount\": 1000\n }\n}",
655
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"cls-fjnfg****\",\n \"ClusterName\": \"demoset\",\n \"ContainerId\": \"2dc265571ad62064781574cb7f854bf25886660c3c99ae677d5c85528409f82d\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"containner1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"检测到敏感服务异常子进程启动\",\n \"EventCount\": 51,\n \"EventType\": \"MALICE_PROCESS_START\",\n \"FoundTime\": \"2020-10-29 00:05:02\",\n \"HostID\": \"8d2fqqq4-8f23-46ba-94ae-da11039e82d3\",\n \"HostIP\": \"10.0.86.119\",\n \"Id\": \"2961418\",\n \"ImageId\": \"sha256:736beeb0cd4edd4e1d3be51d5120eeced04eb50b61fc4a24c54a79ea66e40345\",\n \"ImageName\": \"image1\",\n \"LatestFoundTime\": \"2020-10-29 23:57:45\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchGroupName\": \"SYSTEM_DEFINED_RULE\",\n \"MatchProcessPath\": \"/bin/bash\",\n \"MatchRuleId\": \"100000000000000000000007\",\n \"MatchRuleLevel\": \"MIDDLE\",\n \"MatchRuleName\": \"ABNORMAL_CHILD_PROC\",\n \"NodeID\": \"8a5772dee965c8223aebc*****\",\n \"NodeName\": \"qsh4-k8s-sh-prod4-202206287zr4r-47\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demoset\",\n \"ProcessPath\": \"/bin/bash\",\n \"PublicIP\": \"1.1.1.1\",\n \"RuleExist\": true,\n \"RuleId\": \"100021\",\n \"Solution\": \"排查是否为正常业务需要的命令执行,\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"e8a7b8e9-1894-4715-9201-67e0f74692db\",\n \"TotalCount\": 1000\n }\n}",
648
656
  "title": "运行时异常进程列表"
649
657
  }
650
658
  ],
651
- "DescribeAbnormalProcessEventsExport": [
652
- {
653
- "document": "",
654
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessEventsExport\n&ExportField.0=xxx\n&<公共请求参数>",
655
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"DownloadUrl\": \"xx\"\n }\n}",
656
- "title": "查询运行时异常进程事件列表信息导出"
657
- }
658
- ],
659
659
  "DescribeAbnormalProcessLevelSummary": [
660
660
  {
661
661
  "document": "",
@@ -665,29 +665,23 @@
665
665
  }
666
666
  ],
667
667
  "DescribeAbnormalProcessRuleDetail": [
668
- {
669
- "document": "",
670
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&RuleId=6045892534b9a9000c4ae5ba\n&Limit=10\n&Offset=0\n&<公共请求参数>",
671
- "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6045892534b9a9000c4ae5ba\",\n \"IsEnable\": true,\n \"RuleName\": \"9999\",\n \"ChildRules\": [\n {\n \"RuleId\": \"6020e81134b9a9000c50b56a\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/bin/ptest\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60212ddd98dab16785dfeab2\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/ps\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"6021472934b9a9000c358fa3\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/top\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"602f603d34b9a9000cb2b405\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/tail\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60326e4434b9a9000c0897a8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/busybox\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60337df034b9a9000c2240c8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/sss\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n ]\n }\n }\n}",
672
- "title": "根据规则ID查询规则详情(用户策略)"
673
- },
674
- {
675
- "document": "",
676
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&RuleId=6045892534b9a9000c4ae5ba\n&Limit=10\n&Offset=0\n&<公共请求参数>",
677
- "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6048403bd620f3f9012c521d\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"系统策略\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"100000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"PROXY_TOOL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"TRANSFER_CONTROL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ATTACK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000004\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"REVERSE_SHELL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000005\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"FILELESS\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000006\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"RISK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000007\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ABNORMAL_CHILD_PROC\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n ]\n }\n }\n}",
678
- "title": "根据规则ID查询规则详情(系统策略)"
679
- },
680
668
  {
681
669
  "document": "",
682
670
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
683
- "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6045892534b9a9000c4ae5ba\",\n \"IsEnable\": true,\n \"RuleName\": \"9999\",\n \"ChildRules\": [\n {\n \"RuleId\": \"6020e81134b9a9000c50b56a\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/bin/ptest\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60212ddd98dab16785dfeab2\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/ps\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"6021472934b9a9000c358fa3\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/top\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"602f603d34b9a9000cb2b405\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/tail\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60326e4434b9a9000c0897a8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/busybox\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60337df034b9a9000c2240c8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/sss\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n ]\n }\n }\n}",
671
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6045892534b9a9000c4ae5ba\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"9999\",\n \"ChildRules\": [\n {\n \"RuleId\": \"6020e81134b9a9000c50b56a\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/bin/ptest\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60212ddd98dab16785dfeab2\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/ps\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"6021472934b9a9000c358fa3\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/top\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"602f603d34b9a9000cb2b405\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/tail\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60326e4434b9a9000c0897a8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/busybox\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60337df034b9a9000c2240c8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/sss\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16********\"\n ]\n }\n }\n}",
684
672
  "title": "根据事件的镜像ID,查询当前镜像的规则详情(用户策略)"
685
673
  },
686
674
  {
687
675
  "document": "",
688
676
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
689
- "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6048403bd620f3f9012c521d\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"系统策略\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"100000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"PROXY_TOOL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"TRANSFER_CONTROL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ATTACK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000004\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"REVERSE_SHELL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000005\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"FILELESS\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000006\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"RISK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000007\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ABNORMAL_CHILD_PROC\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n ]\n }\n }\n}",
677
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6048403bd620f3f9012c521d\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"系统策略\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"100000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"PROXY_TOOL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"TRANSFER_CONTROL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ATTACK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000004\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"REVERSE_SHELL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000005\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"FILELESS\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000006\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"RISK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000007\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ABNORMAL_CHILD_PROC\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b**********\"\n ]\n }\n }\n}",
690
678
  "title": "根据事件的镜像ID,查询当前镜像的规则详情(系统策略)"
679
+ },
680
+ {
681
+ "document": "",
682
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&RuleId=6045892534b9a9000c4ae5ba\n&Limit=10\n&Offset=0\n&<公共请求参数>",
683
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6045892534b9a9000c4ae5ba\",\n \"IsEnable\": true,\n \"RuleName\": \"9999\",\n \"IsDefault\": false,\n \"ChildRules\": [\n {\n \"RuleId\": \"6020e81134b9a9000c50b56a\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/bin/ptest\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60212ddd98dab16785dfeab2\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/ps\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"6021472934b9a9000c358fa3\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/top\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"602f603d34b9a9000cb2b405\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/tail\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60326e4434b9a9000c0897a8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/busybox\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60337df034b9a9000c2240c8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/sss\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16********\"\n ]\n }\n }\n}",
684
+ "title": "根据规则ID查询规则详情(用户策略)"
691
685
  }
692
686
  ],
693
687
  "DescribeAbnormalProcessRules": [
@@ -698,19 +692,11 @@
698
692
  "title": "运行时异常进程策略列表"
699
693
  }
700
694
  ],
701
- "DescribeAbnormalProcessRulesExport": [
702
- {
703
- "document": "",
704
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRulesExport\n&ExportField.0=xxx\n&<公共请求参数>",
705
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"DownloadUrl\": \"xx\"\n }\n}",
706
- "title": "查询运行时异常进程策略列表信息导出"
707
- }
708
- ],
709
695
  "DescribeAccessControlDetail": [
710
696
  {
711
697
  "document": "运行时访问控制事件详细信息",
712
698
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAccessControlDetail\n<公共请求参数>\n\n{\n \"EventId\": \"5202566\"\n}",
713
- "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"/usr/bin/containerd-shim-runc-v2 -namespace moby -address /run/containerd/containerd.sock\",\n \"ProcessPath\": \"/usr/bin/containerd-shim-runc-v2\",\n \"ProcessStartUser\": \"0\",\n \"ProcessUserGroup\": \"0\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"43.138.142.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"111411141114758f9ec06e76011da529da15bafdc83f2012d95ffa6382\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/sweet_darwin\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"5202566\",\n \"EventName\": \"访问控制-告警\",\n \"EventType\": \"ACCESS_CONTROL_ALERT\",\n \"FoundTime\": \"2024-10-11 11:03:00\",\n \"HostID\": \"11141114-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"ImageId\": \"sha256:11141114111403bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-10-11 11:03:00\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"--\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"检测到系统命令被篡改\",\n \"MatchRule\": {\n \"ProcessPath\": \"/home/yunjing_testing_x86/events_trigger_x86\",\n \"RuleId\": \"200000000000000000000002\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"TargetFilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\"\n },\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"\",\n \"RuleId\": \"222222222222222222222222\",\n \"RuleName\": \"系统策略\",\n \"Solution\": \"排查是否为正常业务需要的系统命令替换\"\n },\n \"ParentProcessInfo\": {\n \"ProcessParam\": \"\",\n \"ProcessPath\": \"\",\n \"ProcessStartUser\": \"\",\n \"ProcessUserGroup\": \"\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2252097,\n \"ProcessMd5\": \"\",\n \"ProcessName\": \"\",\n \"ProcessParam\": \"./events_trigger_x86 tamper_sys\",\n \"ProcessPath\": \"/home/yunjing_testing_x86/events_trigger_x86\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"events_trigger_x86(2252097)|bash(2247285)|containerd-shim-runc-v2(2247257)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"a8db49cf-2c9a-492c-96e0-a87dcf75be23\",\n \"TamperedFileInfo\": {\n \"FileCreateTime\": \"2024-10-11 11:02:58\",\n \"FileDiff\": \"\",\n \"FileName\": \"pwnkit.so:.\",\n \"FilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\",\n \"FileSize\": 24,\n \"FileType\": \"UNKNOWN\",\n \"LatestTamperedFileMTime\": \"2024-10-11 11:02:58\",\n \"NewFile\": \"\"\n }\n }\n}",
699
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"/usr/bin/containerd-shim-runc-v2 -namespace moby -address /run/containerd/containerd.sock\",\n \"ProcessPath\": \"/usr/bin/containerd-shim-runc-v2\",\n \"ProcessStartUser\": \"0\",\n \"ProcessUserGroup\": \"0\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"175.178.113.111\",\n \"ClusterID\": \"cls-demo1\",\n \"ClusterName\": \"web-demo\",\n \"ContainerId\": \"75D3326A-9B9C-4275-895A-16FDA1*****\",\n \"ContainerIsolateOperationSrc\": \"ContainerIsolateOperationSrc\",\n \"ContainerName\": \"/k8s_xenon_mysql-tce-cwp-mysql-2_sso_c9fdfba4-e31a-46bc-a43a-****\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 130,\n \"EventId\": \"5124493\",\n \"EventName\": \"高危系统调用\",\n \"EventType\": \"RISK_SYSCALL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-23 00:05:17\",\n \"HostID\": \"11141114-66fd-4171-93eb-2f4fc36ef1e1\",\n \"HostIP\": \"10.0.0.105\",\n \"ImageId\": \"sha256:11141114e95dce36e8455cf657e1e54d74bb8fac6111411141114\",\n \"ImageName\": \"registry.tce.com/service-vendors/mysql-xenon:8.0.32-20240524-155426-11141114.rhel.amd64\",\n \"LatestFoundTime\": \"2024-10-23 17:02:47\",\n \"Namespace\": \"default\",\n \"NodeID\": \"pod-dj4xjf***\",\n \"NodeName\": \"tcs-10-0-0-105\",\n \"NodeSubNetCIDR\": \"fe80::8132:1b51:5********\",\n \"NodeSubNetID\": \"subnet-dfj4***\",\n \"NodeSubNetName\": \"default\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"node-4jfjfgdnvnd****\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demonset\",\n \"PodStatus\": \"running\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"StatefulSet\"\n },\n \"EventDetail\": {\n \"Description\": \"检测到系统命令被篡改\",\n \"MatchRule\": {\n \"ProcessPath\": \"/home/yunjing_testing_x86/events_trigger_x86\",\n \"RuleId\": \"200000000000000000000002\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"TargetFilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\"\n },\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"demoset\",\n \"RuleId\": \"222222222222222222222222\",\n \"RuleName\": \"系统策略\",\n \"Solution\": \"排查是否为正常业务需要的系统命令替换\"\n },\n \"ParentProcessInfo\": {\n \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\",\n \"ProcessPath\": \"/usr/bin/containerd-shim\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2907621,\n \"ProcessMd5\": \"8a5772dee965c8223aebc1225e*****\",\n \"ProcessName\": \"xenoncli\",\n \"ProcessParam\": \"xenoncli xenon ping\",\n \"ProcessPath\": \"/usr/local/bin/xenoncli\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"a8db49cf-2c9a-492c-96e0-a87dcf75be23\",\n \"TamperedFileInfo\": {\n \"FileCreateTime\": \"2024-10-11 11:02:58\",\n \"FileDiff\": \"UNKNOW\",\n \"FileName\": \"pwnkit.so:.\",\n \"FilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\",\n \"FileSize\": 24,\n \"FileType\": \"UNKNOWN\",\n \"LatestTamperedFileMTime\": \"2024-10-11 11:02:58\",\n \"NewFile\": \"default.txt\"\n }\n }\n}",
714
700
  "title": "运行时访问控制事件详细信息"
715
701
  }
716
702
  ],
@@ -718,7 +704,7 @@
718
704
  {
719
705
  "document": "运行时访问控制事件列表",
720
706
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAccessControlEvents\n<公共请求参数>\n\n{}",
721
- "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"a41351f3384159740167f25d83fcb206ffa154ab31d50c6594580ca6bac0b2cf\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"container1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"STOPPED\",\n \"Description\": \"检测到系统计划任务被修改\",\n \"EventCount\": 1,\n \"EventType\": \"\",\n \"FileName\": \"cron.update\",\n \"FilePath\": \"/etc/crontabs/cron.update\",\n \"FoundTime\": \"2020-10-29 18:11:10\",\n \"HostID\": \"f5a89f72-aaad-bbbc-cccc-eb3b3b74c2f0\",\n \"HostIP\": \"10.86.68.35\",\n \"Id\": \"4904016\",\n \"ImageId\": \"sha256:3926aaa0fe2ece5cbe51aaaf242b074c211beb8e046c9d4db4959c220be0171f\",\n \"ImageName\": \"iamge1\",\n \"LatestFoundTime\": \"2020-10-29 18:11:10\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchFilePath\": \"/etc/crontabs/cron.update\",\n \"MatchProcessPath\": \"/bin/busybox\",\n \"MatchRuleId\": \"200000000000000000000001\",\n \"MatchRuleName\": \"系统策略\",\n \"NodeID\": \"\",\n \"NodeName\": \"host1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"/bin/busybox\",\n \"PublicIP\": \"\",\n \"RuleExist\": true,\n \"RuleId\": \"222222222222222222222222\",\n \"Solution\": \"排查是否为正常业务需要的计划任务修改\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"098ea687-eba5-4b30-9c05-d3ee0749d0a7\",\n \"TotalCount\": 13\n }\n}",
707
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"cls-fdj4****\",\n \"ClusterName\": \"demoset\",\n \"ContainerId\": \"a41351f3384159740167f25d83fcb206ffa154ab31d50c6594580ca6bac0b2cf\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"container1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"STOPPED\",\n \"Description\": \"检测到系统计划任务被修改\",\n \"EventCount\": 10012,\n \"EventType\": \"NORMAL\",\n \"FileName\": \"cron.update\",\n \"FilePath\": \"/etc/crontabs/cron.update\",\n \"FoundTime\": \"2020-10-29 18:11:10\",\n \"HostID\": \"f5a89f72-aaad-bbbc-cccc-eb3b3b74c2f0\",\n \"HostIP\": \"10.86.68.35\",\n \"Id\": \"4904016\",\n \"ImageId\": \"sha256:3926aaa0fe2ece5cbe51aaaf242b074c211beb8e046c9d4db4959c220be0171f\",\n \"ImageName\": \"iamge1\",\n \"LatestFoundTime\": \"2020-10-29 18:11:10\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchFilePath\": \"/etc/crontabs/cron.update\",\n \"MatchProcessPath\": \"/bin/busybox\",\n \"MatchRuleId\": \"200000000000000000000001\",\n \"MatchRuleName\": \"系统策略\",\n \"NodeID\": \"8a5772dee965c8223aebc*****\",\n \"NodeName\": \"host1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demoset\",\n \"ProcessName\": \"/bin/busybox\",\n \"PublicIP\": \"1.1.1.1\",\n \"RuleExist\": true,\n \"RuleId\": \"222222222222222222222222\",\n \"Solution\": \"排查是否为正常业务需要的计划任务修改\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"098ea687-eba5-4b30-9c05-d3ee0749d0a7\",\n \"TotalCount\": 13\n }\n}",
722
708
  "title": "运行时访问控制事件列表"
723
709
  }
724
710
  ],
@@ -726,34 +712,34 @@
726
712
  {
727
713
  "document": "查询运行时访问控制事件列表导出",
728
714
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlEventsExport\n&ExportField.0=filed_name\n&<公共请求参数>",
729
- "output": "{\n \"Response\": {\n \"DownloadUrl\": \"\",\n \"JobId\": \"10001\",\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
715
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"https://cwp-1258344***.cos.ap-guangzhou.myqcloud.com/file.txt\",\n \"JobId\": \"10001\",\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
730
716
  "title": "查询运行时访问控制事件列表导出"
731
717
  }
732
718
  ],
733
719
  "DescribeAccessControlRuleDetail": [
734
720
  {
735
721
  "document": "",
736
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e\n&Limit=10\n&Offset=0\n&<公共请求参数>",
722
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
737
723
  "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"6045899634b9a9000c4ae5bb\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [\n {\n \"RuleId\": \"603279ba34b9a9000c0897ae\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.txt\"\n },\n {\n \"RuleId\": \"60327a7b34b9a9000c0897af\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test2.txt\"\n },\n {\n \"RuleId\": \"6033081114b9a9000c0897b0\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/coreutils\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60337e1034b9a9000c2240c9\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60361e8234b9a9000cf7a3ee\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"603772d334b9a9000cd92ae8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/iv\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"6045899634b9a9000c4ae5bc\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"/1.txt\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
738
- "title": "根据规则ID查询规则详情(用户策略)"
724
+ "title": "根据事件的镜像ID,查询当前镜像的规则详情(用户策略)"
739
725
  },
740
726
  {
741
727
  "document": "",
742
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e&Limit=10\n&Offset=0\n&<公共请求参数>",
728
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e\n&Limit=10\n&Offset=0\n&<公共请求参数>",
743
729
  "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"60484042d620f3f9012c521e\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"200000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_CRONTAB\"\n },\n {\n \"RuleId\": \"200000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_SYS_BIN\"\n },\n {\n \"RuleId\": \"200000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_USRCFG\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
744
- "title": "根据规则ID查询规则详情(系统策略)"
730
+ "title": "根据事件的镜像ID,查询当前镜像的规则详情(系统策略)"
745
731
  },
746
732
  {
747
733
  "document": "",
748
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
734
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e\n&Limit=10\n&Offset=0\n&<公共请求参数>",
749
735
  "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"6045899634b9a9000c4ae5bb\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [\n {\n \"RuleId\": \"603279ba34b9a9000c0897ae\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.txt\"\n },\n {\n \"RuleId\": \"60327a7b34b9a9000c0897af\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test2.txt\"\n },\n {\n \"RuleId\": \"6033081114b9a9000c0897b0\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/coreutils\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60337e1034b9a9000c2240c9\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60361e8234b9a9000cf7a3ee\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"603772d334b9a9000cd92ae8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/iv\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"6045899634b9a9000c4ae5bc\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"/1.txt\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
750
- "title": "根据事件的镜像ID,查询当前镜像的规则详情(用户策略)"
736
+ "title": "根据规则ID查询规则详情(用户策略)"
751
737
  },
752
738
  {
753
739
  "document": "",
754
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e\n&Limit=10\n&Offset=0\n&<公共请求参数>",
740
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e&Limit=10\n&Offset=0\n&<公共请求参数>",
755
741
  "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"60484042d620f3f9012c521e\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"200000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_CRONTAB\"\n },\n {\n \"RuleId\": \"200000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_SYS_BIN\"\n },\n {\n \"RuleId\": \"200000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_USRCFG\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
756
- "title": "根据事件的镜像ID,查询当前镜像的规则详情(系统策略)"
742
+ "title": "根据规则ID查询规则详情(系统策略)"
757
743
  }
758
744
  ],
759
745
  "DescribeAccessControlRules": [
@@ -764,35 +750,27 @@
764
750
  "title": "运行时访问控制策略列表"
765
751
  }
766
752
  ],
767
- "DescribeAccessControlRulesExport": [
768
- {
769
- "document": "",
770
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRulesExport\n&ExportField.0=xxx\n&<公共请求参数>",
771
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"DownloadUrl\": \"xx\"\n }\n}",
772
- "title": "查询运行时访问控制策略列表导出"
773
- }
774
- ],
775
753
  "DescribeAffectedClusterCount": [
776
754
  {
777
755
  "document": "",
778
756
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedClusterCount\n<公共请求参数>\n\n{}",
779
- "output": "{\n \"Response\": {\n \"RequestId\": \"dba27bfb-5260-4ddd-8661-848c6820f3e0\",\n \"SeriousRiskClusterCount\": 0,\n \"HighRiskClusterCount\": 2,\n \"MiddleRiskClusterCount\": 1,\n \"HintRiskClusterCount\": 1\n }\n}",
757
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dba27bfb-5260-4ddd-8661-848c6820f3e0\",\n \"SeriousRiskClusterCount\": 0,\n \"HighRiskClusterCount\": 2,\n \"MiddleRiskClusterCount\": 41,\n \"HintRiskClusterCount\": 21\n }\n}",
780
758
  "title": "请求示例"
781
759
  }
782
760
  ],
783
761
  "DescribeAffectedNodeList": [
784
762
  {
785
763
  "document": "",
786
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedNodeList\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"CheckItemId\": \"1\",\n \"Offset\": \"0\"\n}",
787
- "output": "{\n \"Response\": {\n \"RequestId\": \"d2cf3a82-f75e-49f3-b2ea-d1f9172062db\",\n \"TotalCount\": 6,\n \"AffectedNodeList\": [\n {\n \"ClusterId\": \"cls-0zmsjvko\",\n \"ClusterName\": \"wk独立集群\",\n \"InstanceId\": \"ins-afynf7mw\",\n \"PrivateIpAddresses\": \"10.0.2.7\",\n \"InstanceRole\": \"WORKER\",\n \"ClusterVersion\": \"1.18.4\",\n \"ContainerRuntime\": \"docker\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"Runc 版本为 1.0.0-rc10\"\n },\n {\n \"ClusterId\": \"cls-0zmsjvko\",\n \"ClusterName\": \"wk独立集群\",\n \"InstanceId\": \"ins-9l567jse\",\n \"PrivateIpAddresses\": \"10.0.2.42\",\n \"InstanceRole\": \"WORKER\",\n \"ClusterVersion\": \"1.18.4\",\n \"ContainerRuntime\": \"docker\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"Runc 版本为 1.0.0-rc10\"\n }\n ]\n }\n}",
764
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedNodeList\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"CheckItemId\": \"15\",\n \"Offset\": \"0\"\n}",
765
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d2cf3a82-f75e-49f3-b2ea-d1f9172062db\",\n \"TotalCount\": 6,\n \"AffectedNodeList\": [\n {\n \"NodeName\": \"inode****\",\n \"ClusterId\": \"cls-0zmsjvko\",\n \"ClusterName\": \"wk独立集群\",\n \"InstanceId\": \"ins-afynf7mw\",\n \"PrivateIpAddresses\": \"10.0.2.7\",\n \"InstanceRole\": \"WORKER\",\n \"ClusterVersion\": \"1.18.4\",\n \"ContainerRuntime\": \"docker\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"Runc 版本为 1.0.0-rc10\"\n },\n {\n \"ClusterId\": \"cls-0zmsjvko\",\n \"ClusterName\": \"wk独立集群\",\n \"InstanceId\": \"ins-9l567jse\",\n \"PrivateIpAddresses\": \"10.0.2.42\",\n \"InstanceRole\": \"WORKER\",\n \"ClusterVersion\": \"1.18.4\",\n \"ContainerRuntime\": \"docker\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"Runc 版本为 1.0.0-rc10\",\n \"NodeName\": \"inode****\"\n }\n ]\n }\n}",
788
766
  "title": "查询节点类型的影响范围示例"
789
767
  }
790
768
  ],
791
769
  "DescribeAffectedWorkloadList": [
792
770
  {
793
771
  "document": "",
794
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedWorkloadList\n<公共请求参数>\n\n{\n \"CheckItemId\": 10071,\n \"Filters\": [],\n \"Limit\": 10,\n \"Offset\": 0\n}",
795
