tccli 3.0.1300.3__py2.py3-none-any.whl → 3.0.1302.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (187) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/__init__.py +2 -1
  3. tccli/services/asr/v20190614/api.json +18 -18
  4. tccli/services/batch/v20170312/api.json +14 -14
  5. tccli/services/bh/bh_client.py +623 -93
  6. tccli/services/bh/v20230418/api.json +1054 -32
  7. tccli/services/bh/v20230418/examples.json +93 -1
  8. tccli/services/billing/billing_client.py +4 -57
  9. tccli/services/billing/v20180709/api.json +3 -305
  10. tccli/services/billing/v20180709/examples.json +2 -10
  11. tccli/services/bpaas/v20181217/api.json +56 -56
  12. tccli/services/cat/cat_client.py +61 -8
  13. tccli/services/cat/v20180409/api.json +115 -0
  14. tccli/services/cat/v20180409/examples.json +20 -0
  15. tccli/services/cbs/v20170312/api.json +9 -7
  16. tccli/services/cbs/v20170312/examples.json +2 -2
  17. tccli/services/ccc/ccc_client.py +216 -4
  18. tccli/services/ccc/v20200210/api.json +364 -6
  19. tccli/services/ccc/v20200210/examples.json +32 -0
  20. tccli/services/cdb/v20170320/api.json +23 -14
  21. tccli/services/cdb/v20170320/examples.json +3 -3
  22. tccli/services/cdc/cdc_client.py +173 -67
  23. tccli/services/cdc/v20201214/api.json +96 -0
  24. tccli/services/cdc/v20201214/examples.json +16 -0
  25. tccli/services/cdn/v20180606/api.json +365 -279
  26. tccli/services/cdwch/v20200915/api.json +21 -21
  27. tccli/services/cdwdoris/v20211228/api.json +21 -1
  28. tccli/services/cdwdoris/v20211228/examples.json +4 -4
  29. tccli/services/cdwpg/v20201230/api.json +375 -360
  30. tccli/services/cdwpg/v20201230/examples.json +1 -1
  31. tccli/services/cfw/cfw_client.py +53 -0
  32. tccli/services/cfw/v20190904/api.json +201 -5
  33. tccli/services/cfw/v20190904/examples.json +8 -0
  34. tccli/services/chc/chc_client.py +57 -4
  35. tccli/services/chc/v20230418/api.json +108 -1
  36. tccli/services/chc/v20230418/examples.json +8 -0
  37. tccli/services/ckafka/ckafka_client.py +408 -302
  38. tccli/services/ckafka/v20190819/api.json +197 -2
  39. tccli/services/ckafka/v20190819/examples.json +16 -0
  40. tccli/services/clb/v20180317/api.json +439 -379
  41. tccli/services/clb/v20180317/examples.json +7 -7
  42. tccli/services/cls/cls_client.py +53 -0
  43. tccli/services/cls/v20201016/api.json +86 -3
  44. tccli/services/cls/v20201016/examples.json +11 -3
  45. tccli/services/cvm/v20170312/api.json +165 -147
  46. tccli/services/cvm/v20170312/examples.json +6 -6
  47. tccli/services/cwp/v20180228/api.json +93 -14
  48. tccli/services/cwp/v20180228/examples.json +7 -7
  49. tccli/services/cynosdb/cynosdb_client.py +171 -12
  50. tccli/services/cynosdb/v20190107/api.json +252 -3
  51. tccli/services/cynosdb/v20190107/examples.json +24 -0
  52. tccli/services/dbbrain/dbbrain_client.py +57 -4
  53. tccli/services/dbbrain/v20210527/api.json +62 -0
  54. tccli/services/dbbrain/v20210527/examples.json +8 -0
  55. tccli/services/dc/v20180410/api.json +1 -1
  56. tccli/services/dlc/dlc_client.py +53 -0
  57. tccli/services/dlc/v20210125/api.json +816 -655
  58. tccli/services/dlc/v20210125/examples.json +73 -59
  59. tccli/services/dsgc/v20190723/api.json +18 -0
  60. tccli/services/dts/v20211206/api.json +4 -4
  61. tccli/services/dts/v20211206/examples.json +6 -0
  62. tccli/services/emr/emr_client.py +53 -0
  63. tccli/services/emr/v20190103/api.json +127 -0
  64. tccli/services/emr/v20190103/examples.json +8 -0
  65. tccli/services/es/es_client.py +686 -151
  66. tccli/services/es/v20180416/api.json +509 -436
  67. tccli/services/es/v20180416/examples.json +43 -49
  68. tccli/services/es/v20250101/api.json +1391 -0
  69. tccli/services/es/v20250101/examples.json +85 -0
  70. tccli/services/ess/ess_client.py +53 -0
  71. tccli/services/ess/v20201111/api.json +142 -21
  72. tccli/services/ess/v20201111/examples.json +14 -0
  73. tccli/services/essbasic/essbasic_client.py +53 -0
  74. tccli/services/essbasic/v20210526/api.json +112 -9
  75. tccli/services/essbasic/v20210526/examples.json +8 -0
  76. tccli/services/gaap/v20180529/api.json +321 -312
  77. tccli/services/gaap/v20180529/examples.json +2 -2
  78. tccli/services/gs/gs_client.py +538 -8
  79. tccli/services/gs/v20191118/api.json +947 -44
  80. tccli/services/gs/v20191118/examples.json +87 -1
  81. tccli/services/gwlb/v20240906/api.json +56 -37
  82. tccli/services/gwlb/v20240906/examples.json +11 -5
  83. tccli/services/hunyuan/hunyuan_client.py +175 -69
  84. tccli/services/hunyuan/v20230901/api.json +191 -1
  85. tccli/services/hunyuan/v20230901/examples.json +17 -1
  86. tccli/services/ioa/ioa_client.py +227 -15
  87. tccli/services/ioa/v20220601/api.json +479 -0
  88. tccli/services/ioa/v20220601/examples.json +44 -0
  89. tccli/services/iotexplorer/iotexplorer_client.py +322 -4
  90. tccli/services/iotexplorer/v20190423/api.json +865 -52
  91. tccli/services/iotexplorer/v20190423/examples.json +64 -16
  92. tccli/services/iotvideo/iotvideo_client.py +57 -4
  93. tccli/services/iotvideo/v20211125/api.json +146 -0
  94. tccli/services/iotvideo/v20211125/examples.json +8 -0
  95. tccli/services/iotvideoindustry/v20201201/api.json +1 -1
  96. tccli/services/kms/v20190118/api.json +38 -2
  97. tccli/services/lcic/v20220817/api.json +66 -1
  98. tccli/services/lcic/v20220817/examples.json +1 -1
  99. tccli/services/lighthouse/lighthouse_client.py +0 -106
  100. tccli/services/lighthouse/v20200324/api.json +11 -98
  101. tccli/services/lighthouse/v20200324/examples.json +0 -16
  102. tccli/services/live/v20180801/api.json +1 -1
  103. tccli/services/lke/v20231130/api.json +208 -10
  104. tccli/services/lke/v20231130/examples.json +10 -10
  105. tccli/services/lkeap/lkeap_client.py +53 -0
  106. tccli/services/lkeap/v20240522/api.json +48 -4
  107. tccli/services/lkeap/v20240522/examples.json +8 -0
  108. tccli/services/mna/mna_client.py +4 -163
  109. tccli/services/mna/v20210119/api.json +0 -524
  110. tccli/services/mna/v20210119/examples.json +0 -24
  111. tccli/services/monitor/monitor_client.py +114 -8
  112. tccli/services/monitor/v20180724/api.json +129 -18
  113. tccli/services/monitor/v20180724/examples.json +17 -1
  114. tccli/services/mps/v20190612/api.json +1223 -1031
  115. tccli/services/mps/v20190612/examples.json +1 -1
  116. tccli/services/nlp/v20190408/examples.json +1 -1
  117. tccli/services/oceanus/v20190422/api.json +12 -12
  118. tccli/services/oceanus/v20190422/examples.json +15 -3
  119. tccli/services/ocr/v20181119/api.json +13 -3
  120. tccli/services/postgres/v20170312/api.json +2 -2
  121. tccli/services/privatedns/v20201028/api.json +30 -11
  122. tccli/services/privatedns/v20201028/examples.json +10 -10
  123. tccli/services/rce/v20201103/api.json +3 -3
  124. tccli/services/ses/v20201002/api.json +10 -1
  125. tccli/services/smop/v20201203/api.json +2 -2
  126. tccli/services/sqlserver/v20180328/api.json +1 -1
  127. tccli/services/ssm/v20190923/api.json +27 -0
  128. tccli/services/sts/sts_client.py +53 -0
  129. tccli/services/sts/v20180813/api.json +101 -1
  130. tccli/services/sts/v20180813/examples.json +8 -0
  131. tccli/services/taf/taf_client.py +0 -53
  132. tccli/services/taf/v20200210/api.json +0 -138
  133. tccli/services/taf/v20200210/examples.json +0 -8
  134. tccli/services/tan/v20220420/api.json +2 -2
  135. tccli/services/tat/v20201028/api.json +2 -2
  136. tccli/services/tcb/v20180608/api.json +29 -1
  137. tccli/services/tcbr/v20220217/api.json +32 -0
  138. tccli/services/tccatalog/v20241024/api.json +1 -1
  139. tccli/services/tccatalog/v20241024/examples.json +1 -1
  140. tccli/services/tcr/v20190924/api.json +5 -5
  141. tccli/services/tcr/v20190924/examples.json +2 -2
  142. tccli/services/tcss/v20201101/api.json +84 -34
  143. tccli/services/tcss/v20201101/examples.json +2809 -0
  144. tccli/services/tdmq/v20200217/api.json +40 -0
  145. tccli/services/tdmq/v20200217/examples.json +1 -1
  146. tccli/services/tds/tds_client.py +53 -0
  147. tccli/services/tds/v20220801/api.json +265 -0
  148. tccli/services/tds/v20220801/examples.json +8 -0
  149. tccli/services/tem/v20210701/api.json +664 -575
  150. tccli/services/tem/v20210701/examples.json +2 -2
  151. tccli/services/teo/v20220901/api.json +236 -208
  152. tccli/services/teo/v20220901/examples.json +13 -13
  153. tccli/services/tione/tione_client.py +53 -0
  154. tccli/services/tione/v20211111/api.json +256 -0
  155. tccli/services/tione/v20211111/examples.json +8 -0
  156. tccli/services/tke/v20180525/api.json +1 -1
  157. tccli/services/trocket/trocket_client.py +489 -12
  158. tccli/services/trocket/v20230308/api.json +925 -146
  159. tccli/services/trocket/v20230308/examples.json +72 -0
  160. tccli/services/trtc/v20190722/api.json +13 -19
  161. tccli/services/trtc/v20190722/examples.json +8 -8
  162. tccli/services/tse/v20201207/api.json +1016 -995
  163. tccli/services/tse/v20201207/examples.json +2 -2
  164. tccli/services/tsf/v20180326/api.json +510 -465
  165. tccli/services/tsf/v20180326/examples.json +4 -4
  166. tccli/services/tts/v20190823/api.json +10 -10
  167. tccli/services/vclm/v20240523/api.json +2 -2
  168. tccli/services/vcube/v20220410/api.json +10 -0
  169. tccli/services/vdb/v20230616/api.json +10 -0
  170. tccli/services/vdb/v20230616/examples.json +1 -1
  171. tccli/services/vpc/v20170312/api.json +824 -254
  172. tccli/services/vpc/v20170312/examples.json +66 -10
  173. tccli/services/vpc/vpc_client.py +383 -12
  174. tccli/services/vrs/v20200824/api.json +9 -0
  175. tccli/services/waf/v20180125/api.json +8113 -5814
  176. tccli/services/waf/v20180125/examples.json +90 -0
  177. tccli/services/waf/waf_client.py +559 -82
  178. tccli/services/wedata/v20210820/api.json +1379 -24
  179. tccli/services/wedata/v20210820/examples.json +25 -1
  180. tccli/services/wedata/wedata_client.py +171 -12
  181. tccli/services/weilingwith/v20230427/api.json +1 -1
  182. tccli/services/weilingwith/v20230427/examples.json +3 -3
  183. {tccli-3.0.1300.3.dist-info → tccli-3.0.1302.1.dist-info}/METADATA +2 -2
  184. {tccli-3.0.1300.3.dist-info → tccli-3.0.1302.1.dist-info}/RECORD +187 -184
  185. {tccli-3.0.1300.3.dist-info → tccli-3.0.1302.1.dist-info}/WHEEL +0 -0
  186. {tccli-3.0.1300.3.dist-info → tccli-3.0.1302.1.dist-info}/entry_points.txt +0 -0
  187. {tccli-3.0.1300.3.dist-info → tccli-3.0.1302.1.dist-info}/license_files/LICENSE +0 -0
@@ -0,0 +1,2809 @@
1
+ {
2
+ "actions": {
3
+ "AddAndPublishNetworkFirewallPolicyDetail": [
4
+ {
5
+ "document": "",
6
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"NewStrategy\",\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"describe content\",\n \"ClusterId\": \"cls-new\",\n \"FromPolicyRule\": 1,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 2,\n \"PodSelector\": \"a=b\"\n}",
7
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
8
+ "title": "容器网络创建网络策略添加并发布任务示例"
9
+ }
10
+ ],
11
+ "AddAndPublishNetworkFirewallPolicyYamlDetail": [
12
+ {
13
+ "document": "",
14
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"fshduis\",\n \"Description\": \"desc of network firewall policy\",\n \"ClusterId\": \"cls-hjsdfh\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
15
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
16
+ "title": "容器网络创建yaml网络策略添加任务示例"
17
+ }
18
+ ],
19
+ "AddAssetImageRegistryRegistryDetail": [
20
+ {
21
+ "document": "新增单个镜像仓库详细信息",
22
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Username\": \"usename\",\n \"Name\": \"admin\",\n \"Url\": \"http://127.0.0.1:8080\",\n \"RegistryVersion\": \"V2\",\n \"RegistryRegion\": \"default\",\n \"NetType\": \"public\",\n \"Password\": \"password\",\n \"RegistryType\": \"harbor\"\n}",
23
+ "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"connect closed\",\n \"NameRepeatErr\": \"name repeat err\",\n \"RegistryId\": 1002,\n \"RequestId\": \"f8d97649-ca1b-4f94-8ed4-40052a40d426\"\n }\n}",
24
+ "title": "新增单个镜像仓库详细信息"
25
+ }
26
+ ],
27
+ "AddComplianceAssetPolicySetToWhitelist": [
28
+ {
29
+ "document": "",
30
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddComplianceAssetPolicySetToWhitelist\n<公共请求参数>\n\n{\n \"AssetPolicySetList\": [\n {\n \"CustomerPolicyItemIdSet\": [\n 13\n ],\n \"CustomerAssetItemId\": 15\n }\n ]\n}",
31
+ "output": "{\n \"Response\": {\n \"RequestId\": \"eac6b301-a322-493a-8e36-83b295459397\"\n }\n}",
32
+ "title": "忽略检测项+资产列表"
33
+ },
34
+ {
35
+ "document": "忽略资产未通过检测项",
36
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddComplianceAssetPolicySetToWhitelist\n<公共请求参数>\n\n{\n \"AssetPolicySetList\": [\n {\n \"CustomerAssetItemId\": 2202462,\n \"CustomerPolicyItemIdSet\": [\n 2809\n ]\n }\n ],\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
37
+ "output": "{\n \"Response\": {\n \"RequestId\": \"5728fa7b-e88a-4cb0-aabb-a403c470ca36\"\n }\n}",
38
+ "title": "忽略资产未通过检测项"
39
+ }
40
+ ],
41
+ "AddCompliancePolicyAssetSetToWhitelist": [
42
+ {
43
+ "document": "",
44
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddCompliancePolicyAssetSetToWhitelist\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 10001,\n \"CustomerAssetItemIdSet\": [\n 10001,\n 10002\n ]\n}",
45
+ "output": "{\n \"Response\": {\n \"RequestId\": \"eac6b301-a322-493a-8e36-83b295459397\"\n }\n}",
46
+ "title": "忽略检测项+资产列表"
47
+ }
48
+ ],
49
+ "AddCompliancePolicyItemToWhitelist": [
50
+ {
51
+ "document": "",
52
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddCompliancePolicyItemToWhitelist\n<公共请求参数>\n\n{\n \"CustomerPolicyItemIdSet\": [\n 10001,\n 10002\n ]\n}",
53
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
54
+ "title": "忽略检测项列表"
55
+ }
56
+ ],
57
+ "AddEditAbnormalProcessRule": [
58
+ {
59
+ "document": "",
60
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEditAbnormalProcessRule\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"IsEnable\": true,\n \"RuleName\": \"customrule_20241014050108\",\n \"ImageIds\": [\n \"sha256:80d28bedfe5dec59da9ebf8e6260224ac9008ab5c11dbbe16ee3ba3e4439ac2c\",\n \"sha256:8652b9f0cb4c0599575e5a003f5906876e10c1ceb2ab9fe1786712dac14a50cf\",\n \"sha256:5d0da3dc976460b72c77d94c8a1ad043720b0416bfc16c52c45d4847e53fadb6\",\n \"sha256:84b0f3f7f6f0416a2a8ef19ac765f43887503bd1ba4c81cb6fd2a4eb3da4e867\",\n \"sha256:c059bfaa849c4d8e4aecaeb3a10c2d9b3d85f5165c66ad3a4d937758128c4d18\",\n \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"sha256:e57cb8aaa6a5a547a38bff69f54b86f1e9ed86a4ea8246f88ada3b0aa698cde0\",\n \"sha256:d41059c812a8741c15695046857b90747aef9c7f9d67733962d7bbb025b9d159\",\n \"sha256:7f8e468621fd9dc3eda2ea2294d684876c68d5df715bb18bd1caa3edabdde4b8\",\n \"sha256:1ca2c2a1b554474b067257607aa811d191bd3314cb4c31f73eee7d97bed3ff98\"\n ],\n \"RuleId\": \"670c35146a91d09858cd8398\",\n \"ChildRules\": [\n {\n \"ProcessPath\": \"/root/customrule_20241014050108.out\",\n \"RuleId\": \"670c35146a91d09858cd8399\",\n \"RuleLevel\": \"HIGH\",\n \"RuleMode\": \"RULE_MODE_ALERT\"\n }\n ]\n }\n}",
61
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
62
+ "title": "添加规则"
63
+ },
64
+ {
65
+ "document": "",
66
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEditAbnormalProcessRule\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"IsEnable\": true,\n \"RuleName\": \"customrule_20241014050108\",\n \"ImageIds\": [\n \"sha256:80d28bedfe5dec59da9ebf8e6260224ac9008ab5c11dbbe16ee3ba3e4439ac2c\",\n \"sha256:8652b9f0cb4c0599575e5a003f5906876e10c1ceb2ab9fe1786712dac14a50cf\",\n \"sha256:5d0da3dc976460b72c77d94c8a1ad043720b0416bfc16c52c45d4847e53fadb6\",\n \"sha256:84b0f3f7f6f0416a2a8ef19ac765f43887503bd1ba4c81cb6fd2a4eb3da4e867\",\n \"sha256:c059bfaa849c4d8e4aecaeb3a10c2d9b3d85f5165c66ad3a4d937758128c4d18\",\n \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"sha256:e57cb8aaa6a5a547a38bff69f54b86f1e9ed86a4ea8246f88ada3b0aa698cde0\",\n \"sha256:d41059c812a8741c15695046857b90747aef9c7f9d67733962d7bbb025b9d159\",\n \"sha256:7f8e468621fd9dc3eda2ea2294d684876c68d5df715bb18bd1caa3edabdde4b8\",\n \"sha256:1ca2c2a1b554474b067257607aa811d191bd3314cb4c31f73eee7d97bed3ff98\"\n ],\n \"RuleId\": \"670c35146a91d09858cd8398\",\n \"ChildRules\": [\n {\n \"ProcessPath\": \"/root/customrule_20241014050108.out\",\n \"RuleId\": \"670c35146a91d09858cd8399\",\n \"RuleLevel\": \"HIGH\",\n \"RuleMode\": \"RULE_MODE_ALERT\"\n }\n ]\n }\n}",
67
+ "output": "{\n \"Response\": {\n \"RequestId\": \"055e66ea-9a62-4315-900c-fd7bca22b3a7\"\n }\n}",
68
+ "title": "编辑规则"
69
+ }
70
+ ],
71
+ "AddEditAccessControlRule": [
72
+ {
73
+ "document": "",
74
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEditAccessControlRule\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"IsEnable\": true,\n \"RuleName\": \"llzlu_test\",\n \"ImageIds\": [\n \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"sha256:2237821772abe2ea18714288644d774d33ea36b2017366da25f3d308c08fdea4\"\n ],\n \"RuleId\": \"66f90eec43f38f311f8e22cf\",\n \"ChildRules\": [\n {\n \"ProcessPath\": \"*/vi\",\n \"RuleId\": \"66f90eec43f38f311f8e22d0\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"TargetFilePath\": \"/home/yunjing_testing_x86/*\"\n }\n ]\n }\n}",
75
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
76
+ "title": "添加规则"
77
+ }
78
+ ],
79
+ "AddEditImageAutoAuthorizedRule": [
80
+ {
81
+ "document": "",
82
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddEditImageAutoAuthorizedRule\n&RangeType=\"MANUAL\"\n&HostIdSet.0=\"be119857-7949-4650-aef5-9591b54091d0\"\n&MaxDailyCount=1\n&RuleId=1\n&IsEnabled=1\n&<公共请求参数>",
83
+ "output": "{\n \"Response\": {\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb9b65c768\"\n }\n}",
84
+ "title": "新增或编辑本地镜像自动授权规则"
85
+ }
86
+ ],
87
+ "AddEditReverseShellWhiteList": [
88
+ {
89
+ "document": "",
90
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddEditReverseShellWhiteList\n&WhiteListInfo.DstIp=127.0.0.1\n&WhiteListInfo.ImageIds.0=sha256:dabduwouo\n&WhiteListInfo.DstPort=12245\n&WhiteListInfo.ProcessName=processName\n&<公共请求参数>",
91
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
92
+ "title": "添加反弹shell白名单"
93
+ }
94
+ ],
95
+ "AddEditRiskSyscallWhiteList": [
96
+ {
97
+ "document": "",
98
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddEditRiskSyscallWhiteList\n&WhiteListInfo.ImageIds.0=sha256:27501aa\n&WhiteListInfo.SyscallNames.0=chroot\n&WhiteListInfo.ProcessPath=/test/test\n&<公共请求参数>",
99
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
100
+ "title": "添加高危系统调用白名单"
101
+ }
102
+ ],
103
+ "AddEditWarningRules": [
104
+ {
105