- "output": "{\n \"Response\": {\n \"AffectedWorkloadList\": [\n {\n \"ClusterId\": \"test-clusterid\",\n \"ClusterName\": \"benben-tcss\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"yunjing-agent set image tag \\\"latest\\\"\",\n \"WorkloadName\": \"tcss/yunjing-agent\",\n \"WorkloadType\": \"DaemonSet\"\n }\n ],\n \"RequestId\": \"299deeb1-48aa-449d-980c-1f46e2375cec\",\n \"TotalCount\": 111\n }\n}",
772
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedWorkloadList\n<公共请求参数>\n\n{\n \"CheckItemId\": 10071,\n \"Limit\": 10,\n \"Offset\": 0\n}",
773
+ "output": "{\n \"Response\": {\n \"AffectedWorkloadList\": [\n {\n \"ClusterId\": \"test-clusterid\",\n \"ClusterName\": \"benben-tcss\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"yunjing-agent set image tag \\\"latest\\\"\",\n \"WorkloadName\": \"tcss/yunjing-agent\",\n \"WorkloadType\": \"DaemonSet\"\n }\n ],\n \"RequestId\": \"299deeb1-48aa-449d-980c-1f46e2375cec\",\n \"TotalCount\": \"0\"\n }\n}",
796
774
  "title": "查询workload类型的影响范围示例"
797
775
  }
798
776
  ],
@@ -816,7 +794,7 @@
816
794
  {
817
795
  "document": "查询app服务列表",
818
796
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetAppServiceList\n<公共请求参数>\n\n{}",
819
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"\",\n \"Config\": \"\",\n \"ContainerId\": \"3a37fab5d1d330a0bc243607d5091649c7546495fdb39f009db49ac062f3b143\",\n \"ContainerName\": \"/k8s_k8s-csp-osd-container_csp-pod-osd-1_tcs-system_6e47070d-360a-49e6-b10e-91daa81162aa_1\",\n \"DataPath\": \"\",\n \"ErrorLog\": \"\",\n \"Exe\": \"/usr/sbin/rpcbind\",\n \"HostID\": \"e1c1db55-3752-4f4e-b88a-158a87549991\",\n \"HostIP\": \"10.0.0.142\",\n \"HostName\": \"tcs-test2\",\n \"Listen\": [\n \"tcp://:::111\",\n \"tcp://0.0.0.0:111\"\n ],\n \"MainType\": \"app\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"Parameter\": \"/sbin/rpcbind -w\",\n \"Pids\": [\n 66771\n ],\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"1.2.3.4\",\n \"RunAs\": \"rpc:rpc\",\n \"ServiceID\": \"fe72109ce260dbb137e60e1f20401c011256299843\",\n \"Type\": \"rpcbind\",\n \"Version\": \"\",\n \"WebRoot\": \"\"\n }\n ],\n \"RequestId\": \"66fccb1f-f7cf-4020-ba91-e60d78d77c71\",\n \"TotalCount\": 1212\n }\n}",
797
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"/var/log/access.log\",\n \"Config\": \"/var/config/aaa.conf\",\n \"ContainerId\": \"3a37fab5d1d330a0bc243607d5091649c7546495fdb39f009db49ac062f3b143\",\n \"ContainerName\": \"/k8s_k8s-csp-osd-container_csp-pod-osd-1_tcs-system_6e47070d-360a-49e6-b10e-91daa81162aa_1\",\n \"DataPath\": \"/a/b\",\n \"ErrorLog\": \"/var/log/error.log\",\n \"Exe\": \"/usr/sbin/rpcbind\",\n \"HostID\": \"e1c1db55-3752-4f4e-b88a-158a87549991\",\n \"HostIP\": \"10.0.0.142\",\n \"HostName\": \"tcs-test2\",\n \"Listen\": [\n \"tcp://:::111\",\n \"tcp://0.0.0.0:111\"\n ],\n \"MainType\": \"app\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"Parameter\": \"/sbin/rpcbind -w\",\n \"Pids\": [\n 66771\n ],\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"1.2.3.4\",\n \"RunAs\": \"rpc:rpc\",\n \"ServiceID\": \"fe72109ce260dbb137e60e1f20401c011256299843\",\n \"Type\": \"rpcbind\",\n \"Version\": \"1.0.1\",\n \"WebRoot\": \"/www\"\n }\n ],\n \"RequestId\": \"66fccb1f-f7cf-4020-ba91-e60d78d77c71\",\n \"TotalCount\": 1212\n }\n}",
820
798
  "title": "查询app服务列表"
821
799
  }
822
800
  ],
@@ -824,7 +802,7 @@
824
802
  {
825
803
  "document": "",
826
804
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetClusterList\n<公共请求参数>\n\n{}",
827
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"BindRuleName\": \"piper\",\n \"ClusterID\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ClusterVersion\": \"\",\n \"CpuLimit\": 0,\n \"MemLimit\": 0,\n \"Status\": \"CSR_RUNNING\"\n }\n ],\n \"RequestId\": \"bb39b643-b0e1-4c79-b006-7d62083227a8\",\n \"TotalCount\": 15\n }\n}",
805
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"BindRuleName\": \"piper\",\n \"ClusterID\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ClusterVersion\": \"1.1.4\",\n \"CpuLimit\": 0,\n \"MemLimit\": 0,\n \"Status\": \"CSR_RUNNING\"\n }\n ],\n \"RequestId\": \"bb39b643-b0e1-4c79-b006-7d62083227a8\",\n \"TotalCount\": 15\n }\n}",
828
806
  "title": "查询集群列表"
829
807
  }
830
808
  ],
@@ -840,7 +818,7 @@
840
818
  {
841
819
  "document": "查询容器信息",
842
820
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetContainerDetail\n<公共请求参数>\n\n{\n \"ContainerId\": \"cndajlhcklanca\"\n}",
843
- "output": "{\n \"Response\": {\n \"AppCnt\": 0,\n \"CPUUsage\": 0,\n \"ClusterID\": \"cls-5555555\",\n \"ClusterName\": \"集群名称\",\n \"Cmd\": \"\",\n \"ComponentCnt\": 0,\n \"ContainerName\": \"容器名称\",\n \"CreateTime\": \"2024-10-24 19:36:24\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostStatus\": \"ONLINE\",\n \"ImageCreateTime\": \"0001-01-01 08:05:43\",\n \"ImageID\": \"sha256:563af\",\n \"ImageName\": \"image:latest\",\n \"ImageSize\": 0,\n \"IsolateSource\": \"\",\n \"IsolateTime\": \"1970-01-01 00:00:01\",\n \"K8sMaster\": \"\",\n \"Mounts\": [],\n \"NetStatus\": \"NORMAL\",\n \"NetSubStatus\": \"NONE\",\n \"Network\": {\n \"EndpointID\": \"\",\n \"Gateway\": \"\",\n \"Ipv4\": \"\",\n \"Ipv6\": \"\",\n \"MAC\": \"\",\n \"Mode\": \"\",\n \"Name\": \"\",\n \"NetworkID\": \"\"\n },\n \"NodeID\": \"eks-111111\",\n \"NodeName\": \"节点名称\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"27501aaed5e639693783321219989889\",\n \"POD\": \"tcss-aset-11-321\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"tcss-asset-124321\",\n \"PodStatus\": \"Running\",\n \"PortCnt\": 0,\n \"ProcessCnt\": 0,\n \"PublicIP\": \"\",\n \"RamUsage\": 0,\n \"RequestId\": \"6954374b-bfcd-4751-8358-3e3682551514\",\n \"RunAs\": \"\",\n \"Status\": \"RUNNING\",\n \"WebServiceCnt\": 0\n }\n}",
821
+ "output": "{\n \"Response\": {\n \"AppCnt\": 0,\n \"CPUUsage\": 0,\n \"ClusterID\": \"cls-m2x0ndjy\",\n \"ClusterName\": \"tke2\",\n \"Cmd\": \"/usr/bin/dumb-init -- /nginx-ingress-controller --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-controller-leader --leader-elect-retry-period=2s --leader-elect-renew-deadline=10s --leader-elect-lease-duration=15s --v=2 --ingress-class=nginx --controller-class=k8s.io/ingress-nginx --configmap=ingress-nginx/ingress-nginx-controller --watch-ingress-without-class=true --update-status-on-shutdown=false --time-buckets=0.01,0.1,1,10 --length-buckets=10,30,50,70,90 --size-buckets=10,100,1000,100000,1000****\",\n \"ComponentCnt\": 0,\n \"ContainerName\": \"cbs-csi\",\n \"CreateTime\": \"2024-10-24 19:36:24\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostStatus\": \"ONLINE\",\n \"ImageCreateTime\": \"0001-01-01 08:05:43\",\n \"ImageID\": \"sha256:563af\",\n \"ImageName\": \"image:latest\",\n \"ImageSize\": 0,\n \"IsolateSource\": \"none \",\n \"IsolateTime\": \"1970-01-01 00:00:01\",\n \"K8sMaster\": \"etcd\",\n \"Mounts\": [],\n \"NetStatus\": \"NORMAL\",\n \"NetSubStatus\": \"NONE\",\n \"Network\": {\n \"EndpointID\": \"myService/us-west-1/instance\",\n \"Gateway\": \"gateway\",\n \"Ipv4\": \"127.0.0.1\",\n \"Ipv6\": \"2001:db8:85a3::8a2e:370:7334\",\n \"MAC\": \"00:1A:2B:3C:4D:5E\",\n \"Mode\": \"mode\",\n \"Name\": \"name\",\n \"NetworkID\": \"1002\"\n },\n \"NodeID\": \"eklet-subnet-1ewk3avk\",\n \"NodeName\": \"VM-1-254-tencentos\",\n \"NodeSubNetCIDR\": \"10.0.200.0/24\",\n \"NodeSubNetID\": \"subnet-5gu2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"27501aaed5e639693783321219989889\",\n \"POD\": \"tcss-aset-11-321\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"tcss-asset-124321\",\n \"PodStatus\": \"Running\",\n \"PortCnt\": 0,\n \"ProcessCnt\": 0,\n \"PublicIP\": \"10.0.1.92\",\n \"RamUsage\": 0,\n \"RequestId\": \"6954374b-bfcd-4751-8358-3e3682551514\",\n \"RunAs\": \"root\",\n \"Status\": \"RUNNING\",\n \"WebServiceCnt\": 0\n }\n}",
844
822
  "title": "查询容器信息"
845
823
  }
846
824
  ],
@@ -848,7 +826,7 @@
848
826
  {
849
827
  "document": "搜索查询容器列表",
850
828
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetContainerList\n<公共请求参数>\n\n{}",
851
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CPUUsage\": 0,\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"Cmd\": \"--controllers=*,-everest-csi-local-volume --leader-elect=true --leader-elect-resource-lock=endpoints --leader-elect-resource-namespace=kube-system --feature-gates=Topology=true,DistributeAttacher=false --provision-with-strict-topology=true --csi-attacher-worker-threads=60 --csi-attacher-detach-worker-threads=60 --csi-attacher-should-reconcile-va=false\",\n \"ContainerID\": \"8eaffb2a09728b130020b7fe33d87fe3a45856a2ff39eab57873c34815461b22\",\n \"ContainerName\": \"/k8s_everest-csi-controller_everest-csi-controller-7b7df58489-9v9pf_kube-system_3b5f2feb-af96-4c0b-84f0-4e86d0671ae8_2\",\n \"CreateTime\": \"2023-08-30 14:48:19\",\n \"HostID\": \"ed7bcc17-3ad7-455d-b2f6-1712c005ced0\",\n \"HostIP\": \"10.0.4.74\",\n \"HostName\": \"ecs-suanfa-0001\",\n \"ImageID\": \"sha256:3cdeb1036c11af9e7f906ed2a0535056c71f3f53522242fa24a5aa2022b83f2c\",\n \"ImageName\": \"swr.cn-south-1.myhuaweicloud.com/hwofficial/everest:2.1.13\",\n \"IsolateSource\": \"\",\n \"IsolateTime\": \"1970-01-01 00:00:01\",\n \"NetStatus\": \"NORMAL\",\n \"NetSubStatus\": \"NONE\",\n \"NodeID\": \"\",\n \"NodeType\": \"\",\n \"NodeUniqueID\": \"\",\n \"POD\": \"\",\n \"PodCpu\": 0,\n \"PodIP\": \"\",\n \"PodMem\": 0,\n \"PodName\": \"\",\n \"PodUid\": \"\",\n \"PublicIp\": \"116.205.224.125\",\n \"RamUsage\": 99728,\n \"RunAs\": \"paas\",\n \"Status\": \"RUNNING\",\n \"UpdateTime\": \"2024-07-15 16:05:20\"\n }\n ],\n \"RequestId\": \"05844ae1-7f46-41f2-a521-0b6a011cc16d\",\n \"TotalCount\": 1\n }\n}",
829
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CPUUsage\": 0,\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"Cmd\": \"--controllers=*,-everest-csi-local-volume --leader-elect=true --leader-elect-resource-lock=endpoints --leader-elect-resource-namespace=kube-system --feature-gates=Topology=true,DistributeAttacher=false --provision-with-strict-topology=true --csi-attacher-worker-threads=60 --csi-attacher-detach-worker-threads=60 --csi-attacher-should-reconcile-va=false\",\n \"ContainerID\": \"8eaffb2a09728b130020b7fe33d87fe3a45856a2ff39eab57873c34815461b22\",\n \"ContainerName\": \"/k8s_everest-csi-controller_everest-csi-controller-7b7df58489-9v9pf_kube-system_3b5f2feb-af96-4c0b-84f0-4e86d0671ae8_2\",\n \"CreateTime\": \"2023-08-30 14:48:19\",\n \"HostID\": \"ed7bcc17-3ad7-455d-b2f6-1712c005ced0\",\n \"HostIP\": \"10.0.4.74\",\n \"HostName\": \"ecs-suanfa-0001\",\n \"ImageID\": \"sha256:3cdeb1036c11af9e7f906ed2a0535056c71f3f53522242fa24a5aa2022b83f2c\",\n \"ImageName\": \"swr.cn-south-1.myhuaweicloud.com/hwofficial/everest:2.1.13\",\n \"IsolateSource\": \"source\",\n \"IsolateTime\": \"1970-01-01 00:00:01\",\n \"NetStatus\": \"NORMAL\",\n \"NetSubStatus\": \"NONE\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"POD\": \"clife-estate-thirdparty-admin-dm-59785fd6-4****\",\n \"PodCpu\": 0,\n \"PodIP\": \"10.0.1.92\",\n \"PodMem\": 0,\n \"PodName\": \"agent-test-2zrp7\",\n \"PodUid\": \"20461430-67c2-455b-932e-6a6c8981****\",\n \"PublicIp\": \"116.205.224.125\",\n \"RamUsage\": 99728,\n \"RunAs\": \"paas\",\n \"Status\": \"RUNNING\",\n \"UpdateTime\": \"2024-07-15 16:05:20\"\n }\n ],\n \"RequestId\": \"05844ae1-7f46-41f2-a521-0b6a011cc16d\",\n \"TotalCount\": 1\n }\n}",
852
830
  "title": "搜索查询容器列表"
853
831
  }
854
832
  ],
@@ -856,7 +834,7 @@
856
834
  {
857
835
  "document": "查询db服务列表",
858
836
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetDBServiceList\n<公共请求参数>\n\n{}",
859
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"\",\n \"Config\": \"\",\n \"ContainerId\": \"3c0a1bc138f982b187549237eb3fc02f99616bb93be3d1b65a5f14f0649591be\",\n \"ContainerName\": \"/k8s_redis_redis-tce-redis-support-ss-0_sso_ad389998-b0ab-4d43-8b25-2c96cac55ecf_0\",\n \"DataPath\": \"\",\n \"ErrorLog\": \"\",\n \"Exe\": \"/usr/local/bin/redis-server\",\n \"HostID\": \"a9365a64-7ffa-4e6e-ab27-1a0475e65070\",\n \"HostIP\": \"10.0.0.98\",\n \"HostName\": \"tcs-pre3\",\n \"Listen\": [\n \"tcp://0.0.0.0:6379\"\n ],\n \"MainType\": \"db\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"Parameter\": \"redis-server 0.0.0.0:6379 \",\n \"Pids\": [\n 338552\n ],\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"43.138.193.64\",\n \"RunAs\": \"root:root\",\n \"ServiceID\": \"fd1a1b7d9c4bc8168949b4e3ee5e9cd91256299843\",\n \"Type\": \"redis\",\n \"Version\": \"\",\n \"WebRoot\": \"\"\n }\n ],\n \"RequestId\": \"57ab9e09-70b3-40ab-b42b-cd2d422dcb9d\",\n \"TotalCount\": 89\n }\n}",
837
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"accesslog\",\n \"Config\": \"config\",\n \"ContainerId\": \"3c0a1bc138f982b187549237eb3fc02f99616bb93be3d1b65a5f14f0649591be\",\n \"ContainerName\": \"/k8s_redis_redis-tce-redis-support-ss-0_sso_ad389998-b0ab-4d43-8b25-2c96cac55ecf_0\",\n \"DataPath\": \"/a/b\",\n \"ErrorLog\": \"errorlog\",\n \"Exe\": \"/usr/local/bin/redis-server\",\n \"HostID\": \"a9365a64-7ffa-4e6e-ab27-1a0475e65070\",\n \"HostIP\": \"10.0.0.98\",\n \"HostName\": \"tcs-pre3\",\n \"Listen\": [\n \"tcp://0.0.0.0:6379\"\n ],\n \"MainType\": \"db\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"Parameter\": \"redis-server 0.0.0.0:6379 \",\n \"Pids\": [\n 338552\n ],\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"43.138.193.64\",\n \"RunAs\": \"root:root\",\n \"ServiceID\": \"fd1a1b7d9c4bc8168949b4e3ee5e9cd91256299843\",\n \"Type\": \"redis\",\n \"Version\": \"1.0.1\",\n \"WebRoot\": \"web\"\n }\n ],\n \"RequestId\": \"57ab9e09-70b3-40ab-b42b-cd2d422dcb9d\",\n \"TotalCount\": 89\n }\n}",
860
838
  "title": "查询db服务列表"
861
839
  }
862
840
  ],
@@ -864,7 +842,7 @@
864
842
  {
865
843
  "document": "查询主机详细信息",
866
844
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetHostDetail\n<公共请求参数>\n\n{\n \"HostId\": \"dskaldjskld\"\n}",
867
- "output": "{\n \"Response\": {\n \"AgentVersion\": \"5.2.1.105\",\n \"ClusterAccessedStatus\": \"AccessedNone\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerCnt\": 1,\n \"DockerAPIVersion\": \"1.43\",\n \"DockerFileSystemDriver\": \"overlay2\",\n \"DockerGoVersion\": \"go1.20.7\",\n \"DockerRootDir\": \"/var/lib/docker\",\n \"DockerVersion\": \"24.0.6\",\n \"Group\": \"\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"ImageCnt\": 10,\n \"InstanceID\": \"ins-8bc803fd\",\n \"IsContainerd\": false,\n \"K8sMasterIP\": \"\",\n \"K8sVersion\": \"\",\n \"KernelVersion\": \"3.10.0-1160.102.1.el7.x86_64\",\n \"KubeProxyVersion\": \"\",\n \"MachineType\": \"CVM\",\n \"OsName\": \"CentOS Linux release 7.9.2009 (Core)\",\n \"Project\": {\n \"ProjectID\": 0,\n \"ProjectName\": \"默认项目\"\n },\n \"PublicIp\": \"1.1.1.1\",\n \"RegionID\": 1,\n \"RequestId\": \"342475fc-76eb-4199-998f-780f9921a5f2\",\n \"Status\": \"ONLINE\",\n \"Tags\": [],\n \"UUID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"UpdateTime\": \"2024-10-30 10:26:52\"\n }\n}",
845
+ "output": "{\n \"Response\": {\n \"AgentVersion\": \"5.2.1.105\",\n \"ClusterAccessedStatus\": \"AccessedNone\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerCnt\": 1,\n \"DockerAPIVersion\": \"1.43\",\n \"DockerFileSystemDriver\": \"overlay2\",\n \"DockerGoVersion\": \"go1.20.7\",\n \"DockerRootDir\": \"/var/lib/docker\",\n \"DockerVersion\": \"24.0.6\",\n \"Group\": \"root\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"ImageCnt\": 10,\n \"InstanceID\": \"ins-8bc803fd\",\n \"IsContainerd\": false,\n \"K8sMasterIP\": \"10.0.1.92\",\n \"K8sVersion\": \"1.0.1\",\n \"KernelVersion\": \"3.10.0-1160.102.1.el7.x86_64\",\n \"KubeProxyVersion\": \"1.0.1\",\n \"MachineType\": \"CVM\",\n \"OsName\": \"CentOS Linux release 7.9.2009 (Core)\",\n \"Project\": {\n \"ProjectID\": 0,\n \"ProjectName\": \"默认项目\"\n },\n \"PublicIp\": \"1.1.1.1\",\n \"RegionID\": 1,\n \"RequestId\": \"342475fc-76eb-4199-998f-780f9921a5f2\",\n \"Status\": \"ONLINE\",\n \"Tags\": [],\n \"UUID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"UpdateTime\": \"2024-10-30 10:26:52\"\n }\n}",
868
846
  "title": "查询主机详细信息"
869
847
  }
870
848
  ],
@@ -887,8 +865,8 @@
887
865
  "DescribeAssetImageDetail": [
888
866
  {
889
867
  "document": "查询镜像详细信息",
890
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageDetail\n<公共请求参数>\n\n{\n \"ImageID\": \"dskaldjskld\"\n}",
891
- "output": "{\n \"Response\": {\n \"AgentError\": \"\",\n \"Architecture\": \"\",\n \"Author\": \"\",\n \"BuildHistory\": \"# create_time:2021-09-15 18:20:05 tags:docker.io/centos:latest,yancyw:1,yancyw:2,yancyw:3, ADD file:1114113413411342942e068863ce2a8491bb71522c652f31fb466 in / \",\n \"ContainerCnt\": 51,\n \"CreateTime\": \"2021-09-16 02:20:05\",\n \"HostCnt\": 24,\n \"ImageDigest\": \"sha256:113411341134134ab9dfb7c8571c40d67d534bbdee55bd6c473f432b177\",\n \"ImageID\": \"sha256:13413413413494c8a1ad043720b0416bfc16c52c45d4847e53fadb6\",\n \"ImageName\": \"docker.io/centos:latest\",\n \"IsAuthorized\": 1,\n \"IsTrustImage\": true,\n \"OsName\": \"centos:8.4.2105\",\n \"RemainScanTime\": 0,\n \"RequestId\": \"113411341134-1037-46b4-a9fc-b17f3a8f0b03\",\n \"RiskCnt\": 211,\n \"ScanError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanRiskProgress\": 0,\n \"ScanStatus\": \"\",\n \"ScanTime\": \"2024-10-25 16:13:39\",\n \"ScanVirusError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulError\": \"\",\n \"ScanVulProgress\": 0,\n \"SensitiveInfoCnt\": 0,\n \"Size\": 231268856,\n \"Status\": 5,\n \"VirusCnt\": 0,\n \"VulCnt\": 230\n }\n}",
868
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageDetail\n<公共请求参数>\n\n{\n \"ImageID\": \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\"\n}",
869
+ "output": "{\n \"Response\": {\n \"AgentError\": \"timeout\",\n \"Architecture\": \"Metadata\",\n \"Author\": \"symon\",\n \"BuildHistory\": \"# create_time:2021-09-15 18:20:05 tags:docker.io/centos:latest,yancyw:1,yancyw:2,yancyw:3, ADD file:1114113413411342942e068863ce2a8491bb71522c652f31fb466 in / \",\n \"ContainerCnt\": 51,\n \"CreateTime\": \"2021-09-16 02:20:05\",\n \"HostCnt\": 24,\n \"ImageDigest\": \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\",\n \"ImageID\": \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\",\n \"ImageName\": \"docker.io/centos:latest\",\n \"IsAuthorized\": 1,\n \"IsTrustImage\": true,\n \"OsName\": \"centos:8.4.2105\",\n \"RemainScanTime\": 0,\n \"RequestId\": \"a11d268f-1601-4f63-9131-0382537b9e55\",\n \"RiskCnt\": 211,\n \"ScanError\": \"timeout\",\n \"ScanRiskError\": \"timeout\",\n \"ScanRiskProgress\": 0,\n \"ScanStatus\": \"SCANNED\",\n \"ScanTime\": \"2024-10-25 16:13:39\",\n \"ScanVirusError\": \"timeout\",\n \"ScanVirusProgress\": 0,\n \"ScanVulError\": \"timeout\",\n \"ScanVulProgress\": 0,\n \"SensitiveInfoCnt\": 0,\n \"Size\": 231268856,\n \"Status\": 5,\n \"VirusCnt\": 0,\n \"VulCnt\": 230\n }\n}",
892
870
  "title": "查询镜像详细信息"
893
871
  }
894
872
  ],
@@ -896,7 +874,7 @@
896
874
  {
897
875
  "document": "",
898
876
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageHostList\n<公共请求参数>\n\n{}",
899
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageID\": \"sha256:bd571e6529f32461648680c82e2540f9db4b3bb92709ae5d19dd347531c98f19\",\n \"HostID\": \"5cd1c13e-d18a-4904-ada3-a2efed76c6f9\"\n },\n {\n \"ImageID\": \"sha256:d6e46aa2470df1d32034c6707c8041158b652f38d2a9ae3d7ad7e7532d22ebe0\",\n \"HostID\": \"5cd1c13e-d18a-4904-ada3-a2efed76c6f9\"\n }\n ],\n \"RequestId\": \"f28e2b9b-ee35-4c82-87e4-fcb64671d2af\",\n \"TotalCount\": 24\n }\n}",
877
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageID\": \"sha256:bd571e6529f32461648680c82e2540f9db4b3bb********\",\n \"HostID\": \"5cd1c13e-d18a-4904-ada3-a2********\"\n },\n {\n \"ImageID\": \"sha256:d6e46aa2470df1d32034c6707c8041158b6********\",\n \"HostID\": \"5cd1c13e-d18a-4904-ada3-a2ef********\"\n }\n ],\n \"RequestId\": \"f28e2b9b-ee35-4c82-87e4-fcb64671d2af\",\n \"TotalCount\": 24\n }\n}",
900
878
  "title": "查询镜像关联主机"
901
879
  }
902
880
  ],
@@ -904,23 +882,15 @@
904
882
  {
905
883
  "document": "查询镜像列表",
906
884
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageList\n<公共请求参数>\n\n{}",
907
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageID\": \"sha256:2061084bfcc0d9ff44f479efc582e3ac9feaf96b556f6901bb39dbddfb9676b2\",\n \"ImageName\": \"l10:latest\",\n \"CreateTime\": \"2021-01-29T04:03:18Z\",\n \"Size\": 16159906,\n \"HostCnt\": 1,\n \"ContainerCnt\": 0,\n \"ScanTime\": \"2021-01-29T06:10:12.021Z\",\n \"VulCnt\": 5,\n \"ComponentCnt\": 1,\n \"VirusCnt\": 11,\n \"RiskCnt\": 7,\n \"IsTrustImage\": true,\n \"OsName\": \"alpine:v3.12\",\n \"AgentError\": \"\",\n \"ScanError\": \"\",\n \"ScanStatus\": \"SCANNED\",\n \"ScanVirusError\": \"\",\n \"ScanVulError\": \"\",\n \"ScanRiskError\": \"\",\n \"IsSuggest\": 0,\n \"IsAuthorized\": 1\n }\n ],\n \"RequestId\": \"9c2d0eee-b4b8-4954-98ab-be69f503f77d\",\n \"TotalCount\": 339\n }\n}",
885
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageID\": \"sha256:2061084bfcc0d9ff44f479efc582e3ac9feaf96b556f6901bb39dbddfb9676b2\",\n \"ImageName\": \"l10:latest\",\n \"CreateTime\": \"2021-01-29T04:03:18Z\",\n \"Size\": 16159906,\n \"HostCnt\": 12,\n \"ContainerCnt\": 0,\n \"ScanTime\": \"2021-01-29T06:10:12.021Z\",\n \"VulCnt\": 5,\n \"ComponentCnt\": 31,\n \"VirusCnt\": 141,\n \"RiskCnt\": 7,\n \"IsTrustImage\": true,\n \"OsName\": \"alpine:v3.12\",\n \"AgentError\": \"No Error\",\n \"ScanError\": \"No Error\",\n \"ScanStatus\": \"SCANNED\",\n \"ScanVirusError\": \"No Error\",\n \"ScanVulError\": \"No Error\",\n \"ScanRiskError\": \"No Error\",\n \"IsSuggest\": 0,\n \"IsAuthorized\": 12\n }\n ],\n \"RequestId\": \"9c2d0eee-b4b8-4954-98ab-be69f503f77d\",\n \"TotalCount\": 339\n }\n}",
908
886
  "title": "查询镜像列表"
909
887
  }
910
888
  ],
911
- "DescribeAssetImageListExport": [
912
- {
913
- "document": "",
914
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"ImageName\"\n ]\n}",
915
- "output": "{\n \"Response\": {\n \"DownloadUrl\": \"sfsfsfsfsfs\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
916
- "title": "查询镜像列表导出"
917
- }
918
- ],
919
889
  "DescribeAssetImageRegistryAssetStatus": [
920
890
  {
921
891
  "document": "",
922
892
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryAssetStatus\n<公共请求参数>\n\n{}",
923
- "output": "{\n \"Response\": {\n \"Status\": \"doing\",\n \"Err\": \"\",\n \"LatestSyncSuccessTime\": \"2006-01-02 15:04:05\",\n \"RequestId\": \"abd55800-ad16-4de8-b319-a6480098e15b\"\n }\n}",
893
+ "output": "{\n \"Response\": {\n \"Status\": \"doing\",\n \"Err\": \"rpc service error\",\n \"LatestSyncSuccessTime\": \"2006-01-02 15:04:05\",\n \"RequestId\": \"abd55800-ad16-4de8-b319-a6480098e15b\"\n }\n}",
924
894
  "title": "查看镜像仓库资产更新进度状态"
925
895
  }
926
896
  ],
@@ -928,13 +898,13 @@
928
898
  {
929
899
  "document": "",
930
900
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryDetail\n<公共请求参数>\n\n{\n \"Id\": \"5427\"\n}",
931
- "output": "{\n \"Response\": {\n \"RequestId\": \"acc92f01-ee14-4eec-a1b6-e78d3ea0b7e9\",\n \"ImageDigest\": \"sha256:615475135bb705517e749767a28f6bd57199008d3e9b688efa0f73a8befccc97\",\n \"ImageId\": \"sha256:e68ba1280908f76a9e22a813b9ea0c7358e9bcf0ed616fddf88dad557e33d1ca\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/yunding/person1\",\n \"InstanceId\": \"\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"yunding\",\n \"ImageName\": \"person1\",\n \"ImageTag\": \"v1\",\n \"ImageSize\": 74866818,\n \"ScanTime\": \"2022-01-14T21:03:19+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 172,\n \"VirusCnt\": 0,\n \"RiskCnt\": 1,\n \"SentiveInfoCnt\": 1,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"\",\n \"ScanVulError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"#2020-06-17 00:22:24.918233762 +0000 UTC\\n\\n/bin/sh -c #(nop) ADD file:84700c11fcc969ac08ef25f115513d76c7b72a4118c01fbc86ef0a6056fdebeb in / \\n\\n#2020-06-17 00:22:25.276021438 +0000 UTC\\n\\n/bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200611\\n\\n#2020-06-17 00:22:25.47282687 +0000 UTC\\n\\n/bin/sh -c #(nop) CMD [\\\"/bin/bash\\\"]\\n\\n#2020-12-18 10:06:01.1576746 +0000 UTC\\n\\n/bin/sh -c echo \\\"RSYNC_PASSWORD='passwd' rsync\\\"\\n\\n\",\n \"RegistryRegion\": \"default\",\n \"ImageCreateTime\": \"2020-12-25T16:40:39+08:00\"\n }\n}",
901
+ "output": "{\n \"Response\": {\n \"RequestId\": \"acc92f01-ee14-4eec-a1b6-e78d3ea0b7e9\",\n \"ImageDigest\": \"sha256:615475135bb705517e749767a28f6bd57199008d3e9b688efa0f73a8befccc97\",\n \"ImageId\": \"sha256:e68ba1280908f76a9e22a813b9ea0c7358e9bcf0ed616fddf88dad557e33d1ca\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/yunding/person1\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"yunding\",\n \"ImageName\": \"person1\",\n \"ImageTag\": \"v1\",\n \"ImageSize\": 74866818,\n \"ScanTime\": \"2022-01-14T21:03:19+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 172,\n \"VirusCnt\": 0,\n \"RiskCnt\": 1,\n \"SentiveInfoCnt\": 1,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"MessageRegistryScan\",\n \"ScanVulError\": \"MessageRegistryScan\",\n \"ScanRiskError\": \"MessageRegistryScan\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"#2020-06-17 00:22:24.918233762 +0000 UTC\\n\\n/bin/sh -c #(nop) ADD file:84700c11fcc969ac08ef25f115513d76c7b72a4118c01fbc86ef0a6056fdebeb in / \\n\\n#2020-06-17 00:22:25.276021438 +0000 UTC\\n\\n/bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200611\\n\\n#2020-06-17 00:22:25.47282687 +0000 UTC\\n\\n/bin/sh -c #(nop) CMD [\\\"/bin/bash\\\"]\\n\\n#2020-12-18 10:06:01.1576746 +0000 UTC\\n\\n/bin/sh -c echo \\\"RSYNC_PASSWORD='passwd' rsync\\\"\\n\\n\",\n \"RegistryRegion\": \"default\",\n \"ImageCreateTime\": \"2020-12-25T16:40:39+08:00\"\n }\n}",
932
902
  "title": "查看仓库镜像详情"
933
903
  },
934
904
  {
935
905
  "document": "",
936
906
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryDetail\n<公共请求参数>\n\n{\n \"Id\": 3421599\n}",
937
- "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"ImageDigest\": \"sha256:8d8faaa36c253a8745c392fc71640757d29a5f026fc0e44bb9c98d56544f5175\",\n \"ImageId\": \"sha256:bb804a9c85d7199b8fd6a0c1a34ef1d049689604046fc5ce1ee6b968de78281b\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"hkccr.ccs.tencentyun.com/mhzou/mhccrxg\",\n \"InstanceId\": \"\",\n \"InstanceName\": \"ccr-ap-hongkong\",\n \"Namespace\": \"mhzou\",\n \"ImageName\": \"mhccrxg\",\n \"ImageTag\": \"mhccrxg1\",\n \"ImageSize\": 8544764,\n \"ScanTime\": \"2022-01-19T22:58:23+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 2425,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"\",\n \"ScanVulError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"#2020-06-17 00:22:24.918233762 +0000 UTC\\n\\n/bin/sh -c #(nop) ADD file:84700c11fcc969ac08ef25f115513d76c7b72a4118c01fbc86ef0a6056fdebeb in / \\n\\n#2020-06-17 00:22:25.276021438 +0000 UTC\\n\\n/bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200611\\n\\n#2020-06-17 00:22:25.47282687 +0000 UTC\\n\\n/bin/sh -c #(nop) CMD [\\\"/bin/bash\\\"]\\n\\n#2020-12-18 10:06:01.1576746 +0000 UTC\\n\\n/bin/sh -c echo \\\"RSYNC_PASSWORD='passwd' rsync\\\"\\n\\n\",\n \"RegistryRegion\": \"ap-hongkong\",\n \"ImageCreateTime\": \"1900-01-01T00:00:00+00:00\"\n }\n}",
907