+ "document": "保存告警策略",
106
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEditWarningRules\n<公共请求参数>\n\n{\n \"WarningRules\": [\n {\n \"BeginTime\": \"00:00\",\n \"ControlBits\": \"00000000\",\n \"EndTime\": \"23:59\",\n \"Switch\": \"OFF\",\n \"Type\": \"IMG_VUL\"\n }\n ]\n}",
107
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
108
+ "title": "保存告警策略"
109
+ }
110
+ ],
111
+ "AddEscapeWhiteList": [
112
+ {
113
+ "document": "",
114
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddEscapeWhiteList\n<公共请求参数>\n\n{\n \"ImageIDs\": [\n \"045513497bb2\"\n ],\n \"EventType\": [\n \"\\\"ESCAPE_DOCKER_API\\\"\"\n ]\n}",
115
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
116
+ "title": "新增逃逸白名单"
117
+ }
118
+ ],
119
+ "AddIgnoreVul": [
120
+ {
121
+ "document": "",
122
+ "input": "https://tcss.tencentcloudapi.com/?Action=AddIgnoreVul\n&List.0.PocID=\"pcmgr-70064\"\n&List.0.ImageIDs.0=\"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\"\n&List.0.ImageType=\"2\"\n&<公共请求参数>",
123
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
124
+ "title": "新增漏洞扫描忽略漏洞"
125
+ }
126
+ ],
127
+ "AddNetworkFirewallPolicyDetail": [
128
+ {
129
+ "document": "",
130
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"test-2\",\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"description1\",\n \"ClusterId\": \"cls-fsdfw\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
131
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
132
+ "title": "容器网络创建网络策略添加任务示例"
133
+ }
134
+ ],
135
+ "AddNetworkFirewallPolicyYamlDetail": [
136
+ {
137
+ "document": "",
138
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AddNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"PolicyName\": \"policyname\",\n \"Description\": \"describe content\",\n \"ClusterId\": \"cls-dsfsdf\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
139
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
140
+ "title": "容器网络创建yaml网络策略添加任务示例"
141
+ }
142
+ ],
143
+ "CheckNetworkFirewallPolicyYaml": [
144
+ {
145
+ "document": "",
146
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckNetworkFirewallPolicyYaml\n<公共请求参数>\n\n{\n \"PolicyName\": \"sdfhuiwhiw\",\n \"Description\": \"description1\",\n \"ClusterId\": \"cls-shuiwf\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
147
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
148
+ "title": "容器网络创建检查Yaml网络策略任务示例"
149
+ }
150
+ ],
151
+ "CheckRepeatAssetImageRegistry": [
152
+ {
153
+ "document": "",
154
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckRepeatAssetImageRegistry\n<公共请求参数>\n\n{\n \"Name\": \"test-name\"\n}",
155
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"IsRepeat\": true\n }\n}",
156
+ "title": "检查单个镜像仓库名是否重复"
157
+ }
158
+ ],
159
+ "ConfirmNetworkFirewallPolicy": [
160
+ {
161
+ "document": "",
162
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ConfirmNetworkFirewallPolicy\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-1324\",\n \"Id\": [\n 1\n ]\n}",
163
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
164
+ "title": "容器网络创建网络策略确认任务示例"
165
+ }
166
+ ],
167
+ "CreateAbnormalProcessRulesExportJob": [
168
+ {
169
+ "document": "",
170
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAbnormalProcessRulesExportJob\n<公共请求参数>\n\n{}",
171
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"f8be02cc-5c2f-49d8-9bbf-79fcf5ac****\"\n }\n}",
172
+ "title": "创建异常进程规则导出任务"
173
+ }
174
+ ],
175
+ "CreateAccessControlsRuleExportJob": [
176
+ {
177
+ "document": "",
178
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAccessControlsRuleExportJob\n<公共请求参数>\n\n{}",
179
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"7e509aa8-24a6-4d7c-8e77-4222be2e****\"\n }\n}",
180
+ "title": "创建k8sApi异常规则导出任务"
181
+ }
182
+ ],
183
+ "CreateAssetImageRegistryScanTask": [
184
+ {
185
+ "document": "正常请求",
186
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageRegistryScanTask\n<公共请求参数>\n\n{\n \"All\": false,\n \"Id\": [\n 1256299843\n ],\n \"OnlyScanLatest\": false\n}",
187
+ "output": "{\n \"Response\": {\n \"RequestId\": \"538366ac-d056-4f69-92ca-cf9bc6c9463b\",\n \"TaskID\": 2\n }\n}",
188
+ "title": "正常请求"
189
+ },
190
+ {
191
+ "document": "镜像仓库创建镜像扫描任务",
192
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageRegistryScanTask\n<公共请求参数>\n\n{\n \"Id\": [\n 8741110\n ],\n \"ScanType\": [\n \"CVE\",\n \"VIRUS\",\n \"RISK\"\n ]\n}",
193
+ "output": "{\n \"Response\": {\n \"RequestId\": \"68d5d49c-4b6b-46af-b060-46f521db0400\"\n }\n}",
194
+ "title": "镜像仓库创建镜像扫描任务"
195
+ }
196
+ ],
197
+ "CreateAssetImageRegistryScanTaskOneKey": [
198
+ {
199
+ "document": "镜像仓库创建镜像一键扫描任务",
200
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageRegistryScanTaskOneKey\n<公共请求参数>\n\n{\n \"All\": true,\n \"ScanType\": [\n \"CVE\",\n \"RISK\"\n ]\n}",
201
+ "output": "{\n \"Response\": {\n \"RequestId\": \"68d5d49c-4b6b-46af-b060-46f521db0400\"\n }\n}",
202
+ "title": "镜像仓库创建镜像一键扫描任务"
203
+ }
204
+ ],
205
+ "CreateAssetImageScanSetting": [
206
+ {
207
+ "document": "添加容器安全镜像扫描设置",
208
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageScanSetting\n<公共请求参数>\n\n{\n \"Enable\": true,\n \"ScanTime\": \"00:00\",\n \"ScanPeriod\": 1,\n \"ScanVirus\": true,\n \"ScanRisk\": true,\n \"ScanVul\": true,\n \"ScanEndTime\": \"02:00\"\n}",
209
+ "output": "{\n \"Response\": {\n \"RequestId\": \"e3526ac5-6a37-46c4-8f65-c722973f4f65\"\n }\n}",
210
+ "title": "添加容器安全镜像扫描设置"
211
+ }
212
+ ],
213
+ "CreateAssetImageScanTask": [
214
+ {
215
+ "document": "",
216
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageScanTask\n<公共请求参数>\n\n{\n \"ScanVirus\": true,\n \"ScanRisk\": true,\n \"ScanVul\": true,\n \"All\": true,\n \"Images\": []\n}",
217
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a6d8d540-940f-47d9-8d7f-daac832ba5b4\",\n \"TaskID\": \"6013a6c334b9a9000cf519be\"\n }\n}",
218
+ "title": "创建镜像扫描任务"
219
+ }
220
+ ],
221
+ "CreateAssetImageVirusExportJob": [
222
+ {
223
+ "document": "",
224
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateAssetImageVirusExportJob\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"Name\": \"RiskLevel\",\n \"Values\": [\n \"1\"\n ],\n \"ExactMatch\": true\n }\n ],\n \"Limit\": 1,\n \"Offset\": 1,\n \"By\": \"RiskLevel\",\n \"Order\": \"desc\",\n \"ExportField\": [\n \"FileName\",\n \"RiskLevel\",\n \"Path\",\n \"Size\",\n \"VirusName\",\n \"Tags\"\n ],\n \"ImageID\": \"sha256:3cd27ee8bd44dc55e2efecf499e0e8c26216cf535c45891a9b1805fbc39d60a3\"\n}",
225
+ "output": "{\n \"Response\": {\n \"JobId\": \"8ddb3db7-6d50-48ee-bdcb-9cc37d49aa3c\",\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
226
+ "title": "创建主机列表导出任务"
227
+ }
228
+ ],
229
+ "CreateCheckComponent": [
230
+ {
231
+ "document": "",
232
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateCheckComponent\n<公共请求参数>\n\n{\n \"ClusterInfoList\": [\n {\n \"ClusterId\": \"cls-0zmsjvko\",\n \"ClusterRegion\": \"ap-guangzho\"\n }\n ]\n}",
233
+ "output": "{\n \"Response\": {\n \"RequestId\": \"feb3881a-be8a-4f43-a485-fa1af264c2cc\",\n \"InstallResult\": \"InstallSucc\"\n }\n}",
234
+ "title": "安装检查组件示例"
235
+ }
236
+ ],
237
+ "CreateClusterCheckTask": [
238
+ {
239
+ "document": "",
240
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateClusterCheckTask\n<公共请求参数>\n\n{\n \"ClusterCheckTaskList\": [\n {\n \"ClusterId\": \"cls-0zmsjvko\",\n \"ClusterRegion\": \"ap-guangzho\"\n }\n ]\n}",
241
+ "output": "{\n \"Response\": {\n \"CreateResult\": \"Succ\",\n \"NewTaskID\": \"4647204fb0f965430b999ffb1f8d974d\",\n \"RequestId\": \"c3a11cce-91df-4fbb-a935-ac85e162c31a\",\n \"TaskId\": 0\n }\n}",
242
+ "title": "创建集群扫描任务示例"
243
+ }
244
+ ],
245
+ "CreateComplianceTask": [
246
+ {
247
+ "document": "",
248
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateComplianceTask\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINER\"\n ]\n}",
249
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
250
+ "title": "创建合规检查任务"
251
+ }
252
+ ],
253
+ "CreateComponentExportJob": [
254
+ {
255
+ "document": "",
256
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateComponentExportJob\n<公共请求参数>\n\n{\n \"ImageID\": \"10001\"\n}",
257
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"JobId\": \"10001\"\n }\n}",
258
+ "title": "查询本地镜像组件列表导出"
259
+ }
260
+ ],
261
+ "CreateDefenceVulExportJob": [
262
+ {
263
+ "document": "",
264
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateDefenceVulExportJob\n<公共请求参数>\n\n{}",
265
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"JobId\": \"27501aaed5e639693783321219989889\"\n }\n}",
266
+ "title": "创建支持防御的漏洞导出任务"
267
+ }
268
+ ],
269
+ "CreateEmergencyVulExportJob": [
270
+ {
271
+ "document": "",
272
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateEmergencyVulExportJob\n&<公共请求参数>",
273
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"JobId\": \"10001\"\n }\n}",
274
+ "title": "创建应急漏洞导出任务"
275
+ }
276
+ ],
277
+ "CreateEscapeEventsExportJob": [
278
+ {
279
+ "document": "",
280
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateEscapeEventsExportJob\n&ExportField.0=Name\n&<公共请求参数>",
281
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\",\n \"JobId\": \"29b37d86-adcd-43d1-b21a-640e82965199\"\n }\n}",
282
+ "title": "创建逃逸事件导出异步任务"
283
+ }
284
+ ],
285
+ "CreateEscapeWhiteListExportJob": [
286
+ {
287
+ "document": "",
288
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateEscapeWhiteListExportJob\n<公共请求参数>\n\n{}",
289
+ "output": "{\n \"Response\": {\n \"JobId\": \"73805b97-0e40-4249-8fe5-f1e38de1c28a\",\n \"RequestId\": \"78382c9e-92c7-42bb-8a2a-04d406903d94\"\n }\n}",
290
+ "title": "创建逃逸白名单导出任务"
291
+ }
292
+ ],
293
+ "CreateExportComplianceStatusListJob": [
294
+ {
295
+ "document": "",
296
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateExportComplianceStatusListJob\n<公共请求参数>\n\n{\n \"AssetType\": \"ASSET_CONTAINER\",\n \"ExportByAsset\": false,\n \"ExportAll\": false,\n \"IdList\": []\n}",
297
+ "output": "{\n \"Response\": {\n \"JobId\": \"e4409223-8e92-45db-a857-11b1ff547c79\",\n \"RequestId\": \"3e6756ce-6512-498d-a9fd-8572ef4ce7d3\"\n }\n}",
298
+ "title": "创建一个导出安全合规信息的任务"
299
+ }
300
+ ],
301
+ "CreateHostExportJob": [
302
+ {
303
+ "document": "",
304
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateHostExportJob\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"HostName\",\n \"HostIP\",\n \"PublicIp\",\n \"Group\",\n \"InstanceID\",\n \"MachineType\",\n \"Status\",\n \"DockerVersion\",\n \"ContainerdVersion\",\n \"DockerFileSystemDriver\",\n \"ImageCnt\",\n \"ContainerCnt\"\n ]\n}",
305
+ "output": "{\n \"Response\": {\n \"JobId\": \"73805b97-0e40-4249-8fe5-f1e38de1c28a\",\n \"RequestId\": \"78382c9e-92c7-42bb-8a2a-04d406903d94\"\n }\n}",
306
+ "title": "创建主机列表导出任务"
307
+ }
308
+ ],
309
+ "CreateImageExportJob": [
310
+ {
311
+ "document": "",
312
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateImageExportJob\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"ImageName\"\n ]\n}",
313
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"sfsfsfsfsfs\",\n \"JobId\": \"jobid-dafdhj\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
314
+ "title": "创建镜像导出任务"
315
+ }
316
+ ],
317
+ "CreateK8sApiAbnormalEventExportJob": [
318
+ {
319
+ "document": "",
320
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateK8sApiAbnormalEventExportJob\n<公共请求参数>\n\n{}",
321
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"06ac844d-4f9d-43f8-b00e-45bc74dd****\"\n }\n}",
322
+ "title": "创建k8s api异常事件导出任务"
323
+ }
324
+ ],
325
+ "CreateK8sApiAbnormalRuleExportJob": [
326
+ {
327
+ "document": "",
328
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateK8sApiAbnormalRuleExportJob\n<公共请求参数>\n\n{}",
329
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"a3ce7861-e09f-44a2-a4b2-e7649a93****\"\n }\n}",
330
+ "title": "创建k8sApi异常规则导出任务"
331
+ }
332
+ ],
333
+ "CreateK8sApiAbnormalRuleInfo": [
334
+ {
335
+ "document": "",
336
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateK8sApiAbnormalRuleInfo\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"RuleName\": \"rulename1\",\n \"Status\": true,\n \"RuleInfoList\": [\n {\n \"Scope\": \"{\\\"RequestURI\\\":\\\"/apis/cowsajhhoa.k8s.io/v\\\",\\\"RequestUser\\\":\\\"“name”:”sanpasahsad-contaosaer-leader”)\\\\\\\"\\\",\\\"ResponseStatusCode\\\":\\\"200\\\",\\\"SourceIPS\\\":\\\"10.255.0.43\\\",\\\"UserAgent\\\":\\\"snapshot-controller\\\",\\\"Verb\\\":\\\"update\\\"}\",\n \"Action\": \"RULE_MODE_ALERT\",\n \"RiskLevel\": \"NOTICE\",\n \"Status\": true,\n \"IsDelete\": false\n }\n ],\n \"EffectClusterIDSet\": [],\n \"RuleType\": \"USER_DEFINED_RULE\",\n \"EffectAllCluster\": true,\n \"RuleID\": \"rule-id\"\n },\n \"CopySrcRuleID\": \"src-rule-id\",\n \"EventID\": 1\n}",
337
+ "output": "{\n \"Response\": {\n \"RequestId\": \"4a0dd046-0be4-434b-b212-f1a96636cc09\",\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\"\n }\n}",
338
+ "title": "创建k8sapi异常事件规则"
339
+ }
340
+ ],
341
+ "CreateNetworkFirewallClusterRefresh": [
342
+ {
343
+ "document": "",
344
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallClusterRefresh\n<公共请求参数>\n\n{}",
345
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
346
+ "title": "容器网络创建刷新任务示例"
347
+ }
348
+ ],
349
+ "CreateNetworkFirewallPolicyDiscover": [
350
+ {
351
+ "document": "",
352
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPolicyDiscover\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-gsdgs\"\n}",
353
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
354
+ "title": "容器网络集群网络策略创建自动发现任务示例"
355
+ }
356
+ ],
357
+ "CreateNetworkFirewallPublish": [
358
+ {
359
+ "document": "",
360
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-sdhfisdf\",\n \"Id\": [\n 1002\n ]\n}",
361
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
362
+ "title": "容器网络创建网络策略发布任务示例"
363
+ }
364
+ ],
365
+ "CreateNetworkFirewallUndoPublish": [
366
+ {
367
+ "document": "",
368
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateNetworkFirewallUndoPublish\n<公共请求参数>\n\n{\n \"ClusterId\": \"test-clusterid\",\n \"Id\": [\n 1021\n ]\n}",
369
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
370
+ "title": "容器网络创建网络策略撤销任务示例"
371
+ }
372
+ ],
373
+ "CreateOrModifyPostPayCores": [
374
+ {
375
+ "document": "",
376
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateOrModifyPostPayCores\n&CoresCnt=500\n&<公共请求参数>",
377
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
378
+ "title": "创建或者编辑弹性计费上限"
379
+ }
380
+ ],
381
+ "CreateProcessEventsExportJob": [
382
+ {
383
+ "document": "",
384
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateProcessEventsExportJob\n&<公共请求参数>",
385
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
386
+ "title": "创建异常进程事件导出异步任务"
387
+ }
388
+ ],
389
+ "CreateRefreshTask": [
390
+ {
391
+ "document": "创建刷新任务示例",
392
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateRefreshTask\n<公共请求参数>\n\n{}",
393
+ "output": "{\n \"Response\": {\n \"CreateResult\": \"Succ\",\n \"NewTaskID\": \"1730270334918953395\",\n \"RequestId\": \"547f3e18-d5af-47ba-a67a-be34ac9df697\",\n \"TaskId\": 0\n }\n}",
394
+ "title": "创建刷新任务示例"
395
+ }
396
+ ],
397
+ "CreateRiskDnsEventExportJob": [
398
+ {
399
+ "document": "",
400
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateRiskDnsEventExportJob\n<公共请求参数>\n\n{}",
401
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"JobId\": \"10001\"\n }\n}",
402
+ "title": "创建恶意请求事件导出任务"
403
+ }
404
+ ],
405
+ "CreateSearchTemplate": [
406
+ {
407
+ "document": "",
408
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateSearchTemplate\n<公共请求参数>\n\n{\n \"SearchTemplate\": {\n \"Id\": 1,\n \"Name\": \"test1\",\n \"DisplayData\": \"[{\\\"id\\\":449375484687,\\\"patternsField\\\":\\\"src_ip\\\",\\\"selectedtype\\\":\\\"is\\\",\\\"selectedOptionsMap\\\":{\\\"is\\\":\\\"匹配字符\\\",\\\"like\\\":\\\"模糊匹配字符\\\",\\\"not\\\":\\\"不包含字符\\\",\\\"is_one_of\\\":\\\"匹配以下任意字符\\\",\\\"not_one_of\\\":\\\"不包含以下任意字符\\\"},\\\"selectedTypeList\\\":[\\\"is\\\",\\\"like\\\",\\\"not\\\",\\\"is_one_of\\\",\\\"not_one_of\\\"],\\\"third_cat\\\":\\\"input\\\",\\\"value\\\":\\\"10.0.0.1\\\"}]\",\n \"TimeRange\": \"2020-06-1300:00:00至2020-07-1323:59:59\",\n \"LogType\": \"malware\",\n \"Flag\": \"simple\",\n \"Query\": \"{\\\"index\\\":[\\\"malware\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1591977600000,\\\"lte\\\":1594655999999}}},\\\"must\\\":[{\\\"term\\\":{\\\"src_ip\\\":\\\"10.0.0.1\\\"}}],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"aggs\\\":{\\\"count_stats\\\":{\\\"date_histogram\\\":{\\\"field\\\":\\\"timestamp\\\",\\\"interval\\\":\\\"12h\\\",\\\"time_zone\\\":\\\"Asia/Shanghai\\\",\\\"min_doc_count\\\":1}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\",\n \"Condition\": \"src_ip匹配字符:10.0.0.1\"\n }\n}",
409
+ "output": "{\n \"Response\": {\n \"RequestId\": \"49082d4a-71b4-4e32-9ca1-b33872a4a63a\"\n }\n}",
410
+ "title": "添加检索模板"
411
+ }
412
+ ],
413
+ "CreateSystemVulExportJob": [
414
+ {
415
+ "document": "",
416
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateSystemVulExportJob\n&<公共请求参数>",
417
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
418
+ "title": "创建系统漏洞导出任务"
419
+ }
420
+ ],
421
+ "CreateVirusScanAgain": [
422
+ {
423
+ "document": "",
424
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVirusScanAgain\n<公共请求参数>\n\n{\n \"TaskId\": \"6177adf5f95e94a76635****\",\n \"ContainerIds\": []\n}",
425
+ "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
426
+ "title": "运行时文件查杀重新检测"
427
+ }
428
+ ],
429
+ "CreateVirusScanTask": [
430
+ {
431
+ "document": "运行时文件查杀一键扫描",
432
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVirusScanTask\n<公共请求参数>\n\n{\n \"ScanRangeAll\": true,\n \"ScanPathAll\": true,\n \"ScanRangeType\": 1,\n \"ScanPathMode\": \"SCAN_PATH_DEFAULT\",\n \"Timeout\": 2\n}",
433
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a6d8d540-940f-47d9-8d7f-daac832ba5b4\",\n \"TaskID\": \"356276635\"\n }\n}",
434
+ "title": "运行时文件查杀一键扫描"
435
+ }
436
+ ],
437
+ "CreateVulContainerExportJob": [
438
+ {
439
+ "document": "",
440
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateVulContainerExportJob\n&PocID=1\n&<公共请求参数>",
441
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
442
+ "title": "创建受漏洞影响的容器导出任务"
443
+ }
444
+ ],
445
+ "CreateVulDefenceEventExportJob": [
446
+ {
447
+ "document": "",
448
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVulDefenceEventExportJob\n<公共请求参数>\n\n{}",
449
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"JobId\": \"fsdfhu23eje34\"\n }\n}",