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"ImageDigest\": \"sha256:8d8faaa36c253a8745c392fc71640757d29a5f026fc0e44bb9c98d56544f5175\",\n \"ImageId\": \"sha256:bb804a9c85d7199b8fd6a0c1a34ef1d049689604046fc5ce1ee6b968de78281b\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"hkccr.ccs.tencentyun.com/mhzou/mhccrxg\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"ccr-ap-hongkong\",\n \"Namespace\": \"mhzou\",\n \"ImageName\": \"mhccrxg\",\n \"ImageTag\": \"mhccrxg1\",\n \"ImageSize\": 8544764,\n \"ScanTime\": \"2022-01-19T22:58:23+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 2425,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"MessageRegistryScan\",\n \"ScanVulError\": \"MessageRegistryScan\",\n \"ScanRiskError\": \"MessageRegistryScan\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"#2020-06-17 00:22:24.918233762 +0000 UTC\\n\\n/bin/sh -c #(nop) ADD file:84700c11fcc969ac08ef25f115513d76c7b72a4118c01fbc86ef0a6056fdebeb in / \\n\\n#2020-06-17 00:22:25.276021438 +0000 UTC\\n\\n/bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200611\\n\\n#2020-06-17 00:22:25.47282687 +0000 UTC\\n\\n/bin/sh -c #(nop) CMD [\\\"/bin/bash\\\"]\\n\\n#2020-12-18 10:06:01.1576746 +0000 UTC\\n\\n/bin/sh -c echo \\\"RSYNC_PASSWORD='passwd' rsync\\\"\\n\\n\",\n \"RegistryRegion\": \"ap-hongkong\",\n \"ImageCreateTime\": \"1900-01-01T00:00:00+00:00\"\n }\n}",
938
908
  "title": "镜像仓库查询镜像仓库详情"
939
909
  }
940
910
  ],
@@ -942,7 +912,7 @@
942
912
  {
943
913
  "document": "",
944
914
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryList\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"ExactMatch\": false,\n \"Name\": \"ScanStatus\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"RepoType\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"SecurityRisk\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"IsAuthorized\",\n \"Values\": [\n \"all\"\n ]\n }\n ],\n \"Limit\": 10,\n \"Offset\": 0\n}",
945
- "output": "{\n \"Response\": {\n \"RequestId\": \"a17ead82-00d3-4bf2-8ec2-55292c42d6e3\",\n \"TotalCount\": 100,\n \"List\": [\n {\n \"Id\": 20933905,\n \"ImageDigest\": \"sha256:8d8d7593f6da4e909bba63a3a22080eca935c57afd81ad0b8f069b90064324ba\",\n \"ImageId\": \"sha256:a810b384f08c95a472d7364b9b3198d4746f1ea001a26c5cb9d7e95272004afc\",\n \"RegistryType\": \"ccr\",\n \"RegistryRegion\": \"default\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/xcar/executor\",\n \"InstanceId\": \"\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"xcar\",\n \"ImageName\": \"executor\",\n \"ImageTag\": \"latest\",\n \"ImageSize\": 22952972,\n \"ScanTime\": \"\",\n \"ScanStatus\": \"NOT_SCAN\",\n \"Progress\": 0,\n \"VulCnt\": 0,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"IsTrustImage\": false,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"\",\n \"ScanVulError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 0,\n \"ScanRiskProgress\": 0,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"NOT_SCAN\",\n \"RiskStatus\": \"NOT_SCAN\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 0,\n \"ImageCreateTime\": \"2020-09-22T00:00:00+00:00\",\n \"IsLatestImage\": true\n },\n {\n \"Id\": 20933905,\n \"ImageDigest\": \"sha256:8d8d7593f6da4e909bba63a3a22080eca935c57afd81ad0b8f069b90064324ba\",\n \"ImageId\": \"sha256:a810b384f08c95a472d7364b9b3198d4746f1ea001a26c5cb9d7e95272004afc\",\n \"RegistryType\": \"ccr\",\n \"RegistryRegion\": \"default\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/xcar/executor\",\n \"InstanceId\": \"\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"xcar\",\n \"ImageName\": \"executor\",\n \"ImageTag\": \"latest\",\n \"ImageSize\": 22952972,\n \"ScanTime\": \"\",\n \"ScanStatus\": \"NOT_SCAN\",\n \"Progress\": 0,\n \"VulCnt\": 0,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"IsTrustImage\": false,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"\",\n \"ScanVulError\": \"\",\n \"ScanRiskError\": \"\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 0,\n \"ScanRiskProgress\": 0,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"NOT_SCAN\",\n \"RiskStatus\": \"NOT_SCAN\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 0,\n \"ImageCreateTime\": \"2020-09-22T00:00:00+00:00\",\n \"IsLatestImage\": true\n }\n ]\n }\n}",
915
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a17ead82-00d3-4bf2-8ec2-55292c42d6e3\",\n \"TotalCount\": 100,\n \"List\": [\n {\n \"Id\": 20933905,\n \"ImageDigest\": \"sha256:8d8d7593f6da4e909bba63a3a22080eca935c57afd81ad0b8f069b90064324ba\",\n \"ImageId\": \"sha256:a810b384f08c95a472d7364b9b3198d4746f1ea001a26c5cb9d7e95272004afc\",\n \"RegistryType\": \"ccr\",\n \"RegistryRegion\": \"default\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/xcar/executor\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"xcar\",\n \"ImageName\": \"executor\",\n \"ImageTag\": \"latest\",\n \"ImageSize\": 22952972,\n \"ScanTime\": \"2020-11-21 15:16:00\",\n \"ScanStatus\": \"NOT_SCAN\",\n \"Progress\": 0,\n \"VulCnt\": 0,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"IsTrustImage\": false,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"OperateFa****\",\n \"ScanVulError\": \"OperateFa****\",\n \"ScanRiskError\": \"MessageRegistry****\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 0,\n \"ScanRiskProgress\": 0,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"NOT_SCAN\",\n \"RiskStatus\": \"NOT_SCAN\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 0,\n \"ImageCreateTime\": \"2020-09-22T00:00:00+00:00\",\n \"IsLatestImage\": true\n },\n {\n \"Id\": 20933905,\n \"ImageDigest\": \"sha256:8d8d7593f6da4e909bba63a3a22080eca935c57afd81ad0b8f069b90064324ba\",\n \"ImageId\": \"sha256:a810b384f08c95a472d7364b9b3198d4746f1ea001a26c5cb9d7e95272004afc\",\n \"RegistryType\": \"ccr\",\n \"RegistryRegion\": \"default\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/xcar/executor\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"xcar\",\n \"ImageName\": \"executor\",\n \"ImageTag\": \"latest\",\n \"ImageSize\": 22952972,\n \"ScanTime\": \"2020-11-21 15:16:00\",\n \"ScanStatus\": \"NOT_SCAN\",\n \"Progress\": 0,\n \"VulCnt\": 0,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"IsTrustImage\": false,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"ScanVirusError\",\n \"ScanVulError\": \"ScanVulError\",\n \"ScanRiskError\": \"ScanRiskError\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 0,\n \"ScanRiskProgress\": 0,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"NOT_SCAN\",\n \"RiskStatus\": \"NOT_SCAN\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 0,\n \"ImageCreateTime\": \"2020-09-22T00:00:00+00:00\",\n \"IsLatestImage\": true\n }\n ]\n }\n}",
946
916
  "title": "镜像仓库查询镜像仓库列表"
947
917
  }
948
918
  ],
@@ -958,13 +928,13 @@
958
928
  {
959
929
  "document": "正常的获取",
960
930
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"RegistryId\": 8329\n}",
961
- "output": "{\n \"Response\": {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"\",\n \"ConnDetectStatus\": \"status_connected\",\n \"FailReason\": \"\",\n \"Quuid\": \"backend\",\n \"Solution\": \"\",\n \"Uuid\": \"backend\"\n }\n ],\n \"Insecure\": 1,\n \"Name\": \"test\",\n \"NetType\": \"public\",\n \"Password\": \"\",\n \"RegistryRegion\": \"ap-beijing\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v1\",\n \"RequestId\": \"ff82bfdb-f923-4b66-8c70-cba784e8be67\",\n \"SpeedLimit\": 1000,\n \"Url\": \"http://good.com.cn\",\n \"Username\": \"test-user-name\"\n }\n}",
931
+ "output": "{\n \"Response\": {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"ConnDetectMessage\",\n \"ConnDetectStatus\": \"status_connected\",\n \"FailReason\": \"FailReason\",\n \"Quuid\": \"backend\",\n \"Solution\": \"Solution\",\n \"Uuid\": \"backend\"\n }\n ],\n \"Insecure\": 1,\n \"Name\": \"jfrog****\",\n \"NetType\": \"public\",\n \"Password\": \"Aa8888****\",\n \"RegistryRegion\": \"ap-beijing\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v1\",\n \"RequestId\": \"ff82bfdb-f923-4b66-8c70-cba784e8be67\",\n \"SpeedLimit\": 1000,\n \"Url\": \"http://good.com.cn\",\n \"Username\": \"test-user-name\"\n }\n}",
962
932
  "title": "正常的获取"
963
933
  },
964
934
  {
965
935
  "document": "镜像仓库详情",
966
936
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"RegistryId\": \"10\"\n}",
967
- "output": "{\n \"Response\": {\n \"RequestId\": \"5187d432-1753-4376-81b6-12e1f7e6ecf5\",\n \"Name\": \"test\",\n \"Username\": \"test-user\",\n \"Password\": \"test-passwd\",\n \"Url\": \"https://127.0.0.1:8080\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v2\",\n \"NetType\": \"public\",\n \"RegistryRegion\": \"default\",\n \"SpeedLimit\": 1,\n \"Insecure\": 0\n }\n}",
937
+ "output": "{\n \"Response\": {\n \"RequestId\": \"5187d432-1753-4376-81b6-12e1f7e6ecf5\",\n \"Name\": \"jfrog****\",\n \"Username\": \"test-user\",\n \"Password\": \"test-passwd\",\n \"Url\": \"https://127.0.0.1:8080\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v2\",\n \"NetType\": \"public\",\n \"RegistryRegion\": \"default\",\n \"SpeedLimit\": 1,\n \"Insecure\": 0\n }\n}",
968
938
  "title": "镜像仓库详情"
969
939
  }
970
940
  ],
@@ -972,7 +942,7 @@
972
942
  {
973
943
  "document": "",
974
944
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRegistryList\n<公共请求参数>\n\n{\n \"Limit\": 100,\n \"Offset\": 0\n}",
975
- "output": "{\n \"Response\": {\n \"RequestId\": \"e59f97b7-87d4-4909-8289-61bd28423d2f\",\n \"TotalCount\": 15525,\n \"List\": [\n {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"\",\n \"ConnDetectStatus\": \"status_connected\",\n \"FailReason\": \"\",\n \"Quuid\": \"backend\",\n \"Solution\": \"\",\n \"Uuid\": \"backend\"\n }\n ],\n \"ConnDetectHostCount\": 1,\n \"ConnDetectType\": \"backend\",\n \"ConnectMsg\": \"\",\n \"InstanceID\": \"\",\n \"LatestSyncTime\": \"2024-10-23 03:12:50\",\n \"Name\": \"aws_public\",\n \"NetType\": \"public\",\n \"RegistryId\": 10000,\n \"RegistryRegion\": \"default\",\n \"RegistryType\": \"aws\",\n \"RegistryVersion\": \"V1\",\n \"SyncFailReason\": \"\",\n \"SyncMessage\": \"\",\n \"SyncSolution\": \"\",\n \"SyncStatus\": \"success\",\n \"Url\": \"https://public.aws\"\n }\n ]\n }\n}",
945
+ "output": "{\n \"Response\": {\n \"RequestId\": \"e59f97b7-87d4-4909-8289-61bd28423d2f\",\n \"TotalCount\": 15525,\n \"List\": [\n {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"AgentOffline\",\n \"ConnDetectStatus\": \"status_auth_failed\",\n \"FailReason\": \"仓库账号密码异常\",\n \"Quuid\": \"5a540076-d38a-4078-aa98-e7c86371d322\",\n \"Solution\": \"请检查您的仓库账号/密码是否正确,建议重新输入,稍后重试连接\",\n \"Uuid\": \"5a540076-d38a-4078-aa98-e7c86371d322\"\n }\n ],\n \"ConnDetectHostCount\": 1,\n \"ConnDetectType\": \"agent\",\n \"ConnectMsg\": \"connect msg\",\n \"InstanceID\": \"instance-01\",\n \"LatestSyncTime\": \"2024-10-23 03:12:50\",\n \"Name\": \"aws_public\",\n \"NetType\": \"public\",\n \"RegistryId\": 10000,\n \"RegistryRegion\": \"default\",\n \"RegistryType\": \"aws\",\n \"RegistryVersion\": \"V1\",\n \"SyncFailReason\": \"自有主机agent离线\",\n \"SyncMessage\": \"自有主机agent离线\",\n \"SyncSolution\": \"您选择的所有自有主机agent离线,请重新检查主机节点后再进行重试\",\n \"SyncStatus\": \"failed\",\n \"Url\": \"https://public.aws\"\n }\n ]\n }\n}",
976
946
  "title": "镜像仓库查询镜像仓库列表"
977
947
  }
978
948
  ],
@@ -1009,7 +979,7 @@
1009
979
  "DescribeAssetImageRegistrySummary": [
1010
980
  {
1011
981
  "document": "",
1012
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistrySummary\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"Name\": \"OnlyShowLatest\",\n \"ExactMatch\": true,\n \"Values\": [\n \"1\"\n ]\n }\n ]\n}",
982
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistrySummary\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"Name\": \"OnlyShowLatest\",\n \"ExactMatch\": true,\n \"Values\": [\n \"1021\"\n ]\n }\n ]\n}",
1013
983
  "output": "{\n \"Response\": {\n \"RequestId\": \"84bdc033-18ce-443a-9d61-8d5a099e6063\",\n \"UnScannedImageCnt\": 2\n }\n}",
1014
984
  "title": "镜像仓库查询镜像统计信息"
1015
985
  }
@@ -1018,7 +988,7 @@
1018
988
  {
1019
989
  "document": "",
1020
990
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVirusList\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"ExactMatch\": false,\n \"Name\": \"RiskLevel\",\n \"Values\": [\n \"all\"\n ]\n }\n ],\n \"Id\": 6947411,\n \"Limit\": 10,\n \"Offset\": 0\n}",
1021
- "output": "{\n \"Response\": {\n \"RequestId\": \"ae035bd6-6e5a-4f3e-b3ce-1f9cf6917066\",\n \"List\": [\n {\n \"Path\": \"var/cache/debconf/passwords.dat\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \"passwords.dat\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"etc/.pwd.lock\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \".pwd.lock\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/triggers/Unincorp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \"Unincorp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/systemd/deb-systemd-helper-enabled/timers.target.wants/apt-daily.timer\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \"apt-daily.timer\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/triggers/Lock\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \"Lock\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/log/btmp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \"btmp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/statoverride\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \"statoverride\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/lock\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \"lock\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/log/wtmp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \"wtmp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"run/utmp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [],\n \"Desc\": \"\",\n \"Solution\": \"\",\n \"FileType\": \"\",\n \"FileName\": \"utmp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n }\n ],\n \"TotalCount\": 17\n }\n}",
991
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ae035bd6-6e5a-4f3e-b3ce-1f9cf6917066\",\n \"List\": [\n {\n \"Path\": \"var/cache/debconf/passwords.dat\",\n \"RiskLevel\": \"4\",\n \"Category\": \"2\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"tag1\"\n ],\n \"Desc\": \"发现容器上存在恶意木马,您的容器可能已经失陷。\\n恶意木马通常会执行挖矿、文件删除、信息窃取和网络攻击等恶****\",\n \"Solution\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/****\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"passwords.dat\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"etc/.pwd.lock\",\n \"RiskLevel\": \"4\",\n \"Category\": \"2\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"tag2\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \".pwd.lock\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/triggers/Unincorp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"2\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"Unincorp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/systemd/deb-systemd-helper-enabled/timers.target.wants/apt-daily.timer\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"3\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"apt-daily.timer\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/triggers/Lock\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"3\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"Lock\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/log/btmp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"5\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"btmp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/statoverride\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"6\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"statoverride\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/lock\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"56\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"lock\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/log/wtmp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"6\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"tag1\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"wtmp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"run/utmp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"tag2\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"utmp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n }\n ],\n \"TotalCount\": 17\n }\n}",
1022
992
  "title": "镜像仓库查询木马病毒列表"
1023
993
  }
1024
994
  ],
@@ -1034,7 +1004,7 @@
1034
1004
  {
1035
1005
  "document": "",
1036
1006
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVulList\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"ExactMatch\": false,\n \"Name\": \"Level\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"Tag\",\n \"Values\": [\n \"all\"\n ]\n }\n ],\n \"Id\": 1929935,\n \"Limit\": 10,\n \"Offset\": 0\n}",
1037
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AttackLevel\": 0,\n \"CVEID\": \"CVE-2019-5827\",\n \"Category\": \"OUT_OF_BOUNDS_WRITE\",\n \"CategoryType\": \"SYSTEM\",\n \"Component\": \"sqlite-libs\",\n \"Components\": [\n {\n \"FixedVersion\": \"0:3.26.0-15.el8\",\n \"Name\": \"sqlite-libs\",\n \"Path\": \"\",\n \"Type\": \"SYSTEM\",\n \"Version\": \"3.26.0-13.el8\"\n }\n ],\n \"CvssScore\": \"8.8\",\n \"CvssVector\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\n \"DefenseSolution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\",\n \"Des\": \"GoogleChrome是美国谷歌(Google)公司的一款Web浏览器。GoogleChrome74.0.3729.131之前版本中的SQLite存在安全漏洞。攻击者可借助特制的HTML页面利用该漏洞损坏堆。\",\n \"FixedVersions\": \"0:3.26.0-15.el8\",\n \"IsSuggest\": \"true\",\n \"LayerInfos\": [\n {\n \"LayerCmd\": \"/bin/sh -c #(nop) ADD file:805cb5e15fb6e0bb0326ca33fd2942e068863ce2a8491bb71522c652f31fb466 in / \",\n \"LayerId\": \"sha256:a1d0c75327776413fa0db9ed3adcdbadedc95a662eb1d360dad82bb913f8a1d1\"\n }\n ],\n \"Level\": \"3\",\n \"Name\": \"Google Chrome 输入验证错误漏洞\",\n \"OfficialSolution\": \"升级到最新无漏洞版本\",\n \"POCID\": \"pcmgr-209472\",\n \"Reference\": \"[\\\"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html\\\", \\\"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\\\", \\\"https://crbug.com/952406\\\", \\\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/\\\", \\\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/\\\", \\\"https://seclists.org/bugtraq/2019/Aug/19\\\", \\\"https://security.gentoo.org/glsa/202003-16\\\", \\\"https://usn.ubuntu.com/4205-1/\\\", \\\"https://www.debian.org/security/2019/dsa-4500\\\"]\",\n \"SubmitTime\": \"2019-06-28 09:15:00\",\n \"Tag\": [\n \"NETWORK\",\n \"SYS\",\n \"APP\"\n ],\n \"Version\": \"3.26.0-13.el8\"\n }\n ],\n \"RequestId\": \"c6abad1d-0c32-4fcc-af55-df63bf986470\",\n \"TotalCount\": 211\n }\n}",
1007
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AttackLevel\": 0,\n \"CVEID\": \"CVE-2019-5827\",\n \"Category\": \"OUT_OF_BOUNDS_WRITE\",\n \"CategoryType\": \"SYSTEM\",\n \"Component\": \"sqlite-libs\",\n \"Components\": [\n {\n \"FixedVersion\": \"0:3.26.0-15.el8\",\n \"Name\": \"sqlite-libs\",\n \"Path\": \"/var/sqlite/\",\n \"Type\": \"SYSTEM\",\n \"Version\": \"3.26.0-13.el8\"\n }\n ],\n \"CvssScore\": \"8.8\",\n \"CvssVector\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\n \"DefenseSolution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\",\n \"Des\": \"GoogleChrome是美国谷歌(Google)公司的一款Web浏览器。GoogleChrome74.0.3729.131之前版本中的SQLite存在安全漏洞。攻击者可借助特制的HTML页面利用该漏洞损坏堆。\",\n \"FixedVersions\": \"0:3.26.0-15.el8\",\n \"IsSuggest\": \"true\",\n \"LayerInfos\": [\n {\n \"LayerCmd\": \"/bin/sh -c #(nop) ADD file:805cb5e15fb6e0bb0326ca33fd2942e068863ce2a8491bb71522c652f31fb466 in / \",\n \"LayerId\": \"sha256:a1d0c75327776413fa0db9ed3adcdbadedc95a662eb1d360dad82bb913f8a1d1\"\n }\n ],\n \"Level\": \"3\",\n \"Name\": \"Google Chrome 输入验证错误漏洞\",\n \"OfficialSolution\": \"升级到最新无漏洞版本\",\n \"POCID\": \"pcmgr-209472\",\n \"Reference\": \"[\\\"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html\\\", \\\"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\\\", \\\"https://crbug.com/952406\\\", \\\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/\\\", \\\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/\\\", \\\"https://seclists.org/bugtraq/2019/Aug/19\\\", \\\"https://security.gentoo.org/glsa/202003-16\\\", \\\"https://usn.ubuntu.com/4205-1/\\\", \\\"https://www.debian.org/security/2019/dsa-4500\\\"]\",\n \"SubmitTime\": \"2019-06-28 09:15:00\",\n \"Tag\": [\n \"NETWORK\",\n \"SYS\",\n \"APP\"\n ],\n \"Version\": \"3.26.0-13.el8\"\n }\n ],\n \"RequestId\": \"c6abad1d-0c32-4fcc-af55-df63bf986470\",\n \"TotalCount\": 211\n }\n}",
1038
1008
  "title": "镜像仓库查询镜像漏洞列表"
1039
1009
  }
1040
1010
  ],
@@ -1105,8 +1075,8 @@
1105
1075
  "DescribeAssetImageVirusListExport": [
1106
1076
  {
1107
1077
  "document": "查询镜像病毒列表导出",
1108
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageVirusListExport\n<公共请求参数>\n\n{\n \"ImageID\": \"dskaldjskld\",\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"FileType\",\n \"VirusName\",\n \"Tags\"\n ]\n}",
1109
- "output": "{\n \"Response\": {\n \"DownloadUrl\": \"sfsfsfsfsfs\",\n \"JobId\": \"\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
1078
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageVirusListExport\n<公共请求参数>\n\n{\n \"ImageID\": \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f23434*****\",\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"FileType\",\n \"VirusName\",\n \"Tags\"\n ]\n}",
1079
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"www.***.com/***\",\n \"JobId\": \"JobId\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
1110
1080
  "title": "查询镜像病毒列表导出"
1111
1081
  }
1112
1082
  ],
@@ -1130,7 +1100,7 @@
1130
1100
  {
1131
1101
  "document": "查询端口占用列表",
1132
1102
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetPortList\n<公共请求参数>\n\n{}",
1133
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ContainerName\": \"容器名称\",\n \"ContainerPID\": 1,\n \"ContainerPort\": 8080,\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"tke_cls-111111\",\n \"ListenContainer\": \"tcp://:::8080\",\n \"ListenHost\": \"\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"sh\",\n \"PublicIP\": \"-\",\n \"PublicIp\": \"1.1.1.1\",\n \"PublicPort\": 0,\n \"RunAs\": \"root:root\",\n \"Type\": \"tcp\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1103
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ContainerName\": \"容器名称\",\n \"ContainerPID\": 1,\n \"ContainerPort\": 8080,\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"tke_cls-111111\",\n \"ListenContainer\": \"tcp://:::8080\",\n \"ListenHost\": \"10.0.0.1\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessName\": \"sh\",\n \"PublicIP\": \"10.0.1.92\",\n \"PublicIp\": \"1.1.1.1\",\n \"PublicPort\": 0,\n \"RunAs\": \"root:root\",\n \"Type\": \"tcp\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1134
1104
  "title": "查询端口占用列表"
1135
1105
  }
1136
1106
  ],
@@ -1138,7 +1108,7 @@
1138
1108
  {
1139
1109
  "document": "查询进程列表",
1140
1110
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetProcessList\n<公共请求参数>\n\n{}",
1141
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CmdLine\": \"/bin/bash\",\n \"ContainerName\": \"/srv_test\",\n \"ContainerPID\": 1,\n \"Exe\": \"/usr/bin/bash\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PID\": 834,\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"bash\",\n \"PublicIp\": \"1.1.1.1\",\n \"RunAs\": \"root:root\",\n \"StartTime\": \"2024-10-17 15:00:47 +0000 UTC\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1111
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CmdLine\": \"/bin/bash\",\n \"ContainerName\": \"/srv_test\",\n \"ContainerPID\": 1,\n \"Exe\": \"/usr/bin/bash\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PID\": 834,\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessName\": \"bash\",\n \"PublicIp\": \"1.1.1.1\",\n \"RunAs\": \"root:root\",\n \"StartTime\": \"2024-10-17 15:00:47 +0000 UTC\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1142
1112
  "title": "查询进程列表"
1143
1113
  }
1144
1114
  ],
@@ -1170,7 +1140,7 @@
1170
1140
  {
1171
1141
  "document": "查询web服务列表",
1172
1142
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetWebServiceList\n<公共请求参数>\n\n{}",
1173
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"\",\n \"Config\": \"/etc/nginx/nginx.conf\",\n \"ContainerId\": \"dbbd1295d632365\",\n \"ContainerName\": \"/container_name\",\n \"DataPath\": \"\",\n \"ErrorLog\": \"\",\n \"Exe\": \"/usr/sbin/nginx\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"Listen\": [\n \"tcp://0.0.0.0:8080\"\n ],\n \"MainType\": \"web\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"Parameter\": \"nginx: master process nginx -g daemon off;\",\n \"Pids\": [\n 1,\n 2\n ],\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"1.1.1.1\",\n \"RunAs\": \":\",\n \"ServiceID\": \"27501aaed5e639693783321219989889\",\n \"Type\": \"Nginx\",\n \"Version\": \"1.22.0\",\n \"WebRoot\": \"/usr/share/nginx/html\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1143
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"AccessLog\",\n \"Config\": \"/etc/nginx/nginx.conf\",\n \"ContainerId\": \"dbbd1295d632365\",\n \"ContainerName\": \"/container_name\",\n \"DataPath\": \"/a/b\",\n \"ErrorLog\": \"ErrorLog\",\n \"Exe\": \"/usr/sbin/nginx\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"Listen\": [\n \"tcp://0.0.0.0:8080\"\n ],\n \"MainType\": \"web\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"Parameter\": \"nginx: master process nginx -g daemon off;\",\n \"Pids\": [\n 1,\n 2\n ],\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"1.1.1.1\",\n \"RunAs\": \":\",\n \"ServiceID\": \"27501aaed5e639693783321219989889\",\n \"Type\": \"Nginx\",\n \"Version\": \"1.22.0\",\n \"WebRoot\": \"/usr/share/nginx/html\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1174
1144
  "title": "查询web服务列表"
1175
1145
  }
1176
1146
  ],
@@ -1186,7 +1156,7 @@
1186
1156
  {
1187
1157
  "document": "",
1188
1158
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCheckItemList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": []\n}",
1189
- "output": "{\n \"Response\": {\n \"ClusterCheckItems\": [\n {\n \"AffectedType\": \"Workload\",\n \"AffectedVersion\": \"所有\",\n \"CVENumber\": \"\",\n \"CVSS\": \"\",\n \"CVSSScore\": \"0\",\n \"CheckItemId\": 10280,\n \"DiscoverTime\": \"2023-08-11 11:18:23\",\n \"IgnoredAssetNum\": 0,\n \"IsIgnored\": false,\n \"ItemDetail\": \"default ServiceAccount禁止授予写入/修改权限\",\n \"Name\": \"禁止授予ServiceAccount default写入/修改权限\",\n \"RelateLink\": \"\",\n \"RiskAssessment\": \"\",\n \"RiskAttribute\": \"MaliciousTampering\",\n \"RiskLevel\": \"High\",\n \"RiskProperty\": \"\",\n \"RiskTarget\": \"RBAC\",\n \"RiskType\": \"ConfigRisk\",\n \"Solution\": \"确保 default 名称的ServiceAccount禁止授予写入/修改权限\"\n }\n ],\n \"RequestId\": \"3d286d4b-8df0-4247-af69-02b510fac784\",\n \"TotalCount\": 163\n }\n}",
1159
+ "output": "{\n \"Response\": {\n \"ClusterCheckItems\": [\n {\n \"AffectedType\": \"Workload\",\n \"AffectedVersion\": \"所有\",\n \"CVENumber\": \"CVE-2021-26691\",\n \"CVSS\": \"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\n \"CVSSScore\": \"9.8\",\n \"CheckItemId\": 10280,\n \"DiscoverTime\": \"2023-08-11 11:18:23\",\n \"IgnoredAssetNum\": 0,\n \"IsIgnored\": false,\n \"ItemDetail\": \"default ServiceAccount禁止授予写入/修改权限\",\n \"Name\": \"禁止授予ServiceAccount default写入/修改权限\",\n \"RelateLink\": \"https://\",\n \"RiskAssessment\": \"assess***\",\n \"RiskAttribute\": \"MaliciousTampering\",\n \"RiskLevel\": \"High\",\n \"RiskProperty\": \"instance-sfd***\",\n \"RiskTarget\": \"RBAC\",\n \"RiskType\": \"ConfigRisk\",\n \"Solution\": \"确保 default 名称的ServiceAccount禁止授予写入/修改权限\"\n }\n ],\n \"RequestId\": \"3d286d4b-8df0-4247-af69-02b510fac784\",\n \"TotalCount\": 163\n }\n}",
1190
1160
  "title": "查询所有检查项示例"
1191
1161
  }
1192
1162
  ],
@@ -1194,7 +1164,7 @@
1194
1164
  {
1195
1165
  "document": "查询集群的详细信息",
1196
1166
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterDetail\n<公共请求参数>\n\n{\n \"ClusterId\": \"b6ebf065d08563396da66bf0950cba8c\"\n}",
1197
- "output": "{\n \"Response\": {\n \"ApiServerAddress\": \"\",\n \"CheckStatus\": \"HasRisk\",\n \"ClusterId\": \"57153b3ea9483f46f5dd9a0052cad265\",\n \"ClusterName\": \"benben-tcss\",\n \"ClusterNodeNum\": 1,\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterSubStatus\": \"\",\n \"ClusterType\": \"USER_CREATE_CLUSTER\",\n \"ClusterVersion\": \"v1.25.13\",\n \"ContainerRuntime\": \"docker://26.1.4\",\n \"DefenderStatus\": \"\",\n \"HighRiskCount\": 8,\n \"HintRiskCount\": 3,\n \"IngressCount\": 0,\n \"MasterIps\": \"172.16.64.12;\",\n \"MiddleRiskCount\": 9,\n \"NamespaceCount\": 7,\n \"NetworkType\": \"\",\n \"NodeCount\": 1,\n \"PodCount\": 15,\n \"Region\": \"ap-guangzhou\",\n \"RequestId\": \"7d65a8f8-2a92-4291-9e18-10a9d6a31382\",\n \"ScanTaskProgress\": 100,\n \"SeriousRiskCount\": 0,\n \"ServiceCount\": 2,\n \"TaskCreateTime\": \"2024-10-29 12:59:55\",\n \"WorkloadCount\": 10\n }\n}",
1167
+ "output": "{\n \"Response\": {\n \"ApiServerAddress\": \"https://30.46.164.12:1****\",\n \"CheckStatus\": \"HasRisk\",\n \"ClusterId\": \"57153b3ea9483f46f5dd9a0052cad265\",\n \"ClusterName\": \"benben-tcss\",\n \"ClusterNodeNum\": 1,\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterSubStatus\": \"CSR_RUNNING\",\n \"ClusterType\": \"USER_CREATE_CLUSTER\",\n \"ClusterVersion\": \"v1.25.13\",\n \"ContainerRuntime\": \"docker://26.1.4\",\n \"DefenderStatus\": \"Defended\",\n \"HighRiskCount\": 8,\n \"HintRiskCount\": 3,\n \"IngressCount\": 0,\n \"MasterIps\": \"172.16.64.12;\",\n \"MiddleRiskCount\": 9,\n \"NamespaceCount\": 7,\n \"NetworkType\": \"3\",\n \"NodeCount\": 1,\n \"PodCount\": 15,\n \"Region\": \"ap-guangzhou\",\n \"RequestId\": \"7d65a8f8-2a92-4291-9e18-10a9d6a31382\",\n \"ScanTaskProgress\": 100,\n \"SeriousRiskCount\": 0,\n \"ServiceCount\": 2,\n \"TaskCreateTime\": \"2024-10-29 12:59:55\",\n \"WorkloadCount\": 10\n }\n}",
1198
1168
  "title": "查询集群详情"
1199
1169
  }
1200
1170
  ],
@@ -1218,15 +1188,15 @@
1218
1188
  {
1219
1189
  "document": "请求资产详细信息",
1220
1190
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceAssetDetailInfo\n<公共请求参数>\n\n{\n \"CustomerAssetId\": 2202462,\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
1221
- "output": "{\n \"Response\": {\n \"AssetDetailInfo\": {\n \"AssetCreateTime\": \"2024-07-24 11:32:45\",\n \"AssetName\": \"my-elasticsearch-container\",\n \"AssetStatus\": \"ASSET_STOPPED\",\n \"AssetType\": \"ASSET_CONTAINER\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerAssetId\": 2202462,\n \"FailedPolicyItemCount\": 7,\n \"HostIP\": \"172.16.49.104\",\n \"HostName\": \"VM-49-104-centos\",\n \"LastCheckTime\": \"2024-07-24 11:17:15\",\n \"NodeName\": \"云镜漏洞测试机-目标机器\",\n \"PassedPolicyItemCount\": 17\n },\n \"ContainerDetailInfo\": {\n \"ContainerId\": \"e822238a07e0\",\n \"PodName\": \"\"\n },\n \"HostDetailInfo\": {\n \"ContainerdVersion\": \"\",\n \"DockerVersion\": \"\",\n \"K8SVersion\": \"\"\n },\n \"ImageDetailInfo\": {\n \"ImageId\": \"\",\n \"ImageName\": \"\",\n \"ImageTag\": \"\",\n \"Repository\": \"\"\n },\n \"K8SDetailInfo\": {\n \"ClusterName\": \"\",\n \"ClusterVersion\": \"\"\n },\n \"RequestId\": \"ae46673b-3930-4874-9144-a514653d232c\"\n }\n}",
1191
+ "output": "{\n \"Response\": {\n \"AssetDetailInfo\": {\n \"AssetCreateTime\": \"2024-07-24 11:32:45\",\n \"AssetName\": \"my-elasticsearch-container\",\n \"AssetStatus\": \"ASSET_STOPPED\",\n \"AssetType\": \"ASSET_CONTAINER\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerAssetId\": 2202462,\n \"FailedPolicyItemCount\": 7,\n \"HostIP\": \"172.16.49.104\",\n \"HostName\": \"VM-49-104-centos\",\n \"LastCheckTime\": \"2024-07-24 11:17:15\",\n \"NodeName\": \"云镜漏洞测试机-目标机器\",\n \"PassedPolicyItemCount\": 17\n },\n \"ContainerDetailInfo\": {\n \"ContainerId\": \"e822238a07e0\",\n \"PodName\": \"PodName\"\n },\n \"HostDetailInfo\": {\n \"ContainerdVersion\": \"2.3\",\n \"DockerVersion\": \"2.3\",\n \"K8SVersion\": \"1.24\"\n },\n \"ImageDetailInfo\": {\n \"ImageId\": \"id1\",\n \"ImageName\": \"name\",\n \"ImageTag\": \"tag1\",\n \"Repository\": \"repository\"\n },\n \"K8SDetailInfo\": {\n \"ClusterName\": \"name\",\n \"ClusterVersion\": \"1.1\"\n },\n \"RequestId\": \"ae46673b-3930-4874-9144-a514653d232c\"\n }\n}",
1222
1192
  "title": "请求资产详细信息"
1223
1193
  }
1224
1194
  ],
1225
1195
  "DescribeComplianceAssetList": [
1226
1196
  {
1227
1197
  "document": "",
1228
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceAssetList\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINDER\"\n ],\n \"Offset\": 0,\n \"Limit\": 1\n}",
1229
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"AssetInfoList\": [\n {\n \"CustomerAssetId\": 14343206,\n \"AssetType\": \"ASSET_CONTAINER\",\n \"AssetName\": \"name-asset\",\n \"ImageTag\": \"latest\",\n \"HostIP\": \"172.16.0.1\",\n \"NodeName\": \"node-1\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"PassedPolicyItemCount\": 1,\n \"FailedPolicyItemCount\": 1,\n \"LastCheckTime\": \"2020-09-22 00:00:00\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"InstanceId\": \"ins-busi1\",\n \"ImageRegistryInfo\": {\n \"Name\": \"registry1\",\n \"Type\": \"habor\",\n \"Address\": \"http://1.1.1.2\"\n },\n \"ClusterID\": \"cluster-busi1\",\n \"ClusterName\": \"cluster1\"\n }\n ],\n \"RequestId\": \"1e6c6a5d-740b-40f5-8685-47467df4df45\"\n }\n}",
1198
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceAssetList\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINDER\"\n ],\n \"Offset\": 0,\n \"Limit\": 100\n}",
1199
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"AssetInfoList\": [\n {\n \"CustomerAssetId\": 14343206,\n \"AssetType\": \"ASSET_CONTAINER\",\n \"AssetName\": \"name-asset\",\n \"ImageTag\": \"latest\",\n \"HostIP\": \"172.16.0.1\",\n \"NodeName\": \"node-1\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"PassedPolicyItemCount\": 1021,\n \"FailedPolicyItemCount\": 1021,\n \"LastCheckTime\": \"2020-09-22 00:00:00\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"InstanceId\": \"ins-busi1\",\n \"ImageRegistryInfo\": {\n \"Name\": \"registry1\",\n \"Type\": \"habor\",\n \"Address\": \"http://1.1.1.2\"\n },\n \"ClusterID\": \"cluster-busi1\",\n \"ClusterName\": \"cluster1\"\n }\n ],\n \"RequestId\": \"1e6c6a5d-740b-40f5-8685-47467df4df45\"\n }\n}",
1230
1200
  "title": "查询某类资产的列表"
1231
1201
  }
1232
1202
  ],
@@ -1242,7 +1212,7 @@
1242
1212
  {
1243
1213
  "document": "基线设置 查询定时任务列表",
1244
1214
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePeriodTaskList\n<公共请求参数>\n\n{\n \"AssetType\": \"ASSET_CONTAINER\",\n \"Offset\": 0,\n \"Limit\": 2\n}",
1245
- "output": "{\n \"Response\": {\n \"RequestId\": \"3e6756ce-6512-498d-a9fd-8572ef4ce7d3\",\n \"TotalCount\": 1,\n \"PeriodTaskSet\": [\n {\n \"PeriodTaskId\": 456,\n \"AssetType\": \"ASSET_CONTAINER\",\n \"PeriodRule\": {\n \"ExecutionTime\": \"2006-01-02 15:04:05\",\n \"Frequency\": 1\n },\n \"LastTriggerTime\": \"2006-01-02 15:04:05\",\n \"TotalPolicyItemCount\": 345634,\n \"BenchmarkStandardSet\": [\n {\n \"StandardId\": 2342,\n \"Name\": \"CIS Docker\",\n \"Description\": \"CIS Docker\",\n \"PolicyItemCount\": 666,\n \"Enabled\": true\n }\n ]\n }\n ]\n }\n}",
1215
+ "output": "{\n \"Response\": {\n \"RequestId\": \"3e6756ce-6512-498d-a9fd-8572ef4ce7d3\",\n \"TotalCount\": 1,\n \"PeriodTaskSet\": [\n {\n \"PeriodTaskId\": 456,\n \"AssetType\": \"ASSET_CONTAINER\",\n \"PeriodRule\": {\n \"ExecutionTime\": \"2006-01-02 15:04:05\",\n \"Frequency\": 1,\n \"Enable\": true\n },\n \"LastTriggerTime\": \"2006-01-02 15:04:05\",\n \"TotalPolicyItemCount\": 345634,\n \"BenchmarkStandardSet\": [\n {\n \"StandardId\": 2342,\n \"Name\": \"CIS Docker\",\n \"Description\": \"CIS Docker\",\n \"PolicyItemCount\": 666,\n \"Enabled\": true\n }\n ]\n }\n ]\n }\n}",
1246
1216
  "title": "查询定时任务列表"
1247
1217
  }
1248
1218
  ],
@@ -1250,7 +1220,7 @@
1250
1220
  {
1251
1221
  "document": "",
1252
1222
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePolicyItemAffectedAssetList\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 45675,\n \"Offset\": 1000,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"NodeName\",\n \"Values\": [\n \"node-1\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
1253
- "output": "{\n \"Response\": {\n \"AffectedAssetList\": [\n {\n \"AssetName\": \"hyperkube\",\n \"AssetType\": \"ASSET_IMAGE\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"ClusterID\": \"cls-5licssbi\",\n \"ClusterName\": \"piper-容器告警接入安全中心测试\",\n \"CustomerAssetId\": 1001005017196,\n \"HostIP\": \"172.17.1.53\",\n \"ImageRegistryInfo\": {\n \"Address\": \"\",\n \"Name\": \"\",\n \"Type\": \"\"\n },\n \"ImageTag\": \"v1.22.5-tke.27-rc1\",\n \"InstanceId\": \"ins-4bi3i496\",\n \"LastCheckTime\": \"2024-10-29 02:02:18\",\n \"NodeName\": \"as-tke-np-7lmwo8pi\",\n \"VerifyInfo\": \"sha256:f5b7776211ac931c484d203db03ed67e8b2dd44e0697119d02796a7d50041bcf:User=\"\n }\n ],\n \"RequestId\": \"dce87f72-d7ad-4ed4-8cd4-688a8464aad3\",\n \"TotalCount\": 186\n }\n}",
1223
+ "output": "{\n \"Response\": {\n \"AffectedAssetList\": [\n {\n \"AssetName\": \"hyperkube\",\n \"AssetType\": \"ASSET_IMAGE\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"ClusterID\": \"cls-5licssbi\",\n \"ClusterName\": \"piper-容器告警接入安全中心测试\",\n \"CustomerAssetId\": 1001005017196,\n \"HostIP\": \"172.17.1.53\",\n \"ImageRegistryInfo\": {\n \"Address\": \"10.0.0.1\",\n \"Name\": \"name1\",\n \"Type\": \"3\"\n },\n \"ImageTag\": \"v1.22.5-tke.27-rc1\",\n \"InstanceId\": \"ins-4bi3i496\",\n \"LastCheckTime\": \"2024-10-29 02:02:18\",\n \"NodeName\": \"as-tke-np-7lmwo8pi\",\n \"VerifyInfo\": \"sha256:f5b7776211ac931c484d203db03ed67e8b2dd44e0697119d02796a7d50041bcf:User=\"\n }\n ],\n \"RequestId\": \"dce87f72-d7ad-4ed4-8cd4-688a8464aad3\",\n \"TotalCount\": 186\n }\n}",
1254
1224
  "title": "查询检测项影响的资产列表"
1255
1225
  }
1256
1226
  ],
@@ -1330,15 +1300,15 @@
1330
1300
  {
1331
1301
  "document": "",
1332
1302
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEmergencyVulList\n<公共请求参数>\n\n{\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
1333
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2024-47176\",\n \"CVSSV3Score\": 0,\n \"Category\": \"OTHER\",\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"\",\n \"DefenceStatus\": \"\",\n \"DefendedCount\": 0,\n \"ID\": 0,\n \"LatestFoundTime\": \"\",\n \"Level\": \"HIGH\",\n \"Name\": \"cups-browsed 远程代码执行漏洞\",\n \"PocID\": \"pcmgr-521425\",\n \"Status\": \"NOT_SCAN\",\n \"SubmitTime\": \"2024-09-27 06:15:00\",\n \"Tags\": [\n \"POC\",\n \"SYS\"\n ]\n }\n ],\n \"RequestId\": \"a3fbabbb-7c7b-45dd-9219-a0b3ca9bc932\",\n \"TotalCount\": 241\n }\n}",
1303
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2024-47176\",\n \"CVSSV3Score\": 0,\n \"Category\": \"OTHER\",\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"ALL\",\n \"DefenceStatus\": \"DEFENDED\",\n \"DefendedCount\": 0,\n \"ID\": 0,\n \"LatestFoundTime\": \"2020-11-21 15:16:00\",\n \"Level\": \"HIGH\",\n \"Name\": \"cups-browsed 远程代码执行漏洞\",\n \"PocID\": \"pcmgr-521425\",\n \"Status\": \"NOT_SCAN\",\n \"SubmitTime\": \"2024-09-27 06:15:00\",\n \"Tags\": [\n \"POC\",\n \"SYS\"\n ]\n }\n ],\n \"RequestId\": \"a3fbabbb-7c7b-45dd-9219-a0b3ca9bc932\",\n \"TotalCount\": 241\n }\n}",
1334
1304
  "title": "查询应急漏洞列表"
1335
1305
  }
1336
1306
  ],
1337
1307
  "DescribeEscapeEventDetail": [
1338
1308
  {
1339
1309
  "document": " 查询容器逃逸事件详情",
1340
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeEventDetail\n<公共请求参数>\n\n{\n \"EventId\": \"dsfhuyh2r\"\n}",
1341
- "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"/usr/lib/systemd/systemd --switched-root --system --deserialize 18 \",\n \"ProcessPath\": \"systemd\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"159.75.90.111\",\n \"ClusterID\": \"cls-sdfw3f3\",\n \"ClusterName\": \"web-cluster\",\n \"ContainerId\": \"a960d85856c7a77cb504b638c56f59a28057\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"node1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"12486\",\n \"EventName\": \"敏感路径挂载\",\n \"EventType\": \"MOUNT_SENSITIVE_PTAH\",\n \"FoundTime\": \"2024-10-23 17:13:51\",\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"HostIP\": \"172.17.1.6\",\n \"ImageId\": \"sha256:b760a4831f5aab71c711f7537a107b751d0d0ce90dd32d8b358df3c5da385426\",\n \"ImageName\": \"-\",\n \"LatestFoundTime\": \"2024-10-23 17:13:51\",\n \"Namespace\": \"default\",\n \"NodeID\": \"web-node1\",\n \"NodeName\": \"VM-1-6-tencentos\",\n \"NodeSubNetCIDR\": \"172.16.0.0/24\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"kube-system/cilium-m2gkw\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"容器(ID:5893711bb2...)挂载了敏感目录/lib/modules,/proc/sys/net,/proc/sys/kernel,存在容器逃逸的风险,当攻击者攻破容器后,可通过篡改该目录下的敏感文件,从而实现容器逃逸,获得宿主机系统的控制权限,威胁宿主机上其它容器及内网的安全。\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"\",\n \"Solution\": \"修改挂载路径,只将必须的路径挂载到容器中,避免挂载敏感路径。\"\n },\n \"ParentProcessInfo\": {\n \"ProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 613d6792485871ca66ab6dc4d1c24e827e1ff4ae6aff87b187e40059cd3ba3b9 -address /run/containerd/containerd.sock \",\n \"ProcessPath\": \"containerd-shim-runc-v2\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"\",\n \"ProcessId\": 2743103,\n \"ProcessMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"ProcessName\": \"runc\",\n \"ProcessParam\": \"cilium-agent --config-dir=/tmp/cilium/config-map\",\n \"ProcessPath\": \"/opt/containerd/bin/runc\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"runc(2743103)|containerd-shim-runc-v2(289436)|systemd(1)\",\n \"ProcessUserGroup\": \"root\"\n },\n \"RequestId\": \"c544fc31-7576-43aa-a4f3-b4c40656f67a\"\n }\n}",
1310
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeEventDetail\n<公共请求参数>\n\n{\n \"EventId\": \"10021\"\n}",
1311
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"/usr/lib/systemd/systemd --switched-root --system --deserialize 18 \",\n \"ProcessPath\": \"systemd\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"159.75.90.111\",\n \"ClusterID\": \"cls-sdfw3f3\",\n \"ClusterName\": \"web-cluster\",\n \"ContainerId\": \"a960d85856c7a77cb504b638c56f59a28057\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"node1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"12486\",\n \"EventName\": \"敏感路径挂载\",\n \"EventType\": \"MOUNT_SENSITIVE_PTAH\",\n \"FoundTime\": \"2024-10-23 17:13:51\",\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"HostIP\": \"172.17.1.6\",\n \"ImageId\": \"sha256:b760a4831f5aab71c711f7537a107b751d0d0ce90dd32d8b358df3c5da385426\",\n \"ImageName\": \"centos:7.6\",\n \"LatestFoundTime\": \"2024-10-23 17:13:51\",\n \"Namespace\": \"default\",\n \"NodeID\": \"web-node1\",\n \"NodeName\": \"VM-1-6-tencentos\",\n \"NodeSubNetCIDR\": \"172.16.0.0/24\",\n \"NodeSubNetID\": \"sub-ndifn***\",\n \"NodeSubNetName\": \"dev\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b20*******\",\n \"PodIP\": \"10.0.0.121\",\n \"PodName\": \"kube-system/cilium-m2gkw\",\n \"PodStatus\": \"NORMAL\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"StatefulSet\"\n },\n \"EventDetail\": {\n \"Description\": \"容器(ID:5893711bb2...)挂载了敏感目录/lib/modules,/proc/sys/net,/proc/sys/kernel,存在容器逃逸的风险,当攻击者攻破容器后,可通过篡改该目录下的敏感文件,从而实现容器逃逸,获得宿主机系统的控制权限,威胁宿主机上其它容器及内网的安全。\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"dev\",\n \"Solution\": \"修改挂载路径,只将必须的路径挂载到容器中,避免挂载敏感路径。\"\n },\n \"ParentProcessInfo\": {\n \"ProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 613d6792485871ca66ab6dc4d1c24e827e1ff4ae6aff87b187e40059cd3ba3b9 -address /run/containerd/containerd.sock \",\n \"ProcessPath\": \"containerd-shim-runc-v2\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2743103,\n \"ProcessMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"ProcessName\": \"runc\",\n \"ProcessParam\": \"cilium-agent --config-dir=/tmp/cilium/config-map\",\n \"ProcessPath\": \"/opt/containerd/bin/runc\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"runc(2743103)|containerd-shim-runc-v2(289436)|systemd(1)\",\n \"ProcessUserGroup\": \"root\"\n },\n \"RequestId\": \"c544fc31-7576-43aa-a4f3-b4c40656f67a\"\n }\n}",
1342
1312
  "title": "DescribeEscapeEventDetail"
1343
1313
  }
1344
1314
  ],
@@ -1346,7 +1316,7 @@
1346
1316
  {
1347
1317
  "document": "查询容器逃逸事件列表",
1348
1318
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeEventInfo\n<公共请求参数>\n\n{}",
1349
- "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"9294ea00cf80469f3604e2a38e725bf77c5a3ea522ce23bbf4d4dba8b4e149c9\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/test1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"容器(ID: 9294ea00cf...) 中的进程bash对cgroup下的文件notify_on_release进行了修改,通过篡改该文件,可以实现容器逃逸,获得宿主机系统权限。\",\n \"EventCount\": 1,\n \"EventId\": \"33705186\",\n \"EventName\": \"利用cgroup机制逃逸\",\n \"EventType\": \"ESCAPE_CGROUPS\",\n \"FoundTime\": \"2024-08-23 16:41:03\",\n \"HostID\": \"3253189e-a107-4892-9bb9-03ad9d3e6990\",\n \"HostIP\": \"172.16.48.74\",\n \"ImageId\": \"sha256:5d0da3dc976460b72c77d94c8a1ad043720b0416bfc16c52c45d4847e53fadb6\",\n \"ImageName\": \"centos:8\",\n \"LatestFoundTime\": \"2024-08-23 16:41:03\",\n \"NodeID\": \"\",\n \"NodeIP\": \"172.16.48.74\",\n \"NodeName\": \"VM-48-74-centos\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"\",\n \"PodName\": \"--\",\n \"PublicIP\": \"101.33.227.64\",\n \"Solution\": \"检查容器对应镜像是否存在漏洞或木马。修改容器启动参数,以普通权限启动容器。检查容器挂载目录,避免将/sys/fs/cgroup挂载到容器中。\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"53e7bf79-dd62-40f9-be45-5849b1a372af\",\n \"TotalCount\": 1\n }\n}",
1319
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ClusterID\": \"cls-fjivn***\",\n \"ClusterName\": \"dev-set\",\n \"ContainerId\": \"9294ea00cf80469f3604e2a38e725bf77c5a3ea522ce23bbf4d4dba8b4e149c9\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"/test1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"容器(ID: 9294ea00cf...) 中的进程bash对cgroup下的文件notify_on_release进行了修改,通过篡改该文件,可以实现容器逃逸,获得宿主机系统权限。\",\n \"EventCount\": 192,\n \"EventId\": \"33705186\",\n \"EventName\": \"利用cgroup机制逃逸\",\n \"EventType\": \"ESCAPE_CGROUPS\",\n \"FoundTime\": \"2024-08-23 16:41:03\",\n \"HostID\": \"3253189e-a107-4892-9bb9-03ad9****\",\n \"HostIP\": \"172.16.48.74\",\n \"ImageId\": \"sha256:5d0da3dc976460b72c77d94c8a1ad043720b0416bfc16c5*****\",\n \"ImageName\": \"centos:8\",\n \"LatestFoundTime\": \"2024-08-23 16:41:03\",\n \"NodeID\": \"d41d8cd98f00b204******\",\n \"NodeIP\": \"172.16.48.74\",\n \"NodeName\": \"VM-48-74-centos\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800****\",\n \"PodIP\": \"10.0.0.121\",\n \"PodName\": \"dev1\",\n \"PublicIP\": \"101.33.227.**\",\n \"Solution\": \"检查容器对应镜像是否存在漏洞或木马。修改容器启动参数,以普通权限启动容器。检查容器挂载目录,避免将/sys/fs/cgroup挂载到容器中。\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"53e7bf79-dd62-40f9-be45-5849b1a372af\",\n \"TotalCount\": 1021\n }\n}",
1350
1320
  "title": "DescribeEscapeEventInfo"
1351
1321
  }
1352
1322
  ],
@@ -1354,7 +1324,7 @@
1354
1324
  {
1355
1325
  "document": "",
1356
1326
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeEventTendency\n&EndTime=2021-05-01\n&StartTime=2021-05-07\n&<公共请求参数>",
1357
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Date\": \"2020-09-22\",\n \"ContainerEscapeEventCount\": 0,\n \"ProcessPrivilegeEventCount\": 0,\n \"RiskContainerEventCount\": 1\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1327
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Date\": \"2020-09-22\",\n \"ContainerEscapeEventCount\": 0,\n \"ProcessPrivilegeEventCount\": 0,\n \"RiskContainerEventCount\": 1021\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1358
1328
  "title": "查询待处理逃逸事件趋势"
1359
1329
  }
1360
1330
  ],
@@ -1366,14 +1336,6 @@
1366
1336
  "title": "统计容器逃逸各事件类型和待处理事件数"
1367
1337
  }
1368
1338
  ],
1369
- "DescribeEscapeEventsExport": [
1370
- {
1371
- "document": "",
1372
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeEventsExport\n&ExportField.0=xxx\n&<公共请求参数>",
1373
- "output": "{\n \"Response\": {\n \"RequestId\": \"xx\",\n \"DownloadUrl\": \"xx\"\n }\n}",
1374
- "title": "查询容器逃逸事件列表导出"
1375
- }
1376
- ],
1377
1339
  "DescribeEscapeRuleInfo": [
1378
1340
  {
1379
1341
  "document": "",
@@ -1402,7 +1364,7 @@
1402
1364
  {
1403
1365
  "document": "",
1404
1366
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskContainerList\n<公共请求参数>\n\n{\n \"Limit\": 1,\n \"Offset\": 1,\n \"Filters\": [\n {\n \"Name\": \"EventType\",\n \"Values\": [\n \"MOUNT_SENSITIVE_PTAH\"\n ],\n \"ExactMatch\": true\n }\n ],\n \"Order\": \"asc\",\n \"By\": \"Status\"\n}",
1405
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageId\": \"sha256:9aae1601d6832af6c69ef257f09\",\n \"EventType\": \"local\",\n \"OriginEventType\": \"MOUNT_SENSITIVE_PTAH\",\n \"UniqueKey\": \"1398abd1-98x71134\",\n \"ImageName\": \"centos-7.6\",\n \"ContainerCount\": 0,\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"LatestFoundTime\": \"2020-09-22 00:00:00\",\n \"EventCount\": 0,\n \"Status\": \"EVENT_INGNORE\",\n \"Description\": \"\",\n \"Solution\": \"\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1367
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageId\": \"sha256:9aae1601d6832af6c69ef257f09\",\n \"EventType\": \"local\",\n \"OriginEventType\": \"MOUNT_SENSITIVE_PTAH\",\n \"UniqueKey\": \"1398abd1-98x71134\",\n \"ImageName\": \"centos-7.6\",\n \"ContainerCount\": 0,\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"LatestFoundTime\": \"2020-09-22 00:00:00\",\n \"EventCount\": 0,\n \"Status\": \"EVENT_INGNORE\",\n \"Description\": \"Description\",\n \"Solution\": \"Solution\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1406
1368
  "title": "查询风险容器镜像列表"
1407
1369
  }
1408
1370
  ],
@@ -1418,7 +1380,7 @@
1418
1380
  {
1419
1381
  "document": "",
1420
1382
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobManageList\n<公共请求参数>\n\n{}",
1421
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ExportProgress\": 0,\n \"ExportStatus\": \"RUNNING\",\n \"FailureMsg\": \"\",\n \"InsertTime\": \"2024-10-30 10:47:57\",\n \"JobID\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"JobName\": \"LocalImage-253332865-343433341-1\",\n \"Source\": \"LocalImage\",\n \"Timeout\": \"2024-10-30 10:47:57\"\n }\n ],\n \"RequestId\": \"b0990d92-0eff-4bc3-8484-ffd61d8daa89\",\n \"TotalCount\": 11\n }\n}",
1383
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ExportProgress\": 0,\n \"ExportStatus\": \"RUNNING\",\n \"FailureMsg\": \"FailureMsg\",\n \"InsertTime\": \"2024-10-30 10:47:57\",\n \"JobID\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"JobName\": \"LocalImage-253332865-343433341-1\",\n \"Source\": \"LocalImage\",\n \"Timeout\": \"2024-10-30 10:47:57\"\n }\n ],\n \"RequestId\": \"b0990d92-0eff-4bc3-8484-ffd61d8daa89\",\n \"TotalCount\": 11\n }\n}",
1422
1384
  "title": "查询导出任务管理列表"
1423
1385
  }
1424
1386
  ],
@@ -1426,7 +1388,7 @@
1426
1388
  {
1427
1389
  "document": "查询导出任务的结果",
1428
1390
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobResult\n<公共请求参数>\n\n{\n \"JobId\": \"e4409223-8e92-45db-a857-11b1ff547c79\"\n}",
1429
- "output": "{\n \"Response\": {\n \"DownloadURL\": \"https://yunjing.cos.ap-guangzhou.myqcloud.com\",\n \"ExportProgress\": 100,\n \"ExportStatus\": \"SUCCESS\",\n \"FailureMsg\": \"\",\n \"RequestId\": \"c66b2b1f-9c85-481a-8eea-1a254ffd61df\"\n }\n}",
1391
+ "output": "{\n \"Response\": {\n \"DownloadURL\": \"https://yunjing.cos.ap-guangzhou.myqcloud.com\",\n \"ExportProgress\": 100,\n \"ExportStatus\": \"SUCCESS\",\n \"FailureMsg\": \"FailureMsg\",\n \"RequestId\": \"c66b2b1f-9c85-481a-8eea-1a254ffd61df\"\n }\n}",
1430
1392
  "title": "查询导出任务的结果"
1431
1393
  }
1432
1394
  ],
@@ -1442,7 +1404,7 @@
1442
1404
  {
1443
1405
  "document": "",
1444
1406
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageAutoAuthorizedLogList\n&TaskId=1\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1445
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"List\": [\n {\n \"Status\": \"SUCCESS\",\n \"AuthorizedTime\": \"2022-01-01 00:00:00\",\n \"ImageName\": \"镜像名称\",\n \"IsAuthorized\": 1,\n \"ImageId\": \"镜像id image-id\"\n }\n ]\n }\n}",
1407
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"List\": [\n {\n \"Status\": \"SUCCESS\",\n \"AuthorizedTime\": \"2022-01-01 00:00:00\",\n \"ImageName\": \"imageName-01\",\n \"IsAuthorized\": 1,\n \"ImageId\": \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\"\n }\n ]\n }\n}",
1446
1408
  "title": "查询镜像自动授权结果列表"
1447
1409
  }
1448
1410
  ],
@@ -1466,7 +1428,7 @@
1466
1428
  {
1467
1429
  "document": "",
1468
1430
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageComponentList\n&ImageID=image-id\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1469
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"ImageID\": \"sha256:2ebe27d\",\n \"Name\": \"name\",\n \"Path\": \"\",\n \"Type\": \"SYSTEM_COMPONENT\",\n \"Version\": \"2.2.51-12.el7\",\n \"VulCount\": 0\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1431
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"ImageID\": \"sha256:2ebe27d\",\n \"Name\": \"name\",\n \"Path\": \"Path\",\n \"Type\": \"SYSTEM_COMPONENT\",\n \"Version\": \"2.2.51-12.el7\",\n \"VulCount\": 0\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1470
1432
  "title": "查询本地镜像组件列表"
1471
1433
  }
1472
1434
  ],
@@ -1482,7 +1444,7 @@
1482
1444
  {
1483
1445
  "document": "镜像仓库查看定时任务",
1484
1446
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeImageRegistryTimingScanTask\n<公共请求参数>\n\n{}",
1485
- "output": "{\n \"Response\": {\n \"RequestId\": \"f60f0ef9-a105-4535-8dfd-42ad8b3a9c73\",\n \"ScanTime\": \"03:00:00\",\n \"ScanPeriod\": 1,\n \"ScanType\": [\n \"risk\",\n \"virus\"\n ],\n \"All\": false,\n \"Images\": [\n {\n \"ImageDigest\": \"sha256:1319b1eaa0b7bcebae63af321fa67559b9517e8494060403d083bb3508fe52c8\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/yunding/luping:v1\",\n \"InstanceId\": \"\",\n \"InstanceName\": \"\",\n \"Namespace\": \"\",\n \"ImageName\": \"yunding/luping\",\n \"ImageTag\": \"v1\",\n \"Force\": \"\"\n }\n ],\n \"Id\": [\n 1\n ],\n \"Enable\": true,\n \"Latest\": true\n }\n}",
1447
+ "output": "{\n \"Response\": {\n \"RequestId\": \"f60f0ef9-a105-4535-8dfd-42ad8b3a9c73\",\n \"ScanTime\": \"03:00:00\",\n \"ScanPeriod\": 1,\n \"ScanType\": [\n \"risk\",\n \"virus\"\n ],\n \"All\": false,\n \"Images\": [\n {\n \"ImageDigest\": \"sha256:1319b1eaa0b7bcebae63af321fa67559b9517e8494060403d083bb3508fe52c8\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/yunding/luping:v1\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"InstanceName\",\n \"Namespace\": \"tcss\",\n \"ImageName\": \"yunding/luping\",\n \"ImageTag\": \"v1\",\n \"Force\": \"Force\"\n }\n ],\n \"Id\": [\n 1\n ],\n \"Enable\": true,\n \"Latest\": true\n }\n}",
1486
1448
  "title": "镜像仓库查看定时任务"
1487
1449
  }
1488
1450
  ],
@@ -1506,7 +1468,7 @@
1506
1468
  {
1507
1469
  "document": "",
1508
1470
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageSimpleList\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1509