450
+ "title": "创建漏洞防御导出任务"
451
+ }
452
+ ],
453
+ "CreateVulDefenceHostExportJob": [
454
+ {
455
+ "document": "",
456
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateVulDefenceHostExportJob\n<公共请求参数>\n\n{}",
457
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"JobId\": \"a9ca70d0-9a89-47f2-b87e-b158e4ceba9a\"\n }\n}",
458
+ "title": "创建漏洞防御主机导出任务"
459
+ }
460
+ ],
461
+ "CreateVulExportJob": [
462
+ {
463
+ "document": "",
464
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateVulExportJob\n&ImageID=sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\n&Limit=10\n&Offset=0\n&ExportField.0=CVEID\n&<公共请求参数>",
465
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
466
+ "title": "查询本地镜像组件列表导出"
467
+ }
468
+ ],
469
+ "CreateVulImageExportJob": [
470
+ {
471
+ "document": "",
472
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateVulImageExportJob\n&PocID=1\n&<公共请求参数>",
473
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
474
+ "title": "创建受漏洞影响的镜像导出任务"
475
+ }
476
+ ],
477
+ "CreateVulScanTask": [
478
+ {
479
+ "document": "",
480
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateVulScanTask\n&LocalImageScanType=ALL\n&RegistryImageScanType=ALL\n&<公共请求参数>",
481
+ "output": "{\n \"Response\": {\n \"LocalTaskID\": 36002,\n \"RegistryTaskID\": 0,\n \"RequestId\": \"5d02bef4-9f93-4d9d-90a9-47d7be4c8fc0\"\n }\n}",
482
+ "title": "创建漏洞扫描任务"
483
+ }
484
+ ],
485
+ "CreateWebVulExportJob": [
486
+ {
487
+ "document": "",
488
+ "input": "https://tcss.tencentcloudapi.com/?Action=CreateWebVulExportJob\n&<公共请求参数>",
489
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"JobId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
490
+ "title": "创建web漏洞导出任务"
491
+ }
492
+ ],
493
+ "DeleteAbnormalProcessRules": [
494
+ {
495
+ "document": "",
496
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteAbnormalProcessRules\n<公共请求参数>\n\n{\n \"RuleIdSet\": [\n \"1114\"\n ]\n}",
497
+ "output": "{\n \"Response\": {\n \"RequestId\": \"bcf438a3-8035-4a31-bc34-6afc9b0901ff\"\n }\n}",
498
+ "title": "删除运行异常进程策略"
499
+ }
500
+ ],
501
+ "DeleteAccessControlRules": [
502
+ {
503
+ "document": "",
504
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteAccessControlRules\n&RuleIdSet.0=10001\n&<公共请求参数>",
505
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
506
+ "title": "删除运行时访问控制策略"
507
+ }
508
+ ],
509
+ "DeleteComplianceAssetPolicySetFromWhitelist": [
510
+ {
511
+ "document": "取消资产忽略项",
512
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteComplianceAssetPolicySetFromWhitelist\n<公共请求参数>\n\n{\n \"AssetItemId\": 2202462,\n \"CustomerPolicyItemIdSet\": [\n 2809\n ],\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
513
+ "output": "{\n \"Response\": {\n \"RequestId\": \"925e6419-1fb8-4169-a96c-020e3ae9171e\"\n }\n}",
514
+ "title": "取消资产忽略项"
515
+ },
516
+ {
517
+ "document": "",
518
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteComplianceAssetPolicySetFromWhitelist\n<公共请求参数>\n\n{\n \"AssetItemId\": 10001,\n \"CustomerPolicyItemIdSet\": [\n 10001,\n 10002\n ]\n}",
519
+ "output": "{\n \"Response\": {\n \"RequestId\": \"eac6b301-a322-493a-8e36-83b295459397\"\n }\n}",
520
+ "title": "忽略检测项+资产列表"
521
+ }
522
+ ],
523
+ "DeleteCompliancePolicyAssetSetFromWhitelist": [
524
+ {
525
+ "document": "",
526
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteCompliancePolicyAssetSetFromWhitelist\n<公共请求参数>\n\n{\n \"PolicyAssetSetList\": [\n {\n \"CustomerPolicyItemId\": 12,\n \"CustomerAssetItemIdSet\": [\n 15\n ]\n }\n ]\n}",
527
+ "output": "{\n \"Response\": {\n \"RequestId\": \"eac6b301-a322-493a-8e36-83b295459397\"\n }\n}",
528
+ "title": "忽略检测项+资产列表"
529
+ }
530
+ ],
531
+ "DeleteCompliancePolicyItemFromWhitelist": [
532
+ {
533
+ "document": "",
534
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteCompliancePolicyItemFromWhitelist\n<公共请求参数>\n\n{\n \"WhitelistIdSet\": [\n 10001,\n 10002\n ]\n}",
535
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
536
+ "title": "取消忽略检测项列表"
537
+ }
538
+ ],
539
+ "DeleteEscapeWhiteList": [
540
+ {
541
+ "document": "",
542
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteEscapeWhiteList\n<公共请求参数>\n\n{\n \"IDSet\": [\n \"1\"\n ]\n}",
543
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
544
+ "title": "删除逃逸白名单"
545
+ }
546
+ ],
547
+ "DeleteIgnoreVul": [
548
+ {
549
+ "document": "",
550
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteIgnoreVul\n&List.0.PocID=\"poc_id\"\n&<公共请求参数>",
551
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
552
+ "title": "取消漏洞扫描忽略漏洞"
553
+ }
554
+ ],
555
+ "DeleteK8sApiAbnormalRule": [
556
+ {
557
+ "document": "",
558
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteK8sApiAbnormalRule\n<公共请求参数>\n\n{\n \"RuleIDSet\": []\n}",
559
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\"\n }\n}",
560
+ "title": "删除k8sapi异常事件规则"
561
+ }
562
+ ],
563
+ "DeleteMachine": [
564
+ {
565
+ "document": "",
566
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteMachine\n&Uuid=\"7c9e719e-aaaa-bbbb-9005-20c9b9a1f6b1\"\n&<公共请求参数>",
567
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
568
+ "title": "卸载Agent客户端"
569
+ }
570
+ ],
571
+ "DeleteNetworkFirewallPolicyDetail": [
572
+ {
573
+ "document": "",
574
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls_fdts***\",\n \"Id\": [\n 1\n ]\n}",
575
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
576
+ "title": "容器网络创建网络策略删除任务示例"
577
+ }
578
+ ],
579
+ "DeleteRaspRules": [
580
+ {
581
+ "document": "删除漏洞防御白名单",
582
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteRaspRules\n<公共请求参数>\n\n{\n \"IDs\": [\n 32\n ]\n}",
583
+ "output": "{\n \"Response\": {\n \"RequestId\": \"6c0fd9e1-8d54-4cf4-b339-7b5dc3afeb81\"\n }\n}",
584
+ "title": "删除漏洞防御白名单"
585
+ }
586
+ ],
587
+ "DeleteReverseShellEvents": [
588
+ {
589
+ "document": "",
590
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteReverseShellEvents\n&EventIdSet.0=\"1002\"\n&<公共请求参数>",
591
+ "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
592
+ "title": "删除运行时反弹shell事件"
593
+ }
594
+ ],
595
+ "DeleteReverseShellWhiteLists": [
596
+ {
597
+ "document": "",
598
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteReverseShellWhiteLists\n&WhiteListIdSet.0=\"id1\"\n&<公共请求参数>",
599
+ "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
600
+ "title": "删除运行时反弹shell白名单"
601
+ }
602
+ ],
603
+ "DeleteRiskSyscallEvents": [
604
+ {
605
+ "document": "",
606
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteRiskSyscallEvents\n&EventIdSet.0=10001\n&<公共请求参数>",
607
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
608
+ "title": "删除运行时高危系统调用事件"
609
+ }
610
+ ],
611
+ "DeleteRiskSyscallWhiteLists": [
612
+ {
613
+ "document": "",
614
+ "input": "https://tcss.tencentcloudapi.com/?Action=DeleteRiskSyscallWhiteLists\n&WhiteListIdSet.0=10001\n&<公共请求参数>",
615
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
616
+ "title": "删除运行时高危系统调用白名单"
617
+ }
618
+ ],
619
+ "DeleteSearchTemplate": [
620
+ {
621
+ "document": "",
622
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteSearchTemplate\n<公共请求参数>\n\n{\n \"Id\": 10\n}",
623
+ "output": "{\n \"Response\": {\n \"RequestId\": \"49082d4a-71b4-4e32-9ca1-b33872a4a63a\"\n }\n}",
624
+ "title": "删除检索模板"
625
+ }
626
+ ],
627
+ "DescribeABTestConfig": [
628
+ {
629
+ "document": "",
630
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeABTestConfig\n<公共请求参数>\n\n{}",
631
+ "output": "{\n \"Response\": {\n \"Config\": [\n {\n \"ProjectName\": \"tcss_pro\",\n \"Status\": true\n },\n {\n \"ProjectName\": \"ban_switch\",\n \"Status\": true\n },\n {\n \"ProjectName\": \"v20200715\",\n \"Status\": true\n }\n ],\n \"RequestId\": \"8fa9bf5e-a0dc-d89d-9ece-d68c2232a4c6\"\n }\n}",
632
+ "title": "获取用户当前灰度配置"
633
+ }
634
+ ],
635
+ "DescribeAbnormalProcessDetail": [
636
+ {
637
+ "document": "运行时异常进程事件详细信息",
638
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAbnormalProcessDetail\n<公共请求参数>\n\n{\n \"EventId\": \"5202566\"\n}",
639
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"-port 22\",\n \"ProcessPath\": \"/usr/local/bin/sshd\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"106.55.163.***\",\n \"ClusterID\": \"cls-13nfdn****\",\n \"ClusterName\": \"demo-dev\",\n \"ContainerId\": \"1***5fe59dbd61071f16d6165480d381********\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"/adoring_ishizaka\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 2,\n \"EventId\": \"10302329\",\n \"EventName\": \"异常进程事件-告警\",\n \"EventType\": \"FILE_ABNORMAL_READ\",\n \"FoundTime\": \"2024-10-21 15:55:45\",\n \"HostID\": \"1414-18a1-4775-9e3f-cdfc898********\",\n \"HostIP\": \"172.16.0.34\",\n \"ImageId\": \"sha256:1413413431fd9255658c128086395d3********\",\n \"ImageName\": \"alpine:latest\",\n \"LatestFoundTime\": \"2024-10-21 20:57:12\",\n \"Namespace\": \"default\",\n \"NodeID\": \"d41d8cd98f00******\",\n \"NodeName\": \"d41d8cd98f00*****\",\n \"NodeSubNetCIDR\": \"fe80::8132:1b51:52******\",\n \"NodeSubNetID\": \"sub-fn4nf***\",\n \"NodeSubNetName\": \"dev\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"fe8dfjf2d2****\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"pod-dev\",\n \"PodStatus\": \"RUNNING\",\n \"Status\": \"EVENT_DEALED\",\n \"WorkloadType\": \"StatefulSet\"\n },\n \"EventDetail\": {\n \"Description\": \"检测到疑似反弹shell命令执行\",\n \"GroupName\": \"SYSTEM_DEFINED_RULE\",\n \"MatchRule\": {\n \"ProcessPath\": \"/usr/bin\",\n \"RuleId\": \"100000000000000000000004\",\n \"RuleLevel\": \"HIGH\",\n \"RuleMode\": \"RULE_MODE_ALERT\"\n },\n \"OperationTime\": \"2024-10-23 17:38:12\",\n \"Remark\": \"for dev\",\n \"RuleId\": \"124\",\n \"RuleName\": \"REVERSE_SHELL\",\n \"Solution\": \"排查反弹shell行为及目标地址是否为业务正常需要\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 330852,\n \"ProcessName\": \"containerd-shim\",\n \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\",\n \"ProcessPath\": \"/usr/bin/containerd-shim\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2907621,\n \"ProcessMd5\": \"8a5772dee965c8223aebc1225e*****\",\n \"ProcessName\": \"xenoncli\",\n \"ProcessParam\": \"xenoncli xenon ping\",\n \"ProcessPath\": \"/usr/local/bin/xenoncli\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"280ebb84-63c5-417e-95bd-e3160f6c8cdc\"\n }\n}",
640
+ "title": "运行时异常进程事件详细信息"
641
+ }
642
+ ],
643
+ "DescribeAbnormalProcessEventTendency": [
644
+ {
645
+ "document": "",
646
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessEventTendency\n&EndTime=2021-05-01\n&StartTime=2021-05-07\n&<公共请求参数>",
647
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ProxyToolEventCount\": 0,\n \"RiskCmdEventCount\": 0,\n \"AttackCmdEventCount\": 0,\n \"UserDefinedRuleEventCount\": 0,\n \"TransferControlEventCount\": 0,\n \"AbnormalChildProcessEventCount\": 0,\n \"ReverseShellEventCount\": 0,\n \"FilelessEventCount\": 0,\n \"Date\": \"2020-09-22\"\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
648
+ "title": "查询待处理异常进程事件趋势"
649
+ }
650
+ ],
651
+ "DescribeAbnormalProcessEvents": [
652
+ {
653
+ "document": "运行时异常进程列表",
654
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAbnormalProcessEvents\n<公共请求参数>\n\n{}",
655
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"cls-fjnfg****\",\n \"ClusterName\": \"demoset\",\n \"ContainerId\": \"2dc265571ad62064781574cb7f854bf25886660c3c99ae677d5c85528409f82d\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"containner1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"检测到敏感服务异常子进程启动\",\n \"EventCount\": 51,\n \"EventType\": \"MALICE_PROCESS_START\",\n \"FoundTime\": \"2020-10-29 00:05:02\",\n \"HostID\": \"8d2fqqq4-8f23-46ba-94ae-da11039e82d3\",\n \"HostIP\": \"10.0.86.119\",\n \"Id\": \"2961418\",\n \"ImageId\": \"sha256:736beeb0cd4edd4e1d3be51d5120eeced04eb50b61fc4a24c54a79ea66e40345\",\n \"ImageName\": \"image1\",\n \"LatestFoundTime\": \"2020-10-29 23:57:45\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchGroupName\": \"SYSTEM_DEFINED_RULE\",\n \"MatchProcessPath\": \"/bin/bash\",\n \"MatchRuleId\": \"100000000000000000000007\",\n \"MatchRuleLevel\": \"MIDDLE\",\n \"MatchRuleName\": \"ABNORMAL_CHILD_PROC\",\n \"NodeID\": \"8a5772dee965c8223aebc*****\",\n \"NodeName\": \"qsh4-k8s-sh-prod4-202206287zr4r-47\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demoset\",\n \"ProcessPath\": \"/bin/bash\",\n \"PublicIP\": \"1.1.1.1\",\n \"RuleExist\": true,\n \"RuleId\": \"100021\",\n \"Solution\": \"排查是否为正常业务需要的命令执行,\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"e8a7b8e9-1894-4715-9201-67e0f74692db\",\n \"TotalCount\": 1000\n }\n}",
656
+ "title": "运行时异常进程列表"
657
+ }
658
+ ],
659
+ "DescribeAbnormalProcessLevelSummary": [
660
+ {
661
+ "document": "",
662
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessLevelSummary\n&<公共请求参数>",
663
+ "output": "{\n \"Response\": {\n \"MediumLevelEventCount\": 0,\n \"HighLevelEventCount\": 0,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"LowLevelEventCount\": 0\n }\n}",
664
+ "title": "统计异常进程各威胁等级待处理事件数"
665
+ }
666
+ ],
667
+ "DescribeAbnormalProcessRuleDetail": [
668
+ {
669
+ "document": "",
670
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
671
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6045892534b9a9000c4ae5ba\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"9999\",\n \"ChildRules\": [\n {\n \"RuleId\": \"6020e81134b9a9000c50b56a\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/bin/ptest\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60212ddd98dab16785dfeab2\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/ps\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"6021472934b9a9000c358fa3\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/top\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"602f603d34b9a9000cb2b405\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/tail\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60326e4434b9a9000c0897a8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/busybox\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60337df034b9a9000c2240c8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/sss\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16********\"\n ]\n }\n }\n}",
672
+ "title": "根据事件的镜像ID,查询当前镜像的规则详情(用户策略)"
673
+ },
674
+ {
675
+ "document": "",
676
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
677
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6048403bd620f3f9012c521d\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"系统策略\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"100000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"PROXY_TOOL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"TRANSFER_CONTROL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ATTACK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000004\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"REVERSE_SHELL\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000005\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"FILELESS\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000006\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"RISK_CMD\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"100000000000000000000007\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"ABNORMAL_CHILD_PROC\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b**********\"\n ]\n }\n }\n}",
678
+ "title": "根据事件的镜像ID,查询当前镜像的规则详情(系统策略)"
679
+ },
680
+ {
681
+ "document": "",
682
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRuleDetail\n&RuleId=6045892534b9a9000c4ae5ba\n&Limit=10\n&Offset=0\n&<公共请求参数>",
683
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\",\n \"RuleDetail\": {\n \"RuleId\": \"6045892534b9a9000c4ae5ba\",\n \"IsEnable\": true,\n \"RuleName\": \"9999\",\n \"IsDefault\": false,\n \"ChildRules\": [\n {\n \"RuleId\": \"6020e81134b9a9000c50b56a\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/bin/ptest\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60212ddd98dab16785dfeab2\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/ps\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"6021472934b9a9000c358fa3\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/top\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"602f603d34b9a9000cb2b405\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/tail\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60326e4434b9a9000c0897a8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/busybox\",\n \"RuleLevel\": \"MIDDLE\"\n },\n {\n \"RuleId\": \"60337df034b9a9000c2240c8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/sss\",\n \"RuleLevel\": \"MIDDLE\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16********\"\n ]\n }\n }\n}",
684
+ "title": "根据规则ID查询规则详情(用户策略)"
685
+ }
686
+ ],
687
+ "DescribeAbnormalProcessRules": [
688
+ {
689
+ "document": "",
690
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAbnormalProcessRules\n&Limit=10\n&Offset=0\n&<公共请求参数>",
691
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RuleSet\": [\n {\n \"UpdateTime\": \"2022-01-01 00:00:00\",\n \"IsEnable\": true,\n \"RuleId\": \"10001\",\n \"EffectImageCount\": 1,\n \"EditUserName\": \"admin\",\n \"RuleName\": \"rule_name\",\n \"IsDefault\": true\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
692
+ "title": "运行时异常进程策略列表"
693
+ }
694
+ ],
695
+ "DescribeAccessControlDetail": [
696
+ {
697
+ "document": "运行时访问控制事件详细信息",
698
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAccessControlDetail\n<公共请求参数>\n\n{\n \"EventId\": \"5202566\"\n}",
699