- "output": "{\n \"Response\": {\n \"ImageCnt\": 1,\n \"ImageList\": [\n {\n \"Size\": 1,\n \"ImageName\": \"centos:7.6\",\n \"ContainerCnt\": 0,\n \"ImageType\": \"\",\n \"ImageID\": \"c826b9fa-68b5-4603-bf25-a5eb9b65c768\"\n }\n ],\n \"RequestId\": \"965c55c5-8ab1-4e32-8425-4c44acb5edec\"\n }\n}",
1471
+ "output": "{\n \"Response\": {\n \"ImageCnt\": 1,\n \"ImageList\": [\n {\n \"Size\": 1,\n \"ImageName\": \"centos:7.6\",\n \"ContainerCnt\": 0,\n \"HostCnt\": 1,\n \"ImageType\": \"3\",\n \"ImageID\": \"c826b9fa-68b5-4603-bf25-a5eb9b65c768\"\n }\n ],\n \"RequestId\": \"965c55c5-8ab1-4e32-8425-4c44acb5edec\"\n }\n}",
1510
1472
  "title": "查询全部镜像列表"
1511
1473
  }
1512
1474
  ],
@@ -1522,7 +1484,7 @@
1522
1484
  {
1523
1485
  "document": "",
1524
1486
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeInspectionReport\n<公共请求参数>\n\n{}",
1525
- "output": "{\n \"Response\": {\n \"ReportName\": \"\",\n \"ReportUrl\": \"\",\n \"RequestId\": \"d1be9e4b-99db-47cb-8aa1-11b4c4b7becd\"\n }\n}",
1487
+ "output": "{\n \"Response\": {\n \"ReportName\": \"report.csv\",\n \"ReportUrl\": \"https://cwp-1258344699.cos.ap-guangzhou.myqcloud.com/report.csv\",\n \"RequestId\": \"d1be9e4b-99db-47cb-8aa1-11b4c4b7becd\"\n }\n}",
1526
1488
  "title": "查询检查报告"
1527
1489
  }
1528
1490
  ],
@@ -1530,7 +1492,7 @@
1530
1492
  {
1531
1493
  "document": "",
1532
1494
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalEventInfo\n<公共请求参数>\n\n{\n \"ID\": 10\n}",
1533
- "output": "{\n \"Response\": {\n \"Info\": {\n \"AlarmCount\": 1,\n \"ClusterID\": \"cls-abhq0j4o-666\",\n \"ClusterMasterIP\": \"\",\n \"ClusterName\": \"\",\n \"ClusterRunningStatus\": \"\",\n \"Desc\": \"检测到您的K8s API Server存在匿名用户访问请求,攻击者可利用匿名用户,通过API Server访问集群资源,如进入容器执行命令等。\",\n \"FirstCreateTime\": \"2024-10-22T11:00:45Z\",\n \"HighLightFields\": [\n \"RequestUser\"\n ],\n \"Info\": \"{\\\"Verb\\\": \\\"list\\\", \\\"AuditID\\\": \\\"4e477a26-b171-4702-a2ac-1ac494ae8c85\\\", \\\"PodNameIP\\\": \\\"\\\", \\\"SourceIPS\\\": \\\"[\\\\\\\"10.0.0.4\\\\\\\"]\\\", \\\"UserAgent\\\": \\\"tcss_agent_cluster/v0.0.0 (linux/amd64) kubernetes/$Format\\\", \\\"RequestURI\\\": \\\"/api/v1/namespaces?limit=1\\\", \\\"RequestUser\\\": \\\"{\\\\\\\"groups\\\\\\\":\\\\\\\"[\\\\\\\\\\\\\\\"system:unauthenticated\\\\\\\\\\\\\\\"]\\\\\\\",\\\\\\\"uid\\\\\\\":\\\\\\\"\\\\\\\",\\\\\\\"username\\\\\\\":\\\\\\\"system:anonymous\\\\\\\"}\\\", \\\"MountHostDir\\\": \\\"\\\", \\\"RequestObject\\\": \\\"{\\\\\\\"metadata\\\\\\\":\\\\\\\"\\\\\\\"}\\\", \\\"ResponseObject\\\": \\\"{\\\\\\\"metadata\\\\\\\":\\\\\\\"\\\\\\\"}\\\", \\\"ResponseStatusCode\\\": \\\"200\\\"}\",\n \"K8sVersion\": \"\",\n \"LastCreateTime\": \"2024-10-22T11:00:45Z\",\n \"MatchRule\": {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"HIGH\",\n \"Scope\": \"{\\\"RequestUser\\\": \\\"system:anonymous\\\", \\\"RequestUserGroups\\\": \\\"system:anonymous\\\"}\",\n \"Status\": false\n },\n \"MatchRuleID\": \"SYSTEM\",\n \"MatchRuleName\": \"系统规则\",\n \"MatchRuleType\": \"ANONYMOUS_ACCESS\",\n \"RiskLevel\": \"HIGH\",\n \"RunningComponent\": [],\n \"Status\": \"EVENT_UNDEAL\",\n \"Suggestion\": \"启用匿名用户存在较高的风险,建议您及时停用匿名用户,避免被攻击者利用;并排查来源IP和操作的资源是否属于正常运维操作。\\n1、修改API Server 配置文件(如:/etc/kubernetes/manifests/kube-apiserver.yaml)将anonymous-auth改为false;并修改bind-address,避免监听在0.0.0.0,或使用安全组限制;去掉insecure-port配置。\\n2、禁用kubelet的匿名认证功能,如去除kubelet服务配置文件中的anonymous-auth配置。\\n建议修改配置前,确认是否为业务所需;在修改配置文件前,做好备份。\"\n },\n \"RequestId\": \"8d8d41ab-6dfd-4f66-ad09-4a882485e733\"\n }\n}",
1495
+ "output": "{\n \"Response\": {\n \"Info\": {\n \"AlarmCount\": 1,\n \"ClusterID\": \"cls-abhq0j4o-666\",\n \"ClusterMasterIP\": \"10.0.1.92\",\n \"ClusterName\": \"clsfoo***\",\n \"ClusterRunningStatus\": \"CSR_RUN****\",\n \"Desc\": \"检测到您的K8s API Server存在匿名用户访问请求,攻击者可利用匿名用户,通过API Server访问集群资源,如进入容器执行命令等。\",\n \"FirstCreateTime\": \"2024-10-22T11:00:45Z\",\n \"HighLightFields\": [\n \"RequestUser\"\n ],\n \"Info\": \"{\\\"Verb\\\": \\\"list\\\", \\\"AuditID\\\": \\\"4e477a26-b171-4702-a2ac-1ac494ae8c85\\\", \\\"PodNameIP\\\": \\\"\\\", \\\"SourceIPS\\\": \\\"[\\\\\\\"10.0.0.4\\\\\\\"]\\\", \\\"UserAgent\\\": \\\"tcss_agent_cluster/v0.0.0 (linux/amd64) kubernetes/$Format\\\", \\\"RequestURI\\\": \\\"/api/v1/namespaces?limit=1\\\", \\\"RequestUser\\\": \\\"{\\\\\\\"groups\\\\\\\":\\\\\\\"[\\\\\\\\\\\\\\\"system:unauthenticated\\\\\\\\\\\\\\\"]\\\\\\\",\\\\\\\"uid\\\\\\\":\\\\\\\"\\\\\\\",\\\\\\\"username\\\\\\\":\\\\\\\"system:anonymous\\\\\\\"}\\\", \\\"MountHostDir\\\": \\\"\\\", \\\"RequestObject\\\": \\\"{\\\\\\\"metadata\\\\\\\":\\\\\\\"\\\\\\\"}\\\", \\\"ResponseObject\\\": \\\"{\\\\\\\"metadata\\\\\\\":\\\\\\\"\\\\\\\"}\\\", \\\"ResponseStatusCode\\\": \\\"200\\\"}\",\n \"K8sVersion\": \"1.0.1\",\n \"LastCreateTime\": \"2024-10-22T11:00:45Z\",\n \"MatchRule\": {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"HIGH\",\n \"Scope\": \"{\\\"RequestUser\\\": \\\"system:anonymous\\\", \\\"RequestUserGroups\\\": \\\"system:anonymous\\\"}\",\n \"Status\": false\n },\n \"MatchRuleID\": \"SYSTEM\",\n \"MatchRuleName\": \"系统规则\",\n \"MatchRuleType\": \"ANONYMOUS_ACCESS\",\n \"RiskLevel\": \"HIGH\",\n \"RunningComponent\": [],\n \"Status\": \"EVENT_UNDEAL\",\n \"Suggestion\": \"启用匿名用户存在较高的风险,建议您及时停用匿名用户,避免被攻击者利用;并排查来源IP和操作的资源是否属于正常运维操作。\\n1、修改API Server 配置文件(如:/etc/kubernetes/manifests/kube-apiserver.yaml)将anonymous-auth改为false;并修改bind-address,避免监听在0.0.0.0,或使用安全组限制;去掉insecure-port配置。\\n2、禁用kubelet的匿名认证功能,如去除kubelet服务配置文件中的anonymous-auth配置。\\n建议修改配置前,确认是否为业务所需;在修改配置文件前,做好备份。\"\n },\n \"RequestId\": \"8d8d41ab-6dfd-4f66-ad09-4a882485e733\"\n }\n}",
1534
1496
  "title": "查询k8s api 异常事件详情"
1535
1497
  }
1536
1498
  ],
@@ -1538,7 +1500,7 @@
1538
1500
  {
1539
1501
  "document": "",
1540
1502
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalEventList\n<公共请求参数>\n\n{}",
1541
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AlarmCount\": 1,\n \"ClusterID\": \"cls-abhq0j4o-666\",\n \"ClusterName\": \"\",\n \"ClusterRunningStatus\": \"\",\n \"Desc\": \"检测到您的K8s API Server存在匿名用户访问请求,攻击者可利用匿名用户,通过API Server访问集群资源,如进入容器执行命令等。\",\n \"FirstCreateTime\": \"2024-10-22T11:00:45Z\",\n \"ID\": 501472,\n \"LastCreateTime\": \"2024-10-22T11:00:45Z\",\n \"MatchRule\": {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"HIGH\",\n \"Scope\": \"{\\\"RequestUser\\\": \\\"system:anonymous\\\", \\\"RequestUserGroups\\\": \\\"system:anonymous\\\"}\",\n \"Status\": false\n },\n \"MatchRuleType\": \"ANONYMOUS_ACCESS\",\n \"RiskLevel\": \"HIGH\",\n \"RuleName\": \"系统规则\",\n \"RuleType\": \"SYSTEM_DEFINED_RULE\",\n \"Status\": \"EVENT_UNDEAL\",\n \"Suggestion\": \"启用匿名用户存在较高的风险,建议您及时停用匿名用户,避免被攻击者利用;并排查来源IP和操作的资源是否属于正常运维操作。\\n1、修改API Server 配置文件(如:/etc/kubernetes/manifests/kube-apiserver.yaml)将anonymous-auth改为false;并修改bind-address,避免监听在0.0.0.0,或使用安全组限制;去掉insecure-port配置。\\n2、禁用kubelet的匿名认证功能,如去除kubelet服务配置文件中的anonymous-auth配置。\\n建议修改配置前,确认是否为业务所需;在修改配置文件前,做好备份。\"\n }\n ],\n \"RequestId\": \"74b6dcb5-f38e-45f4-9f3f-be848b52466f\",\n \"TotalCount\": 218\n }\n}",
1503
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AlarmCount\": 1,\n \"ClusterID\": \"cls-abhq0j4o-666\",\n \"ClusterName\": \"clsfoo***\",\n \"ClusterRunningStatus\": \"CSR_RUN****\",\n \"Desc\": \"检测到您的K8s API Server存在匿名用户访问请求,攻击者可利用匿名用户,通过API Server访问集群资源,如进入容器执行命令等。\",\n \"FirstCreateTime\": \"2024-10-22T11:00:45Z\",\n \"ID\": 501472,\n \"LastCreateTime\": \"2024-10-22T11:00:45Z\",\n \"MatchRule\": {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"HIGH\",\n \"Scope\": \"{\\\"RequestUser\\\": \\\"system:anonymous\\\", \\\"RequestUserGroups\\\": \\\"system:anonymous\\\"}\",\n \"Status\": false\n },\n \"MatchRuleType\": \"ANONYMOUS_ACCESS\",\n \"RiskLevel\": \"HIGH\",\n \"RuleName\": \"系统规则\",\n \"RuleType\": \"SYSTEM_DEFINED_RULE\",\n \"Status\": \"EVENT_UNDEAL\",\n \"Suggestion\": \"启用匿名用户存在较高的风险,建议您及时停用匿名用户,避免被攻击者利用;并排查来源IP和操作的资源是否属于正常运维操作。\\n1、修改API Server 配置文件(如:/etc/kubernetes/manifests/kube-apiserver.yaml)将anonymous-auth改为false;并修改bind-address,避免监听在0.0.0.0,或使用安全组限制;去掉insecure-port配置。\\n2、禁用kubelet的匿名认证功能,如去除kubelet服务配置文件中的anonymous-auth配置。\\n建议修改配置前,确认是否为业务所需;在修改配置文件前,做好备份。\"\n }\n ],\n \"RequestId\": \"74b6dcb5-f38e-45f4-9f3f-be848b52466f\",\n \"TotalCount\": 218\n }\n}",
1542
1504
  "title": "查询k8s api异常事件列表"
1543
1505
  }
1544
1506
  ],
@@ -1594,7 +1556,7 @@
1594
1556
  {
1595
1557
  "document": "",
1596
1558
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallAuditRecord\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1597
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"AuditList\": [\n {\n \"ClusterName\": \"tke_test\",\n \"Region\": \"ap-guangzhou\",\n \"ClusterId\": \" cls-jvrv0kf2\",\n \"Uin\": \"10023234334\",\n \"NetworkPolicyName\": \"test\",\n \"AppId\": 346456456,\n \"PolicyId\": \"54645\",\n \"Action\": \"add\",\n \"Operation\": \"Running\",\n \"OperationTime\": \"2024-10-30 12:21:51\"\n }\n ],\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\"\n }\n}",
1559
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"AuditList\": [\n {\n \"ClusterName\": \"tke_test\",\n \"Region\": \"ap-guangzhou\",\n \"ClusterId\": \" cls-jvrv0kf2\",\n \"Uin\": \"10023234334\",\n \"NetworkPolicyName\": \"NetworkPolicyName\",\n \"AppId\": 346456456,\n \"PolicyId\": \"54645\",\n \"Action\": \"add\",\n \"Operation\": \"Running\",\n \"OperationTime\": \"2024-10-30 12:21:51\"\n }\n ],\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\"\n }\n}",
1598
1560
  "title": "查询集群策略审计列表示例"
1599
1561
  }
1600
1562
  ],
@@ -1626,36 +1588,36 @@
1626
1588
  {
1627
1589
  "document": "",
1628
1590
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallNamespaceList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-new\",\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1629
- "output": "{\n \"Response\": {\n \"RequestId\": \"a6405e01-bf4f-4044-abe9-4458783a3066\",\n \"TotalCount\": 9,\n \"ClusterNamespaceList\": [\n {\n \"Name\": \"hello\",\n \"Labels\": \"new=test\"\n }\n ]\n }\n}",
1591
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a6405e01-bf4f-4044-abe9-4458783a3066\",\n \"TotalCount\": 9,\n \"ClusterNamespaceList\": [\n {\n \"Name\": \"hello\",\n \"Labels\": \"new=value\"\n }\n ]\n }\n}",
1630
1592
  "title": "查询结果"
1631
1593
  },
1632
1594
  {
1633
1595
  "document": "",
1634
1596
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallNamespaceList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-o9mfjg0i\"\n}",
1635
- "output": "{\n \"Response\": {\n \"RequestId\": \"dee2fbd3-3114-4b17-9cf7-5c456cd703b1\",\n \"TotalCount\": 14,\n \"ClusterNamespaceList\": [\n {\n \"Labels\": \"\",\n \"Name\": \"app-team1\"\n },\n {\n \"Labels\": \"ns=backend,\",\n \"Name\": \"backend\"\n },\n {\n \"Labels\": \"\",\n \"Name\": \"backend1\"\n },\n {\n \"Labels\": \"\",\n \"Name\": \"default\"\n },\n {\n \"Labels\": \"\",\n \"Name\": \"dosec\"\n },\n {\n \"Labels\": \"\",\n \"Name\": \"foo\"\n },\n {\n \"Labels\": \"\",\n \"Name\": \"front\"\n },\n {\n \"Labels\": \"app.kubernetes.io/name=ingress-nginx,app.kubernetes.io/part-of=ingress-nginx,\",\n \"Name\": \"ingress-nginx\"\n },\n {\n \"Labels\": \"\",\n \"Name\": \"kube-node-lease\"\n },\n {\n \"Labels\": \"\",\n \"Name\": \"kube-public\"\n }\n ]\n }\n}",
1597
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dee2fbd3-3114-4b17-9cf7-5c456cd703b1\",\n \"TotalCount\": 14,\n \"ClusterNamespaceList\": [\n {\n \"Labels\": \"key=value\",\n \"Name\": \"app-team1\"\n }\n ]\n }\n}",
1636
1598
  "title": "命名空间列表"
1637
1599
  }
1638
1600
  ],
1639
1601
  "DescribeNetworkFirewallPodLabelsList": [
1640
1602
  {
1641
- "document": "",
1603
+ "document": "查询集群网络pod标签",
1642
1604
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPodLabelsList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-new\",\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1643
- "output": "{\n \"Response\": {\n \"RequestId\": \"a6405e01-bf4f-4044-abe9-4458783a3066\",\n \"TotalCount\": 9,\n \"PodList\": [\n {\n \"PodName\": \"hello\",\n \"Namespace\": \"default\",\n \"Labels\": \"new=test\"\n }\n ]\n }\n}",
1644
- "title": "查询结果"
1605
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a6405e01-bf4f-4044-abe9-4458783a3066\",\n \"TotalCount\": 9,\n \"PodList\": [\n {\n \"PodName\": \"hello\",\n \"Namespace\": \"default\",\n \"Labels\": \"newlabel\",\n \"WorkloadKind\": \"deployment\"\n }\n ]\n }\n}",
1606
+ "title": "查询集群网络pod标签"
1645
1607
  }
1646
1608
  ],
1647
1609
  "DescribeNetworkFirewallPolicyDetail": [
1648
1610
  {
1649
1611
  "document": "",
1650
1612
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 1\n}",
1651
- "output": "{\n \"Response\": {\n \"PolicyName\": \"test\",\n \"CustomPolicy\": [\n {\n \"Peer\": [\n {\n \"NamespaceSelector\": \"default\",\n \"PeerType\": \"\",\n \"PodSelector\": \"\",\n \"IPBlock\": \"\"\n }\n ],\n \"Direction\": \"FROM\",\n \"Ports\": [\n {\n \"Protocol\": \"tcp\",\n \"Port\": \"80\"\n }\n ]\n }\n ],\n \"Description\": \"\",\n \"ClusterId\": \"cls-dsfhuisdhfis\",\n \"FromPolicyRule\": 0,\n \"PublishResult\": \"\",\n \"Namespace\": \"default\",\n \"NetworkPolicyPlugin\": \"\",\n \"PodSelector\": \"a=b\",\n \"PublishStatus\": \"running\",\n \"ToPolicyRule\": 0,\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\",\n \"PolicyCreateTime\": \"2024-10-30 12:27:01\",\n \"PolicySourceType\": \"\"\n }\n}",
1613
+ "output": "{\n \"Response\": {\n \"PolicyName\": \"name01\",\n \"CustomPolicy\": [\n {\n \"Peer\": [\n {\n \"NamespaceSelector\": \"default\",\n \"PeerType\": \"peer type\",\n \"PodSelector\": \"a=b\",\n \"IPBlock\": \"ip block\"\n }\n ],\n \"Direction\": \"FROM\",\n \"Ports\": [\n {\n \"Protocol\": \"tcp\",\n \"Port\": \"80\"\n }\n ]\n }\n ],\n \"Description\": \"desc content\",\n \"ClusterId\": \"cls-dsfhuisdhfis\",\n \"FromPolicyRule\": 0,\n \"PublishResult\": \"success\",\n \"Namespace\": \"default\",\n \"NetworkPolicyPlugin\": \"plugin\",\n \"PodSelector\": \"a=b\",\n \"PublishStatus\": \"running\",\n \"ToPolicyRule\": 0,\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\",\n \"PolicyCreateTime\": \"2024-10-30 12:27:01\",\n \"PolicySourceType\": \"type\"\n }\n}",
1652
1614
  "title": "容器网络集群查看策略详情示例"
1653
1615
  }
1654
1616
  ],
1655
1617
  "DescribeNetworkFirewallPolicyDiscover": [
1656
1618
  {
1657
1619
  "document": "",
1658
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyDiscover\n<公共请求参数>\n\n{\n \"TaskId\": \"34702\"\n}",
1620
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyDiscover\n<公共请求参数>\n\n{\n \"TaskId\": \"1002\"\n}",
1659
1621
  "output": "{\n \"Response\": {\n \"RequestId\": \"ed202021-696e-4c03-a726-ca459c47c4ea\",\n \"TaskStatus\": \"Task_Succ\"\n }\n}",
1660
1622
  "title": "容器网络查询网络策略自动发现任务进度示例"
1661
1623
  }
@@ -1664,7 +1626,7 @@
1664
1626
  {
1665
1627
  "document": "",
1666
1628
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-o9mfjg0i\"\n}",
1667
- "output": "{\n \"Response\": {\n \"RequestId\": \"0f209045-f906-4ba4-9f61-105b73ecfcc6\",\n \"TotalCount\": 0,\n \"NetPolicy\": [\n {\n \"Id\": 1,\n \"Name\": \"backend-ingress-deny\",\n \"Description\": \"\",\n \"PolicySourceType\": \"System\",\n \"PodSelector\": \"new=roopingliu\",\n \"Namespace\": \"default\",\n \"FromPolicyRule\": 0,\n \"ToPolicyRule\": 0,\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishStatus\": \"PublishedNoConfirm\",\n \"PublishResult\": \"\",\n \"PolicyCreateTime\": \"2022-05-10 03:04:34\"\n },\n {\n \"Id\": 8,\n \"Name\": \"policy_test_add\",\n \"Description\": \"\",\n \"PolicySourceType\": \"Manual\",\n \"PodSelector\": \"good=labeld\",\n \"Namespace\": \"default\",\n \"FromPolicyRule\": 3,\n \"ToPolicyRule\": 0,\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishStatus\": \"unPublishEdit\",\n \"PublishResult\": \"\",\n \"PolicyCreateTime\": \"2022-06-23 05:40:13\"\n },\n {\n \"Id\": 2,\n \"Name\": \"test-network-policy\",\n \"Description\": \"\",\n \"PolicySourceType\": \"System\",\n \"PodSelector\": \"role=db\",\n \"Namespace\": \"default\",\n \"FromPolicyRule\": 0,\n \"ToPolicyRule\": 0,\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishStatus\": \"PublishedNoConfirm\",\n \"PublishResult\": \"\",\n \"PolicyCreateTime\": \"2022-06-13 08:33:35\"\n }\n ]\n }\n}",
1629
+ "output": "{\n \"Response\": {\n \"RequestId\": \"0f209045-f906-4ba4-9f61-105b73ecfcc6\",\n \"TotalCount\": 0,\n \"NetPolicy\": [\n {\n \"Id\": 1021,\n \"Name\": \"backend-ingress-deny\",\n \"Description\": \"dev\",\n \"PolicySourceType\": \"System\",\n \"PodSelector\": \"new=roopingliu\",\n \"Namespace\": \"default\",\n \"FromPolicyRule\": 0,\n \"ToPolicyRule\": 0,\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishStatus\": \"PublishedNoConfirm\",\n \"PublishResult\": \"success\",\n \"PolicyCreateTime\": \"2022-05-10 03:04:34\"\n },\n {\n \"Id\": 8,\n \"Name\": \"policy_test_add\",\n \"Description\": \"dev\",\n \"PolicySourceType\": \"Manual\",\n \"PodSelector\": \"good=labeld\",\n \"Namespace\": \"default\",\n \"FromPolicyRule\": 3,\n \"ToPolicyRule\": 0,\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishStatus\": \"unPublishEdit\",\n \"PublishResult\": \"success\",\n \"PolicyCreateTime\": \"2022-06-23 05:40:13\"\n }\n ]\n }\n}",
1668
1630
  "title": "策略列表"
1669
1631
  }
1670
1632
  ],
@@ -1680,7 +1642,7 @@
1680
1642
  {
1681
1643
  "document": "",
1682
1644
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Id\": 1\n}",
1683
- "output": "{\n \"Response\": {\n \"PolicyName\": \"test\",\n \"PolicySourceType\": \"System\",\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishResult\": \"\",\n \"ClusterId\": \"cls-jvrv0kf2\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\",\n \"PublishStatus\": \"PublishedNoConfirm\",\n \"RequestId\": \"965c55c5-8ab1-4e32-8425-4c44acb5edec\",\n \"PolicyCreateTime\": \"2024-10-30 14:35:57\",\n \"Description\": \"\"\n }\n}",
1645
+ "output": "{\n \"Response\": {\n \"PolicyName\": \"name1\",\n \"PolicySourceType\": \"System\",\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishResult\": \"success\",\n \"ClusterId\": \"cls-jvrv0kf2\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\",\n \"PublishStatus\": \"PublishedNoConfirm\",\n \"RequestId\": \"965c55c5-8ab1-4e32-8425-4c44acb5edec\",\n \"PolicyCreateTime\": \"2024-10-30 14:35:57\",\n \"Description\": \"desc content\"\n }\n}",
1684
1646
  "title": "容器网络集群查看Yaml网络策略详情示例"
1685
1647
  }
1686
1648
  ],
@@ -1696,7 +1658,7 @@
1696
1658
  {
1697
1659
  "document": "",
1698
1660
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribePostPayDetail\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1699
- "output": "{\n \"Response\": {\n \"SoftQuotaDayDetail\": [\n {\n \"PayTime\": \"2024-10-30 10:02:45\",\n \"CoresCnt\": 1\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1661
+ "output": "{\n \"Response\": {\n \"SoftQuotaDayDetail\": [\n {\n \"PayTime\": \"2024-10-30 10:02:45\",\n \"CoresCnt\": 1341\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1700
1662
  "title": "查询后付费详情"
1701
1663
  }
1702
1664
  ],
@@ -1720,7 +1682,7 @@
1720
1682
  {
1721
1683
  "document": "",
1722
1684
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribePublicKey\n<公共请求参数>\n\n{}",
1723
- "output": "{\n \"Response\": {\n \"PublicKey\": \"testpublickey\",\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1685
+ "output": "{\n \"Response\": {\n \"PublicKey\": \"-----BEGIN PUBLIC KEY-----MIIBIjANBgkqhOs2lWq8CUPB5wGPBYSG5cqW8Txho92EpR9/av7ySRMlZJh5st771IuWH/iaEbyq2XlwIDAQAB-----END PUBLIC KEY----****\",\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1724
1686
  "title": "获取公钥"
1725
1687
  }
1726
1688
  ],
@@ -1728,10 +1690,26 @@
1728
1690
  {
1729
1691
  "document": "",
1730
1692
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribePurchaseStateInfo\n<公共请求参数>\n\n{}",
1731
- "output": "{\n \"Response\": {\n \"AllCoresCnt\": 154,\n \"AuthorizedCoresCnt\": 147,\n \"AuthorizedImageCnt\": 287756,\n \"AutomaticRenewal\": 1,\n \"BeginTime\": \"2024-09-24 13:01:18\",\n \"CoresCnt\": 68,\n \"CurrentFlexibleCoresCnt\": 0,\n \"DefendClusterCoresCnt\": 48,\n \"DefendHostCoresCnt\": 20,\n \"DefendPolicy\": \"Part\",\n \"ExpirationTime\": \"2024-12-24 13:01:18\",\n \"FlexibleCoresLimit\": 5000,\n \"GivenAuthorizedCnt\": 0,\n \"GivenAuthorizedCoresCnt\": 0,\n \"ImageCnt\": 291209,\n \"InquireKey\": \"sv_yunjing_css_pem\",\n \"PurchasedAuthorizedCnt\": 300000,\n \"RequestId\": \"e40cad09-f295-42a8-914d-ea84767fb6f1\",\n \"State\": 3,\n \"SubState\": \"\",\n \"UndefendCoresCnt\": 86\n }\n}",
1693
+ "output": "{\n \"Response\": {\n \"AllCoresCnt\": 154,\n \"AuthorizedCoresCnt\": 147,\n \"AuthorizedImageCnt\": 287756,\n \"AutomaticRenewal\": 194,\n \"BeginTime\": \"2024-09-24 13:01:18\",\n \"CoresCnt\": 68,\n \"CurrentFlexibleCoresCnt\": 0,\n \"DefendClusterCoresCnt\": 48,\n \"DefendHostCoresCnt\": 20,\n \"DefendPolicy\": \"Part\",\n \"ExpirationTime\": \"2024-12-24 13:01:18\",\n \"FlexibleCoresLimit\": 5000,\n \"GivenAuthorizedCnt\": 0,\n \"GivenAuthorizedCoresCnt\": 0,\n \"ImageCnt\": 291209,\n \"InquireKey\": \"sv_yunjing_css_pem\",\n \"PurchasedAuthorizedCnt\": 300000,\n \"RequestId\": \"e40cad09-f295-42a8-914d-ea84767fb6f1\",\n \"State\": 3,\n \"SubState\": \"NORMAL\",\n \"UndefendCoresCnt\": 86\n }\n}",
1732
1694
  "title": "查询容器安全服务已购买信息"
1733
1695
  }
1734
1696
  ],
1697
+ "DescribeRaspRuleVuls": [
1698
+ {
1699
+ "document": "查询漏洞白名单里的漏洞列表",
1700
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRuleVuls\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"Name\": \"WhiteType\",\n \"Values\": [\n \"1\"\n ]\n }\n ]\n}",
1701
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102851,\n \"VulVulsName\": \"Weblogic T3/IIOP 反序列化漏洞\"\n },\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102413,\n \"VulVulsName\": \"xstream反序列化漏洞系列\"\n },\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102408,\n \"VulVulsName\": \"Jackson反序列化漏洞\"\n },\n {\n \"CveID\": \"pcmgr-9102137\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102137,\n \"VulVulsName\": \"Apache Struts2 远程代码执行漏洞\"\n },\n {\n \"CveID\": \"\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102094,\n \"VulVulsName\": \"java反序列化漏洞\"\n },\n {\n \"CveID\": \"pcmgr-9102071\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102071,\n \"VulVulsName\": \"Fastjson 反序列化任意代码执行漏洞\"\n },\n {\n \"CveID\": \"pcmgr-9100547\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9100547,\n \"VulVulsName\": \"Fastjson 远程代码执行漏洞\"\n },\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9100414,\n \"VulVulsName\": \"Fastjson 反序列化远程代码执行漏洞\"\n },\n {\n \"CveID\": \"pcmgr-9100399\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9100399,\n \"VulVulsName\": \"Fastjson 远程代码执行漏洞\"\n },\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9100388,\n \"VulVulsName\": \"Fastjson 远程代码执行漏洞\"\n }\n ],\n \"RequestId\": \"bbeddb8a-f99d-43a1-aadb-c32e148fdb94\",\n \"TotalCount\": 215\n }\n}",
1702
+ "title": "查询漏洞白名单里的漏洞列表"
1703
+ }
1704
+ ],
1705
+ "DescribeRaspRules": [
1706
+ {
1707
+ "document": "查询漏洞防御白名单",
1708
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRules\n<公共请求参数>\n\n{}",
1709
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CreateTime\": \"2024-11-19 19:16:26\",\n \"CveID\": \"CVE-2024-37032\",\n \"Id\": 463,\n \"ModifyTime\": \"2024-11-19 19:16:26\",\n \"Status\": 0,\n \"SupportDefense\": 2,\n \"URLRegexp\": \"\",\n \"VulVulsID\": 105333,\n \"VulVulsName\": \"Ollama远程代码执行漏洞(CVE-2024-37032)\",\n \"WhiteType\": 1\n }\n ],\n \"RequestId\": \"43acddb3-20bf-41d2-a5ca-824cae917760\",\n \"TotalCount\": 1\n }\n}",
1710
+ "title": "查询漏洞防御白名单"
1711
+ }
1712
+ ],
1735
1713
  "DescribeRefreshTask": [
1736
1714
  {
1737
1715
  "document": "",
@@ -1744,7 +1722,7 @@
1744
1722
  {
1745
1723
  "document": "",
1746
1724
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellDetail\n&EventId=100\n&<公共请求参数>",
1747
- "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"bash\",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"43.138.142.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"464567\",\n \"EventName\": \"反弹shell\",\n \"EventType\": \"REVERSE_SHELL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-09 10:17:07\",\n \"HostID\": \"45641324-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"ImageId\": \"sha256:345234541324b561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-10-09 10:17:07\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"--\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"/fervent_goodall容器(ID:b18a9a3726...)内存在疑似反弹shell行为\",\n \"DstAddress\": \"175.178.80.251:3387\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 737356,\n \"ProcessName\": \"bash\",\n \"ProcessParam\": \"sh -c bash \",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"\",\n \"ProcessUserGroup\": \"\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 737357,\n \"ProcessMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"ProcessName\": \"bash\",\n \"ProcessParam\": \"bash -i\",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"bash(737357)|bash(737356)|bash(733933)|containerd-shim-runc-v2(2178890)|systemd(1)\",\n \"ProcessUserGroup\": \"root\"\n },\n \"RequestId\": \"a14b6d46-6fa0-48bb-829f-acfa7a58b47a\"\n }\n}",
1725
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"bash\",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"43.138.**.**\",\n \"ClusterID\": \"12\",\n \"ClusterName\": \"name1\",\n \"ContainerId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"ContainerIsolateOperationSrc\": \"ContainerIsolateOperationSrc\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"464567\",\n \"EventName\": \"反弹shell\",\n \"EventType\": \"REVERSE_SHELL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-09 10:17:07\",\n \"HostID\": \"45641324-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"ImageId\": \"sha256:345234541324b561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-10-09 10:17:07\",\n \"Namespace\": \"Namespace\",\n \"NodeID\": \"NodeID\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"NodeSubNetCIDR\",\n \"NodeSubNetID\": \"NodeSubNetID\",\n \"NodeSubNetName\": \"NodeSubNetName\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"NodeUniqueID\",\n \"PodIP\": \"10.0.0.1\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"2\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"3\"\n },\n \"EventDetail\": {\n \"Description\": \"/fervent_goodall容器(ID:b18a9a3726...)内存在疑似反弹shell行为\",\n \"DstAddress\": \"175.178.**.**:3387\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"Remark\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 737356,\n \"ProcessName\": \"bash\",\n \"ProcessParam\": \"sh -c bash \",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"ProcessStartUser\",\n \"ProcessUserGroup\": \"ProcessUserGroup\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 737357,\n \"ProcessMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"ProcessName\": \"bash\",\n \"ProcessParam\": \"bash -i\",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"ProcessStartUser\",\n \"ProcessTree\": \"bash(737357)|bash(737356)|bash(733933)|containerd-shim-runc-v2(2178890)|systemd(1)\",\n \"ProcessUserGroup\": \"root\"\n },\n \"RequestId\": \"a14b6d46-6fa0-48bb-829f-acfa7a58b47a\"\n }\n}",
1748
1726
  "title": "运行时反弹shell事件详细信息"
1749
1727
  }
1750
1728
  ],
@@ -1752,7 +1730,7 @@
1752
1730
  {
1753
1731
  "document": "运行时反弹shell列表",
1754
1732
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellEvents\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1755
- "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"b49a9fd917d30b736e76bff07a81e016bb1ced7bd9428b5d076628c80f8c62fd\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"policy\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"policy1\",\n \"DstAddress\": \"10.145.120.27:9000\",\n \"EventCount\": 1,\n \"EventId\": \"5075001\",\n \"FoundTime\": \"2024-10-24 08:38:49\",\n \"HostID\": \"0c4f6c1d-8215-43e2-8dcf-a4fb1db12f41\",\n \"HostIP\": \"10.150.14.152\",\n \"ImageId\": \"sha256:8415e883970de94c3131ff24ffaf9943ea81b3eca0c3d8d747b98581730bcdb6\",\n \"ImageName\": \"registry-cn-shanghai-vpc.ack.aliyuncs.com/acs/terway:v1.8.13\",\n \"LatestFoundTime\": \"2020-10-24 08:38:49\",\n \"NodeID\": \"\",\n \"NodeName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PProcessName\": \"socat\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"dash\",\n \"ProcessPath\": \"/usr/bin/dash\",\n \"PublicIP\": \"\",\n \"Remark\": \"\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\",\n \"Status\": \"EVENT_UNDEAL\"\n },\n {\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"b15e610a7f62b5873902923dfeee2d3ab642f76bd7f1777b3f628158c5b39586\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"policy\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"policy1\",\n \"DstAddress\": \"100.127.196.56:10556\",\n \"EventCount\": 1,\n \"EventId\": \"5067003\",\n \"FoundTime\": \"2020-10-24 08:03:10\",\n \"HostID\": \"fc472648-37ed-4946-a4c9-d72c75e162c4\",\n \"HostIP\": \"10.144.49.213\",\n \"ImageId\": \"sha256:41481aae5e2d135b2624fc09aa1875eb84c6472eaa0929f6d827699e67edd041\",\n \"ImageName\": \"registry\",\n \"LatestFoundTime\": \"2020-10-24 08:03:10\",\n \"NodeID\": \"\",\n \"NodeName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PProcessName\": \"socat\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"ProcessName\": \"dash\",\n \"ProcessPath\": \"/usr/bin/dash\",\n \"PublicIP\": \"\",\n \"Remark\": \"\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"c73a7252-0f68-4203-8b18-52037ab5efd1\",\n \"TotalCount\": 253\n }\n}",
1733
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"b49a9fd917d30b736e76bff07a81e016bb1ced7bd9428b5d076628c80f8c62fd\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"policy\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"policy1\",\n \"DstAddress\": \"10.145.120.27:9000\",\n \"EventCount\": 1,\n \"EventId\": \"5075001\",\n \"FoundTime\": \"2024-10-24 08:38:49\",\n \"HostID\": \"0c4f6c1d-8215-43e2-8dcf-a4fb1db12f41\",\n \"HostIP\": \"10.150.14.152\",\n \"ImageId\": \"sha256:8415e883970de94c3131ff24ffaf9943ea81b3eca0c3d8d747b98581730bcdb6\",\n \"ImageName\": \"registry-cn-shanghai-vpc.ack.aliyuncs.com/acs/terway:v1.8.13\",\n \"LatestFoundTime\": \"2020-10-24 08:38:49\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"i-node***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PProcessName\": \"socat\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessName\": \"dash\",\n \"ProcessPath\": \"/usr/bin/dash\",\n \"PublicIP\": \"10.0.1.92\",\n \"Remark\": \"myremark***\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\",\n \"Status\": \"EVENT_UNDEAL\"\n },\n {\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"b15e610a7f62b5873902923dfeee2d3ab642f76bd7f1777b3f628158c5b39586\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"policy\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"policy1\",\n \"DstAddress\": \"100.127.196.56:10556\",\n \"EventCount\": 1,\n \"EventId\": \"5067003\",\n \"FoundTime\": \"2020-10-24 08:03:10\",\n \"HostID\": \"fc472648-37ed-4946-a4c9-d72c75e162c4\",\n \"HostIP\": \"10.144.49.213\",\n \"ImageId\": \"sha256:41481aae5e2d135b2624fc09aa1875eb84c6472eaa0929f6d827699e67edd041\",\n \"ImageName\": \"registry\",\n \"LatestFoundTime\": \"2020-10-24 08:03:10\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"i-node***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PProcessName\": \"socat\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessName\": \"dash\",\n \"ProcessPath\": \"/usr/bin/dash\",\n \"PublicIP\": \"10.0.1.92\",\n \"Remark\": \"myremark***\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"c73a7252-0f68-4203-8b18-52037ab5efd1\",\n \"TotalCount\": 253\n }\n}",
1756
1734
  "title": "运行时反弹shell列表"
1757
1735
  }
1758
1736
  ],
@@ -1760,7 +1738,7 @@
1760
1738
  {
1761
1739
  "document": "",
1762
1740
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellEventsExport\n&<公共请求参数>",
1763
- "output": "{\n \"Response\": {\n \"DownloadUrl\": \"\",\n \"JobId\": \"94b72f91-5827-4314-bc65-6b07c0d77a9c\",\n \"RequestId\": \"2f5665c4-6bf5-4d99-a3b5-ee16d5f9bae9\"\n }\n}",
1741
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"https://cwp-1258344***.cos.ap-guangzhou.myqcloud.com/file.txt\",\n \"JobId\": \"94b72f91-5827-4314-bc65-6b07c0d77a9c\",\n \"RequestId\": \"2f5665c4-6bf5-4d99-a3b5-ee16d5f9bae9\"\n }\n}",
1764
1742
  "title": "查询运行时反弹shell事件列表信息导出"
1765
1743
  }
1766
1744
  ],
@@ -1768,7 +1746,7 @@
1768
1746
  {
1769
1747
  "document": "",
1770
1748
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellWhiteListDetail\n&WhiteListId=3hg7edh873hf\n&<公共请求参数>",
1771
- "output": "{\n \"Response\": {\n \"RequestId\": \"6281f7822403e60601d1dba6\",\n \"WhiteListDetailInfo\": {\n \"ImageIds\": [\n \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\"\n ],\n \"ProcessName\": \"/bin/apitest\",\n \"DstIp\": \"1.1.1.1\",\n \"Id\": \"3hg7edh873hf\",\n \"DstPort\": \"1222\"\n }\n }\n}",
1749
+ "output": "{\n \"Response\": {\n \"RequestId\": \"6281f7822403e60601d1dba6\",\n \"WhiteListDetailInfo\": {\n \"ImageIds\": [\n \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5b*****\"\n ],\n \"ProcessName\": \"/bin/apitest\",\n \"DstIp\": \"1.1.1.1\",\n \"Id\": \"3hg7edh873hf\",\n \"DstPort\": \"1222\"\n }\n }\n}",
1772
1750
  "title": "运行时反弹shell白名单详细信息"
1773
1751
  }
1774
1752
  ],
@@ -1776,7 +1754,7 @@
1776
1754
  {
1777
1755
  "document": "",
1778
1756
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellWhiteLists\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1779
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"ImageIds\": [\n \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\"\n ],\n \"IsGlobal\": true,\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessName\": \"/bin/apitest\",\n \"DstIp\": \"1.1.1.1\",\n \"DstPort\": \"1222\",\n \"Id\": \"6281f7822403e60601d1dba6\",\n \"ImageCount\": 1\n }\n ]\n }\n}",
1757
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1021,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"ImageIds\": [\n \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f23*******\"\n ],\n \"IsGlobal\": true,\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessName\": \"/bin/apitest\",\n \"DstIp\": \"1.1.1.1\",\n \"DstPort\": \"1222\",\n \"Id\": \"6281f7822403e60601d1dba6\",\n \"ImageCount\": 1021\n }\n ]\n }\n}",
1780
1758
  "title": "运行时反弹shell白名单列表"
1781
1759
  }
1782
1760
  ],
@@ -1784,7 +1762,7 @@
1784
1762
  {
1785
1763
  "document": "查询恶意请求事件详情",
1786
1764
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDnsEventDetail\n<公共请求参数>\n\n{\n \"EventID\": \"1\"\n}",
1787
- "output": "{\n \"Response\": {\n \"Address\": \"www.iuyiyo.cc\",\n \"AncestorProcessParam\": \"/usr/bin/containerd-shim-runc-v2 -namespace moby -id b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5 -address /run/containerd/containerd.sock\",\n \"AncestorProcessPath\": \"/usr/bin/containerd-shim-runc-v2\",\n \"AncestorProcessStartUser\": \"\",\n \"AncestorProcessUserGroup\": \"0:0\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"\",\n \"ContainerStatus\": \"\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 1,\n \"EventID\": 306602,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FeatureLabel\": \"\",\n \"FoundTime\": \"2024-09-29 17:27:15\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:27:15\",\n \"MatchRuleType\": \"USER\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"OperationTime\": \"2024-09-29 17:27:17\",\n \"ParentProcessParam\": \"/bin/bash\",\n \"ParentProcessPath\": \"/usr/bin/bash\",\n \"ParentProcessStartUser\": \"\",\n \"ParentProcessUserGroup\": \"root:root\",\n \"PodIP\": \"\",\n \"PodName\": \"/\",\n \"PodStatus\": \"\",\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessMd5\": \"b8b1ce2ef81accb7febb8ab7f56c1576\",\n \"ProcessParam\": \"curl www.iuyiyo.cc\",\n \"ProcessPath\": \"/usr/bin/curl\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"curl(2206566)_bash(2178914)_containerd-shim-runc-v2(2178890)_systemd(1)\",\n \"ProcessUserGroup\": \"root:root\",\n \"PublicIP\": \"43.138.142.208\",\n \"Reference\": [\n \"暂无\"\n ],\n \"Remark\": \"\",\n \"RequestId\": \"52fe1ea9-4826-4f8e-bc8b-61faae09683b\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\",\n \"WorkloadType\": \"\"\n }\n}",
1765
+ "output": "{\n \"Response\": {\n \"Address\": \"www.iuyiyo.cc\",\n \"AncestorProcessParam\": \"/usr/bin/containerd-shim-runc-v2 -namespace moby -id b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5 -address /run/containerd/containerd.sock\",\n \"AncestorProcessPath\": \"/usr/bin/containerd-shim-runc-v2\",\n \"AncestorProcessStartUser\": \"root\",\n \"AncestorProcessUserGroup\": \"0:0\",\n \"City\": \"103\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 1,\n \"EventID\": 306602,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FeatureLabel\": \"label1\",\n \"FoundTime\": \"2024-09-29 17:27:15\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:27:15\",\n \"MatchRuleType\": \"USER\",\n \"Namespace\": \"tcss\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"10.0.200.0/24\",\n \"NodeSubNetID\": \"subnet-5gu2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"OperationTime\": \"2024-09-29 17:27:17\",\n \"ParentProcessParam\": \"/bin/bash\",\n \"ParentProcessPath\": \"/usr/bin/bash\",\n \"ParentProcessStartUser\": \"root\",\n \"ParentProcessUserGroup\": \"root:root\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"Running\",\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessMd5\": \"b8b1ce2ef81accb7febb8ab7f56c1576\",\n \"ProcessParam\": \"curl www.iuyiyo.cc\",\n \"ProcessPath\": \"/usr/bin/curl\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"curl(2206566)_bash(2178914)_containerd-shim-runc-v2(2178890)_systemd(1)\",\n \"ProcessUserGroup\": \"root:root\",\n \"PublicIP\": \"43.138.142.208\",\n \"Reference\": [\n \"Reference\"\n ],\n \"Remark\": \"myremark***\",\n \"RequestId\": \"52fe1ea9-4826-4f8e-bc8b-61faae09683b\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\",\n \"WorkloadType\": \"DaemonSet\"\n }\n}",
1788
1766
  "title": "查询恶意请求事件详情"
1789
1767
  }
1790
1768
  ],
@@ -1792,7 +1770,7 @@
1792
1770
  {
1793
1771
  "document": "查询恶意请求事件列表",
1794
1772
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDnsList\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
1795
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Address\": \"www.iuyiyo.cc\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 1,\n \"EventID\": 306602,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FoundTime\": \"2024-09-29 17:27:15\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:27:15\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"/\",\n \"PublicIP\": \"43.138.142.208\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\"\n },\n {\n \"Address\": \"www.baidu.com\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 3,\n \"EventID\": 306601,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FoundTime\": \"2024-09-29 17:15:41\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:19:18\",\n \"NodeID\": \"\",\n \"NodeName\": \"k8s-node1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"/\",\n \"PublicIP\": \"43.138.142.208\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\"\n }\n ],\n \"RequestId\": \"8edec175-6938-41a7-80e1-b685cc37154c\",\n \"TotalCount\": 2\n }\n}",
1773
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Address\": \"www.iuyiyo.cc\",\n \"City\": \"shenzhen\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 1,\n \"EventID\": 306602,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FoundTime\": \"2024-09-29 17:27:15\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.92\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:27:15\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"k8s-node1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"PodName\",\n \"PublicIP\": \"43.138.142.208\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\"\n },\n {\n \"Address\": \"www.baidu.com\",\n \"City\": \"beijing\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 3,\n \"EventID\": 306601,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FoundTime\": \"2024-09-29 17:15:41\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.92\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:19:18\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"k8s-node1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"PodName\",\n \"PublicIP\": \"43.138.142.208\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\"\n }\n ],\n \"RequestId\": \"8edec175-6938-41a7-80e1-b685cc37154c\",\n \"TotalCount\": 2\n }\n}",
1796
1774
  "title": "查询恶意请求事件列表"
1797
1775
  }
1798
1776
  ],
@@ -1800,7 +1778,7 @@
1800
1778
  {
1801
1779
  "document": "",
1802
1780
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-0zmsjvko\",\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1803
- "output": "{\n \"Response\": {\n \"RequestId\": \"ada3da6c-7aa9-48a7-9bdd-c9ae192fef65\",\n \"TotalCount\": 18,\n \"ClusterRiskItems\": [\n {\n \"CheckItem\": {\n \"CheckItemId\": 2,\n \"Name\": \"Apache containerd 安全漏洞\",\n \"ItemDetail\": \"containerd是美国阿帕奇(Apache)基金会的一个容器守护进程。该进程根据RunCOCI规范负责控制宿主机上容器的完整周期。containerd1.3.9之前版本和1.4.3版本存在安全漏洞,该漏洞源于containerd-shimAPI被不正确地公开给主机网络容器。shimsAPI套接字的访问控制验证了连接进程的有效UID为0,但是没有限制对抽象Unix域套接字的访问。这将允许在与shim相同的网络名称空间中运行的恶意容器,其有效UID为0,但在其他方面减少了特权,从而导致使用elevat运行新进程。\",\n \"RiskLevel\": \"Middle\",\n \"RiskTarget\": \"Containerd\",\n \"RiskType\": \"CVERisk\",\n \"RiskAttribute\": \"PrivilegePromotion\",\n \"RiskProperty\": \"ExistPOC ExistEXP ServerRestart\",\n \"CVENumber\": \"CVE-2020-15257\",\n \"DiscoverTime\": \"2020-12-01 11:15:00\",\n \"Solution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad\",\n \"CVSS\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N\",\n \"CVSSScore\": \"5.2\",\n \"RelateLink\": \"https://\",\n \"AffectedType\": \"Node\",\n \"AffectedVersion\": \"\",\n \"IgnoredAssetNum\": 0,\n \"IsIgnored\": true,\n \"RiskAssessment\": \"test\"\n },\n \"VerifyInfo\": \"\",\n \"ErrorMessage\": \"\",\n \"AffectedClusterCount\": 1,\n \"AffectedNodeCount\": 2\n }\n ]\n }\n}",
1781
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ada3da6c-7aa9-48a7-9bdd-c9ae192fef65\",\n \"TotalCount\": 18,\n \"ClusterRiskItems\": [\n {\n \"CheckItem\": {\n \"CheckItemId\": 2,\n \"Name\": \"Apache containerd 安全漏洞\",\n \"ItemDetail\": \"containerd是美国阿帕奇(Apache)基金会的一个容器守护进程。该进程根据RunCOCI规范负责控制宿主机上容器的完整周期。containerd1.3.9之前版本和1.4.3版本存在安全漏洞,该漏洞源于containerd-shimAPI被不正确地公开给主机网络容器。shimsAPI套接字的访问控制验证了连接进程的有效UID为0,但是没有限制对抽象Unix域套接字的访问。这将允许在与shim相同的网络名称空间中运行的恶意容器,其有效UID为0,但在其他方面减少了特权,从而导致使用elevat运行新进程。\",\n \"RiskLevel\": \"Middle\",\n \"RiskTarget\": \"Containerd\",\n \"RiskType\": \"CVERisk\",\n \"RiskAttribute\": \"PrivilegePromotion\",\n \"RiskProperty\": \"ExistPOC ExistEXP ServerRestart\",\n \"CVENumber\": \"CVE-2020-15257\",\n \"DiscoverTime\": \"2020-12-01 11:15:00\",\n \"Solution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad\",\n \"CVSS\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N\",\n \"CVSSScore\": \"5.2\",\n \"RelateLink\": \"https://\",\n \"AffectedType\": \"Node\",\n \"AffectedVersion\": \"1.3\",\n \"IgnoredAssetNum\": 0,\n \"IsIgnored\": true,\n \"RiskAssessment\": \"RiskAssessment\"\n },\n \"VerifyInfo\": \"VerifyInfo\",\n \"ErrorMessage\": \"ErrorMessage\",\n \"AffectedClusterCount\": 1,\n \"AffectedNodeCount\": 2\n }\n ]\n }\n}",
1804
1782
  "title": "查询集群风险项列表示例"
1805
1783
  }
1806
1784
  ],
@@ -1808,7 +1786,7 @@
1808
1786
  {
1809
1787
  "document": "运行时高危系统调用事件详细信息",
1810
1788
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskSyscallDetail\n<公共请求参数>\n\n{\n \"EventId\": \"ad134-cdadfa\"\n}",
1811
- "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"containerd --config /var/run/docker/containerd/containerd.toml --log-level warn\",\n \"ProcessPath\": \"/usr/bin/containerd\",\n \"ProcessStartUser\": \"0\",\n \"ProcessUserGroup\": \"0\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"175.178.113.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"11141114111402dedad4deccf17c7b307dbd6b47d31114111411141324\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/k8s_xenon_mysql-tce-cwp-mysql-2_sso_c9fdfba4-e31a-46bc-a43a-111411141114_0\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 130,\n \"EventId\": \"5124493\",\n \"EventName\": \"高危系统调用\",\n \"EventType\": \"RISK_SYSCALL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-23 00:05:17\",\n \"HostID\": \"11141114-66fd-4171-93eb-2f4fc36ef1e1\",\n \"HostIP\": \"10.0.0.105\",\n \"ImageId\": \"sha256:11141114e95dce36e8455cf657e1e54d74bb8fac6111411141114\",\n \"ImageName\": \"registry.tce.com/service-vendors/mysql-xenon:8.0.32-20240524-155426-11141114.rhel.amd64\",\n \"LatestFoundTime\": \"2024-10-23 17:02:47\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeName\": \"tcs-10-0-0-105\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"--\",\n \"PodStatus\": \"\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"\"\n },\n \"EventDetail\": {\n \"Description\": \"sergid会导致运行进程的账号权限变更,可能带来安全风险\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"\",\n \"Solution\": \"使用存在潜在风险的系统调用,可能导致容器逃逸。建议对于不常用的系统调用,禁止容器使用,并及时更新宿主机的系统漏洞\",\n \"SyscallName\": \"\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 330852,\n \"ProcessName\": \"containerd-shim\",\n \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\",\n \"ProcessPath\": \"/usr/bin/containerd-shim\",\n \"ProcessStartUser\": \"\",\n \"ProcessUserGroup\": \"\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2907621,\n \"ProcessMd5\": \"\",\n \"ProcessName\": \"xenoncli\",\n \"ProcessParam\": \"xenoncli xenon ping\",\n \"ProcessPath\": \"/usr/local/bin/xenoncli\",\n \"ProcessStartUser\": \"\",\n \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"d1dd6ed1-0424-4dc8-a3e1-6e6b17fed637\"\n }\n}",
1789
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"containerd --config /var/run/docker/containerd/containerd.toml --log-level warn\",\n \"ProcessPath\": \"/usr/bin/containerd\",\n \"ProcessStartUser\": \"0\",\n \"ProcessUserGroup\": \"0\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"175.178.113.111\",\n \"ClusterID\": \"cls-demo1\",\n \"ClusterName\": \"web-demo\",\n \"ContainerId\": \"75D3326A-9B9C-4275-895A-16FDA1*****\",\n \"ContainerIsolateOperationSrc\": \"ContainerIsolateOperationSrc\",\n \"ContainerName\": \"/k8s_xenon_mysql-tce-cwp-mysql-2_sso_c9fdfba4-e31a-46bc-a43a-****\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 130,\n \"EventId\": \"5124493\",\n \"EventName\": \"高危系统调用\",\n \"EventType\": \"RISK_SYSCALL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-23 00:05:17\",\n \"HostID\": \"11141114-66fd-4171-93eb-2f4fc36ef1e1\",\n \"HostIP\": \"10.0.0.105\",\n \"ImageId\": \"sha256:11141114e95dce36e8455cf657e1e54d74bb8fac6111411141114\",\n \"ImageName\": \"registry.tce.com/service-vendors/mysql-xenon:8.0.32-20240524-155426-11141114.rhel.amd64\",\n \"LatestFoundTime\": \"2024-10-23 17:02:47\",\n \"Namespace\": \"default\",\n \"NodeID\": \"pod-dj4xjf***\",\n \"NodeName\": \"tcs-10-0-0-105\",\n \"NodeSubNetCIDR\": \"fe80::8132:1b51:5********\",\n \"NodeSubNetID\": \"subnet-dfj4***\",\n \"NodeSubNetName\": \"default\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"node-4jfjfgdnvnd****\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demonset\",\n \"PodStatus\": \"running\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"StatefulSet\"\n },\n \"EventDetail\": {\n \"Description\": \"sergid会导致运行进程的账号权限变更,可能带来安全风险\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"user config\",\n \"Solution\": \"使用存在潜在风险的系统调用,可能导致容器逃逸。建议对于不常用的系统调用,禁止容器使用,并及时更新宿主机的系统漏洞\",\n \"SyscallName\": \"chroot\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 330852,\n \"ProcessName\": \"containerd-shim\",\n \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\",\n \"ProcessPath\": \"/usr/bin/containerd-shim\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2907621,\n \"ProcessMd5\": \"8a5772dee965c8223aebc1225e*****\",\n \"ProcessName\": \"xenoncli\",\n \"ProcessParam\": \"xenoncli xenon ping\",\n \"ProcessPath\": \"/usr/local/bin/xenoncli\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"d1dd6ed1-0424-4dc8-a3e1-*******\"\n }\n}",
1812
1790
  "title": "运行时高危系统调用事件详细信息"
1813
1791
  }
1814
1792
  ],
@@ -1816,7 +1794,7 @@
1816
1794
  {
1817
1795
  "document": "运行时高危系统调用接口",
1818
1796
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskSyscallEvents\n<公共请求参数>\n\n{}",
1819
- "output": "{\n \"Response\": {\n \"EventSet\": [],\n \"RequestId\": \"48d997cd-353a-4457-929f-dc9183161462\",\n \"TotalCount\": 0\n }\n}",
1797
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ProcessName\": \"bash\",\n \"ProcessPath\": \"/home/work/\",\n \"ImageId\": \"81abdbc1427b1983b63a2e7bf48ab156a9a22\",\n \"ContainerId\": \"81abdbc1427b1983b63a2e7bf48ab156a9a22\",\n \"ImageName\": \"镜像名\",\n \"ContainerName\": \"/condescending_allen\",\n \"FoundTime\": \"2020-2-2 13:00:00\",\n \"Solution\": \"解决方案\",\n \"Description\": \"事件描述\",\n \"SyscallName\": \"chroot\",\n \"Status\": \"EVENT_UNDEAL\",\n \"EventId\": \"1\",\n \"NodeName\": \"VM-0-13-centos\",\n \"PodName\": \"pod-name\",\n \"Remark\": \"Remark\",\n \"RuleExist\": true,\n \"EventCount\": 1,\n \"LatestFoundTime\": \"2020-2-2 13:00:00\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerIsolateOperationSrc\": \"RiskSyscall\",\n \"ContainerStatus\": \"RUNNING\",\n \"NodeType\": \"NORMAL\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"PodIP\": \"10.0.1****\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8****\",\n \"PublicIP\": \"10.0.1****\",\n \"NodeID\": \"node-ins1a\",\n \"HostID\": \"27253917-572f-4eb5-9a55-99cc3a7a****\",\n \"HostIP\": \"10.4.4****\",\n \"ClusterName\": \"clsfoo***\"\n }\n ],\n \"RequestId\": \"48d997cd-353a-4457-929f-dc9183161462\",\n \"TotalCount\": 0\n }\n}",
1820
1798
  "title": "运行时高危系统调用接口"
1821
1799
  }
1822
1800
  ],
@@ -1824,7 +1802,7 @@
1824
1802
  {
1825
1803
  "document": "",
1826
1804
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallEventsExport\n&ExportField.0=filed_name\n&<公共请求参数>",
1827
- "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"DownloadUrl\": \"\",\n \"JobId\": \"10001\"\n }\n}",
1805
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"DownloadUrl\": \"https://cwp-1258344***.cos.ap-guangzhou.myqcloud.com/file.txt\",\n \"JobId\": \"10001\"\n }\n}",
1828
1806
  "title": "查询运行时异常进程事件列表信息导出"
1829
1807
  }
1830
1808
  ],
@@ -1839,8 +1817,8 @@
1839
1817
  "DescribeRiskSyscallWhiteListDetail": [
1840
1818
  {
1841
1819
  "document": "",
1842
- "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallWhiteListDetail\n&WhiteListId=45645\n&<公共请求参数>",
1843
- "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"WhiteListDetailInfo\": {\n \"SyscallNames\": [\n \"chroot\"\n ],\n \"ImageIds\": [\n \"image-id\"\n ],\n \"Id\": \"10001\",\n \"ProcessPath\": \"/bin/sh\"\n }\n }\n}",
1820
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallWhiteListDetail\n&WhiteListId=1002\n&<公共请求参数>",
1821
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"WhiteListDetailInfo\": {\n \"SyscallNames\": [\n \"chroot\"\n ],\n \"ImageIds\": [\n \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\"\n ],\n \"Id\": \"10001\",\n \"ProcessPath\": \"/bin/sh\"\n }\n }\n}",
1844
1822
  "title": "运行时高危系统调用白名单详细信息"
1845
1823
  }
1846
1824
  ],
@@ -1848,7 +1826,7 @@
1848
1826
  {
1849
1827
  "document": "",
1850
1828
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallWhiteLists\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1851
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"SyscallNames\": [\n \"chroot\",\n \"kill\"\n ],\n \"ImageIds\": [\n \"image-id\"\n ],\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessPath\": \"/usr/bin/sh\",\n \"Id\": \"10001\",\n \"ImageCount\": 1,\n \"IsGlobal\": true\n }\n ]\n }\n}",
1829
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1021,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"SyscallNames\": [\n \"chroot\",\n \"kill\"\n ],\n \"ImageIds\": [\n \"image-id\"\n ],\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessPath\": \"/usr/bin/sh\",\n \"Id\": \"10001\",\n \"ImageCount\": 1021,\n \"IsGlobal\": true\n }\n ]\n }\n}",
1852
1830
  "title": "运行时高危系统调用白名单列表"
1853
1831
  }
1854
1832
  ],
@@ -1864,7 +1842,7 @@
1864
1842
  {
1865
1843
  "document": "",
1866
1844
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSearchExportList\n<公共请求参数>\n\n{\n \"Query\": \"{\\\"index\\\":[\\\"netflow\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1597075200000,\\\"lte\\\":1597161599999}}},\\\"must\\\":[],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\"\n}",
1867
- "output": "{\n \"Response\": {\n \"JobId\": \"1223\",\n \"RequestId\": \"e4ee7f6c-a036-43e7-b98f-96f174827fea\"\n }\n}",
1845
+ "output": "{\n \"Response\": {\n \"JobId\": \"356125\",\n \"RequestId\": \"e4ee7f6c-a036-43e7-b98f-96f174827fea\"\n }\n}",
1868
1846
  "title": "导出ES查询文档列表"
1869
1847
  }
1870
1848
  ],
@@ -1872,7 +1850,7 @@
1872
1850
  {
1873
1851
  "document": "",
1874
1852
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSearchLogs\n<公共请求参数>\n\n{}",
1875
- "output": "{\n \"Response\": {\n \"Data\": [\n \"test\",\n \"test2\",\n \"test3\"\n ],\n \"RequestId\": \"498e4cab-e95d-430b-bc4c-f5821bb278d4\"\n }\n}",
1853
+ "output": "{\n \"Response\": {\n \"Data\": [\n \"\\\"exec_start: bash -ec mysqladmin p****\",\n \"test2\",\n \"test3\"\n ],\n \"RequestId\": \"498e4cab-e95d-430b-bc4c-f5821bb278d4\"\n }\n}",
1876
1854
  "title": "获取历史搜索记录"
1877
1855
  }
1878
1856
  ],
@@ -1880,7 +1858,7 @@
1880
1858
  {
1881
1859
  "document": "",
1882
1860
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSearchTemplates\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10\n}",
1883