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"/usr/bin/containerd-shim-runc-v2 -namespace moby -address /run/containerd/containerd.sock\",\n \"ProcessPath\": \"/usr/bin/containerd-shim-runc-v2\",\n \"ProcessStartUser\": \"0\",\n \"ProcessUserGroup\": \"0\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"175.178.113.111\",\n \"ClusterID\": \"cls-demo1\",\n \"ClusterName\": \"web-demo\",\n \"ContainerId\": \"75D3326A-9B9C-4275-895A-16FDA1*****\",\n \"ContainerIsolateOperationSrc\": \"ContainerIsolateOperationSrc\",\n \"ContainerName\": \"/k8s_xenon_mysql-tce-cwp-mysql-2_sso_c9fdfba4-e31a-46bc-a43a-****\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 130,\n \"EventId\": \"5124493\",\n \"EventName\": \"高危系统调用\",\n \"EventType\": \"RISK_SYSCALL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-23 00:05:17\",\n \"HostID\": \"11141114-66fd-4171-93eb-2f4fc36ef1e1\",\n \"HostIP\": \"10.0.0.105\",\n \"ImageId\": \"sha256:11141114e95dce36e8455cf657e1e54d74bb8fac6111411141114\",\n \"ImageName\": \"registry.tce.com/service-vendors/mysql-xenon:8.0.32-20240524-155426-11141114.rhel.amd64\",\n \"LatestFoundTime\": \"2024-10-23 17:02:47\",\n \"Namespace\": \"default\",\n \"NodeID\": \"pod-dj4xjf***\",\n \"NodeName\": \"tcs-10-0-0-105\",\n \"NodeSubNetCIDR\": \"fe80::8132:1b51:5********\",\n \"NodeSubNetID\": \"subnet-dfj4***\",\n \"NodeSubNetName\": \"default\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"node-4jfjfgdnvnd****\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demonset\",\n \"PodStatus\": \"running\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"StatefulSet\"\n },\n \"EventDetail\": {\n \"Description\": \"检测到系统命令被篡改\",\n \"MatchRule\": {\n \"ProcessPath\": \"/home/yunjing_testing_x86/events_trigger_x86\",\n \"RuleId\": \"200000000000000000000002\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"TargetFilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\"\n },\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"demoset\",\n \"RuleId\": \"222222222222222222222222\",\n \"RuleName\": \"系统策略\",\n \"Solution\": \"排查是否为正常业务需要的系统命令替换\"\n },\n \"ParentProcessInfo\": {\n \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\",\n \"ProcessPath\": \"/usr/bin/containerd-shim\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2907621,\n \"ProcessMd5\": \"8a5772dee965c8223aebc1225e*****\",\n \"ProcessName\": \"xenoncli\",\n \"ProcessParam\": \"xenoncli xenon ping\",\n \"ProcessPath\": \"/usr/local/bin/xenoncli\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"a8db49cf-2c9a-492c-96e0-a87dcf75be23\",\n \"TamperedFileInfo\": {\n \"FileCreateTime\": \"2024-10-11 11:02:58\",\n \"FileDiff\": \"UNKNOW\",\n \"FileName\": \"pwnkit.so:.\",\n \"FilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\",\n \"FileSize\": 24,\n \"FileType\": \"UNKNOWN\",\n \"LatestTamperedFileMTime\": \"2024-10-11 11:02:58\",\n \"NewFile\": \"default.txt\"\n }\n }\n}",
700
+ "title": "运行时访问控制事件详细信息"
701
+ }
702
+ ],
703
+ "DescribeAccessControlEvents": [
704
+ {
705
+ "document": "运行时访问控制事件列表",
706
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAccessControlEvents\n<公共请求参数>\n\n{}",
707
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"cls-fdj4****\",\n \"ClusterName\": \"demoset\",\n \"ContainerId\": \"a41351f3384159740167f25d83fcb206ffa154ab31d50c6594580ca6bac0b2cf\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"container1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"STOPPED\",\n \"Description\": \"检测到系统计划任务被修改\",\n \"EventCount\": 10012,\n \"EventType\": \"NORMAL\",\n \"FileName\": \"cron.update\",\n \"FilePath\": \"/etc/crontabs/cron.update\",\n \"FoundTime\": \"2020-10-29 18:11:10\",\n \"HostID\": \"f5a89f72-aaad-bbbc-cccc-eb3b3b74c2f0\",\n \"HostIP\": \"10.86.68.35\",\n \"Id\": \"4904016\",\n \"ImageId\": \"sha256:3926aaa0fe2ece5cbe51aaaf242b074c211beb8e046c9d4db4959c220be0171f\",\n \"ImageName\": \"iamge1\",\n \"LatestFoundTime\": \"2020-10-29 18:11:10\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchFilePath\": \"/etc/crontabs/cron.update\",\n \"MatchProcessPath\": \"/bin/busybox\",\n \"MatchRuleId\": \"200000000000000000000001\",\n \"MatchRuleName\": \"系统策略\",\n \"NodeID\": \"8a5772dee965c8223aebc*****\",\n \"NodeName\": \"host1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demoset\",\n \"ProcessName\": \"/bin/busybox\",\n \"PublicIP\": \"1.1.1.1\",\n \"RuleExist\": true,\n \"RuleId\": \"222222222222222222222222\",\n \"Solution\": \"排查是否为正常业务需要的计划任务修改\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"098ea687-eba5-4b30-9c05-d3ee0749d0a7\",\n \"TotalCount\": 13\n }\n}",
708
+ "title": "运行时访问控制事件列表"
709
+ }
710
+ ],
711
+ "DescribeAccessControlEventsExport": [
712
+ {
713
+ "document": "查询运行时访问控制事件列表导出",
714
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlEventsExport\n&ExportField.0=filed_name\n&<公共请求参数>",
715
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"https://cwp-1258344***.cos.ap-guangzhou.myqcloud.com/file.txt\",\n \"JobId\": \"10001\",\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
716
+ "title": "查询运行时访问控制事件列表导出"
717
+ }
718
+ ],
719
+ "DescribeAccessControlRuleDetail": [
720
+ {
721
+ "document": "",
722
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&ImageId=\"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
723
+ "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"6045899634b9a9000c4ae5bb\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [\n {\n \"RuleId\": \"603279ba34b9a9000c0897ae\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.txt\"\n },\n {\n \"RuleId\": \"60327a7b34b9a9000c0897af\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test2.txt\"\n },\n {\n \"RuleId\": \"6033081114b9a9000c0897b0\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/coreutils\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60337e1034b9a9000c2240c9\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60361e8234b9a9000cf7a3ee\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"603772d334b9a9000cd92ae8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/iv\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"6045899634b9a9000c4ae5bc\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"/1.txt\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
724
+ "title": "根据事件的镜像ID,查询当前镜像的规则详情(用户策略)"
725
+ },
726
+ {
727
+ "document": "",
728
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e\n&Limit=10\n&Offset=0\n&<公共请求参数>",
729
+ "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"60484042d620f3f9012c521e\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"200000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_CRONTAB\"\n },\n {\n \"RuleId\": \"200000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_SYS_BIN\"\n },\n {\n \"RuleId\": \"200000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_USRCFG\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
730
+ "title": "根据事件的镜像ID,查询当前镜像的规则详情(系统策略)"
731
+ },
732
+ {
733
+ "document": "",
734
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e\n&Limit=10\n&Offset=0\n&<公共请求参数>",
735
+ "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"6045899634b9a9000c4ae5bb\",\n \"IsEnable\": true,\n \"IsDefault\": false,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [\n {\n \"RuleId\": \"603279ba34b9a9000c0897ae\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.txt\"\n },\n {\n \"RuleId\": \"60327a7b34b9a9000c0897af\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test2.txt\"\n },\n {\n \"RuleId\": \"6033081114b9a9000c0897b0\",\n \"RuleMode\": \"RULE_MODE_HOLDUP\",\n \"ProcessPath\": \"/usr/bin/coreutils\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60337e1034b9a9000c2240c9\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/data/a.out\",\n \"TargetFilePath\": \"/tmp/test.txt\"\n },\n {\n \"RuleId\": \"60361e8234b9a9000cf7a3ee\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"603772d334b9a9000cd92ae8\",\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"ProcessPath\": \"/usr/bin/iv\",\n \"TargetFilePath\": \"*.HTML\"\n },\n {\n \"RuleId\": \"6045899634b9a9000c4ae5bc\",\n \"RuleMode\": \"RULE_MODE_RELEASE\",\n \"ProcessPath\": \"/usr/bin/vi\",\n \"TargetFilePath\": \"/1.txt\"\n }\n ],\n \"SystemChildRules\": [],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
736
+ "title": "根据规则ID查询规则详情(用户策略)"
737
+ },
738
+ {
739
+ "document": "",
740
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRuleDetail\n&RuleId=60484042d620f3f9012c521e&Limit=10\n&Offset=0\n&<公共请求参数>",
741
+ "output": "{\n \"Response\": {\n \"RequestId\": \"1af946cb-d3d5-4b03-bbfc-3d5ad306f753\",\n \"RuleDetail\": {\n \"RuleId\": \"60484042d620f3f9012c521e\",\n \"IsEnable\": true,\n \"IsDefault\": true,\n \"RuleName\": \"kkkkk\",\n \"ChildRules\": [],\n \"SystemChildRules\": [\n {\n \"RuleId\": \"200000000000000000000001\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_CRONTAB\"\n },\n {\n \"RuleId\": \"200000000000000000000002\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_SYS_BIN\"\n },\n {\n \"RuleId\": \"200000000000000000000003\",\n \"IsEnable\": true,\n \"RuleMode\": \"RULE_MODE_ALERT\",\n \"RuleType\": \"CHANGE_USRCFG\"\n }\n ],\n \"ImageIds\": [\n \"sha256:300e315adb2f96afe5f0b2780b87f28ae95231fe3bdd1e16b9ba606307728f55\",\n \"sha256:e50c909a8df2b7c8b92a6e8730e210ebe98e5082871e66edd8ef4d90838cbd25\",\n \"sha256:298ec0e28760b8eb1aad79711dc29c19041c61d7cf342dd1f445e91f30500549\"\n ]\n }\n }\n}",
742
+ "title": "根据规则ID查询规则详情(系统策略)"
743
+ }
744
+ ],
745
+ "DescribeAccessControlRules": [
746
+ {
747
+ "document": "",
748
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAccessControlRules\n&Limit=10\n&Offset=0\n&<公共请求参数>",
749
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RuleSet\": [\n {\n \"UpdateTime\": \"2022-01-01 00:00:00\",\n \"IsEnable\": true,\n \"RuleId\": \"10001\",\n \"EffectImageCount\": 1,\n \"EditUserName\": \"admin\",\n \"RuleName\": \"rule_name\",\n \"IsDefault\": true\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
750
+ "title": "运行时访问控制策略列表"
751
+ }
752
+ ],
753
+ "DescribeAffectedClusterCount": [
754
+ {
755
+ "document": "",
756
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedClusterCount\n<公共请求参数>\n\n{}",
757
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dba27bfb-5260-4ddd-8661-848c6820f3e0\",\n \"SeriousRiskClusterCount\": 0,\n \"HighRiskClusterCount\": 2,\n \"MiddleRiskClusterCount\": 41,\n \"HintRiskClusterCount\": 21\n }\n}",
758
+ "title": "请求示例"
759
+ }
760
+ ],
761
+ "DescribeAffectedNodeList": [
762
+ {
763
+ "document": "",
764
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedNodeList\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"CheckItemId\": \"15\",\n \"Offset\": \"0\"\n}",
765
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d2cf3a82-f75e-49f3-b2ea-d1f9172062db\",\n \"TotalCount\": 6,\n \"AffectedNodeList\": [\n {\n \"NodeName\": \"inode****\",\n \"ClusterId\": \"cls-0zmsjvko\",\n \"ClusterName\": \"wk独立集群\",\n \"InstanceId\": \"ins-afynf7mw\",\n \"PrivateIpAddresses\": \"10.0.2.7\",\n \"InstanceRole\": \"WORKER\",\n \"ClusterVersion\": \"1.18.4\",\n \"ContainerRuntime\": \"docker\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"Runc 版本为 1.0.0-rc10\"\n },\n {\n \"ClusterId\": \"cls-0zmsjvko\",\n \"ClusterName\": \"wk独立集群\",\n \"InstanceId\": \"ins-9l567jse\",\n \"PrivateIpAddresses\": \"10.0.2.42\",\n \"InstanceRole\": \"WORKER\",\n \"ClusterVersion\": \"1.18.4\",\n \"ContainerRuntime\": \"docker\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"Runc 版本为 1.0.0-rc10\",\n \"NodeName\": \"inode****\"\n }\n ]\n }\n}",
766
+ "title": "查询节点类型的影响范围示例"
767
+ }
768
+ ],
769
+ "DescribeAffectedWorkloadList": [
770
+ {
771
+ "document": "",
772
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAffectedWorkloadList\n<公共请求参数>\n\n{\n \"CheckItemId\": 10071,\n \"Limit\": 10,\n \"Offset\": 0\n}",
773
+ "output": "{\n \"Response\": {\n \"AffectedWorkloadList\": [\n {\n \"ClusterId\": \"test-clusterid\",\n \"ClusterName\": \"benben-tcss\",\n \"Region\": \"ap-guangzhou\",\n \"VerifyInfo\": \"yunjing-agent set image tag \\\"latest\\\"\",\n \"WorkloadName\": \"tcss/yunjing-agent\",\n \"WorkloadType\": \"DaemonSet\"\n }\n ],\n \"RequestId\": \"299deeb1-48aa-449d-980c-1f46e2375cec\",\n \"TotalCount\": \"0\"\n }\n}",
774
+ "title": "查询workload类型的影响范围示例"
775
+ }
776
+ ],
777
+ "DescribeAgentDaemonSetCmd": [
778
+ {
779
+ "document": "查询平行容器安装命令",
780
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAgentDaemonSetCmd\n&IsCloud=true\n&NetType=\"basic\"\n&<公共请求参数>",
781
+ "output": "{\n \"Response\": {\n \"Command\": \"install command'\",\n \"FileContent\": \"fakecontent\",\n \"RequestId\": \"0adc9022-1364-4b4b-b3e7-2e37930af279\",\n \"URL\": \"https://1.2.3.4/a\"\n }\n}",
782
+ "title": "查询平行容器安装命令"
783
+ }
784
+ ],
785
+ "DescribeAgentInstallCommand": [
786
+ {
787
+ "document": "",
788
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAgentInstallCommand\n&IsCloud=true\n&NetType=\"basic\"\n&<公共请求参数>",
789
+ "output": "{\n \"Response\": {\n \"ARMCommand\": \"wget http://a.com/ydeyes_linux64_aarch64.tar.gz -O ydeyes_linux64_aarch64.tar.gz && tar -zxvf ydeyes_linux64_aarch64.tar.gz && ./self_cloud_install_linux64.sh\",\n \"LinuxCommand\": \"wget http://a.comydeyes_linux64.tar.gz -O ydeyes_linux64.tar.gz && tar -zxvf ydeyes_linux64.tar.gz && ./self_cloud_install_linux64.sh\",\n \"RequestId\": \"751c2a46-7ef4-4932-ac06-5ccc2faa74fb\",\n \"WindowsCommand\": \"powershell -executionpolicy bypass -c \\\"(New-Object Net.WebClient).DownloadFile('http://a.com/ydeyes_win32.exe', $ExecutionContext.SessionState.Path.GetUnresolvedProviderPathFromPSPath('.\\\\ydeyes_win32.exe'))\\\"; \\\"./ydeyes_win32.exe\\\"\",\n \"WindowsDownloadUrl\": \"https://a.com/ydeyes_win32.exe\",\n \"WindowsStepOne\": \"http://a.com/ydeyes_win32.exe\",\n \"WindowsStepTwo\": \"ydeyes_win32.exe\"\n }\n}",
790
+ "title": "查询agent安装命令"
791
+ }
792
+ ],
793
+ "DescribeAssetAppServiceList": [
794
+ {
795
+ "document": "查询app服务列表",
796
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetAppServiceList\n<公共请求参数>\n\n{}",
797
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"/var/log/access.log\",\n \"Config\": \"/var/config/aaa.conf\",\n \"ContainerId\": \"3a37fab5d1d330a0bc243607d5091649c7546495fdb39f009db49ac062f3b143\",\n \"ContainerName\": \"/k8s_k8s-csp-osd-container_csp-pod-osd-1_tcs-system_6e47070d-360a-49e6-b10e-91daa81162aa_1\",\n \"DataPath\": \"/a/b\",\n \"ErrorLog\": \"/var/log/error.log\",\n \"Exe\": \"/usr/sbin/rpcbind\",\n \"HostID\": \"e1c1db55-3752-4f4e-b88a-158a87549991\",\n \"HostIP\": \"10.0.0.142\",\n \"HostName\": \"tcs-test2\",\n \"Listen\": [\n \"tcp://:::111\",\n \"tcp://0.0.0.0:111\"\n ],\n \"MainType\": \"app\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"Parameter\": \"/sbin/rpcbind -w\",\n \"Pids\": [\n 66771\n ],\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"1.2.3.4\",\n \"RunAs\": \"rpc:rpc\",\n \"ServiceID\": \"fe72109ce260dbb137e60e1f20401c011256299843\",\n \"Type\": \"rpcbind\",\n \"Version\": \"1.0.1\",\n \"WebRoot\": \"/www\"\n }\n ],\n \"RequestId\": \"66fccb1f-f7cf-4020-ba91-e60d78d77c71\",\n \"TotalCount\": 1212\n }\n}",
798
+ "title": "查询app服务列表"
799
+ }
800
+ ],
801
+ "DescribeAssetClusterList": [
802
+ {
803
+ "document": "",
804
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetClusterList\n<公共请求参数>\n\n{}",
805
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"BindRuleName\": \"piper\",\n \"ClusterID\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ClusterVersion\": \"1.1.4\",\n \"CpuLimit\": 0,\n \"MemLimit\": 0,\n \"Status\": \"CSR_RUNNING\"\n }\n ],\n \"RequestId\": \"bb39b643-b0e1-4c79-b006-7d62083227a8\",\n \"TotalCount\": 15\n }\n}",
806
+ "title": "查询集群列表"
807
+ }
808
+ ],
809
+ "DescribeAssetComponentList": [
810
+ {
811
+ "document": "",
812
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetComponentList\n<公共请求参数>\n\n{\n \"ContainerID\": \"dnhaidhkahdjas\"\n}",
813
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Name\": \"zlib\",\n \"Version\": \"1.2.11-r0;apk;;\"\n },\n {\n \"Name\": \"apk-tools\",\n \"Version\": \"2.7.6-r0;apk;;\"\n }\n ],\n \"RequestId\": \"8341b3a1-8bb3-43ad-a56e-30e265be1a97\",\n \"TotalCount\": 14\n }\n}",
814
+ "title": "查询容器组件列表"
815
+ }
816
+ ],
817
+ "DescribeAssetContainerDetail": [
818
+ {
819
+ "document": "查询容器信息",
820
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetContainerDetail\n<公共请求参数>\n\n{\n \"ContainerId\": \"cndajlhcklanca\"\n}",
821
+ "output": "{\n \"Response\": {\n \"AppCnt\": 0,\n \"CPUUsage\": 0,\n \"ClusterID\": \"cls-m2x0ndjy\",\n \"ClusterName\": \"tke2\",\n \"Cmd\": \"/usr/bin/dumb-init -- /nginx-ingress-controller --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-controller-leader --leader-elect-retry-period=2s --leader-elect-renew-deadline=10s --leader-elect-lease-duration=15s --v=2 --ingress-class=nginx --controller-class=k8s.io/ingress-nginx --configmap=ingress-nginx/ingress-nginx-controller --watch-ingress-without-class=true --update-status-on-shutdown=false --time-buckets=0.01,0.1,1,10 --length-buckets=10,30,50,70,90 --size-buckets=10,100,1000,100000,1000****\",\n \"ComponentCnt\": 0,\n \"ContainerName\": \"cbs-csi\",\n \"CreateTime\": \"2024-10-24 19:36:24\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostStatus\": \"ONLINE\",\n \"ImageCreateTime\": \"0001-01-01 08:05:43\",\n \"ImageID\": \"sha256:563af\",\n \"ImageName\": \"image:latest\",\n \"ImageSize\": 0,\n \"IsolateSource\": \"none \",\n \"IsolateTime\": \"1970-01-01 00:00:01\",\n \"K8sMaster\": \"etcd\",\n \"Mounts\": [],\n \"NetStatus\": \"NORMAL\",\n \"NetSubStatus\": \"NONE\",\n \"Network\": {\n \"EndpointID\": \"myService/us-west-1/instance\",\n \"Gateway\": \"gateway\",\n \"Ipv4\": \"127.0.0.1\",\n \"Ipv6\": \"2001:db8:85a3::8a2e:370:7334\",\n \"MAC\": \"00:1A:2B:3C:4D:5E\",\n \"Mode\": \"mode\",\n \"Name\": \"name\",\n \"NetworkID\": \"1002\"\n },\n \"NodeID\": \"eklet-subnet-1ewk3avk\",\n \"NodeName\": \"VM-1-254-tencentos\",\n \"NodeSubNetCIDR\": \"10.0.200.0/24\",\n \"NodeSubNetID\": \"subnet-5gu2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"27501aaed5e639693783321219989889\",\n \"POD\": \"tcss-aset-11-321\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"tcss-asset-124321\",\n \"PodStatus\": \"Running\",\n \"PortCnt\": 0,\n \"ProcessCnt\": 0,\n \"PublicIP\": \"10.0.1.92\",\n \"RamUsage\": 0,\n \"RequestId\": \"6954374b-bfcd-4751-8358-3e3682551514\",\n \"RunAs\": \"root\",\n \"Status\": \"RUNNING\",\n \"WebServiceCnt\": 0\n }\n}",
822
+ "title": "查询容器信息"
823
+ }
824
+ ],
825
+ "DescribeAssetContainerList": [
826
+ {
827
+ "document": "搜索查询容器列表",
828
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetContainerList\n<公共请求参数>\n\n{}",
829