- "output": "{\n \"Response\": {\n \"TotalCount\": 2,\n \"List\": [\n {\n \"Id\": 17,\n \"Name\": \"kbtest\",\n \"LogType\": \"malware\",\n \"Condition\": \"src_ip 匹配字符: 193.27.228.98\",\n \"TimeRange\": \"2020-07-31 00:00:00 至 2020-07-31 23:59:59\",\n \"Query\": \"{\\\"index\\\":[\\\"malware\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1596124800000,\\\"lte\\\":1596211199999}}},\\\"must\\\":[{\\\"term\\\":{\\\"src_ip\\\":\\\"193.27.228.98\\\"}}],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"aggs\\\":{\\\"count_stats\\\":{\\\"date_histogram\\\":{\\\"field\\\":\\\"timestamp\\\",\\\"interval\\\":\\\"30m\\\",\\\"time_zone\\\":\\\"Asia/Shanghai\\\",\\\"min_doc_count\\\":1}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\",\n \"Flag\": \"simple\",\n \"DisplayData\": \"[{\\\"id\\\":14401398135,\\\"patternsField\\\":\\\"src_ip\\\",\\\"selectedtype\\\":\\\"is\\\",\\\"selectedOptionsMap\\\":{\\\"is\\\":\\\"匹配字符\\\",\\\"like\\\":\\\"模糊匹配字符\\\",\\\"not\\\":\\\"不包含字符\\\",\\\"is_one_of\\\":\\\"匹配以下任意字符\\\",\\\"not_one_of\\\":\\\"不包含以下任意字符\\\"},\\\"selectedTypeList\\\":[\\\"is\\\",\\\"like\\\",\\\"not\\\",\\\"is_one_of\\\",\\\"not_one_of\\\"],\\\"third_cat\\\":\\\"input\\\",\\\"value\\\":\\\"193.27.228.98\\\"}]\"\n },\n {\n \"Id\": 13,\n \"Name\": \"test\",\n \"LogType\": \"malware\",\n \"Condition\": \"src_ip 匹配字符: 10.0.0.1\",\n \"TimeRange\": \"2020-06-13 00:00:00 至 2020-07-13 23:59:59\",\n \"Query\": \"{\\\"index\\\":[\\\"malware\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1591977600000,\\\"lte\\\":1594655999999}}},\\\"must\\\":[{\\\"term\\\":{\\\"src_ip\\\":\\\"10.0.0.1\\\"}}],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"aggs\\\":{\\\"count_stats\\\":{\\\"date_histogram\\\":{\\\"field\\\":\\\"timestamp\\\",\\\"interval\\\":\\\"12h\\\",\\\"time_zone\\\":\\\"Asia/Shanghai\\\",\\\"min_doc_count\\\":1}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\",\n \"Flag\": \"simple\",\n \"DisplayData\": \"[{\\\"id\\\":449375484687,\\\"patternsField\\\":\\\"src_ip\\\",\\\"selectedtype\\\":\\\"is\\\",\\\"selectedOptionsMap\\\":{\\\"is\\\":\\\"匹配字符\\\",\\\"like\\\":\\\"模糊匹配字符\\\",\\\"not\\\":\\\"不包含字符\\\",\\\"is_one_of\\\":\\\"匹配以下任意字符\\\",\\\"not_one_of\\\":\\\"不包含以下任意字符\\\"},\\\"selectedTypeList\\\":[\\\"is\\\",\\\"like\\\",\\\"not\\\",\\\"is_one_of\\\",\\\"not_one_of\\\"],\\\"third_cat\\\":\\\"input\\\",\\\"value\\\":\\\"10.0.0.1\\\"}]\"\n }\n ],\n \"RequestId\": \"252ab6a8-3d45-414d-a31e-fb668e99864c\"\n }\n}",
1861
+ "output": "{\n \"Response\": {\n \"TotalCount\": 2,\n \"List\": [\n {\n \"Id\": 17,\n \"Name\": \"Name\",\n \"LogType\": \"malware\",\n \"Condition\": \"src_ip 匹配字符: 193.27.228.98\",\n \"TimeRange\": \"2020-07-31 00:00:00 至 2020-07-31 23:59:59\",\n \"Query\": \"{\\\"index\\\":[\\\"malware\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1596124800000,\\\"lte\\\":1596211199999}}},\\\"must\\\":[{\\\"term\\\":{\\\"src_ip\\\":\\\"193.27.228.98\\\"}}],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"aggs\\\":{\\\"count_stats\\\":{\\\"date_histogram\\\":{\\\"field\\\":\\\"timestamp\\\",\\\"interval\\\":\\\"30m\\\",\\\"time_zone\\\":\\\"Asia/Shanghai\\\",\\\"min_doc_count\\\":1}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\",\n \"Flag\": \"simple\",\n \"DisplayData\": \"[{\\\"id\\\":14401398135,\\\"patternsField\\\":\\\"src_ip\\\",\\\"selectedtype\\\":\\\"is\\\",\\\"selectedOptionsMap\\\":{\\\"is\\\":\\\"匹配字符\\\",\\\"like\\\":\\\"模糊匹配字符\\\",\\\"not\\\":\\\"不包含字符\\\",\\\"is_one_of\\\":\\\"匹配以下任意字符\\\",\\\"not_one_of\\\":\\\"不包含以下任意字符\\\"},\\\"selectedTypeList\\\":[\\\"is\\\",\\\"like\\\",\\\"not\\\",\\\"is_one_of\\\",\\\"not_one_of\\\"],\\\"third_cat\\\":\\\"input\\\",\\\"value\\\":\\\"193.27.228.98\\\"}]\"\n },\n {\n \"Id\": 13,\n \"Name\": \"Name\",\n \"LogType\": \"malware\",\n \"Condition\": \"src_ip 匹配字符: 10.0.0.1\",\n \"TimeRange\": \"2020-06-13 00:00:00 至 2020-07-13 23:59:59\",\n \"Query\": \"{\\\"index\\\":[\\\"malware\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1591977600000,\\\"lte\\\":1594655999999}}},\\\"must\\\":[{\\\"term\\\":{\\\"src_ip\\\":\\\"10.0.0.1\\\"}}],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"aggs\\\":{\\\"count_stats\\\":{\\\"date_histogram\\\":{\\\"field\\\":\\\"timestamp\\\",\\\"interval\\\":\\\"12h\\\",\\\"time_zone\\\":\\\"Asia/Shanghai\\\",\\\"min_doc_count\\\":1}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\",\n \"Flag\": \"simple\",\n \"DisplayData\": \"[{\\\"id\\\":449375484687,\\\"patternsField\\\":\\\"src_ip\\\",\\\"selectedtype\\\":\\\"is\\\",\\\"selectedOptionsMap\\\":{\\\"is\\\":\\\"匹配字符\\\",\\\"like\\\":\\\"模糊匹配字符\\\",\\\"not\\\":\\\"不包含字符\\\",\\\"is_one_of\\\":\\\"匹配以下任意字符\\\",\\\"not_one_of\\\":\\\"不包含以下任意字符\\\"},\\\"selectedTypeList\\\":[\\\"is\\\",\\\"like\\\",\\\"not\\\",\\\"is_one_of\\\",\\\"not_one_of\\\"],\\\"third_cat\\\":\\\"input\\\",\\\"value\\\":\\\"10.0.0.1\\\"}]\"\n }\n ],\n \"RequestId\": \"252ab6a8-3d45-414d-a31e-fb668e99864c\"\n }\n}",
1884
1862
  "title": "获取快速检索列表"
1885
1863
  }
1886
1864
  ],
@@ -1911,7 +1889,7 @@
1911
1889
  "DescribeSecLogDeliveryClsOptions": [
1912
1890
  {
1913
1891
  "document": "",
1914
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryClsOptions\n<公共请求参数>\n\n{\n \"ClsRegion\": \"\"\n}",
1892
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryClsOptions\n<公共请求参数>\n\n{\n \"ClsRegion\": \"ap-bangkok\"\n}",
1915
1893
  "output": "{\n \"Response\": {\n \"LogSetList\": [],\n \"RegionList\": [\n {\n \"Region\": \"ap-bangkok\",\n \"RegionName\": \"亚太东南(曼谷)\"\n },\n {\n \"Region\": \"ap-beijing\",\n \"RegionName\": \"华北地区(北京)\"\n },\n {\n \"Region\": \"ap-chengdu\",\n \"RegionName\": \"西南地区(成都)\"\n }\n ],\n \"RequestId\": \"31c5ca59-2ed8-4b22-8ebf-6ba5003caea3\"\n }\n}",
1916
1894
  "title": "查询安全日志投递cls可选项"
1917
1895
  }
@@ -1920,7 +1898,7 @@
1920
1898
  {
1921
1899
  "document": "",
1922
1900
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryClsSetting\n<公共请求参数>\n\n{}",
1923
- "output": "{\n \"Response\": {\n \"LogTypeList\": [\n {\n \"LogSet\": \"\",\n \"LogSetName\": \"\",\n \"LogType\": \"container_bash\",\n \"Region\": \"\",\n \"State\": false,\n \"TopicID\": \"\",\n \"TopicName\": \"\"\n },\n {\n \"LogSet\": \"\",\n \"LogSetName\": \"\",\n \"LogType\": \"container_launch\",\n \"Region\": \"\",\n \"State\": false,\n \"TopicID\": \"\",\n \"TopicName\": \"\"\n },\n {\n \"LogSet\": \"\",\n \"LogSetName\": \"\",\n \"LogType\": \"k8s_api\",\n \"Region\": \"\",\n \"State\": false,\n \"TopicID\": \"\",\n \"TopicName\": \"\"\n }\n ],\n \"RequestId\": \"1279ad3b-a5aa-46ea-825d-3124cc19112a\"\n }\n}",
1901
+ "output": "{\n \"Response\": {\n \"LogTypeList\": [\n {\n \"LogSet\": \"846f4834-7f89-4e97-9c0a-e8623959****\",\n \"LogSetName\": \"tcss\",\n \"LogType\": \"container_bash\",\n \"Region\": \"ap-guangzhou\",\n \"State\": false,\n \"TopicID\": \"72ebf085-f7b7-4efb-961a-6ef37f07****\",\n \"TopicName\": \"tcss_log_****\"\n },\n {\n \"LogSet\": \"LogSet\",\n \"LogSetName\": \"cn\",\n \"LogType\": \"container_launch\",\n \"Region\": \"ap-guangzhou\",\n \"State\": false,\n \"TopicID\": \"TopicID\",\n \"TopicName\": \"TopicName\"\n },\n {\n \"LogSet\": \"LogSet\",\n \"LogSetName\": \"LogSetName\",\n \"LogType\": \"k8s_api\",\n \"Region\": \"ap-guangzhou\",\n \"State\": false,\n \"TopicID\": \"TopicID\",\n \"TopicName\": \"TopicName\"\n }\n ],\n \"RequestId\": \"1279ad3b-a5aa-46ea-825d-3124cc19112a\"\n }\n}",
1924
1902
  "title": "查询安全日志投递Cls配置"
1925
1903
  }
1926
1904
  ],
@@ -1936,7 +1914,7 @@
1936
1914
  {
1937
1915
  "document": "",
1938
1916
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryKafkaSetting\n<公共请求参数>\n\n{}",
1939
- "output": "{\n \"Response\": {\n \"InstanceID\": \"实例ID\",\n \"InstanceName\": \"实例名称\",\n \"Domain\": \"域名\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"主题ID\",\n \"TopicName\": \"主题名称\",\n \"State\": true\n }\n ],\n \"User\": \"test\",\n \"RegionID\": \"ap-beijing\",\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1917
+ "output": "{\n \"Response\": {\n \"InstanceID\": \"实例ID\",\n \"InstanceName\": \"实例名称\",\n \"Domain\": \"域名\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"主题ID\",\n \"TopicName\": \"主题名称\",\n \"State\": true\n }\n ],\n \"User\": \"user_10086\",\n \"RegionID\": \"ap-beijing\",\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1940
1918
  "title": "查询安全日志投递kafka配置"
1941
1919
  }
1942
1920
  ],
@@ -1944,7 +1922,7 @@
1944
1922
  {
1945
1923
  "document": "查询安全日志接入对象列表",
1946
1924
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogJoinObjectList\n<公共请求参数>\n\n{\n \"LogType\": \"container_bash\",\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"Status\",\n \"Values\": [\n \"ONLINE\",\n \"OFFLINE\",\n \"UNINSTALL\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
1947
- "output": "{\n \"Response\": {\n \"AutoJoin\": false,\n \"ExcludedCount\": 0,\n \"List\": [\n {\n \"ClusterID\": \"cls-q0bc0ed2\",\n \"ClusterMainAddress\": \"\",\n \"ClusterName\": \"tke2\",\n \"ClusterStatus\": \"\",\n \"ClusterType\": \"\",\n \"ClusterVersion\": \"v1.26.1-tke.5\",\n \"ContainerCnt\": 23,\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"HostIP\": \"172.17.1.6\",\n \"HostName\": \"tke_cls-q0bc0ed2_worker\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"159.75.90.217\"\n }\n ],\n \"RangeType\": 1,\n \"RequestId\": \"a38b89a7-fbdf-4133-9981-1c09a5a94895\",\n \"TotalCount\": 55\n }\n}",
1925
+ "output": "{\n \"Response\": {\n \"AutoJoin\": false,\n \"ExcludedCount\": 0,\n \"List\": [\n {\n \"ClusterID\": \"cls-q0bc0ed2\",\n \"ClusterMainAddress\": \"10.0.0.1\",\n \"ClusterName\": \"tke2\",\n \"ClusterStatus\": \"3\",\n \"ClusterType\": \"2\",\n \"ClusterVersion\": \"v1.26.1-tke.5\",\n \"ContainerCnt\": 23,\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"HostIP\": \"172.17.1.6\",\n \"HostName\": \"tke_cls-q0bc0ed2_worker\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"159.75.90.217\"\n }\n ],\n \"RangeType\": 1,\n \"RequestId\": \"a38b89a7-fbdf-4133-9981-1c09a5a94895\",\n \"TotalCount\": 55\n }\n}",
1948
1926
  "title": "查询安全日志接入对象列表"
1949
1927
  }
1950
1928
  ],
@@ -1952,7 +1930,7 @@
1952
1930
  {
1953
1931
  "document": "查询安全日志接入列表",
1954
1932
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogJoinTypeList\n<公共请求参数>\n\n{}",
1955
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Count\": 1,\n \"SuperNodeCount\": 1,\n \"IsJoined\": true,\n \"LogType\": \"local\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1933
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Count\": 1931,\n \"SuperNodeCount\": 21,\n \"IsJoined\": true,\n \"LogType\": \"container_bash\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1956
1934
  "title": "查询安全日志接入列表"
1957
1935
  }
1958
1936
  ],
@@ -1992,7 +1970,7 @@
1992
1970
  {
1993
1971
  "document": "",
1994
1972
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSystemVulList\n<公共请求参数>\n\n{\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
1995
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2023-3341\",\n \"CVSSV3Score\": 7.5,\n \"Category\": \"OUT_OF_BOUNDS_WRITE\",\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"\",\n \"DefenceStatus\": \"\",\n \"DefendedCount\": 0,\n \"FoundTime\": \"2024-08-10 04:34:55\",\n \"ID\": 173268083,\n \"LatestFoundTime\": \"2024-10-18 23:30:37\",\n \"Level\": \"HIGH\",\n \"LocalImageCount\": 2,\n \"Name\": \"ISC BIND 缓冲区错误漏洞\",\n \"PocID\": \"pcmgr-444379\",\n \"RegistryImageCount\": 12,\n \"Tags\": [\n \"NETWORK\"\n ]\n }\n ],\n \"RequestId\": \"5dfca22b-e7b5-408e-b3bf-a930818c5952\",\n \"TotalCount\": 836\n }\n}",
1973
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2023-3341\",\n \"CVSSV3Score\": 7.5,\n \"Category\": \"OUT_OF_BOUNDS_WRITE\",\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"ALL\",\n \"DefenceStatus\": \"DEFENDED\",\n \"DefendedCount\": 0,\n \"FoundTime\": \"2024-08-10 04:34:55\",\n \"ID\": 173268083,\n \"LatestFoundTime\": \"2024-10-18 23:30:37\",\n \"Level\": \"HIGH\",\n \"LocalImageCount\": 2,\n \"Name\": \"ISC BIND 缓冲区错误漏洞\",\n \"PocID\": \"pcmgr-444379\",\n \"RegistryImageCount\": 12,\n \"Tags\": [\n \"NETWORK\"\n ]\n }\n ],\n \"RequestId\": \"5dfca22b-e7b5-408e-b3bf-a930818c5952\",\n \"TotalCount\": 836\n }\n}",
1996
1974
  "title": "查询系统漏洞列表"
1997
1975
  }
1998
1976
  ],
@@ -2008,7 +1986,7 @@
2008
1986
  {
2009
1987
  "document": "",
2010
1988
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeTcssSummary\n<公共请求参数>\n\n{}",
2011
- "output": "{\n \"Response\": {\n \"RiskLocalImageCnt\": 1,\n \"RiskRepositoryImageCnt\": 1,\n \"RuntimeUnhandleEventCnt\": 1,\n \"RiskBaseLineCnt\": 1,\n \"ScannedImageCnt\": 1,\n \"RiskVulCnt\": 1,\n \"RiskContainerCnt\": 1,\n \"ImageCnt\": 1,\n \"ContainerCnt\": 1,\n \"UnScannedVulCnt\": 1,\n \"UnScannedBaseLineCnt\": 1,\n \"RiskClusterCnt\": 1,\n \"ClusterCnt\": 1,\n \"UnScannedImageCnt\": 1,\n \"LocalImageCnt\": 1,\n \"RepositoryImageCnt\": 1,\n \"UnScannedClusterCnt\": 1,\n \"ScanImageStatus\": true,\n \"ScanClusterStatus\": true,\n \"ScanBaseLineStatus\": true,\n \"ScanVulStatus\": true,\n \"VulRiskImageCnt\": 10,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1989
+ "output": "{\n \"Response\": {\n \"RiskLocalImageCnt\": 21,\n \"RiskRepositoryImageCnt\": 12,\n \"RuntimeUnhandleEventCnt\": 51,\n \"RiskBaseLineCnt\": 151,\n \"ScannedImageCnt\": 41,\n \"RiskVulCnt\": 16,\n \"RiskContainerCnt\": 81,\n \"ImageCnt\": 12,\n \"ContainerCnt\": 71,\n \"UnScannedVulCnt\": 81,\n \"UnScannedBaseLineCnt\": 98,\n \"RiskClusterCnt\": 2,\n \"ClusterCnt\": 60,\n \"UnScannedImageCnt\": 20,\n \"LocalImageCnt\": 14,\n \"RepositoryImageCnt\": 12,\n \"UnScannedClusterCnt\": 21,\n \"ScanImageStatus\": true,\n \"ScanClusterStatus\": true,\n \"ScanBaseLineStatus\": true,\n \"ScanVulStatus\": true,\n \"VulRiskImageCnt\": 10,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2012
1990
  "title": "查询容器安全概览信息"
2013
1991
  }
2014
1992
  ],
@@ -2032,7 +2010,7 @@
2032
2010
  {
2033
2011
  "document": "查询用户集群列表",
2034
2012
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUserCluster\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
2035
- "output": "{\n \"Response\": {\n \"ClusterInfoList\": [\n {\n \"AccessedStatus\": \"AccessedPartialDefence\",\n \"AccessedSubStatus\": \"AccessedSubNone\",\n \"ChargeCoresCnt\": 4000,\n \"CheckFailReason\": \"SUCCESS\",\n \"CheckStatus\": \"HasRisk\",\n \"ClusterAuditFailedInfo\": \"\",\n \"ClusterAuditStatus\": \"Opened\",\n \"ClusterAutoCheck\": false,\n \"ClusterCheckMode\": \"\",\n \"ClusterId\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterNodeNum\": 4,\n \"ClusterOs\": \"\",\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterSubStatus\": \"\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ClusterVersion\": \"1.28.3\",\n \"CoresCnt\": 12000,\n \"DefenderErrorReason\": \"\",\n \"DefenderStatus\": \"UnDefended\",\n \"HighRiskCount\": 6,\n \"HintRiskCount\": 3,\n \"MasterAddresses\": [\n \"10.0.0.11;10.0.0.14;10.0.0.4;\"\n ],\n \"MiddleRiskCount\": 7,\n \"NodeCount\": 4,\n \"OffLineNodeCount\": 0,\n \"Region\": \"ap-guangzhou\",\n \"SeriousRiskCount\": 1,\n \"TaskCreateTime\": \"2024-10-30 14:41:25\",\n \"UnInstallAgentNodeCount\": 1,\n \"UnreadyNodeNum\": 3\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TotalCount\": 7\n }\n}",
2013
+ "output": "{\n \"Response\": {\n \"ClusterInfoList\": [\n {\n \"AccessedStatus\": \"AccessedPartialDefence\",\n \"AccessedSubStatus\": \"AccessedSubNone\",\n \"ChargeCoresCnt\": 4000,\n \"CheckFailReason\": \"SUCCESS\",\n \"CheckStatus\": \"HasRisk\",\n \"ClusterAuditFailedInfo\": \"ClusterAuditFailedInfo\",\n \"ClusterAuditStatus\": \"Opened\",\n \"ClusterAutoCheck\": false,\n \"ClusterCheckMode\": \"ClusterCheckMode\",\n \"ClusterId\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterNodeNum\": 4,\n \"ClusterOs\": \"centos\",\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterSubStatus\": \"3\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ClusterVersion\": \"1.28.3\",\n \"CoresCnt\": 12000,\n \"DefenderErrorReason\": \"DefenderErrorReason\",\n \"DefenderStatus\": \"UnDefended\",\n \"HighRiskCount\": 6,\n \"HintRiskCount\": 3,\n \"MasterAddresses\": [\n \"10.0.0.11;10.0.0.14;10.0.0.4;\"\n ],\n \"MiddleRiskCount\": 7,\n \"NodeCount\": 4,\n \"OffLineNodeCount\": 0,\n \"Region\": \"ap-guangzhou\",\n \"SeriousRiskCount\": 1,\n \"TaskCreateTime\": \"2024-10-30 14:41:25\",\n \"UnInstallAgentNodeCount\": 1,\n \"UnreadyNodeNum\": 3\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TotalCount\": 7\n }\n}",
2036
2014
  "title": "查询用户集群列表"
2037
2015
  }
2038
2016
  ],
@@ -2040,7 +2018,7 @@
2040
2018
  {
2041
2019
  "document": "",
2042
2020
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUserPodList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-ane0zamq\",\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
2043
- "output": "{\n \"Response\": {\n \"PodList\": [\n {\n \"Age\": \"303h45m31.069895614s\",\n \"CPU\": 0,\n \"ChargeCoresCnt\": 0,\n \"ClusterId\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ContainerCount\": 0,\n \"ContainerId\": \"\",\n \"ContainerName\": \"\",\n \"HostId\": \"ins-qj24hgj0\",\n \"HostName\": \"\",\n \"Labels\": \"\",\n \"Memory\": 0,\n \"Namespace\": \"default\",\n \"NodeLanIP\": \"10.0.0.14\",\n \"NodeName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"PodIP\": \"192.168.0.172\",\n \"PodName\": \"tiefighter\",\n \"Region\": \"ap-guangzhou\",\n \"Restarts\": 0,\n \"ServiceCount\": 0,\n \"ServiceName\": \"\",\n \"StartTime\": \"2024-10-17 23:03:42\",\n \"Status\": \"Running\",\n \"WorkloadKind\": \"\",\n \"WorkloadLabels\": \"\",\n \"WorkloadName\": \"\"\n }\n ],\n \"RequestId\": \"1d32a744-4f31-4a6b-8574-7919f034f317\",\n \"TotalCount\": 54\n }\n}",
2021
+ "output": "{\n \"Response\": {\n \"PodList\": [\n {\n \"Age\": \"303h45m31.069895614s\",\n \"CPU\": 0,\n \"ChargeCoresCnt\": 0,\n \"ClusterId\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ContainerCount\": 0,\n \"ContainerId\": \"ContainerId\",\n \"ContainerName\": \"ContainerName\",\n \"HostId\": \"ins-qj24hgj0\",\n \"HostName\": \"hn***\",\n \"Labels\": \"3\",\n \"Memory\": 0,\n \"Namespace\": \"default\",\n \"NodeLanIP\": \"10.0.0.14\",\n \"NodeName\": \"i-node***\",\n \"NodeType\": \"NORMAL\",\n \"PodIP\": \"192.168.0.172\",\n \"PodName\": \"tiefighter\",\n \"Region\": \"ap-guangzhou\",\n \"Restarts\": 0,\n \"ServiceCount\": 0,\n \"ServiceName\": \"ServiceName\",\n \"StartTime\": \"2024-10-17 23:03:42\",\n \"Status\": \"Running\",\n \"WorkloadKind\": \"Replic****\",\n \"WorkloadLabels\": \"WorkloadLabels\",\n \"WorkloadName\": \"ka-waybill-router-f877d****\"\n }\n ],\n \"RequestId\": \"1d32a744-4f31-4a6b-8574-7919f034f317\",\n \"TotalCount\": 54\n }\n}",
2044
2022
  "title": "查询集群的Pod列表"
2045
2023
  }
2046
2024
  ],
@@ -2056,7 +2034,7 @@
2056
2034
  {
2057
2035
  "document": "",
2058
2036
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSampleDetail\n<公共请求参数>\n\n{\n \"MD5\": \"dskaldjskld\"\n}",
2059
- "output": "{\n \"Response\": {\n \"HarmDescribe\": \"发现容器上存在恶意木马,您的容器可能已经失陷。\\n恶意木马通常会执行挖矿、文件删除、信息窃取和网络攻击等恶意行为。\",\n \"KillEngine\": [],\n \"MD5\": \"5b98800688cae1533ff965ab31baeab1\",\n \"ReferenceLink\": \"\",\n \"RequestId\": \"a8304c25-f23b-4638-b994-7bb0ba4c5156\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 52,\n \"SuggestScheme\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [],\n \"VirusName\": \"Bk.YDWebShell.Php.Small.11100534\"\n }\n}",
2037
+ "output": "{\n \"Response\": {\n \"HarmDescribe\": \"发现容器上存在恶意木马,您的容器可能已经失陷。\\n恶意木马通常会执行挖矿、文件删除、信息窃取和网络攻击等恶意行为。\",\n \"KillEngine\": [],\n \"MD5\": \"5b98800688cae1533ff965ab31baeab1\",\n \"ReferenceLink\": \"https://cloud.tencent.com/document/product/296/9605\",\n \"RequestId\": \"a8304c25-f23b-4638-b994-7bb0ba4c5156\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 52,\n \"SuggestScheme\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [],\n \"VirusName\": \"Bk.YDWebShell.Php.Small.11100534\"\n }\n}",
2060
2038
  "title": "查询木马自动隔离样本详情"
2061
2039
  }
2062
2040
  ],
@@ -2064,7 +2042,7 @@
2064
2042
  {
2065
2043
  "document": "",
2066
2044
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSampleDownloadURL\n<公共请求参数>\n\n{\n \"MD5\": \"dskaldjskld\"\n}",
2067
- "output": "{\n \"Response\": {\n \"FileUrl\": \"\",\n \"RequestId\": \"56726fc5-1a50-46ba-ba2a-eb5f7aff4cd3\"\n }\n}",
2045
+ "output": "{\n \"Response\": {\n \"FileUrl\": \"https://malware-1258344699.cos.ap-guangzhou.myqcloud.com/samples%2F5b98800688cae1533ff965ab31baeab1?q-sign-algorithm=sha1&q-ak=AKID******&q-sign-time=1730427587%3B1730431187&q-key-time=1730427587%3B1730431187&q-header-list=host&q-url-param-list=&q-signature=2aed00b5e98f66d0aeb833036362f98c17c51bd0\",\n \"RequestId\": \"56726fc5-1a50-46ba-ba2a-eb5f7aff4cd3\"\n }\n}",
2068
2046
  "title": "查询木马自动隔离样本下载链接"
2069
2047
  }
2070
2048
  ],
@@ -2072,23 +2050,23 @@
2072
2050
  {
2073
2051
  "document": "",
2074
2052
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSampleList\n<公共请求参数>\n\n{}",
2075
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"MD5\": \"61d7d84e979212bed18ed9aa8748defa\",\n \"VirusName\": \"virus1\",\n \"ModifyTime\": \"2020-09-22T00:00:00+00:00\",\n \"AutoIsolateSwitch\": true\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2053
+ "output": "{\n \"Response\": {\n \"TotalCount\": 102,\n \"List\": [\n {\n \"MD5\": \"61d7d84e979212bed18ed9aa8748defa\",\n \"VirusName\": \"virus1\",\n \"ModifyTime\": \"2020-09-22T00:00:00+00:00\",\n \"AutoIsolateSwitch\": true\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2076
2054
  "title": "查询木马自动隔离样本列表"
2077
2055
  }
2078
2056
  ],
2079
2057
  "DescribeVirusAutoIsolateSetting": [
2080
2058
  {
2081
- "document": "",
2059
+ "document": "查询木马自动隔离设置",
2082
2060
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSetting\n<公共请求参数>\n\n{}",
2083
- "output": "{\n \"Response\": {\n \"AutoIsolateSwitch\": true,\n \"IsKillProgress\": true,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2061
+ "output": "{\n \"Response\": {\n \"AutoIsolateSwitch\": true,\n \"IsKillProgress\": true,\n \"UserAutoIsolateKillSwitch\": true,\n \"RequestId\": \"F00A8503-6233-452E-913E-DAFE9******\"\n }\n}",
2084
2062
  "title": "查询木马自动隔离设置"
2085
2063
  }
2086
2064
  ],
2087
2065
  "DescribeVirusDetail": [
2088
2066
  {
2089
2067
  "document": "运行时查询木马文件信息",
2090
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusDetail\n<公共请求参数>\n\n{\n \"Id\": \"dskaldjskld\"\n}",
2091
- "output": "{\n \"Response\": {\n \"AncestorProcessParam\": \"-\",\n \"AncestorProcessPath\": \"-\",\n \"AncestorProcessStartUser\": \"-\",\n \"AncestorProcessUserGroup\": \"\",\n \"CheckPlatform\": [\n \"VDC\",\n \"TAV\"\n ],\n \"ClientIP\": \"106.55.163.111\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerId\": \"d4c43f9268ecea2aa75b26632299df8aaf496af54e391f94ebcc62d7b2435105\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/pedantic_agnesi\",\n \"ContainerNetStatus\": \"ISOLATED\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"CreateTime\": \"2024-08-27T03:30:37Z\",\n \"EventType\": \"恶意文件告警\",\n \"FileAccessTime\": \"2018-02-28T07:45:34Z\",\n \"FileMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"FileModifyTime\": \"2018-02-28T07:45:34Z\",\n \"FileName\": \"specimen_a1193b5c213b17cfc7fd\",\n \"FilePath\": \"/home/virus/specimen_a1193b5c213b17cfc7fd\",\n \"HarmDescribe\": \"蠕虫病毒Ramnit最早出现在2010年,至今已有8年之久,因传播力强而“闻名于世”。Ramnit蠕虫病毒通过被感染的EXE、DLL、HTML、HTM文件传播,在正常电脑打开这些染毒文件时会导致新的感染发生。同时,Ramnit蠕虫病毒还会通过浏览器访问网页、写入U盘移动硬盘,创建U盘自启动等方式进行蠕虫式传播。\",\n \"HostIP\": \"172.16.0.34\",\n \"HostId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"HostName\": \"稳定性监控_ivon\",\n \"ImageId\": \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\",\n \"ImageName\": \"centos:7\",\n \"Mark\": \"just for test\",\n \"ModifyTime\": \"2024-10-21T06:42:49Z\",\n \"Namespace\": \"\",\n \"NodeID\": \"\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"wer41324-18a1-4775-9e3f-cdfc89845157\",\n \"OperationTime\": \"2024-08-27T03:30:37Z\",\n \"PProcessParam\": \"-\",\n \"PProcessPath\": \"-\",\n \"PProcessStartUser\": \"-\",\n \"PProcessUserGroup\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"/\",\n \"PodStatus\": \"\",\n \"ProcessAccountGroup\": \"\",\n \"ProcessArgv\": \"-\",\n \"ProcessChan\": \"-\",\n \"ProcessFileAuthority\": \"-\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"-\",\n \"ProcessName\": \"\",\n \"ProcessPath\": \"-\",\n \"ProcessStartAccount\": \"-\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1f1\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 332155,\n \"SourceType\": 0,\n \"Status\": \"DEAL_NONE\",\n \"SubStatus\": \"FILE_NOT_FOUND\",\n \"SuggestScheme\": \"1.在病毒尚未完全清理干净之前,暂时关闭系统文件共享功能 ,防止感染范围进一步扩大;\\n2.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n3.隔离或者删除相关的木马文件;\\n4.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [\n \"ramnit\",\n \"Worm\",\n \"窃取用户信息,感染用户本地所有的html、exe、dll等格式的文件。\"\n ],\n \"VirusName\": \"Win32.Virus.Ramnit.Qwhl\",\n \"WorkloadType\": \"\"\n }\n}",
2068
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusDetail\n<公共请求参数>\n\n{\n \"Id\": \"10021\"\n}",
2069
+ "output": "{\n \"Response\": {\n \"AncestorProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b4ed805844e07bd15663e4f778acf9bf388719cbcdf794290b9637a550a21d6 -address /run/containerd/containerd.****\",\n \"AncestorProcessPath\": \"/usr/local/bin/containerd-shim-run****\",\n \"AncestorProcessStartUser\": \"0\",\n \"AncestorProcessUserGroup\": \"0\",\n \"CheckPlatform\": [\n \"VDC\",\n \"TAV\"\n ],\n \"ClientIP\": \"106.55.163.111\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"d4c43f9268ecea2aa75b26632299df8aaf496af54e391f94ebcc62d7b2435105\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/pedantic_agnesi\",\n \"ContainerNetStatus\": \"ISOLATED\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"CreateTime\": \"2024-08-27T03:30:37Z\",\n \"EventType\": \"恶意文件告警\",\n \"FileAccessTime\": \"2018-02-28T07:45:34Z\",\n \"FileMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"FileModifyTime\": \"2018-02-28T07:45:34Z\",\n \"FileName\": \"specimen_a1193b5c213b17cfc7fd\",\n \"FilePath\": \"/home/virus/specimen_a1193b5c213b17cfc7fd\",\n \"HarmDescribe\": \"蠕虫病毒Ramnit最早出现在2010年,至今已有8年之久,因传播力强而“闻名于世”。Ramnit蠕虫病毒通过被感染的EXE、DLL、HTML、HTM文件传播,在正常电脑打开这些染毒文件时会导致新的感染发生。同时,Ramnit蠕虫病毒还会通过浏览器访问网页、写入U盘移动硬盘,创建U盘自启动等方式进行蠕虫式传播。\",\n \"HostIP\": \"172.16.0.34\",\n \"HostId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"HostName\": \"稳定性监控_ivon\",\n \"ImageId\": \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\",\n \"ImageName\": \"centos:7\",\n \"Mark\": \"just for test\",\n \"ModifyTime\": \"2024-10-21T06:42:49Z\",\n \"Namespace\": \"tcss\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeSubNetCIDR\": \"10.0.200.0/24\",\n \"NodeSubNetID\": \"subnet-5gu2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"wer41324-18a1-4775-9e3f-cdfc89845157\",\n \"OperationTime\": \"2024-08-27T03:30:37Z\",\n \"PProcessParam\": \"node dist/inde****\",\n \"PProcessPath\": \"/usr/bin/****\",\n \"PProcessStartUser\": \"root\",\n \"PProcessUserGroup\": \"root\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"Running\",\n \"ProcessAccountGroup\": \"root\",\n \"ProcessArgv\": \"git clone --depth=1 https://youmengjie:Yn-2_qMrLWkX5cf3iVKz@code.devops.xiaohongshu.com/fe/farmer/asar-hot-updater.git part-local-lab/asar-hot-upd****\",\n \"ProcessChan\": \"git(433802)|node(280016)|containerd-shim-runc-v2(176637)|system****\",\n \"ProcessFileAuthority\": \"-rwxr-****\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"472c65af3f43136472d1a383f5******\",\n \"ProcessName\": \"/bin/a***\",\n \"ProcessPath\": \"/usr/bin****\",\n \"ProcessStartAccount\": \"root\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1f1\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 332155,\n \"SourceType\": 0,\n \"Status\": \"DEAL_NONE\",\n \"SubStatus\": \"FILE_NOT_FOUND\",\n \"SuggestScheme\": \"1.在病毒尚未完全清理干净之前,暂时关闭系统文件共享功能 ,防止感染范围进一步扩大;\\n2.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n3.隔离或者删除相关的木马文件;\\n4.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [\n \"ramnit\",\n \"Worm\",\n \"窃取用户信息,感染用户本地所有的html、exe、dll等格式的文件。\"\n ],\n \"VirusName\": \"Win32.Virus.Ramnit.Qwhl\",\n \"WorkloadType\": \"DaemonSet\"\n }\n}",
2092
2070
  "title": "运行时查询木马文件信息"
2093
2071
  }
2094
2072
  ],