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CPUUsage\": 0,\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"Cmd\": \"--controllers=*,-everest-csi-local-volume --leader-elect=true --leader-elect-resource-lock=endpoints --leader-elect-resource-namespace=kube-system --feature-gates=Topology=true,DistributeAttacher=false --provision-with-strict-topology=true --csi-attacher-worker-threads=60 --csi-attacher-detach-worker-threads=60 --csi-attacher-should-reconcile-va=false\",\n \"ContainerID\": \"8eaffb2a09728b130020b7fe33d87fe3a45856a2ff39eab57873c34815461b22\",\n \"ContainerName\": \"/k8s_everest-csi-controller_everest-csi-controller-7b7df58489-9v9pf_kube-system_3b5f2feb-af96-4c0b-84f0-4e86d0671ae8_2\",\n \"CreateTime\": \"2023-08-30 14:48:19\",\n \"HostID\": \"ed7bcc17-3ad7-455d-b2f6-1712c005ced0\",\n \"HostIP\": \"10.0.4.74\",\n \"HostName\": \"ecs-suanfa-0001\",\n \"ImageID\": \"sha256:3cdeb1036c11af9e7f906ed2a0535056c71f3f53522242fa24a5aa2022b83f2c\",\n \"ImageName\": \"swr.cn-south-1.myhuaweicloud.com/hwofficial/everest:2.1.13\",\n \"IsolateSource\": \"source\",\n \"IsolateTime\": \"1970-01-01 00:00:01\",\n \"NetStatus\": \"NORMAL\",\n \"NetSubStatus\": \"NONE\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"POD\": \"clife-estate-thirdparty-admin-dm-59785fd6-4****\",\n \"PodCpu\": 0,\n \"PodIP\": \"10.0.1.92\",\n \"PodMem\": 0,\n \"PodName\": \"agent-test-2zrp7\",\n \"PodUid\": \"20461430-67c2-455b-932e-6a6c8981****\",\n \"PublicIp\": \"116.205.224.125\",\n \"RamUsage\": 99728,\n \"RunAs\": \"paas\",\n \"Status\": \"RUNNING\",\n \"UpdateTime\": \"2024-07-15 16:05:20\"\n }\n ],\n \"RequestId\": \"05844ae1-7f46-41f2-a521-0b6a011cc16d\",\n \"TotalCount\": 1\n }\n}",
830
+ "title": "搜索查询容器列表"
831
+ }
832
+ ],
833
+ "DescribeAssetDBServiceList": [
834
+ {
835
+ "document": "查询db服务列表",
836
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetDBServiceList\n<公共请求参数>\n\n{}",
837
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"accesslog\",\n \"Config\": \"config\",\n \"ContainerId\": \"3c0a1bc138f982b187549237eb3fc02f99616bb93be3d1b65a5f14f0649591be\",\n \"ContainerName\": \"/k8s_redis_redis-tce-redis-support-ss-0_sso_ad389998-b0ab-4d43-8b25-2c96cac55ecf_0\",\n \"DataPath\": \"/a/b\",\n \"ErrorLog\": \"errorlog\",\n \"Exe\": \"/usr/local/bin/redis-server\",\n \"HostID\": \"a9365a64-7ffa-4e6e-ab27-1a0475e65070\",\n \"HostIP\": \"10.0.0.98\",\n \"HostName\": \"tcs-pre3\",\n \"Listen\": [\n \"tcp://0.0.0.0:6379\"\n ],\n \"MainType\": \"db\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"Parameter\": \"redis-server 0.0.0.0:6379 \",\n \"Pids\": [\n 338552\n ],\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"43.138.193.64\",\n \"RunAs\": \"root:root\",\n \"ServiceID\": \"fd1a1b7d9c4bc8168949b4e3ee5e9cd91256299843\",\n \"Type\": \"redis\",\n \"Version\": \"1.0.1\",\n \"WebRoot\": \"web\"\n }\n ],\n \"RequestId\": \"57ab9e09-70b3-40ab-b42b-cd2d422dcb9d\",\n \"TotalCount\": 89\n }\n}",
838
+ "title": "查询db服务列表"
839
+ }
840
+ ],
841
+ "DescribeAssetHostDetail": [
842
+ {
843
+ "document": "查询主机详细信息",
844
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetHostDetail\n<公共请求参数>\n\n{\n \"HostId\": \"dskaldjskld\"\n}",
845
+ "output": "{\n \"Response\": {\n \"AgentVersion\": \"5.2.1.105\",\n \"ClusterAccessedStatus\": \"AccessedNone\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerCnt\": 1,\n \"DockerAPIVersion\": \"1.43\",\n \"DockerFileSystemDriver\": \"overlay2\",\n \"DockerGoVersion\": \"go1.20.7\",\n \"DockerRootDir\": \"/var/lib/docker\",\n \"DockerVersion\": \"24.0.6\",\n \"Group\": \"root\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"ImageCnt\": 10,\n \"InstanceID\": \"ins-8bc803fd\",\n \"IsContainerd\": false,\n \"K8sMasterIP\": \"10.0.1.92\",\n \"K8sVersion\": \"1.0.1\",\n \"KernelVersion\": \"3.10.0-1160.102.1.el7.x86_64\",\n \"KubeProxyVersion\": \"1.0.1\",\n \"MachineType\": \"CVM\",\n \"OsName\": \"CentOS Linux release 7.9.2009 (Core)\",\n \"Project\": {\n \"ProjectID\": 0,\n \"ProjectName\": \"默认项目\"\n },\n \"PublicIp\": \"1.1.1.1\",\n \"RegionID\": 1,\n \"RequestId\": \"342475fc-76eb-4199-998f-780f9921a5f2\",\n \"Status\": \"ONLINE\",\n \"Tags\": [],\n \"UUID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"UpdateTime\": \"2024-10-30 10:26:52\"\n }\n}",
846
+ "title": "查询主机详细信息"
847
+ }
848
+ ],
849
+ "DescribeAssetHostList": [
850
+ {
851
+ "document": "查询主机列表",
852
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetHostList\n<公共请求参数>\n\n{}",
853
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"HostID\": \"223e6323-1db6-42cf-8094-200916841684\",\n \"HostIP\": \"10.0.0.11\",\n \"HostName\": \"ins-1684ad1f2\",\n \"Group\": \"staffs\",\n \"DockerVersion\": \"1.0.0\",\n \"DockerFileSystemDriver\": \"ZFS\",\n \"ImageCnt\": 1,\n \"ContainerCnt\": 1,\n \"Status\": \"ONLINE\",\n \"IsContainerd\": true,\n \"MachineType\": \"CVM\",\n \"PublicIp\": \"112.46.12.11\",\n \"Uuid\": \"223e6323-1db6-42cf-8094-200916841684\",\n \"InstanceID\": \"ins-1684ad1f2\",\n \"RegionID\": 1,\n \"Project\": {\n \"ProjectName\": \"ap-beijing\",\n \"ProjectID\": 0\n },\n \"Tags\": [\n {\n \"TagKey\": \"adone\",\n \"TagValue\": \"mark\"\n }\n ],\n \"ClusterID\": \"csbd-cawfdfafd\",\n \"ClusterName\": \"cls-test1\",\n \"ClusterAccessedStatus\": \"1\",\n \"ChargeCoresCnt\": 1,\n \"DefendStatus\": \"running\",\n \"CoresCnt\": 1\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
854
+ "title": "查询主机列表"
855
+ }
856
+ ],
857
+ "DescribeAssetImageBindRuleInfo": [
858
+ {
859
+ "document": "",
860
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAssetImageBindRuleInfo\n&Limit=10\n&Offset=0\n&<公共请求参数>",
861
+ "output": "{\n \"Response\": {\n \"ImageBindRuleSet\": [\n {\n \"ImageSize\": 0,\n \"RuleId\": \"10001\",\n \"ScanTime\": \"2022-01-1 00:00:00\",\n \"ImageId\": \"image-id\",\n \"ImageName\": \"image-name\",\n \"RuleName\": \"rule_name\",\n \"ContainerCnt\": 0\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
862
+ "title": "镜像绑定规则列表"
863
+ }
864
+ ],
865
+ "DescribeAssetImageDetail": [
866
+ {
867
+ "document": "查询镜像详细信息",
868
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageDetail\n<公共请求参数>\n\n{\n \"ImageID\": \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\"\n}",
869
+ "output": "{\n \"Response\": {\n \"AgentError\": \"timeout\",\n \"Architecture\": \"Metadata\",\n \"Author\": \"symon\",\n \"BuildHistory\": \"# create_time:2021-09-15 18:20:05 tags:docker.io/centos:latest,yancyw:1,yancyw:2,yancyw:3, ADD file:1114113413411342942e068863ce2a8491bb71522c652f31fb466 in / \",\n \"ContainerCnt\": 51,\n \"CreateTime\": \"2021-09-16 02:20:05\",\n \"HostCnt\": 24,\n \"SuperNodeCnt\": 1,\n \"ImageDigest\": \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\",\n \"ImageID\": \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\",\n \"ImageName\": \"docker.io/centos:latest\",\n \"IsAuthorized\": 1,\n \"IsTrustImage\": true,\n \"OsName\": \"centos:8.4.2105\",\n \"RemainScanTime\": 0,\n \"RequestId\": \"a11d268f-1601-4f63-9131-0382537b9e55\",\n \"RiskCnt\": 211,\n \"ScanError\": \"timeout\",\n \"ScanRiskError\": \"timeout\",\n \"ScanRiskProgress\": 0,\n \"ScanStatus\": \"SCANNED\",\n \"ScanTime\": \"2024-10-25 16:13:39\",\n \"ScanVirusError\": \"timeout\",\n \"ScanVirusProgress\": 0,\n \"ScanVulError\": \"timeout\",\n \"ScanVulProgress\": 0,\n \"SensitiveInfoCnt\": 0,\n \"Size\": 231268856,\n \"Status\": 5,\n \"VirusCnt\": 0,\n \"VulCnt\": 230\n }\n}",
870
+ "title": "查询镜像详细信息"
871
+ }
872
+ ],
873
+ "DescribeAssetImageHostList": [
874
+ {
875
+ "document": "",
876
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageHostList\n<公共请求参数>\n\n{}",
877
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageID\": \"sha256:bd571e6529f32461648680c82e2540f9db4b3bb********\",\n \"HostID\": \"5cd1c13e-d18a-4904-ada3-a2********\"\n },\n {\n \"ImageID\": \"sha256:d6e46aa2470df1d32034c6707c8041158b6********\",\n \"HostID\": \"5cd1c13e-d18a-4904-ada3-a2ef********\"\n }\n ],\n \"RequestId\": \"f28e2b9b-ee35-4c82-87e4-fcb64671d2af\",\n \"TotalCount\": 24\n }\n}",
878
+ "title": "查询镜像关联主机"
879
+ }
880
+ ],
881
+ "DescribeAssetImageList": [
882
+ {
883
+ "document": "查询镜像列表",
884
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageList\n<公共请求参数>\n\n{}",
885
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageID\": \"sha256:2061084bfcc0d9ff44f479efc582e3ac9feaf96b556f6901bb39dbddfb9676b2\",\n \"ImageName\": \"l10:latest\",\n \"CreateTime\": \"2021-01-29T04:03:18Z\",\n \"Size\": 16159906,\n \"HostCnt\": 12,\n \"SuperNodeCnt\": 1,\n \"ContainerCnt\": 0,\n \"ScanTime\": \"2021-01-29T06:10:12.021Z\",\n \"VulCnt\": 5,\n \"ComponentCnt\": 31,\n \"VirusCnt\": 141,\n \"RiskCnt\": 7,\n \"IsTrustImage\": true,\n \"OsName\": \"alpine:v3.12\",\n \"AgentError\": \"No Error\",\n \"ScanError\": \"No Error\",\n \"ScanStatus\": \"SCANNED\",\n \"ScanVirusError\": \"No Error\",\n \"ScanVulError\": \"No Error\",\n \"ScanRiskError\": \"No Error\",\n \"IsSuggest\": 0,\n \"IsAuthorized\": 12\n }\n ],\n \"RequestId\": \"9c2d0eee-b4b8-4954-98ab-be69f503f77d\",\n \"TotalCount\": 339\n }\n}",
886
+ "title": "查询镜像列表"
887
+ }
888
+ ],
889
+ "DescribeAssetImageRegistryAssetStatus": [
890
+ {
891
+ "document": "",
892
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryAssetStatus\n<公共请求参数>\n\n{}",
893
+ "output": "{\n \"Response\": {\n \"Status\": \"doing\",\n \"Err\": \"rpc service error\",\n \"LatestSyncSuccessTime\": \"2006-01-02 15:04:05\",\n \"RequestId\": \"abd55800-ad16-4de8-b319-a6480098e15b\"\n }\n}",
894
+ "title": "查看镜像仓库资产更新进度状态"
895
+ }
896
+ ],
897
+ "DescribeAssetImageRegistryDetail": [
898
+ {
899
+ "document": "",
900
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryDetail\n<公共请求参数>\n\n{\n \"Id\": \"5427\"\n}",
901
+ "output": "{\n \"Response\": {\n \"RequestId\": \"acc92f01-ee14-4eec-a1b6-e78d3ea0b7e9\",\n \"ImageDigest\": \"sha256:615475135bb705517e749767a28f6bd57199008d3e9b688efa0f73a8befccc97\",\n \"ImageId\": \"sha256:e68ba1280908f76a9e22a813b9ea0c7358e9bcf0ed616fddf88dad557e33d1ca\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/yunding/person1\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"yunding\",\n \"ImageName\": \"person1\",\n \"ImageTag\": \"v1\",\n \"ImageSize\": 74866818,\n \"ScanTime\": \"2022-01-14T21:03:19+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 172,\n \"VirusCnt\": 0,\n \"RiskCnt\": 1,\n \"SentiveInfoCnt\": 1,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"MessageRegistryScan\",\n \"ScanVulError\": \"MessageRegistryScan\",\n \"ScanRiskError\": \"MessageRegistryScan\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"#2020-06-17 00:22:24.918233762 +0000 UTC\\n\\n/bin/sh -c #(nop) ADD file:84700c11fcc969ac08ef25f115513d76c7b72a4118c01fbc86ef0a6056fdebeb in / \\n\\n#2020-06-17 00:22:25.276021438 +0000 UTC\\n\\n/bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200611\\n\\n#2020-06-17 00:22:25.47282687 +0000 UTC\\n\\n/bin/sh -c #(nop) CMD [\\\"/bin/bash\\\"]\\n\\n#2020-12-18 10:06:01.1576746 +0000 UTC\\n\\n/bin/sh -c echo \\\"RSYNC_PASSWORD='passwd' rsync\\\"\\n\\n\",\n \"RegistryRegion\": \"default\",\n \"ImageCreateTime\": \"2020-12-25T16:40:39+08:00\"\n }\n}",
902
+ "title": "查看仓库镜像详情"
903
+ },
904
+ {
905
+ "document": "",
906
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryDetail\n<公共请求参数>\n\n{\n \"Id\": 3421599\n}",
907
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"ImageDigest\": \"sha256:8d8faaa36c253a8745c392fc71640757d29a5f026fc0e44bb9c98d56544f5175\",\n \"ImageId\": \"sha256:bb804a9c85d7199b8fd6a0c1a34ef1d049689604046fc5ce1ee6b968de78281b\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"hkccr.ccs.tencentyun.com/mhzou/mhccrxg\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"ccr-ap-hongkong\",\n \"Namespace\": \"mhzou\",\n \"ImageName\": \"mhccrxg\",\n \"ImageTag\": \"mhccrxg1\",\n \"ImageSize\": 8544764,\n \"ScanTime\": \"2022-01-19T22:58:23+08:00\",\n \"ScanStatus\": \"SCANNED\",\n \"Progress\": 100,\n \"VulCnt\": 2425,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"MessageRegistryScan\",\n \"ScanVulError\": \"MessageRegistryScan\",\n \"ScanRiskError\": \"MessageRegistryScan\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 100,\n \"ScanRiskProgress\": 100,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"SCANNED\",\n \"RiskStatus\": \"SCANNED\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 1,\n \"LayerInfo\": \"#2020-06-17 00:22:24.918233762 +0000 UTC\\n\\n/bin/sh -c #(nop) ADD file:84700c11fcc969ac08ef25f115513d76c7b72a4118c01fbc86ef0a6056fdebeb in / \\n\\n#2020-06-17 00:22:25.276021438 +0000 UTC\\n\\n/bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200611\\n\\n#2020-06-17 00:22:25.47282687 +0000 UTC\\n\\n/bin/sh -c #(nop) CMD [\\\"/bin/bash\\\"]\\n\\n#2020-12-18 10:06:01.1576746 +0000 UTC\\n\\n/bin/sh -c echo \\\"RSYNC_PASSWORD='passwd' rsync\\\"\\n\\n\",\n \"RegistryRegion\": \"ap-hongkong\",\n \"ImageCreateTime\": \"1900-01-01T00:00:00+00:00\"\n }\n}",
908
+ "title": "镜像仓库查询镜像仓库详情"
909
+ }
910
+ ],
911
+ "DescribeAssetImageRegistryList": [
912
+ {
913
+ "document": "",
914
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryList\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"ExactMatch\": false,\n \"Name\": \"ScanStatus\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"RepoType\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"SecurityRisk\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"IsAuthorized\",\n \"Values\": [\n \"all\"\n ]\n }\n ],\n \"Limit\": 10,\n \"Offset\": 0\n}",
915
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a17ead82-00d3-4bf2-8ec2-55292c42d6e3\",\n \"TotalCount\": 100,\n \"List\": [\n {\n \"Id\": 20933905,\n \"ImageDigest\": \"sha256:8d8d7593f6da4e909bba63a3a22080eca935c57afd81ad0b8f069b90064324ba\",\n \"ImageId\": \"sha256:a810b384f08c95a472d7364b9b3198d4746f1ea001a26c5cb9d7e95272004afc\",\n \"RegistryType\": \"ccr\",\n \"RegistryRegion\": \"default\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/xcar/executor\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"xcar\",\n \"ImageName\": \"executor\",\n \"ImageTag\": \"latest\",\n \"ImageSize\": 22952972,\n \"ScanTime\": \"2020-11-21 15:16:00\",\n \"ScanStatus\": \"NOT_SCAN\",\n \"Progress\": 0,\n \"VulCnt\": 0,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"IsTrustImage\": false,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"OperateFa****\",\n \"ScanVulError\": \"OperateFa****\",\n \"ScanRiskError\": \"MessageRegistry****\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 0,\n \"ScanRiskProgress\": 0,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"NOT_SCAN\",\n \"RiskStatus\": \"NOT_SCAN\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 0,\n \"ImageCreateTime\": \"2020-09-22T00:00:00+00:00\",\n \"IsLatestImage\": true\n },\n {\n \"Id\": 20933905,\n \"ImageDigest\": \"sha256:8d8d7593f6da4e909bba63a3a22080eca935c57afd81ad0b8f069b90064324ba\",\n \"ImageId\": \"sha256:a810b384f08c95a472d7364b9b3198d4746f1ea001a26c5cb9d7e95272004afc\",\n \"RegistryType\": \"ccr\",\n \"RegistryRegion\": \"default\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/xcar/executor\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"ccr-default\",\n \"Namespace\": \"xcar\",\n \"ImageName\": \"executor\",\n \"ImageTag\": \"latest\",\n \"ImageSize\": 22952972,\n \"ScanTime\": \"2020-11-21 15:16:00\",\n \"ScanStatus\": \"NOT_SCAN\",\n \"Progress\": 0,\n \"VulCnt\": 0,\n \"VirusCnt\": 0,\n \"RiskCnt\": 0,\n \"SentiveInfoCnt\": 0,\n \"IsTrustImage\": false,\n \"OsName\": \"linux\",\n \"ScanVirusError\": \"ScanVirusError\",\n \"ScanVulError\": \"ScanVulError\",\n \"ScanRiskError\": \"ScanRiskError\",\n \"ScanVirusProgress\": 0,\n \"ScanVulProgress\": 0,\n \"ScanRiskProgress\": 0,\n \"ScanRemainTime\": 0,\n \"CveStatus\": \"NOT_SCAN\",\n \"RiskStatus\": \"NOT_SCAN\",\n \"VirusStatus\": \"NOT_SCAN\",\n \"IsAuthorized\": 0,\n \"ImageCreateTime\": \"2020-09-22T00:00:00+00:00\",\n \"IsLatestImage\": true\n }\n ]\n }\n}",
916
+ "title": "镜像仓库查询镜像仓库列表"
917
+ }
918
+ ],
919
+ "DescribeAssetImageRegistryListExport": [
920
+ {
921
+ "document": "",
922
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"InstanceName\",\n \"InstanceId\",\n \"RegistryType\",\n \"Namespace\",\n \"ImageName\",\n \"ImageTag\",\n \"ImageSize\",\n \"ImageDigest\",\n \"ImageId\",\n \"ImageRepoAddress\",\n \"ScanStatus\",\n \"VulCnt\",\n \"VirusCnt\",\n \"RiskCnt\",\n \"ScanStartTime\",\n \"ScanEndTime\",\n \"OsName\",\n \"IsAuthorized\",\n \"RegistryRegion\"\n ]\n}",
923
+ "output": "{\n \"Response\": {\n \"RequestId\": \"c00f4492-6973-4d8f-872b-c29d22c8eee0\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
924
+ "title": "镜像仓库镜像列表导出"
925
+ }
926
+ ],
927
+ "DescribeAssetImageRegistryRegistryDetail": [
928
+ {
929
+ "document": "正常的获取",
930
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"RegistryId\": 8329\n}",
931
+ "output": "{\n \"Response\": {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"ConnDetectMessage\",\n \"ConnDetectStatus\": \"status_connected\",\n \"FailReason\": \"FailReason\",\n \"Quuid\": \"backend\",\n \"Solution\": \"Solution\",\n \"Uuid\": \"backend\"\n }\n ],\n \"Insecure\": 1,\n \"Name\": \"jfrog****\",\n \"NetType\": \"public\",\n \"Password\": \"Aa8888****\",\n \"RegistryRegion\": \"ap-beijing\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v1\",\n \"RequestId\": \"ff82bfdb-f923-4b66-8c70-cba784e8be67\",\n \"SpeedLimit\": 1000,\n \"Url\": \"http://good.com.cn\",\n \"Username\": \"test-user-name\"\n }\n}",
932
+ "title": "正常的获取"
933
+ },
934
+ {
935
+ "document": "镜像仓库详情",
936
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"RegistryId\": \"10\"\n}",
937
+ "output": "{\n \"Response\": {\n \"RequestId\": \"5187d432-1753-4376-81b6-12e1f7e6ecf5\",\n \"Name\": \"jfrog****\",\n \"Username\": \"test-user\",\n \"Password\": \"test-passwd\",\n \"Url\": \"https://127.0.0.1:8080\",\n \"RegistryType\": \"harbor\",\n \"RegistryVersion\": \"v2\",\n \"NetType\": \"public\",\n \"RegistryRegion\": \"default\",\n \"SpeedLimit\": 1,\n \"Insecure\": 0\n }\n}",
938
+ "title": "镜像仓库详情"
939
+ }
940
+ ],
941
+ "DescribeAssetImageRegistryRegistryList": [
942
+ {
943
+ "document": "",
944
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRegistryList\n<公共请求参数>\n\n{\n \"Limit\": 100,\n \"Offset\": 0\n}",
945
+ "output": "{\n \"Response\": {\n \"RequestId\": \"e59f97b7-87d4-4909-8289-61bd28423d2f\",\n \"TotalCount\": 15525,\n \"List\": [\n {\n \"ConnDetectDetail\": [\n {\n \"ConnDetectMessage\": \"AgentOffline\",\n \"ConnDetectStatus\": \"status_auth_failed\",\n \"FailReason\": \"仓库账号密码异常\",\n \"Quuid\": \"5a540076-d38a-4078-aa98-e7c86371d322\",\n \"Solution\": \"请检查您的仓库账号/密码是否正确,建议重新输入,稍后重试连接\",\n \"Uuid\": \"5a540076-d38a-4078-aa98-e7c86371d322\"\n }\n ],\n \"ConnDetectHostCount\": 1,\n \"ConnDetectType\": \"agent\",\n \"ConnectMsg\": \"connect msg\",\n \"InstanceID\": \"instance-01\",\n \"LatestSyncTime\": \"2024-10-23 03:12:50\",\n \"Name\": \"aws_public\",\n \"NetType\": \"public\",\n \"RegistryId\": 10000,\n \"RegistryRegion\": \"default\",\n \"RegistryType\": \"aws\",\n \"RegistryVersion\": \"V1\",\n \"SyncFailReason\": \"自有主机agent离线\",\n \"SyncMessage\": \"自有主机agent离线\",\n \"SyncSolution\": \"您选择的所有自有主机agent离线,请重新检查主机节点后再进行重试\",\n \"SyncStatus\": \"failed\",\n \"Url\": \"https://public.aws\"\n }\n ]\n }\n}",
946
+ "title": "镜像仓库查询镜像仓库列表"
947
+ }
948
+ ],
949
+ "DescribeAssetImageRegistryRiskInfoList": [
950
+ {
951
+ "document": "",
952
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRiskInfoList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"Level\",\n \"Values\": [\n \"all\"\n ],\n \"ExactMatch\": false\n },\n {\n \"Name\": \"Behavior\",\n \"Values\": [\n \"all\"\n ],\n \"ExactMatch\": false\n },\n {\n \"Name\": \"Type\",\n \"Values\": [\n \"all\"\n ],\n \"ExactMatch\": false\n }\n ],\n \"Id\": 100078461\n}",
953
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:49:58\\n/bin/sh -c #(nop) ENV ROOTPASSWD=2473\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:10\\n/bin/sh -c #(nop) ENV ROOTPASSWD=17666\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:08\\n/bin/sh -c #(nop) ENV ROOTPASSWD=17065\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:05\\n/bin/sh -c #(nop) ENV ROOTPASSWD=20419\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:03\\n/bin/sh -c #(nop) ENV ROOTPASSWD=6079\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:00\\n/bin/sh -c #(nop) ENV ROOTPASSWD=31991\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:49:53\\n/bin/sh -c #(nop) ENV ROOTPASSWD=19826\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:49:49\\n/bin/sh -c #(nop) ENV ROOTPASSWD=25831\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:49:51\\n/bin/sh -c #(nop) ENV ROOTPASSWD=19978\",\n \"Level\": \"3\",\n \"Type\": 2\n },\n {\n \"Behavior\": 3,\n \"Desc\": \"Dockerfile中环境变量包含密码\",\n \"InstructionContent\": \"2024-05-06 10:50:12\\n/bin/sh -c #(nop) ENV ROOTPASSWD=4883\",\n \"Level\": \"3\",\n \"Type\": 2\n }\n ],\n \"RequestId\": \"1c23b3e4-ea15-4705-990d-fe63890dc992\",\n \"TotalCount\": 658\n }\n}",
954
+ "title": "镜像仓库查询镜像高危行为列表"
955
+ }
956
+ ],
957
+ "DescribeAssetImageRegistryRiskListExport": [
958
+ {
959
+ "document": "",
960
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryRiskListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"Category\",\n \"VirusName\",\n \"Tags\"\n ],\n \"Id\": 1001\n}",
961
+ "output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
962
+ "title": "镜像仓库敏感信息列表导出"
963
+ }
964
+ ],
965
+ "DescribeAssetImageRegistryScanStatusOneKey": [
966
+ {
967
+ "document": "正常请求",
968
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryScanStatusOneKey\n<公共请求参数>\n\n{\n \"TaskID\": 13\n}",
969
+ "output": "{\n \"Response\": {\n \"ImageScanCnt\": 0,\n \"ImageStatus\": [],\n \"ImageTotal\": 1525,\n \"RequestId\": \"a8298892-31c6-4a39-84e2-ce998b5822fd\",\n \"RiskCount\": 0,\n \"ScanRemainTime\": 0,\n \"Schedule\": 0,\n \"Status\": \"SCANNING\",\n \"SuccessCount\": 0\n }\n}",
970
+ "title": "正常请求"
971
+ },
972
+ {
973
+ "document": "镜像仓库查询一键镜像扫描状态",
974
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryScanStatusOneKey\n<公共请求参数>\n\n{\n \"All\": true,\n \"TaskID\": 2257\n}",
975
+ "output": "{\n \"Response\": {\n \"ImageScanCnt\": 0,\n \"ImageStatus\": [],\n \"ImageTotal\": 1,\n \"RequestId\": \"2d6532f3-28b8-4a99-863b-e178b3c5c416\",\n \"RiskCount\": 1,\n \"ScanRemainTime\": 0,\n \"Schedule\": 100,\n \"Status\": \"SCAN_TIMEOUT\",\n \"SuccessCount\": 0\n }\n}",
976
+ "title": "镜像仓库查询一键镜像扫描状态"
977
+ }
978
+ ],
979
+ "DescribeAssetImageRegistrySummary": [
980
+ {
981
+ "document": "",
982
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistrySummary\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"Name\": \"OnlyShowLatest\",\n \"ExactMatch\": true,\n \"Values\": [\n \"1021\"\n ]\n }\n ]\n}",
983
+ "output": "{\n \"Response\": {\n \"RequestId\": \"84bdc033-18ce-443a-9d61-8d5a099e6063\",\n \"UnScannedImageCnt\": 2\n }\n}",
984
+ "title": "镜像仓库查询镜像统计信息"
985
+ }
986
+ ],
987
+ "DescribeAssetImageRegistryVirusList": [
988
+ {
989
+ "document": "",
990
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVirusList\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"ExactMatch\": false,\n \"Name\": \"RiskLevel\",\n \"Values\": [\n \"all\"\n ]\n }\n ],\n \"Id\": 6947411,\n \"Limit\": 10,\n \"Offset\": 0\n}",
991
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ae035bd6-6e5a-4f3e-b3ce-1f9cf6917066\",\n \"List\": [\n {\n \"Path\": \"var/cache/debconf/passwords.dat\",\n \"RiskLevel\": \"4\",\n \"Category\": \"2\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"tag1\"\n ],\n \"Desc\": \"发现容器上存在恶意木马,您的容器可能已经失陷。\\n恶意木马通常会执行挖矿、文件删除、信息窃取和网络攻击等恶****\",\n \"Solution\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/****\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"passwords.dat\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"etc/.pwd.lock\",\n \"RiskLevel\": \"4\",\n \"Category\": \"2\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"tag2\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \".pwd.lock\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/triggers/Unincorp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"2\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"Unincorp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/systemd/deb-systemd-helper-enabled/timers.target.wants/apt-daily.timer\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"3\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"apt-daily.timer\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/triggers/Lock\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"3\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"Lock\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/log/btmp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"5\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"btmp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/statoverride\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"6\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"statoverride\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/lib/dpkg/lock\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"56\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"lock\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"var/log/wtmp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"6\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"tag1\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"wtmp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n },\n {\n \"Path\": \"run/utmp\",\n \"RiskLevel\": \"4\",\n \"Category\": \"Category\",\n \"VirusName\": \"stargate.lock\",\n \"Tags\": [\n \"tag2\"\n ],\n \"Desc\": \"Desc\",\n \"Solution\": \"Solution\",\n \"FileType\": \"UNKOWN\",\n \"FileName\": \"utmp\",\n \"FileMd5\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"FileSize\": 0,\n \"FirstScanTime\": \"2021-01-30 03:31:56 +0000 UTC\",\n \"LatestScanTime\": \"2021-01-30 05:14:07 +0000 UTC\"\n }\n ],\n \"TotalCount\": 17\n }\n}",
992
+ "title": "镜像仓库查询木马病毒列表"
993
+ }
994
+ ],
995
+ "DescribeAssetImageRegistryVirusListExport": [
996
+ {
997
+ "document": "",
998
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVirusListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"Category\",\n \"VirusName\",\n \"Tags\"\n ],\n \"Id\": 1001\n}",
999
+ "output": "{\n \"Response\": {\n \"RequestId\": \"62e5c0e8-2cae-410a-8240-9cefbd419e08\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
1000
+ "title": "镜像仓库木马信息列表导出"
1001
+ }
1002
+ ],
1003
+ "DescribeAssetImageRegistryVulList": [
1004
+ {
1005
+ "document": "",
1006
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVulList\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"ExactMatch\": false,\n \"Name\": \"Level\",\n \"Values\": [\n \"all\"\n ]\n },\n {\n \"ExactMatch\": false,\n \"Name\": \"Tag\",\n \"Values\": [\n \"all\"\n ]\n }\n ],\n \"Id\": 1929935,\n \"Limit\": 10,\n \"Offset\": 0\n}",
1007
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AttackLevel\": 0,\n \"CVEID\": \"CVE-2019-5827\",\n \"Category\": \"OUT_OF_BOUNDS_WRITE\",\n \"CategoryType\": \"SYSTEM\",\n \"Component\": \"sqlite-libs\",\n \"Components\": [\n {\n \"FixedVersion\": \"0:3.26.0-15.el8\",\n \"Name\": \"sqlite-libs\",\n \"Path\": \"/var/sqlite/\",\n \"Type\": \"SYSTEM\",\n \"Version\": \"3.26.0-13.el8\"\n }\n ],\n \"CvssScore\": \"8.8\",\n \"CvssVector\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\n \"DefenseSolution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\",\n \"Des\": \"GoogleChrome是美国谷歌(Google)公司的一款Web浏览器。GoogleChrome74.0.3729.131之前版本中的SQLite存在安全漏洞。攻击者可借助特制的HTML页面利用该漏洞损坏堆。\",\n \"FixedVersions\": \"0:3.26.0-15.el8\",\n \"IsSuggest\": \"true\",\n \"LayerInfos\": [\n {\n \"LayerCmd\": \"/bin/sh -c #(nop) ADD file:805cb5e15fb6e0bb0326ca33fd2942e068863ce2a8491bb71522c652f31fb466 in / \",\n \"LayerId\": \"sha256:a1d0c75327776413fa0db9ed3adcdbadedc95a662eb1d360dad82bb913f8a1d1\"\n }\n ],\n \"Level\": \"3\",\n \"Name\": \"Google Chrome 输入验证错误漏洞\",\n \"OfficialSolution\": \"升级到最新无漏洞版本\",\n \"POCID\": \"pcmgr-209472\",\n \"Reference\": \"[\\\"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html\\\", \\\"https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html\\\", \\\"https://crbug.com/952406\\\", \\\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/\\\", \\\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/\\\", \\\"https://seclists.org/bugtraq/2019/Aug/19\\\", \\\"https://security.gentoo.org/glsa/202003-16\\\", \\\"https://usn.ubuntu.com/4205-1/\\\", \\\"https://www.debian.org/security/2019/dsa-4500\\\"]\",\n \"SubmitTime\": \"2019-06-28 09:15:00\",\n \"Tag\": [\n \"NETWORK\",\n \"SYS\",\n \"APP\"\n ],\n \"Version\": \"3.26.0-13.el8\"\n }\n ],\n \"RequestId\": \"c6abad1d-0c32-4fcc-af55-df63bf986470\",\n \"TotalCount\": 211\n }\n}",
1008
+ "title": "镜像仓库查询镜像漏洞列表"
1009
+ }
1010
+ ],
1011
+ "DescribeAssetImageRegistryVulListExport": [
1012
+ {
1013
+ "document": "",
1014
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVulListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"CVEId\",\n \"POCId\",\n \"Name\",\n \"Components\",\n \"Category\",\n \"CategoryType\",\n \"Level\",\n \"Des\",\n \"OfficialSolution\",\n \"Reference\",\n \"DefenseSolution\",\n \"SubmitTime\",\n \"CVSS_Score\",\n \"CVSS_Desc\"\n ],\n \"Id\": 121\n}",
1015
+ "output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
1016
+ "title": "镜像仓库漏洞列表导出"
1017
+ }
1018
+ ],
1019
+ "DescribeAssetImageRiskList": [
1020
+ {
1021
+ "document": "查询镜像风险列表",
1022
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRiskList\n<公共请求参数>\n\n{\n \"ImageID\": \"dskaldjskld\"\n}",
1023
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Behavior\": 3,\n \"Level\": 3,\n \"Type\": 2,\n \"Desc\": \"Dockerfile中存在账号密码、认证凭据等敏感信息\",\n \"InstructionContent\": \"/bin/sh -c #(nop) ENV PWD=postgresql\"\n },\n {\n \"Behavior\": 3,\n \"Level\": 3,\n \"Type\": 2,\n \"Desc\": \"Dockerfile中存在账号密码、认证凭据等敏感信息\",\n \"InstructionContent\": \"/bin/sh -c echo root:654321 | chpasswd\"\n }\n ],\n \"RequestId\": \"ff49ad4b-fe52-4f9d-8810-ba377eab9124\",\n \"TotalCount\": 6\n }\n}",
1024
+ "title": "查询镜像风险列表"
1025
+ }
1026
+ ],
1027
+ "DescribeAssetImageRiskListExport": [
1028
+ {
1029
+ "document": "镜像风险列表导出",
1030
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRiskListExport\n<公共请求参数>\n\n{\n \"ImageID\": \"dskaldjskld\",\n \"ExportField\": [\n \"Behavior\",\n \"Level\",\n \"Type\",\n \"Desc\",\n \"InstructionContent\"\n ]\n}",
1031
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"csfsfsf\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
1032
+ "title": "镜像风险列表导出"
1033
+ }
1034
+ ],
1035
+ "DescribeAssetImageScanSetting": [
1036
+ {
1037
+ "document": "",
1038
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageScanSetting\n<公共请求参数>\n\n{}",
1039
+ "output": "{\n \"Response\": {\n \"All\": false,\n \"Enable\": true,\n \"Images\": [\n \"sha256:f8d1d3fe96d0bb9d04eab9043b53ed5280a409db58f2506e9f65caa11bb39ad1\"\n ],\n \"RequestId\": \"6732aa52-9940-49c3-a8be-361c312b1ee5\",\n \"ScanPeriod\": 1,\n \"ScanRisk\": false,\n \"ScanTime\": \"11:05:00\",\n \"ScanVirus\": true,\n \"ScanVul\": false\n }\n}",
1040
+ "title": "获取镜像扫描设置信息"
1041
+ }
1042
+ ],
1043
+ "DescribeAssetImageScanStatus": [
1044
+ {
1045
+ "document": "查询镜像扫描状态",
1046
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageScanStatus\n<公共请求参数>\n\n{\n \"TaskID\": \"dskaldjskld\"\n}",
1047
+ "output": "{\n \"Response\": {\n \"ImageScanCnt\": 0,\n \"ImageTotal\": 339,\n \"LeftSeconds\": 4666,\n \"RequestId\": \"b9e9e86e-5b7e-476c-9be1-a8c6399afef3\",\n \"RiskCount\": 0,\n \"Schedule\": 0,\n \"Status\": \"SCANNING\",\n \"SuccessCount\": 0\n }\n}",
1048
+ "title": "查询镜像扫描状态"
1049
+ }
1050
+ ],
1051
+ "DescribeAssetImageScanTask": [
1052
+ {
1053
+ "document": "查询正在一键扫描的镜像扫描taskid",
1054
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageScanTask\n<公共请求参数>\n\n{}",
1055
+ "output": "{\n \"Response\": {\n \"LastScanTime\": \"2024-10-11 14:34:15\",\n \"RequestId\": \"ebdffbc4-bf83-4e25-bc4c-8ada17cc0481\",\n \"Status\": \"END\",\n \"SubStatus\": \"Cancel\",\n \"TaskID\": \"10000504\"\n }\n}",
1056
+ "title": "查询正在一键扫描的镜像扫描taskid"
1057
+ }
1058
+ ],
1059
+ "DescribeAssetImageSimpleList": [
1060
+ {
1061
+ "document": "",
1062
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageSimpleList\n<公共请求参数>\n\n{}",
1063
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageID\": \"sha256:27a55a6c3646bdb51f0bedff3a7b87f613c4c69c94b4134c3f7248e1a4bd2ffb\",\n \"ImageName\": \"<none>:<none>\",\n \"ContainerCnt\": 0,\n \"ScanTime\": \"2021-01-29T05:26:18.07Z\",\n \"Size\": 12800228\n }\n ],\n \"RequestId\": \"1b4fa00d-257c-4d97-b175-cd78c7a8a362\",\n \"TotalCount\": 339\n }\n}",
1064
+ "title": "查询镜像简略信息列表"
1065
+ }
1066
+ ],
1067
+ "DescribeAssetImageVirusList": [
1068
+ {
1069
+ "document": "查询镜像病毒列表",
1070
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageVirusList\n<公共请求参数>\n\n{\n \"ImageID\": \"dskaldjskld\"\n}",
1071
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"CheckPlatform\": [],\n \"Desc\": \"发现容器上存在恶意木马,您的容器可能已经失陷。\\n恶意木马通常会执行挖矿、文件删除、信息窃取和网络攻击等恶意行为。\",\n \"FileName\": \"webshell_2.php\",\n \"FirstScanTime\": \"2024-09-02 07:36:15\",\n \"LatestScanTime\": \"2024-10-23 16:40:54\",\n \"Md5\": \"27501aaed5e639693783321219989889\",\n \"Path\": \"/root/webshell_2.php\",\n \"RiskLevel\": 4,\n \"Size\": 51,\n \"Solution\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [],\n \"VirusName\": \"Php.Trojan.Php.Ssmw\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"VirusScanStatus\": 1\n }\n}",
1072
+ "title": "查询镜像病毒列表"
1073
+ }
1074
+ ],
1075
+ "DescribeAssetImageVirusListExport": [
1076
+ {
1077
+ "document": "查询镜像病毒列表导出",
1078
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageVirusListExport\n<公共请求参数>\n\n{\n \"ImageID\": \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f23434*****\",\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"FileType\",\n \"VirusName\",\n \"Tags\"\n ]\n}",
1079
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"www.***.com/***\",\n \"JobId\": \"JobId\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
1080
+ "title": "查询镜像病毒列表导出"
1081
+ }
1082
+ ],
1083
+ "DescribeAssetImageVulList": [
1084
+ {
1085
+ "document": "",
1086
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageVulList\n<公共请求参数>\n\n{\n \"ImageID\": \"csnjkcnshj\"\n}",
1087
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"AttackLevel\": 0,\n \"CVEID\": \"CVE-2016-5131\",\n \"CVSSV3Desc\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\n \"CVSSV3Score\": 8.8,\n \"Category\": \"CODE_INJECTION\",\n \"CategoryType\": \"SYSTEM\",\n \"Component\": \"libxml2\",\n \"DefenseSolution\": \"建议您更新当前系统或软件至最新版,完成漏洞的修复。\",\n \"Des\": \"GoogleChrome是美国谷歌(Google)公司开发的一款Web浏览器。Libxml2是其中的一个基于C语言的用来解析XML文档的函数库组件。GoogleChrome52.0.2743.82之前版本中使用的libxml22.9.4及之前的版本存在释放后重用漏洞。远程攻击者可利用该漏洞造成拒绝服务。\",\n \"FixedVersions\": \"0:2.9.1-6.tl2.4\",\n \"IsSuggest\": true,\n \"Level\": 2,\n \"Name\": \"libxml2 释放后重用漏洞 (CVE-2016-5131)\",\n \"OfficialSolution\": \"升级到最新无漏洞版本\",\n \"Reference\": \"[\\\"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html\\\", \\\"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html\\\", \\\"http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html\\\", \\\"http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html\\\", \\\"http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html\\\", \\\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html\\\", \\\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html\\\", \\\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html\\\", \\\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html\\\", \\\"http://rhn.redhat.com/errata/RHSA-2016-1485.html\\\", \\\"http://www.debian.org/security/2016/dsa-3637\\\", \\\"http://www.securityfocus.com/bid/92053\\\", \\\"http://www.securitytracker.com/id/1036428\\\", \\\"http://www.securitytracker.com/id/1038623\\\", \\\"http://www.ubuntu.com/usn/USN-3041-1\\\", \\\"https://bugzilla.redhat.com/show_bug.cgi?id=1358641\\\", \\\"https://codereview.chromiu\\\"]\",\n \"SubmitTime\": \"2016-07-24T11:59:00+08:00\",\n \"Tag\": [\n \"NETWORK\"\n ],\n \"Version\": \"2.9.1-6.tl2.3\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1088
+ "title": "查询镜像漏洞列表"
1089
+ }
1090
+ ],
1091
+ "DescribeAssetImageVulListExport": [
1092
+ {
1093
+ "document": "",
1094
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageVulListExport\n<公共请求参数>\n\n{\n \"ImageID\": \"dskaldjskld\",\n \"ExportField\": [\n \"CVEID\",\n \"Name\",\n \"Component\",\n \"Version\",\n \"Category\"\n ]\n}",
1095
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"sfsfsfsfsfs\",\n \"RequestId\": \"7c07629e-58ff-4e8a-b63d-679698cf295a\"\n }\n}",
1096
+ "title": "镜像漏洞列表导出"
1097
+ }
1098
+ ],
1099
+ "DescribeAssetPortList": [
1100
+ {
1101
+ "document": "查询端口占用列表",
1102
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetPortList\n<公共请求参数>\n\n{}",
1103
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ContainerName\": \"容器名称\",\n \"ContainerPID\": 1,\n \"ContainerPort\": 8080,\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"tke_cls-111111\",\n \"ListenContainer\": \"tcp://:::8080\",\n \"ListenHost\": \"10.0.0.1\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessName\": \"sh\",\n \"PublicIP\": \"10.0.1.92\",\n \"PublicIp\": \"1.1.1.1\",\n \"PublicPort\": 0,\n \"RunAs\": \"root:root\",\n \"Type\": \"tcp\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1104
+ "title": "查询端口占用列表"
1105
+ }
1106
+ ],
1107
+ "DescribeAssetProcessList": [
1108
+ {
1109
+ "document": "查询进程列表",