@@ -2128,7 +2106,7 @@
2128
2106
  {
2129
2107
  "document": "",
2130
2108
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusSampleDownloadUrl\n<公共请求参数>\n\n{\n \"ID\": \"1000\"\n}",
2131
- "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"FileUrl\": \"http://1.2.3.4/a\"\n }\n}",
2109
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"FileUrl\": \"http://****/a***\"\n }\n}",
2132
2110
  "title": "查询木马样本下载url"
2133
2111
  }
2134
2112
  ],
@@ -2144,7 +2122,7 @@
2144
2122
  {
2145
2123
  "document": "运行时查询文件查杀任务状态",
2146
2124
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusScanTaskStatus\n<公共请求参数>\n\n{\n \"TaskID\": \"dskaldjskld\"\n}",
2147
- "output": "{\n \"Response\": {\n \"ContainerScanCnt\": 0,\n \"ContainerTotal\": 339,\n \"LeftSeconds\": 4666,\n \"RequestId\": \"b9e9e86e-5b7e-476c-9be1-a8c6399afef3\",\n \"RiskCnt\": 0,\n \"Schedule\": 0,\n \"Status\": \"SCANNING\",\n \"RiskContainerCnt\": 0,\n \"StartTime\": \"\",\n \"EndTime\": \"\",\n \"ScanType\": 1\n }\n}",
2125
+ "output": "{\n \"Response\": {\n \"ContainerScanCnt\": 0,\n \"ContainerTotal\": 339,\n \"LeftSeconds\": 4666,\n \"RequestId\": \"b9e9e86e-5b7e-476c-9be1-a8c6399afef3\",\n \"RiskCnt\": 0,\n \"Schedule\": 0,\n \"Status\": \"SCANNING\",\n \"RiskContainerCnt\": 0,\n \"StartTime\": \"2020-11-21 15:16:00\",\n \"EndTime\": \"2020-11-21 15:16:00\",\n \"ScanType\": \"CYCLE\"\n }\n}",
2148
2126
  "title": "运行时查询文件查杀任务状态"
2149
2127
  }
2150
2128
  ],
@@ -2160,7 +2138,7 @@
2160
2138
  {
2161
2139
  "document": "运行时查询木马概览信息",
2162
2140
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusSummary\n<公共请求参数>\n\n{}",
2163
- "output": "{\n \"Response\": {\n \"IsolateCnt\": 1133,\n \"IsolateIncrease\": 0,\n \"RequestId\": \"83b45d62-7383-4257-8de5-f460a3446a2c\",\n \"RiskCnt\": 94,\n \"RiskContainerCnt\": 58,\n \"RiskContainerIncrease\": 0,\n \"RiskIncrease\": 0,\n \"TaskId\": \"67204f7cad8a5e71a40875752cc2f374\",\n \"VirusDataBaseModifyTime\": \"\"\n }\n}",
2141
+ "output": "{\n \"Response\": {\n \"IsolateCnt\": 1133,\n \"IsolateIncrease\": 0,\n \"RequestId\": \"83b45d62-7383-4257-8de5-f460a3446a2c\",\n \"RiskCnt\": 94,\n \"RiskContainerCnt\": 58,\n \"RiskContainerIncrease\": 0,\n \"RiskIncrease\": 0,\n \"TaskId\": \"67204f7cad8a5e71a40875752cc2f374\",\n \"VirusDataBaseModifyTime\": \"2020-11-21 15:16:00\"\n }\n}",
2164
2142
  "title": "运行时查询木马概览信息"
2165
2143
  }
2166
2144
  ],
@@ -2176,7 +2154,7 @@
2176
2154
  {
2177
2155
  "document": "",
2178
2156
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulContainerList\n&PocID=1\n&<公共请求参数>",
2179
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ClusterID\": \"68b68a372df3394bf46f7320707ebdcd\",\n \"ClusterName\": \"default-cluster\",\n \"ContainerID\": \"0b70affcd1c495798c2fbde915a43e94df0457c204848be862ad0689aab868a6\",\n \"ContainerName\": \"containner\",\n \"HostID\": \"5c442550-bbbc-aaaa-ada3-00796bd9fefe\",\n \"HostIP\": \"10.206.64.13\",\n \"HostName\": \"tcs-sssa\",\n \"NodeID\": \"\",\n \"NodeName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"PublicIP\": \"1.2.3.4\"\n }\n ],\n \"RequestId\": \"e33b04ca-8e2f-4242-946f-2804debc5c9b\",\n \"TotalCount\": 31\n }\n}",
2157
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ClusterID\": \"68b68a372df3394bf46f7320707ebdcd\",\n \"ClusterName\": \"default-cluster\",\n \"ContainerID\": \"0b70affcd1c495798c2fbde915a43e94df0457c204848be862ad0689aab868a6\",\n \"ContainerName\": \"containner\",\n \"HostID\": \"5c442550-bbbc-aaaa-ada3-00796bd9fefe\",\n \"HostIP\": \"10.206.64.13\",\n \"HostName\": \"tcs-sssa\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"i-node***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"PublicIP\": \"1.2.3.4\"\n }\n ],\n \"RequestId\": \"e33b04ca-8e2f-4242-946f-2804debc5c9b\",\n \"TotalCount\": 31\n }\n}",
2180
2158
  "title": "查询受漏洞的容器列表"
2181
2159
  }
2182
2160
  ],
@@ -2184,15 +2162,15 @@
2184
2162
  {
2185
2163
  "document": "DescribeVulDefenceEvent",
2186
2164
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceEvent\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
2187
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2021-44228\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"1a00d48467136a768278cbb93fb45b3a7d1cbb7e11ee906eb54cf09bf6a27e5b\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/cve-2021-44228-solr-1\",\n \"ContainerNetStatus\": \"\",\n \"ContainerNetSubStatus\": \"\",\n \"ContainerStatus\": \"\",\n \"CreateTime\": \"2023-10-08 11:07:16\",\n \"EventCount\": 4,\n \"EventID\": 20055,\n \"EventType\": \"EVENT_DEFENDED\",\n \"HostIP\": \"\",\n \"HostName\": \"\",\n \"ImageID\": \"sha256:33f2d4bf4fa944682b9c7c1ed66262fe22d488bab7028ce0f676215bade8d92e\",\n \"ImageName\": \"vulhub/solr:8.11.0\",\n \"MergeTime\": \"2023-10-08 11:07:16\",\n \"NodeID\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PocID\": \"pcmgr-333393\",\n \"PublicIP\": \"\",\n \"QUUID\": \"d9438d70-2689-4013-9ce1-d80edbc29edb\",\n \"SourceIP\": \"\",\n \"Status\": \"EVENT_DEALED\",\n \"VulName\": \"Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"PodName\"\n }\n ],\n \"TotalCount\": 0,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2165
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2021-44228\",\n \"City\": \"广东省-深圳市\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"1a00d48467136a768278cbb93fb45b3a7d1cbb7e11ee906eb54cf09bf6a27e5b\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/cve-2021-44228-solr-1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"CreateTime\": \"2023-10-08 11:07:16\",\n \"EventCount\": 4,\n \"EventID\": 20055,\n \"EventType\": \"EVENT_DEFENDED\",\n \"HostIP\": \"10.0.1.92\",\n \"HostName\": \"hn***\",\n \"ImageID\": \"sha256:33f2d4bf4fa944682b9c7c1ed66262fe22d488bab7028ce0f676215bade8d92e\",\n \"ImageName\": \"vulhub/solr:8.11.0\",\n \"MergeTime\": \"2023-10-08 11:07:16\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PocID\": \"pcmgr-333393\",\n \"PublicIP\": \"10.0.1.92\",\n \"QUUID\": \"d9438d70-2689-4013-9ce1-d80edbc29edb\",\n \"SourceIP\": \"10.0.1.92\",\n \"Status\": \"EVENT_DEALED\",\n \"VulName\": \"Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"PodName\"\n }\n ],\n \"TotalCount\": 0,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2188
2166
  "title": "查询漏洞防御事件列表"
2189
2167
  }
2190
2168
  ],
2191
2169
  "DescribeVulDefenceEventDetail": [
2192
2170
  {
2193
2171
  "document": "查询漏洞防御事件详情",
2194
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceEventDetail\n<公共请求参数>\n\n{\n \"EventID\": \"0\"\n}",
2195
- "output": "{\n \"Response\": {\n \"EventDetail\": {\n \"CVEID\": \"CVE-2021-44228\",\n \"City\": \"\",\n \"ClusterID\": \"\",\n \"ClusterName\": \"\",\n \"ContainerID\": \"5457113fd88a5cc8f88391f7387ad2f1b23c4b9a154f12fc725cfa8b134134\",\n \"ContainerIsolateOperationSrc\": \"\",\n \"ContainerName\": \"/cve-2021-44228-solr-1\",\n \"ContainerNetStatus\": \"\",\n \"ContainerNetSubStatus\": \"\",\n \"ContainerStatus\": \"\",\n \"Description\": \"访问源(IP:)在对容器(ID:5457113fd8...)发起漏洞利用攻击\",\n \"EventCount\": 20,\n \"EventID\": 30061,\n \"EventType\": \"EVENT_DEFENDED\",\n \"HostIP\": \"172.16.51.209\",\n \"HostName\": \"harborV2_yancyw\",\n \"ImageID\": \"sha256:052794134d434bc2db0775211589beb372412af333a262d16841893418941894\",\n \"ImageName\": \"vulhub/solr:8.11.0\",\n \"JNDIUrl\": \"\",\n \"MainClass\": \"org.eclipse.jetty.start.Main\",\n \"Namespace\": \"\",\n \"NetworkPayload\": \": \\n\",\n \"NodeID\": \"\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"OfficialSolution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://logging.apache.org/log4j/2.x/security.html\",\n \"PID\": 20545,\n \"PocID\": \"pcmgr-333393\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"PublicIP\": \"139.199.178.111\",\n \"QUUID\": \"380add75-bb06-4cc4-84c5-cf806d102fba\",\n \"RaspDetail\": [\n {\n \"Name\": \"jndiurl\",\n \"Value\": \"ldap://1.8.0_102.example.com\"\n }\n ],\n \"ServerAccount\": \"\",\n \"ServerArg\": \"\",\n \"ServerExe\": \"\",\n \"ServerPort\": \"\",\n \"SourceIP\": \"\",\n \"SourcePort\": [\n \"-\"\n ],\n \"StackTrace\": \"org.apache.logging.log4j.core.lookup.JndiLookup.lookup\\norg.apache.logging.log4j.core.lookup.Interpolator.lookup\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.resolveVariable\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.substitute\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.substitute\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.replace\\norg.apache.logging.log4j.core.pattern.MessagePatternConverter.format\\norg.apache.logging.log4j.core.pattern.PatternFormatter.format\\norg.apache.logging.log4j.core.pattern.MaxLengthConverter.format\\norg.apache.logging.log4j.core.pattern.PatternFormatter.format\\n\",\n \"Status\": \"EVENT_DEFENDED\",\n \"VulName\": \"Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)\",\n \"WorkloadType\": \"\"\n },\n \"RequestId\": \"2f944254-e774-4f19-ac09-c9c1bdf311f6\"\n }\n}",
2172
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceEventDetail\n<公共请求参数>\n\n{\n \"EventID\": \"1002\"\n}",
2173
+ "output": "{\n \"Response\": {\n \"EventDetail\": {\n \"CVEID\": \"CVE-2021-44228\",\n \"City\": \"Beijing\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"5457113fd88a5cc8f88391f7387ad2f1b23c4b9a154f12fc725cfa8b134134\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/cve-2021-44228-solr-1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"访问源(IP:)在对容器(ID:5457113fd8...)发起漏洞利用攻击\",\n \"EventCount\": 20,\n \"EventID\": 30061,\n \"EventType\": \"EVENT_DEFENDED\",\n \"HostIP\": \"172.16.51.209\",\n \"HostName\": \"harborV2_yancyw\",\n \"ImageID\": \"sha256:052794134d434bc2db0775211589beb372412af333a262d16841893418941894\",\n \"ImageName\": \"vulhub/solr:8.11.0\",\n \"JNDIUrl\": \"http://10.0.0.1\",\n \"MainClass\": \"org.eclipse.jetty.start.Main\",\n \"Namespace\": \"tcss\",\n \"NetworkPayload\": \": \\n\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeSubNetCIDR\": \"10.0.200.0/24\",\n \"NodeSubNetID\": \"subnet-5gu2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"OfficialSolution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://logging.apache.org/log4j/2.x/security.html\",\n \"PID\": 20545,\n \"PocID\": \"pcmgr-333393\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"PublicIP\": \"127.2.3.4\",\n \"QUUID\": \"380add75-bb06-4cc4-84c5-cf806d102fba\",\n \"RaspDetail\": [\n {\n \"Name\": \"jndiurl\",\n \"Value\": \"ldap://1.8.0_102.example.com\"\n }\n ],\n \"ServerAccount\": \"server account\",\n \"ServerArg\": \"server avg\",\n \"ServerExe\": \"server exe\",\n \"ServerPort\": \"3306\",\n \"SourceIP\": \"10.0.1.2\",\n \"SourcePort\": [\n \"3306\"\n ],\n \"StackTrace\": \"org.apache.logging.log4j.core.lookup.JndiLookup.lookup\\norg.apache.logging.log4j.core.lookup.Interpolator.lookup\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.resolveVariable\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.substitute\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.substitute\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.replace\\norg.apache.logging.log4j.core.pattern.MessagePatternConverter.format\\norg.apache.logging.log4j.core.pattern.PatternFormatter.format\\norg.apache.logging.log4j.core.pattern.MaxLengthConverter.format\\norg.apache.logging.log4j.core.pattern.PatternFormatter.format\\n\",\n \"Status\": \"EVENT_DEFENDED\",\n \"VulName\": \"Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)\",\n \"WorkloadType\": \"DaemonSet\"\n },\n \"RequestId\": \"2f944254-e774-4f19-ac09-c9c1bdf311f6\"\n }\n}",
2196
2174
  "title": "查询漏洞防御事件详情"
2197
2175
  }
2198
2176
  ],
@@ -2208,7 +2186,7 @@
2208
2186
  {
2209
2187
  "document": "查询漏洞防御的主机列表",
2210
2188
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceHost\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
2211
- "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"CreateTime\": \"2023-08-17 15:41:32\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"tcs-test\",\n \"ModifyTime\": \"2024-10-30 14:00:21\",\n \"NodeID\": \"ins-8bc803fd\",\n \"NodeSubNetCIDR\": \"\",\n \"NodeSubNetID\": \"\",\n \"NodeSubNetName\": \"\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"\",\n \"PodIP\": \"\",\n \"PodName\": \"\",\n \"PublicIP\": \"1.1.1.1\",\n \"Status\": \"SUCCESS\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2189
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"CreateTime\": \"2023-08-17 15:41:32\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"tcs-test\",\n \"ModifyTime\": \"2024-10-30 14:00:21\",\n \"NodeID\": \"ins-8bc803fd\",\n \"NodeSubNetCIDR\": \"10.0.200.0/24\",\n \"NodeSubNetID\": \"subnet-5gu2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"PublicIP\": \"1.1.1.1\",\n \"Status\": \"SUCCESS\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2212
2190
  "title": "查询漏洞防御的主机列表"
2213
2191
  }
2214
2192
  ],
@@ -2216,7 +2194,7 @@
2216
2194
  {
2217
2195
  "document": "查询漏洞防御插件列表",
2218
2196
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefencePlugin\n<公共请求参数>\n\n{\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"Limit\": 1,\n \"Offset\": 1,\n \"Filters\": [\n {\n \"Name\": \"Status\",\n \"Values\": [\n \"SUCCESS\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
2219
- "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"PID\": 0,\n \"MainClass\": \"com.java.main\",\n \"Status\": \"SUCCESS\",\n \"ErrorLog\": \"\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2197
+ "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"PID\": 0,\n \"MainClass\": \"com.java.main\",\n \"Status\": \"SUCCESS\",\n \"ErrorLog\": \"ErrorLog\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2220
2198
  "title": "查询漏洞防御插件列表"
2221
2199
  }
2222
2200
  ],
@@ -2288,7 +2266,7 @@
2288
2266
  {
2289
2267
  "document": "",
2290
2268
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulRegistryImageList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"OnlyAffectedNewestImage\",\n \"Values\": [\n \"false\"\n ],\n \"ExactMatch\": false\n }\n ],\n \"PocID\": \"pcmgr-448277\"\n}",
2291
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ComponentList\": [\n {\n \"FixedVersion\": \"0:1.33.0-5.el8_8\",\n \"Name\": \"libnghttp2\",\n \"Path\": \"\",\n \"Version\": \"1.33.0-3.el8_2.1\"\n }\n ],\n \"ImageAssetId\": 100078588,\n \"ImageID\": \"sha256:0ecdf0d66075bf978f4723e3a41dbf8f984633fb6e6f1ff525666ba58cc6770c\",\n \"ImageName\": \"yancyw999\",\n \"ImageRepoAddress\": \"139.199.178.171:8089/yancyw/yancyw999\",\n \"ImageTag\": \"999\",\n \"IsLatestImage\": true,\n \"Namespace\": \"yancyw\"\n }\n ],\n \"RequestId\": \"d7a94822-5d3c-4d15-9522-56dd70b03b5a\",\n \"TotalCount\": 1\n }\n}",
2269
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ComponentList\": [\n {\n \"FixedVersion\": \"0:1.33.0-5.el8_8\",\n \"Name\": \"libnghttp2\",\n \"Path\": \"/a/b\",\n \"Version\": \"1.33.0-3.el8_2.1\"\n }\n ],\n \"ImageAssetId\": 100078588,\n \"ImageID\": \"sha256:0ecdf0d66075bf978f4723e3a41dbf8f984633fb6e6f1ff525666ba58cc6770c\",\n \"ImageName\": \"yancyw999\",\n \"ImageRepoAddress\": \"139.199.178.171:8089/yancyw/yancyw999\",\n \"ImageTag\": \"999\",\n \"IsLatestImage\": true,\n \"Namespace\": \"yancyw\"\n }\n ],\n \"RequestId\": \"d7a94822-5d3c-4d15-9522-56dd70b03b5a\",\n \"TotalCount\": 1\n }\n}",
2292
2270
  "title": "查询漏洞影响的仓库镜像列表"
2293
2271
  }
2294
2272
  ],
@@ -2304,7 +2282,7 @@
2304
2282
  {
2305
2283
  "document": "",
2306
2284
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulScanInfo\n&LocalTaskID=1\n&RegistryTaskID=1\n&<公共请求参数>",
2307
- "output": "{\n \"Response\": {\n \"FoundRiskImageCount\": 0,\n \"FoundVulCount\": 0,\n \"IgnoreVulCount\": 0,\n \"LocalImageScanCount\": 0,\n \"LocalTaskID\": 0,\n \"RegistryFoundVulCount\": 0,\n \"RegistryImageScanCount\": 0,\n \"RegistryTaskID\": 0,\n \"RemainingTime\": 0,\n \"RequestId\": \"b6cffd6d-b5a4-41d2-8ffc-21e5cbdee3b5\",\n \"ScanEndTime\": \"\",\n \"ScanProgress\": 0,\n \"ScanStartTime\": \"\",\n \"Status\": \"NOT_SCAN\"\n }\n}",
2285
+ "output": "{\n \"Response\": {\n \"FoundRiskImageCount\": 0,\n \"FoundVulCount\": 0,\n \"IgnoreVulCount\": 0,\n \"LocalImageScanCount\": 0,\n \"LocalTaskID\": 0,\n \"RegistryFoundVulCount\": 0,\n \"RegistryImageScanCount\": 0,\n \"RegistryTaskID\": 0,\n \"RemainingTime\": 0,\n \"RequestId\": \"b6cffd6d-b5a4-41d2-8ffc-21e5cbdee3b5\",\n \"ScanEndTime\": \"2020-11-21 15:16:00\",\n \"ScanProgress\": 0,\n \"ScanStartTime\": \"2020-11-21 15:16:00\",\n \"Status\": \"NOT_SCAN\"\n }\n}",
2308
2286
  "title": "查询漏洞扫描任务信息"
2309
2287
  }
2310
2288
  ],
@@ -2352,7 +2330,7 @@
2352
2330
  {
2353
2331
  "document": "",
2354
2332
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeWebVulList\n<公共请求参数>\n\n{\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
2355
- "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2022-23302\",\n \"CVSSV3Score\": 8.8,\n \"Category\": \"DESERIALIZATION_OF_UNTRUSTED_DATA\",\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"\",\n \"DefenceStatus\": \"\",\n \"DefendedCount\": 0,\n \"FoundTime\": \"2024-10-29 11:56:21\",\n \"ID\": 173840040,\n \"LatestFoundTime\": \"2024-10-29 11:56:21\",\n \"Level\": \"HIGH\",\n \"LocalImageCount\": 0,\n \"Name\": \"Apache log4j JMSSink反序列化代码执行漏洞(CVE-2022-23302)\",\n \"PocID\": \"pcmgr-335818\",\n \"RegistryImageCount\": 1,\n \"Tags\": [\n \"NETWORK\",\n \"POC\"\n ]\n }\n ],\n \"RequestId\": \"e8f59b70-321a-423d-9f8a-a587451c19dd\",\n \"TotalCount\": 33\n }\n}",
2333
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2022-23302\",\n \"CVSSV3Score\": 8.8,\n \"Category\": \"DESERIALIZATION_OF_UNTRUSTED_DATA\",\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"ALL\",\n \"DefenceStatus\": \"DEFENDED\",\n \"DefendedCount\": 0,\n \"FoundTime\": \"2024-10-29 11:56:21\",\n \"ID\": 173840040,\n \"LatestFoundTime\": \"2024-10-29 11:56:21\",\n \"Level\": \"HIGH\",\n \"LocalImageCount\": 0,\n \"Name\": \"Apache log4j JMSSink反序列化代码执行漏洞(CVE-2022-23302)\",\n \"PocID\": \"pcmgr-335818\",\n \"RegistryImageCount\": 1,\n \"Tags\": [\n \"NETWORK\",\n \"POC\"\n ]\n }\n ],\n \"RequestId\": \"e8f59b70-321a-423d-9f8a-a587451c19dd\",\n \"TotalCount\": 33\n }\n}",
2356
2334
  "title": "查询web应用漏洞列表"
2357
2335
  }
2358
2336
  ],
@@ -2360,7 +2338,7 @@
2360
2338
  {
2361
2339
  "document": "",
2362
2340
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ExportVirusList\n<公共请求参数>\n\n{}",
2363
- "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"\"\n }\n}",
2341
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"99fe44ea-3583-479b-a8ec-9932d9b8****\"\n }\n}",
2364
2342
  "title": "运行时文件查杀事件列表导出"
2365
2343
  }
2366
2344
  ],
@@ -2383,7 +2361,7 @@
2383
2361
  "ModifyAbnormalProcessStatus": [
2384
2362
  {
2385
2363
  "document": "",
2386
- "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAbnormalProcessStatus\n&EventIdSet.0=10001\n&Status= EVENT_DEALED\n&Remark=无\n&<公共请求参数>",
2364
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAbnormalProcessStatus\n&EventIdSet.0=10001\n&Status= EVENT_DEALED\n&Remark=Remark\n&<公共请求参数>",
2387
2365
  "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2388
2366
  "title": "修改异常进程事件状态"
2389
2367
  }
@@ -2391,7 +2369,7 @@
2391
2369
  "ModifyAccessControlRuleStatus": [
2392
2370
  {
2393
2371
  "document": "",
2394
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAccessControlRuleStatus\n<公共请求参数>\n\n{\n \"RuleIdSet\": [\n \"111\"\n ],\n \"IsEnable\": true\n}",
2372
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAccessControlRuleStatus\n<公共请求参数>\n\n{\n \"RuleIdSet\": [\n \"1002\"\n ],\n \"IsEnable\": true\n}",
2395
2373
  "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
2396
2374
  "title": "修改规则状态"
2397
2375
  }
@@ -2399,7 +2377,7 @@
2399
2377
  "ModifyAccessControlStatus": [
2400
2378
  {
2401
2379
  "document": "",
2402
- "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAccessControlStatus\n&EventIdSet.0=10001\n&Status=EVENT_DEALED\n&Remark=无\n&<公共请求参数>",
2380
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAccessControlStatus\n&EventIdSet.0=10001\n&Status=EVENT_DEALED\n&Remark=Remark\n&<公共请求参数>",
2403
2381
  "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2404
2382
  "title": "修改运行时访问控制事件状态"
2405
2383
  }
@@ -2520,6 +2498,14 @@
2520
2498
  "title": "修改k8sapi异常事件规则状态"
2521
2499
  }
2522
2500
  ],
2501
+ "ModifyRaspRules": [
2502
+ {
2503
+ "document": "添加漏洞防御白名单",
2504
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRaspRules\n<公共请求参数>\n\n{\n \"VulVulsIDs\": [\n 105346\n ],\n \"WhiteType\": 1\n}",
2505
+ "output": "{\n \"Response\": {\n \"RequestId\": \"e8ff031f-094b-485d-949f-8b557b4d1b6d\"\n }\n}",
2506
+ "title": "添加漏洞防御白名单"
2507
+ }
2508
+ ],
2523
2509
  "ModifyReverseShellStatus": [
2524
2510
  {
2525
2511
  "document": "",
@@ -2555,7 +2541,7 @@
2555
2541
  "ModifySecLogDeliveryKafkaSetting": [
2556
2542
  {
2557
2543
  "document": "",
2558
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogDeliveryKafkaSetting\n<公共请求参数>\n\n{\n \"InstanceID\": \"实例ID\",\n \"InstanceName\": \"实例名称\",\n \"Domain\": \"域名\",\n \"User\": \"用户名\",\n \"Password\": \"密码\",\n \"RegionID\": \"ap-beijing\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"主题ID\",\n \"TopicName\": \"主题名称\",\n \"State\": true\n }\n ]\n}",
2544
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogDeliveryKafkaSetting\n<公共请求参数>\n\n{\n \"InstanceID\": \"ins_dhsghd\",\n \"InstanceName\": \"xingneng\",\n \"Domain\": \"www.a.com\",\n \"User\": \"root\",\n \"Password\": \"pwd\",\n \"RegionID\": \"ap-beijing\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"topicID\",\n \"TopicName\": \"name\",\n \"State\": true\n }\n ]\n}",
2559
2545
  "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2560
2546
  "title": "更新安全日志投递kafka设置"
2561
2547
  }
@@ -2594,7 +2580,7 @@
2594
2580
  ],
2595
2581
  "ModifyVirusAutoIsolateSetting": [
2596
2582
  {
2597
- "document": "",
2583
+ "document": "修改木马自动隔离设置",
2598
2584
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusAutoIsolateSetting\n<公共请求参数>\n\n{\n \"AutoIsolateSwitch\": true,\n \"IsKillProgress\": true\n}",
2599
2585
  "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2600
2586
  "title": "修改木马自动隔离设置"
@@ -2635,7 +2621,7 @@
2635
2621
  "ModifyVulDefenceEventStatus": [
2636
2622
  {
2637
2623
  "document": "",
2638
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVulDefenceEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"EVENT_DEALED\",\n \"EventIDs\": [\n \"1\"\n ]\n}",
2624
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVulDefenceEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"EVENT_DEALED\",\n \"EventIDs\": [\n \"1\"\n ],\n \"Remark\": \"remark content\"\n}",
2639
2625
  "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2640
2626
  "title": "修改漏洞防御事件状态"
2641
2627
  }
@@ -2719,7 +2705,7 @@
2719
2705
  "ScanComplianceScanFailedAssets": [
2720
2706
  {
2721
2707
  "document": "",
2722
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceScanFailedAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 111,\n 456,\n 789\n ]\n}",
2708
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceScanFailedAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 1002\n ]\n}",
2723
2709
  "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
2724
2710
  "title": "重新检测上次检测失败的资产"
2725
2711
  },
@@ -2773,7 +2759,7 @@
2773
2759
  "UpdateAndPublishNetworkFirewallPolicyDetail": [
2774
2760
  {
2775
2761
  "document": "",
2776
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"\",\n \"ClusterId\": \"cls-dfdsfd\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
2762
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Direction\": \"FROM\",\n \"Ports\": [\n {\n \"Protocol\": \"TCP\",\n \"Port\": \"80\"\n }\n ],\n \"Peer\": [\n {\n \"NamespaceSelector\": \"default\",\n \"PeerType\": \"NamespaceSelector \",\n \"PodSelector\": \"default \",\n \"IPBlock\": \"0.0.0.0/24\"\n }\n ]\n }\n ],\n \"Description\": \"Description\",\n \"ClusterId\": \"cls-cluster-id\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
2777
2763
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2778
2764
  "title": "容器网络创建网络策略更新并发布任务示例"
2779
2765
  }
@@ -2781,7 +2767,7 @@
2781
2767
  "UpdateAndPublishNetworkFirewallPolicyYamlDetail": [
2782
2768
  {
2783
2769
  "document": "",
2784
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"\",\n \"ClusterId\": \"cls-dfddf\",\n \"Id\": 1,\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
2770
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"desc\",\n \"ClusterId\": \"cls-dff**\",\n \"Id\": 1,\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
2785
2771
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2786
2772
  "title": "容器网络更新Yaml网络策略并发布任务任务示例"
2787
2773
  }
@@ -2789,8 +2775,8 @@
2789
2775
  "UpdateAssetImageRegistryRegistryDetail": [
2790
2776
  {
2791
2777
  "document": "更新单个镜像仓库详细信息",
2792
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Name\": \"private_aws\",\n \"Username\": \"AKIAVHDIU6R7C3BD\",\n \"Password\": \"password\",\n \"Url\": \"https://dkr.ecr.us-east-119.amazonaws.com\",\n \"RegistryType\": \"aws\",\n \"RegistryVersion\": \"V1\",\n \"NetType\": \"public\",\n \"RegistryRegion\": \"default\",\n \"SpeedLimit\": 0,\n \"Insecure\": 0,\n \"ConnDetectConfig\": [\n {\n \"Quuid\": \"backend\",\n \"Uuid\": \"backend\"\n }\n ]\n}",
2793
- "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"\",\n \"NameRepeatErr\": \"\",\n \"RegistryId\": 29113,\n \"RequestId\": \"47d03bf3-6ea3-4e79-a7f0-70eae99717bc\"\n }\n}",
2778
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Name\": \"private_aws\",\n \"Username\": \"name01\",\n \"Password\": \"password\",\n \"Url\": \"https://dkr.ecr.us-east-119.amazonaws.com\",\n \"RegistryType\": \"aws\",\n \"RegistryVersion\": \"V1\",\n \"NetType\": \"public\",\n \"RegistryRegion\": \"default\",\n \"SpeedLimit\": 0,\n \"Insecure\": 0,\n \"ConnDetectConfig\": [\n {\n \"Quuid\": \"5a540076-d38a-4078-aa98-e7c86371d322\",\n \"Uuid\": \"5a540076-d38a-4078-aa98-e7c86371d322\"\n }\n ]\n}",
2779
+ "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"connect refused\",\n \"NameRepeatErr\": \"connect refused\",\n \"RegistryId\": 29113,\n \"RequestId\": \"47d03bf3-6ea3-4e79-a7f0-70eae99717bc\"\n }\n}",
2794
2780
  "title": "更新单个镜像仓库详细信息"
2795
2781
  }
2796
2782
  ],
@@ -2805,7 +2791,7 @@
2805
2791
  "UpdateNetworkFirewallPolicyDetail": [
2806
2792
  {
2807
2793
  "document": "",
2808
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"\",\n \"ClusterId\": \"cls-sdfdsf\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
2794
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"just for develop\",\n \"ClusterId\": \"cls-sdfdsf\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
2809
2795
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2810
2796
  "title": "容器网络创建网络策略更新任务示例"
2811
2797
  }
@@ -2813,7 +2799,7 @@
2813
2799
  "UpdateNetworkFirewallPolicyYamlDetail": [
2814
2800
  {
2815
2801
  "document": "",
2816
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"\",\n \"ClusterId\": \"cls-67898\",\n \"Id\": 1,\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
2802
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"desc\",\n \"ClusterId\": \"cls-67898\",\n \"Id\": 1,\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
2817
2803
  "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2818
2804
  "title": "容器网络更新Yaml网络策略任务示例"
2819
2805
  }