1110
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetProcessList\n<公共请求参数>\n\n{}",
1111
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CmdLine\": \"/bin/bash\",\n \"ContainerName\": \"/srv_test\",\n \"ContainerPID\": 1,\n \"Exe\": \"/usr/bin/bash\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PID\": 834,\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessName\": \"bash\",\n \"PublicIp\": \"1.1.1.1\",\n \"RunAs\": \"root:root\",\n \"StartTime\": \"2024-10-17 15:00:47 +0000 UTC\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1112
+ "title": "查询进程列表"
1113
+ }
1114
+ ],
1115
+ "DescribeAssetSummary": [
1116
+ {
1117
+ "document": "查询账户容器、镜像等统计信息",
1118
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetSummary\n<公共请求参数>\n\n{}",
1119
+ "output": "{\n \"Response\": {\n \"AppCnt\": 926,\n \"ContainerCnt\": 1453849,\n \"ContainerPause\": 239,\n \"ContainerRunning\": 1275740,\n \"ContainerStop\": 175512,\n \"CreateTime\": \"2021-06-04 17:24:40\",\n \"DbCnt\": 41,\n \"HostCnt\": 57,\n \"HostOnline\": 42,\n \"HostUnInstallCnt\": 2,\n \"ImageCnt\": 6859,\n \"ImageHasRiskInfoCnt\": 33,\n \"ImageHasVirusCnt\": 196,\n \"ImageHasVulsCnt\": 1833,\n \"ImageUnsafeCnt\": 1833,\n \"ImageUntrustCnt\": 6246,\n \"LatestImageScanTime\": \"2024-10-30 02:02:24\",\n \"ListenPortCnt\": 1390,\n \"ProcessCnt\": 4398,\n \"RecommendedFixImageCnt\": 12,\n \"RequestId\": \"c409c2f3-eaa0-4732-8f2b-e585c2515f3e\",\n \"ScannedImageCnt\": 733,\n \"SuperNodeCnt\": 30,\n \"SuperNodeRunningCnt\": 30,\n \"TodayNewImageCnt\": 0,\n \"TodayUnsafeImageCnt\": 0,\n \"UnScannedImageCnt\": 12,\n \"WebServiceCnt\": 35\n }\n}",
1120
+ "title": "查询账户容器、镜像等统计信息"
1121
+ }
1122
+ ],
1123
+ "DescribeAssetSuperNodeList": [
1124
+ {
1125
+ "document": "查询超级节点列表",
1126
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetSuperNodeList\n<公共请求参数>\n\n{}",
1127
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"NodeID\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"NodeName\": \"web-node1\",\n \"ClusterName\": \"web-cluster\",\n \"ClusterID\": \"cls-sdfsdf\",\n \"Status\": \"Running\",\n \"SubNetID\": \"subnet-sdfsd\",\n \"SubNetName\": \"web-node1\",\n \"SubNetCidr\": \"10.0.1.0/24\",\n \"ZoneID\": \"ap-guangzhou-6\",\n \"Zone\": \"ap-guangzhou\",\n \"CreateTime\": \"2024-10-30 10:40:41\",\n \"RelatePodCount\": 1,\n \"RelateContainerCount\": 1,\n \"AgentStatus\": \"UNINSTALL\",\n \"NodeUniqueID\": \"392f05bd-bf86-4911-8cf9-b8c2afd445cd4\",\n \"ClusterAccessedStatus\": \"AccessedDefended\",\n \"ChargeCoresCnt\": 1,\n \"DefendStatus\": \"Defended\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb9b65c768\"\n }\n}",
1128
+ "title": "DescribeAssetSuperNodeList"
1129
+ }
1130
+ ],
1131
+ "DescribeAssetSyncLastTime": [
1132
+ {
1133
+ "document": "",
1134
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAssetSyncLastTime\n&<公共请求参数>",
1135
+ "output": "{\n \"Response\": {\n \"AssetSyncLastTime\": \"2024-10-30 11:48:49\",\n \"TaskStatus\": \"PROCESSED\",\n \"TaskProcess\": 10,\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb918846666\"\n }\n}",
1136
+ "title": "查询资产同步最近时间"
1137
+ }
1138
+ ],
1139
+ "DescribeAssetWebServiceList": [
1140
+ {
1141
+ "document": "查询web服务列表",
1142
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetWebServiceList\n<公共请求参数>\n\n{}",
1143
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AccessLog\": \"AccessLog\",\n \"Config\": \"/etc/nginx/nginx.conf\",\n \"ContainerId\": \"dbbd1295d632365\",\n \"ContainerName\": \"/container_name\",\n \"DataPath\": \"/a/b\",\n \"ErrorLog\": \"ErrorLog\",\n \"Exe\": \"/usr/sbin/nginx\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"Listen\": [\n \"tcp://0.0.0.0:8080\"\n ],\n \"MainType\": \"web\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"Parameter\": \"nginx: master process nginx -g daemon off;\",\n \"Pids\": [\n 1,\n 2\n ],\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessCnt\": 0,\n \"PublicIp\": \"1.1.1.1\",\n \"RunAs\": \":\",\n \"ServiceID\": \"27501aaed5e639693783321219989889\",\n \"Type\": \"Nginx\",\n \"Version\": \"1.22.0\",\n \"WebRoot\": \"/usr/share/nginx/html\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1144
+ "title": "查询web服务列表"
1145
+ }
1146
+ ],
1147
+ "DescribeAutoAuthorizedRuleHost": [
1148
+ {
1149
+ "document": "",
1150
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAutoAuthorizedRuleHost\n&RuleId=1\n&<公共请求参数>",
1151
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"ContainerCnt\": 2,\n \"DockerVersion\": \"19.03.9\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"机器名称\",\n \"ImageCnt\": 1,\n \"InstanceID\": \"ins-8bc803fd\",\n \"MachineType\": \"CVM\",\n \"PublicIp\": \"1.1.1.1\",\n \"Status\": \"ONLINE\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1152
+ "title": "查询自动授权规则授权范围主机信息"
1153
+ }
1154
+ ],
1155
+ "DescribeCheckItemList": [
1156
+ {
1157
+ "document": "",
1158
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCheckItemList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": []\n}",
1159
+ "output": "{\n \"Response\": {\n \"ClusterCheckItems\": [\n {\n \"AffectedType\": \"Workload\",\n \"AffectedVersion\": \"所有\",\n \"CVENumber\": \"CVE-2021-26691\",\n \"CVSS\": \"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\n \"CVSSScore\": \"9.8\",\n \"CheckItemId\": 10280,\n \"DiscoverTime\": \"2023-08-11 11:18:23\",\n \"IgnoredAssetNum\": 0,\n \"IsIgnored\": false,\n \"ItemDetail\": \"default ServiceAccount禁止授予写入/修改权限\",\n \"Name\": \"禁止授予ServiceAccount default写入/修改权限\",\n \"RelateLink\": \"https://\",\n \"RiskAssessment\": \"assess***\",\n \"RiskAttribute\": \"MaliciousTampering\",\n \"RiskLevel\": \"High\",\n \"RiskProperty\": \"instance-sfd***\",\n \"RiskTarget\": \"RBAC\",\n \"RiskType\": \"ConfigRisk\",\n \"Solution\": \"确保 default 名称的ServiceAccount禁止授予写入/修改权限\"\n }\n ],\n \"RequestId\": \"3d286d4b-8df0-4247-af69-02b510fac784\",\n \"TotalCount\": 163\n }\n}",
1160
+ "title": "查询所有检查项示例"
1161
+ }
1162
+ ],
1163
+ "DescribeClusterDetail": [
1164
+ {
1165
+ "document": "查询集群的详细信息",
1166
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterDetail\n<公共请求参数>\n\n{\n \"ClusterId\": \"b6ebf065d08563396da66bf0950cba8c\"\n}",
1167
+ "output": "{\n \"Response\": {\n \"ApiServerAddress\": \"https://30.46.164.12:1****\",\n \"CheckStatus\": \"HasRisk\",\n \"ClusterId\": \"57153b3ea9483f46f5dd9a0052cad265\",\n \"ClusterName\": \"benben-tcss\",\n \"ClusterNodeNum\": 1,\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterSubStatus\": \"CSR_RUNNING\",\n \"ClusterType\": \"USER_CREATE_CLUSTER\",\n \"ClusterVersion\": \"v1.25.13\",\n \"ContainerRuntime\": \"docker://26.1.4\",\n \"DefenderStatus\": \"Defended\",\n \"HighRiskCount\": 8,\n \"HintRiskCount\": 3,\n \"IngressCount\": 0,\n \"MasterIps\": \"172.16.64.12;\",\n \"MiddleRiskCount\": 9,\n \"NamespaceCount\": 7,\n \"NetworkType\": \"3\",\n \"NodeCount\": 1,\n \"PodCount\": 15,\n \"Region\": \"ap-guangzhou\",\n \"RequestId\": \"7d65a8f8-2a92-4291-9e18-10a9d6a31382\",\n \"ScanTaskProgress\": 100,\n \"SeriousRiskCount\": 0,\n \"ServiceCount\": 2,\n \"TaskCreateTime\": \"2024-10-29 12:59:55\",\n \"WorkloadCount\": 10\n }\n}",
1168
+ "title": "查询集群详情"
1169
+ }
1170
+ ],
1171
+ "DescribeClusterNodes": [
1172
+ {
1173
+ "document": "查询集群节点信息",
1174
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterNodes\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"ClusterId\": \"cls-abhq0j4o\",\n \"Filters\": []\n}",
1175
+ "output": "{\n \"Response\": {\n \"ClusterNodeList\": [\n {\n \"AgentStatus\": \"ONLINE\",\n \"ChargeCoresCnt\": 0,\n \"DefendStatus\": \"UnDefended\",\n \"HostID\": \"d4cfa6cc-a6a5-49da-a050-cb5892f60e3f\",\n \"InstanceId\": \"ins-qj24hgj0\",\n \"InstanceRole\": \"MASTER\",\n \"InstanceState\": \"Running\",\n \"MachineType\": \"CVM\",\n \"NodeName\": \"tke_cls-abhq0j4o_master_etcd1\",\n \"NodeType\": \"NORMAL\",\n \"PrivateIpAddresses\": \"10.0.0.14\",\n \"PublicIP\": \"119.29.217.177\",\n \"UUID\": \"d4cfa6cc-a6a5-49da-a050-cb5892f60e3f\"\n }\n ],\n \"RequestId\": \"c803edab-2a2d-4274-917c-8dd0a806e53d\",\n \"TotalCount\": 4\n }\n}",
1176
+ "title": "查询集群节点信息"
1177
+ }
1178
+ ],
1179
+ "DescribeClusterSummary": [
1180
+ {
1181
+ "document": "查询用户集群资产总览示例",
1182
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeClusterSummary\n<公共请求参数>\n\n{}",
1183
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RiskClusterCount\": 1,\n \"UncheckClusterCount\": 1,\n \"ManagedClusterCount\": 1,\n \"IndependentClusterCount\": 1,\n \"NoRiskClusterCount\": 1,\n \"CheckedClusterCount\": 1,\n \"AutoCheckClusterCount\": 1,\n \"ManualCheckClusterCount\": 1,\n \"FailedClusterCount\": 1,\n \"NotImportedClusterCount\": 1,\n \"ServerlessClusterCount\": 1,\n \"TkeClusterCount\": 1,\n \"UserCreateTencentClusterCount\": 1,\n \"UserCreateHybridClusterCount\": 1,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
1184
+ "title": "查询用户集群资产总览示例"
1185
+ }
1186
+ ],
1187
+ "DescribeComplianceAssetDetailInfo": [
1188
+ {
1189
+ "document": "请求资产详细信息",
1190
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceAssetDetailInfo\n<公共请求参数>\n\n{\n \"CustomerAssetId\": 2202462,\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
1191
+ "output": "{\n \"Response\": {\n \"AssetDetailInfo\": {\n \"AssetCreateTime\": \"2024-07-24 11:32:45\",\n \"AssetName\": \"my-elasticsearch-container\",\n \"AssetStatus\": \"ASSET_STOPPED\",\n \"AssetType\": \"ASSET_CONTAINER\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerAssetId\": 2202462,\n \"FailedPolicyItemCount\": 7,\n \"HostIP\": \"172.16.49.104\",\n \"HostName\": \"VM-49-104-centos\",\n \"LastCheckTime\": \"2024-07-24 11:17:15\",\n \"NodeName\": \"云镜漏洞测试机-目标机器\",\n \"PassedPolicyItemCount\": 17\n },\n \"ContainerDetailInfo\": {\n \"ContainerId\": \"e822238a07e0\",\n \"PodName\": \"PodName\"\n },\n \"HostDetailInfo\": {\n \"ContainerdVersion\": \"2.3\",\n \"DockerVersion\": \"2.3\",\n \"K8SVersion\": \"1.24\"\n },\n \"ImageDetailInfo\": {\n \"ImageId\": \"id1\",\n \"ImageName\": \"name\",\n \"ImageTag\": \"tag1\",\n \"Repository\": \"repository\"\n },\n \"K8SDetailInfo\": {\n \"ClusterName\": \"name\",\n \"ClusterVersion\": \"1.1\"\n },\n \"RequestId\": \"ae46673b-3930-4874-9144-a514653d232c\"\n }\n}",
1192
+ "title": "请求资产详细信息"
1193
+ }
1194
+ ],
1195
+ "DescribeComplianceAssetList": [
1196
+ {
1197
+ "document": "",
1198
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceAssetList\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINDER\"\n ],\n \"Offset\": 0,\n \"Limit\": 100\n}",
1199
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"AssetInfoList\": [\n {\n \"CustomerAssetId\": 14343206,\n \"AssetType\": \"ASSET_CONTAINER\",\n \"AssetName\": \"name-asset\",\n \"ImageTag\": \"latest\",\n \"HostIP\": \"172.16.0.1\",\n \"NodeName\": \"node-1\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"PassedPolicyItemCount\": 1021,\n \"FailedPolicyItemCount\": 1021,\n \"LastCheckTime\": \"2020-09-22 00:00:00\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"InstanceId\": \"ins-busi1\",\n \"ImageRegistryInfo\": {\n \"Name\": \"registry1\",\n \"Type\": \"habor\",\n \"Address\": \"http://1.1.1.2\"\n },\n \"ClusterID\": \"cluster-busi1\",\n \"ClusterName\": \"cluster1\"\n }\n ],\n \"RequestId\": \"1e6c6a5d-740b-40f5-8685-47467df4df45\"\n }\n}",
1200
+ "title": "查询某类资产的列表"
1201
+ }
1202
+ ],
1203
+ "DescribeComplianceAssetPolicyItemList": [
1204
+ {
1205
+ "document": "请求资产检测项列表",
1206
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceAssetPolicyItemList\n<公共请求参数>\n\n{\n \"CustomerAssetId\": 2202462,\n \"Offset\": 0,\n \"Limit\": 3,\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
1207
+ "output": "{\n \"Response\": {\n \"AssetPolicyItemList\": [\n {\n \"BasePolicyItemId\": 142,\n \"BenchmarkStandardId\": 1,\n \"BenchmarkStandardName\": \"CIS Docker\",\n \"Category\": \"CATEGORY_DOCKER_RUNTIME\",\n \"CheckResult\": \"RESULT_PASSED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerPolicyItemId\": 2809,\n \"FixSuggestion\": \"使用--health-cmd和其他参数运行容器。 例如,docker run -d --health-cmd ='stat /etc/passwd || exit1'nginx。\",\n \"LastCheckTime\": \"2024-07-24 11:12:16\",\n \"Name\": \"检查容器运行时的健康状态\",\n \"RiskLevel\": \"1\",\n \"VerifyInfo\": \"e822238a07e0d193a12c0608f2d821812664d3d9cf5871cc9bedc9eab562e602:Healthcheck=null\\n\",\n \"WhitelistId\": 0\n },\n {\n \"BasePolicyItemId\": 141,\n \"BenchmarkStandardId\": 1,\n \"BenchmarkStandardName\": \"CIS Docker\",\n \"Category\": \"CATEGORY_DOCKER_RUNTIME\",\n \"CheckResult\": \"RESULT_PASSED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerPolicyItemId\": 2808,\n \"FixSuggestion\": \"如无必须,不要使用 --cgroup-parent 选项在docker运行。\",\n \"LastCheckTime\": \"2024-07-24 11:12:16\",\n \"Name\": \"确保cgroup安全使用\",\n \"RiskLevel\": \"1\",\n \"VerifyInfo\": \"e822238a07e0d193a12c0608f2d821812664d3d9cf5871cc9bedc9eab562e602:CgroupParent=\\n\",\n \"WhitelistId\": 0\n },\n {\n \"BasePolicyItemId\": 140,\n \"BenchmarkStandardId\": 1,\n \"BenchmarkStandardName\": \"CIS Docker\",\n \"Category\": \"CATEGORY_DOCKER_RUNTIME\",\n \"CheckResult\": \"RESULT_PASSED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerPolicyItemId\": 2807,\n \"FixSuggestion\": \"在docker exec命令中不要使用--privileged选项。\",\n \"LastCheckTime\": \"2024-07-24 11:12:16\",\n \"Name\": \"确保docker exec命令不能使用特权选项\",\n \"RiskLevel\": \"2\",\n \"VerifyInfo\": \"e822238a07e0d193a12c0608f2d821812664d3d9cf5871cc9bedc9eab562e602:ExecIDs=null\\n\",\n \"WhitelistId\": 0\n }\n ],\n \"RequestId\": \"dc08e10e-5ac8-4e94-9321-6c2f89d8ed5c\",\n \"TotalCount\": 24\n }\n}",
1208
+ "title": "请求资产检测项列表"
1209
+ }
1210
+ ],
1211
+ "DescribeCompliancePeriodTaskList": [
1212
+ {
1213
+ "document": "基线设置 查询定时任务列表",
1214
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePeriodTaskList\n<公共请求参数>\n\n{\n \"AssetType\": \"ASSET_CONTAINER\",\n \"Offset\": 0,\n \"Limit\": 2\n}",
1215
+ "output": "{\n \"Response\": {\n \"RequestId\": \"3e6756ce-6512-498d-a9fd-8572ef4ce7d3\",\n \"TotalCount\": 1,\n \"PeriodTaskSet\": [\n {\n \"PeriodTaskId\": 456,\n \"AssetType\": \"ASSET_CONTAINER\",\n \"PeriodRule\": {\n \"ExecutionTime\": \"2006-01-02 15:04:05\",\n \"Frequency\": 1,\n \"Enable\": true\n },\n \"LastTriggerTime\": \"2006-01-02 15:04:05\",\n \"TotalPolicyItemCount\": 345634,\n \"BenchmarkStandardSet\": [\n {\n \"StandardId\": 2342,\n \"Name\": \"CIS Docker\",\n \"Description\": \"CIS Docker\",\n \"PolicyItemCount\": 666,\n \"Enabled\": true\n }\n ]\n }\n ]\n }\n}",
1216
+ "title": "查询定时任务列表"
1217
+ }
1218
+ ],
1219
+ "DescribeCompliancePolicyItemAffectedAssetList": [
1220
+ {
1221
+ "document": "",
1222
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePolicyItemAffectedAssetList\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 45675,\n \"Offset\": 1000,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"NodeName\",\n \"Values\": [\n \"node-1\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
1223
+ "output": "{\n \"Response\": {\n \"AffectedAssetList\": [\n {\n \"AssetName\": \"hyperkube\",\n \"AssetType\": \"ASSET_IMAGE\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"ClusterID\": \"cls-5licssbi\",\n \"ClusterName\": \"piper-容器告警接入安全中心测试\",\n \"CustomerAssetId\": 1001005017196,\n \"HostIP\": \"172.17.1.53\",\n \"ImageRegistryInfo\": {\n \"Address\": \"10.0.0.1\",\n \"Name\": \"name1\",\n \"Type\": \"3\"\n },\n \"ImageTag\": \"v1.22.5-tke.27-rc1\",\n \"InstanceId\": \"ins-4bi3i496\",\n \"LastCheckTime\": \"2024-10-29 02:02:18\",\n \"NodeName\": \"as-tke-np-7lmwo8pi\",\n \"VerifyInfo\": \"sha256:f5b7776211ac931c484d203db03ed67e8b2dd44e0697119d02796a7d50041bcf:User=\"\n }\n ],\n \"RequestId\": \"dce87f72-d7ad-4ed4-8cd4-688a8464aad3\",\n \"TotalCount\": 186\n }\n}",
1224
+ "title": "查询检测项影响的资产列表"
1225
+ }
1226
+ ],
1227
+ "DescribeCompliancePolicyItemAffectedSummary": [
1228
+ {
1229
+ "document": "",
1230
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCompliancePolicyItemAffectedSummary\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 474567\n}",
1231
+ "output": "{\n \"Response\": {\n \"PolicyItemSummary\": {\n \"ApplicableVersion\": \"docker 1.11-1.13, 17.12-20.10.2\",\n \"AssetType\": \"ASSET_IMAGE\",\n \"AuditProcedure\": \"执行以下命令审计\\ndocker ps --quiet | xargs --max-args=1 -I{} docker exec {} cat /proc/1/status | grep '^Uid:' | awk '{print $3}'\",\n \"BasePolicyItemId\": 178,\n \"BenchmarkStandardId\": 2,\n \"BenchmarkStandardName\": \"CIS Docker\",\n \"Category\": \"CATEGORY_DOCKER_IMAGES_BUILD_FILE\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerPolicyItemId\": 5914,\n \"Description\": \"在可能的情况下,最好以非root用户的身份运行容器。\",\n \"FailedAssetCount\": 208,\n \"FixSuggestion\": \"确保容器镜像的Dockerfile包含以下指令:USER <用户名或ID> 其中用户名或ID是指可以在容器基础镜像中找到的用户。 如果在容器基础镜像中没有创建特定用户,则在USER指令之前添加useradd命令以添加特定用户。例如,在Dockerfile中创建用户:RUN useradd -d /home/username -m -s /bin/bash username USER username注意:如果镜像中有容器不需要的用户,请考虑删除它们。 删除这些用户后,提交镜像,然后生成新的容器实例以供使用。\",\n \"IsEnable\": 0,\n \"LastCheckTime\": \"2024-10-30 02:02:09\",\n \"Name\": \"确保创建使用容器的用户\",\n \"PassedAssetCount\": 0,\n \"RiskLevel\": \"1\",\n \"WhitelistId\": 0\n },\n \"RequestId\": \"3e8b4c60-58ba-4acc-97fc-33f086c7a3bb\"\n }\n}",
1232
+ "title": "查询某检测项影响的信息"
1233
+ }
1234
+ ],
1235
+ "DescribeComplianceScanFailedAssetList": [
1236
+ {
1237
+ "document": "",
1238
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceScanFailedAssetList\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINER\"\n ],\n \"Offset\": 0,\n \"Limit\": 10\n}",
1239
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TotalCount\": 1,\n \"ScanFailedAssetList\": [\n {\n \"CustomerAssetId\": 111456789,\n \"AssetType\": \"ASSET_CONTAINDER\",\n \"AssetName\": \"happy-jenkins\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CheckTime\": \"2021-04-02 16:42:00\",\n \"FailureReason\": \"发生一些预料之外的情况\",\n \"Suggestion\": \"尝试重试\"\n }\n ]\n }\n}",
1240
+ "title": "查询上次检测失败的资产的列表"
1241
+ }
1242
+ ],
1243
+ "DescribeComplianceTaskAssetSummary": [
1244
+ {
1245
+ "document": "",
1246
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceTaskAssetSummary\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_CONTAINER\"\n ]\n}",
1247
+ "output": "{\n \"Response\": {\n \"Status\": \"USER_NORMAL\",\n \"AssetSummaryList\": [\n {\n \"AssetType\": \"ASSET_CONTAINER\",\n \"IsCustomerFirstCheck\": true,\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CheckProgress\": 0,\n \"PassedPolicyItemCount\": 1,\n \"FailedPolicyItemCount\": 1,\n \"FailedCriticalPolicyItemCount\": 1,\n \"FailedHighRiskPolicyItemCount\": 1,\n \"FailedMediumRiskPolicyItemCount\": 1,\n \"FailedLowRiskPolicyItemCount\": 1,\n \"NoticePolicyItemCount\": 1,\n \"PassedAssetCount\": 1,\n \"FailedAssetCount\": 1,\n \"AssetPassedRate\": 0,\n \"ScanFailedAssetCount\": 1,\n \"CheckCostTime\": 0,\n \"LastCheckTime\": \"2020-09-22 00:00:00\",\n \"PeriodRule\": {\n \"Frequency\": 1,\n \"ExecutionTime\": \"21:00\",\n \"Enable\": true\n },\n \"OpenPolicyItemCount\": 1,\n \"IgnoredPolicyItemCount\": 1,\n \"TotalPolicyItemCount\": 1,\n \"DetectHostCount\": 1,\n \"LeftTime\": 1\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
1248
+ "title": "查询上次任务的资产通过率汇总信息"
1249
+ }
1250
+ ],
1251
+ "DescribeComplianceTaskPolicyItemSummaryList": [
1252
+ {
1253
+ "document": "",
1254
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceTaskPolicyItemSummaryList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"RiskLevel\",\n \"Values\": [\n \"3\",\n \"2\",\n \"1\",\n \"0\"\n ],\n \"ExactMatch\": true\n },\n {\n \"Name\": \"ItemType\",\n \"Values\": [\n \"CATEGORY_DOCKER_RUNTIME\"\n ],\n \"ExactMatch\": true\n }\n ],\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
1255
+ "output": "{\n \"Response\": {\n \"PolicyItemSummaryList\": [\n {\n \"ApplicableVersion\": \"docker 1.11-1.13, 17.12-20.10.2\",\n \"AssetType\": \"ASSET_CONTAINER\",\n \"AuditProcedure\": \"运行以下命令执行检查\\ndocker ps --quiet --all | xargs docker inspect --format '{{ .Id }}: Privileged={{ .HostConfig.Privileged }}'\",\n \"BasePolicyItemId\": 1,\n \"BenchmarkStandardId\": 1,\n \"BenchmarkStandardName\": \"CIS Docker\",\n \"Category\": \"CATEGORY_DOCKER_RUNTIME\",\n \"CheckResult\": \"RESULT_FAILED\",\n \"CheckStatus\": \"CHECK_FINISHED\",\n \"CustomerPolicyItemId\": 6190,\n \"Description\": \"开启了privileged权限之后,会让容器拥有底层主机的大部分权限,不应该在创建容器时使用该参数\",\n \"FailedAssetCount\": 29,\n \"FixSuggestion\": \"不要运行带有--privileged标志的容器。 例如,不要启动如下容器:docker run --interactive --tty --privileged centos/bin/bash。\",\n \"IsEnable\": 1,\n \"LastCheckTime\": \"2024-10-30 02:02:27\",\n \"Name\": \"确保不使用特权容器\",\n \"PassedAssetCount\": 210,\n \"RiskLevel\": \"3\",\n \"WhitelistId\": 0\n }\n ],\n \"RequestId\": \"a9aae028-b4f8-4ec3-8f77-5c102c4b5fcf\",\n \"TaskId\": 0,\n \"TotalCount\": 33\n }\n}",
1256
+ "title": "查询上次任务的检测项的汇总信息列表"
1257
+ }
1258
+ ],
1259
+ "DescribeComplianceWhitelistItemList": [
1260
+ {
1261
+ "document": "",
1262
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeComplianceWhitelistItemList\n<公共请求参数>\n\n{\n \"AssetTypeSet\": [\n \"ASSET_IMAGE\"\n ],\n \"Offset\": 0,\n \"Limit\": 10\n}",
1263
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TotalCount\": 1,\n \"WhitelistItemSet\": [\n {\n \"WhitelistItemId\": 1001,\n \"CustomerPolicyItemId\": 456,\n \"Name\": \"test-name\",\n \"StandardId\": 11222,\n \"StandardName\": \"CIS Docker\",\n \"AffectedAssetCount\": 100,\n \"LastUpdateTime\": \"2021-04-02 16:00:00\",\n \"InsertTime\": \"2021-04-02 16:00:00\"\n }\n ]\n }\n}",
1264
+ "title": "查询白名单列表"
1265
+ }
1266
+ ],
1267
+ "DescribeContainerAssetSummary": [
1268
+ {
1269
+ "document": "查询容器资产信息",
1270
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeContainerAssetSummary\n<公共请求参数>\n\n{}",
1271
+ "output": "{\n \"Response\": {\n \"ContainerTotalCnt\": 1,\n \"ContainerRunningCnt\": 1,\n \"ContainerPauseCnt\": 1,\n \"ContainerStopped\": 1,\n \"ImageCnt\": 1,\n \"HostCnt\": 1,\n \"HostRunningCnt\": 1,\n \"HostOfflineCnt\": 1,\n \"ImageRegistryCnt\": 1,\n \"ImageTotalCnt\": 1,\n \"HostUnInstallCnt\": 1,\n \"HostSuperNodeCnt\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1272
+ "title": "查询容器资产信息"
1273
+ }
1274
+ ],
1275
+ "DescribeContainerSecEventSummary": [
1276
+ {
1277
+ "document": "",
1278
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeContainerSecEventSummary\n<公共请求参数>\n\n{}",
1279
+ "output": "{\n \"Response\": {\n \"UnhandledFileCnt\": 1,\n \"UnhandledEscapeCnt\": 1,\n \"UnhandledRiskSyscallCnt\": 1,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"UnhandledReverseShellCnt\": 1,\n \"UnhandledAbnormalProcessCnt\": 1,\n \"UnhandledVirusEventCnt\": 1,\n \"UnhandledMaliciousConnectionEventCnt\": 1,\n \"UnhandledK8sApiEventCnt\": 1\n }\n}",
1280
+ "title": "查询待处理安全事件"
1281
+ }
1282
+ ],
1283
+ "DescribeESAggregations": [
1284
+ {
1285
+ "document": "",
1286
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeESAggregations\n<公共请求参数>\n\n{\n \"Query\": \"{\\\"index\\\":[],\\\"body\\\":\\\"{\\\\\\\"query\\\\\\\":{\\\\\\\"bool\\\\\\\":{\\\\\\\"filter\\\\\\\":{\\\\\\\"bool\\\\\\\":{\\\\\\\"filter\\\\\\\":{\\\\\\\"range\\\\\\\":{\\\\\\\"insert_time\\\\\\\":{\\\\\\\"gt\\\\\\\":1729737627694,\\\\\\\"lte\\\\\\\":1729766427694}}},\\\\\\\"must\\\\\\\":[],\\\\\\\"must_not\\\\\\\":[],\\\\\\\"should\\\\\\\":[]}}}},\\\\\\\"highlight\\\\\\\":{\\\\\\\"fields\\\\\\\":{\\\\\\\"*\\\\\\\":{}}},\\\\\\\"aggs\\\\\\\":{\\\\\\\"count_stats\\\\\\\":{\\\\\\\"date_histogram\\\\\\\":{\\\\\\\"field\\\\\\\":\\\\\\\"insert_time\\\\\\\",\\\\\\\"interval\\\\\\\":\\\\\\\"30m\\\\\\\",\\\\\\\"time_zone\\\\\\\":\\\\\\\"Asia/Shanghai\\\\\\\",\\\\\\\"min_doc_count\\\\\\\":1}}},\\\\\\\"track_total_hits\\\\\\\":true,\\\\\\\"sort\\\\\\\":[{\\\\\\\"insert_time\\\\\\\":\\\\\\\"desc\\\\\\\"}]}\\\"}\",\n \"LogTypes\": [\n \"asset_container\",\n \"asset_local_image\",\n \"asset_registry_image\",\n \"asset_host\",\n \"asset_cluster\",\n \"asset_pod\",\n \"asset_service\",\n \"asset_ingress\",\n \"asset_process\",\n \"asset_port\",\n \"asset_web_service\",\n \"asset_app\",\n \"asset_db\",\n \"container_bash\",\n \"container_launch\",\n \"k8s_api\",\n \"local_image_virus\",\n \"local_image_risk\",\n \"local_image_vul\",\n \"registry_image_virus\",\n \"registry_image_risk\",\n \"registry_image_vul\",\n \"image_deny\",\n \"cluster_risk_vul\",\n \"cluster_risk_cfg\",\n \"baseline_docker_container\",\n \"baseline_docker_image\",\n \"baseline_docker_host\",\n \"baseline_containerd_container\",\n \"baseline_k8s\",\n \"baseline_containerd_host\",\n \"container_escape\",\n \"reverse_shell\",\n \"container_virus\",\n \"malicious_connection\",\n \"abnormal_process\",\n \"access_control\",\n \"risk_syscall\",\n \"abnormal_k8s_api\"\n ]\n}",
1287
+ "output": "{\n \"Response\": {\n \"Data\": \"{\\\"took\\\":973,\\\"hits\\\":{\\\"total\\\":{\\\"value\\\":5108036,\\\"relation\\\":\\\"eq\\\"}},\\\"aggregations\\\":{\\\"count_stats\\\":{\\\"buckets\\\":[{\\\"key_as_string\\\":\\\"2024-10-24T10:30:00.000+08:00\\\",\\\"key\\\":1729737000000,\\\"doc_count\\\":47623},{\\\"key_as_string\\\":\\\"2024-10-24T11:00:00.000+08:00\\\",\\\"key\\\":1729738800000,\\\"doc_count\\\":64848},{\\\"key_as_string\\\":\\\"2024-10-24T11:30:00.000+08:00\\\",\\\"key\\\":1729740600000,\\\"doc_count\\\":65760},{\\\"key_as_string\\\":\\\"2024-10-24T12:00:00.000+08:00\\\",\\\"key\\\":1729742400000,\\\"doc_count\\\":71743},{\\\"key_as_string\\\":\\\"2024-10-24T12:30:00.000+08:00\\\",\\\"key\\\":1729744200000,\\\"doc_count\\\":72563},{\\\"key_as_string\\\":\\\"2024-10-24T13:00:00.000+08:00\\\",\\\"key\\\":1729746000000,\\\"doc_count\\\":65545},{\\\"key_as_string\\\":\\\"2024-10-24T13:30:00.000+08:00\\\",\\\"key\\\":1729747800000,\\\"doc_count\\\":63693},{\\\"key_as_string\\\":\\\"2024-10-24T14:00:00.000+08:00\\\",\\\"key\\\":1729749600000,\\\"doc_count\\\":71868},{\\\"key_as_string\\\":\\\"2024-10-24T14:30:00.000+08:00\\\",\\\"key\\\":1729751400000,\\\"doc_count\\\":73547},{\\\"key_as_string\\\":\\\"2024-10-24T15:00:00.000+08:00\\\",\\\"key\\\":1729753200000,\\\"doc_count\\\":65341},{\\\"key_as_string\\\":\\\"2024-10-24T15:30:00.000+08:00\\\",\\\"key\\\":1729755000000,\\\"doc_count\\\":64074},{\\\"key_as_string\\\":\\\"2024-10-24T16:00:00.000+08:00\\\",\\\"key\\\":1729756800000,\\\"doc_count\\\":877499},{\\\"key_as_string\\\":\\\"2024-10-24T16:30:00.000+08:00\\\",\\\"key\\\":1729758600000,\\\"doc_count\\\":914717},{\\\"key_as_string\\\":\\\"2024-10-24T17:00:00.000+08:00\\\",\\\"key\\\":1729760400000,\\\"doc_count\\\":823727},{\\\"key_as_string\\\":\\\"2024-10-24T17:30:00.000+08:00\\\",\\\"key\\\":1729762200000,\\\"doc_count\\\":743536},{\\\"key_as_string\\\":\\\"2024-10-24T18:00:00.000+08:00\\\",\\\"key\\\":1729764000000,\\\"doc_count\\\":756934},{\\\"key_as_string\\\":\\\"2024-10-24T18:30:00.000+08:00\\\",\\\"key\\\":1729765800000,\\\"doc_count\\\":265018}]}},\\\"_shards\\\":{\\\"total\\\":9,\\\"successful\\\":9,\\\"failed\\\":0}}\",\n \"RequestId\": \"16fd0b2f-6bae-426e-bf63-64607a7e2705\"\n }\n}",
1288
+ "title": "获取ES字段聚合结果"
1289
+ }
1290
+ ],
1291
+ "DescribeESHits": [
1292
+ {
1293
+ "document": "",
1294
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeESHits\n<公共请求参数>\n\n{\n \"Query\": \"{\\\"index\\\":[\\\"netflow\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1597075200000,\\\"lte\\\":1597161599999}}},\\\"must\\\":[],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\",\n \"Offset\": 0,\n \"Limit\": 10\n}",
1295
+ "output": "{\n \"Response\": {\n \"Data\": \"{\\\"took\\\":0,\\\"timed_out\\\":false,\\\"_shards\\\":{\\\"total\\\":1,\\\"successful\\\":1,\\\"skipped\\\":0,\\\"failed\\\":0},\\\"hits\\\":{\\\"total\\\":{\\\"value\\\":938,\\\"relation\\\":\\\"eq\\\"},\\\"max_score\\\":1.0,\\\"hits\\\":[{\\\"_index\\\":\\\"userlog-1256299843-asset_account-202026\\\",\\\"_type\\\":\\\"_doc\\\",\\\"_id\\\":\\\"PsAsunMBxgMcMHXNMzGL\\\",\\\"_score\\\":1.0,\\\"_source\\\":{\\\"id\\\":12900000007108,\\\"create_time\\\":\\\"2020-07-02T09:18:45+08:00\\\",\\\"modify_time\\\":\\\"2020-07-02T09:18:45+08:00\\\",\\\"uuid\\\":\\\"454a07be-8f21-11e9-818b-5cb9019b3cb0\\\",\\\"hostip\\\":\\\"172.21.0.14\\\",\\\"guid\\\":\\\"14f7981c-48f3-4d58-846e-fb2c86e9c7e2\\\",\\\"appid\\\":1256953985,\\\"user_name\\\":\\\"root\\\",\\\"groups\\\":\\\"root\\\",\\\"account_create_time\\\":\\\"1970-01-01T08:00:00+08:00\\\",\\\"last_login_time\\\":\\\"1970-01-01T08:00:00+08:00\\\",\\\"shell_path\\\":\\\"/bin/bash\\\",\\\"is_login_account\\\":1,\\\"is_hidden_account\\\":0,\\\"is_without_pwd\\\":0,\\\"account_privilege\\\":0,\\\"platform\\\":4,\\\"status\\\":0}},{\\\"_index\\\":\\\"userlog-1256299843-asset_account-202026\\\",\\\"_type\\\":\\\"_doc\\\",\\\"_id\\\":\\\"XMgsunMBuMj9w9DkMwS1\\\",\\\"_score\\\":1.0,\\\"_source\\\":{\\\"id\\\":12900000007109,\\\"create_time\\\":\\\"2020-07-02T09:18:45+08:00\\\",\\\"modify_time\\\":\\\"2020-07-02T09:18:45+08:00\\\",\\\"uuid\\\":\\\"454a07be-8f21-11e9-818b-5cb9019b3cb0\\\",\\\"hostip\\\":\\\"172.21.0.14\\\",\\\"guid\\\":\\\"14f7981c-48f3-4d58-846e-fb2c86e9c7e2\\\",\\\"appid\\\":1256953985,\\\"user_name\\\":\\\"bin\\\",\\\"groups\\\":\\\"bin\\\",\\\"account_create_time\\\":\\\"1970-01-01T08:00:00+08:00\\\",\\\"last_login_time\\\":\\\"1970-01-01T08:00:00+08:00\\\",\\\"shell_path\\\":\\\"/sbin/nologin\\\",\\\"is_login_account\\\":0,\\\"is_hidden_account\\\":0,\\\"is_without_pwd\\\":1,\\\"account_privilege\\\":1,\\\"platform\\\":4,\\\"status\\\":0}},{\\\"_index\\\":\\\"userlog-1256299843-asset_account-202026\\\",\\\"_type\\\":\\\"_doc\\\",\\\"_id\\\":\\\"aMgsunMBuMj9w9DkMwS-\\\",\\\"_score\\\":1.0,\\\"_source\\\":{\\\"id\\\":12900000007110,\\\"create_time\\\":\\\"2020-07-02T09:18:45+08:00\\\",\\\"modify_time\\\":\\\"2020-07-02T09:18:45+08:00\\\",\\\"uuid\\\":\\\"454a07be-8f21-11e9-818b-5cb9019b3cb0\\\",\\\"hostip\\\":\\\"172.21.0.14\\\",\\\"guid\\\":\\\"14f7981c-48f3-4d58-846e-fb2c86e9c7e2\\\",\\\"appid\\\":1256953985,\\\"user_name\\\":\\\"daemon\\\",\\\"groups\\\":\\\"daemon\\\",\\\"account_create_time\\\":\\\"1970-01-01T08:00:00+08:00\\\",\\\"last_login_time\\\":\\\"1970-01-01T08:00:00+08:00\\\",\\\"shell_path\\\":\\\"/sbin/nologin\\\",\\\"is_login_account\\\":0,\\\"is_hidden_account\\\":0,\\\"is_without_pwd\\\":1,\\\"account_privilege\\\":1,\\\"platform\\\":4,\\\"status\\\":0}}]}}\",\n \"RequestId\": \"e4ee7f6c-a036-43e7-b98f-96f174827fea\"\n }\n}",
1296
+ "title": "获取ES查询文档列表"
1297
+ }
1298
+ ],
1299
+ "DescribeEmergencyVulList": [
1300
+ {
1301
+ "document": "",
1302
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEmergencyVulList\n<公共请求参数>\n\n{\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
1303
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2024-47176\",\n \"CVSSV3Score\": 0,\n \"Category\": \"OTHER\",\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"ALL\",\n \"DefenceStatus\": \"DEFENDED\",\n \"DefendedCount\": 0,\n \"ID\": 0,\n \"LatestFoundTime\": \"2020-11-21 15:16:00\",\n \"Level\": \"HIGH\",\n \"Name\": \"cups-browsed 远程代码执行漏洞\",\n \"PocID\": \"pcmgr-521425\",\n \"Status\": \"NOT_SCAN\",\n \"SubmitTime\": \"2024-09-27 06:15:00\",\n \"Tags\": [\n \"POC\",\n \"SYS\"\n ]\n }\n ],\n \"RequestId\": \"a3fbabbb-7c7b-45dd-9219-a0b3ca9bc932\",\n \"TotalCount\": 241\n }\n}",
1304
+ "title": "查询应急漏洞列表"
1305
+ }
1306
+ ],
1307
+ "DescribeEscapeEventDetail": [
1308
+ {
1309
+ "document": " 查询容器逃逸事件详情",
1310
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeEventDetail\n<公共请求参数>\n\n{\n \"EventId\": \"10021\"\n}",
1311
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"/usr/lib/systemd/systemd --switched-root --system --deserialize 18 \",\n \"ProcessPath\": \"systemd\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"159.75.90.111\",\n \"ClusterID\": \"cls-sdfw3f3\",\n \"ClusterName\": \"web-cluster\",\n \"ContainerId\": \"a960d85856c7a77cb504b638c56f59a28057\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"node1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"12486\",\n \"EventName\": \"敏感路径挂载\",\n \"EventType\": \"MOUNT_SENSITIVE_PTAH\",\n \"FoundTime\": \"2024-10-23 17:13:51\",\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"HostIP\": \"172.17.1.6\",\n \"ImageId\": \"sha256:b760a4831f5aab71c711f7537a107b751d0d0ce90dd32d8b358df3c5da385426\",\n \"ImageName\": \"centos:7.6\",\n \"LatestFoundTime\": \"2024-10-23 17:13:51\",\n \"Namespace\": \"default\",\n \"NodeID\": \"web-node1\",\n \"NodeName\": \"VM-1-6-tencentos\",\n \"NodeSubNetCIDR\": \"172.16.0.0/24\",\n \"NodeSubNetID\": \"sub-ndifn***\",\n \"NodeSubNetName\": \"dev\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b20*******\",\n \"PodIP\": \"10.0.0.121\",\n \"PodName\": \"kube-system/cilium-m2gkw\",\n \"PodStatus\": \"NORMAL\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"StatefulSet\"\n },\n \"EventDetail\": {\n \"Description\": \"容器(ID:5893711bb2...)挂载了敏感目录/lib/modules,/proc/sys/net,/proc/sys/kernel,存在容器逃逸的风险,当攻击者攻破容器后,可通过篡改该目录下的敏感文件,从而实现容器逃逸,获得宿主机系统的控制权限,威胁宿主机上其它容器及内网的安全。\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"dev\",\n \"Solution\": \"修改挂载路径,只将必须的路径挂载到容器中,避免挂载敏感路径。\"\n },\n \"ParentProcessInfo\": {\n \"ProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 613d6792485871ca66ab6dc4d1c24e827e1ff4ae6aff87b187e40059cd3ba3b9 -address /run/containerd/containerd.sock \",\n \"ProcessPath\": \"containerd-shim-runc-v2\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2743103,\n \"ProcessMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"ProcessName\": \"runc\",\n \"ProcessParam\": \"cilium-agent --config-dir=/tmp/cilium/config-map\",\n \"ProcessPath\": \"/opt/containerd/bin/runc\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"runc(2743103)|containerd-shim-runc-v2(289436)|systemd(1)\",\n \"ProcessUserGroup\": \"root\"\n },\n \"RequestId\": \"c544fc31-7576-43aa-a4f3-b4c40656f67a\"\n }\n}",
1312
+ "title": "DescribeEscapeEventDetail"
1313
+ }
1314
+ ],
1315
+ "DescribeEscapeEventInfo": [
1316
+ {
1317
+ "document": "查询容器逃逸事件列表",
1318
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeEventInfo\n<公共请求参数>\n\n{}",
1319
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ClusterID\": \"cls-fjivn***\",\n \"ClusterName\": \"dev-set\",\n \"ContainerId\": \"9294ea00cf80469f3604e2a38e725bf77c5a3ea522ce23bbf4d4dba8b4e149c9\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"/test1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"容器(ID: 9294ea00cf...) 中的进程bash对cgroup下的文件notify_on_release进行了修改,通过篡改该文件,可以实现容器逃逸,获得宿主机系统权限。\",\n \"EventCount\": 192,\n \"EventId\": \"33705186\",\n \"EventName\": \"利用cgroup机制逃逸\",\n \"EventType\": \"ESCAPE_CGROUPS\",\n \"FoundTime\": \"2024-08-23 16:41:03\",\n \"HostID\": \"3253189e-a107-4892-9bb9-03ad9****\",\n \"HostIP\": \"172.16.48.74\",\n \"ImageId\": \"sha256:5d0da3dc976460b72c77d94c8a1ad043720b0416bfc16c5*****\",\n \"ImageName\": \"centos:8\",\n \"LatestFoundTime\": \"2024-08-23 16:41:03\",\n \"NodeID\": \"d41d8cd98f00b204******\",\n \"NodeIP\": \"172.16.48.74\",\n \"NodeName\": \"VM-48-74-centos\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800****\",\n \"PodIP\": \"10.0.0.121\",\n \"PodName\": \"dev1\",\n \"PublicIP\": \"101.33.227.**\",\n \"Solution\": \"检查容器对应镜像是否存在漏洞或木马。修改容器启动参数,以普通权限启动容器。检查容器挂载目录,避免将/sys/fs/cgroup挂载到容器中。\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"53e7bf79-dd62-40f9-be45-5849b1a372af\",\n \"TotalCount\": 1021\n }\n}",
1320
+ "title": "DescribeEscapeEventInfo"
1321
+ }
1322
+ ],
1323
+ "DescribeEscapeEventTendency": [
1324
+ {
1325
+ "document": "",
1326
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeEventTendency\n&EndTime=2021-05-01\n&StartTime=2021-05-07\n&<公共请求参数>",
1327
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Date\": \"2020-09-22\",\n \"ContainerEscapeEventCount\": 0,\n \"ProcessPrivilegeEventCount\": 0,\n \"RiskContainerEventCount\": 1021\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1328
+ "title": "查询待处理逃逸事件趋势"
1329
+ }
1330
+ ],
1331
+ "DescribeEscapeEventTypeSummary": [
1332
+ {
1333
+ "document": "",
1334
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeEventTypeSummary\n&<公共请求参数>",
1335
+ "output": "{\n \"Response\": {\n \"RiskContainerEventCount\": 0,\n \"ProcessPrivilegeEventCount\": 0,\n \"ContainerEscapeEventCount\": 0,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\",\n \"PendingEscapeEventCount\": 0\n }\n}",
1336
+ "title": "统计容器逃逸各事件类型和待处理事件数"
1337
+ }
1338
+ ],
1339
+ "DescribeEscapeRuleInfo": [
1340
+ {
1341
+ "document": "",
1342
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeRuleInfo\n&<公共请求参数>",
1343
+ "output": "{\n \"Response\": {\n \"RequestId\": \"d8663c94-1030-4256-8e10-a3822d7b5e10\",\n \"RuleSet\": [\n {\n \"Group\": \"PROCESS_PRIVILEGE\",\n \"IsEnable\": true,\n \"Name\": \"突破namespace限制\",\n \"Type\": \"PRIVILEGE\"\n },\n {\n \"Group\": \"RISK_CONTAINER\",\n \"IsEnable\": true,\n \"Name\": \"敏感路径挂载\",\n \"Type\": \"MOUNT_SENSITIVE_PTAH\"\n },\n {\n \"Group\": \"CONTAINER_ESCAPE\",\n \"IsEnable\": true,\n \"Name\": \"逃逸漏洞利用\",\n \"Type\": \"ESCAPE_VUL_OCCURRED\"\n },\n {\n \"Group\": \"CONTAINER_ESCAPE\",\n \"IsEnable\": true,\n \"Name\": \"访问Docker API接口逃逸\",\n \"Type\": \"ESCAPE_DOCKER_API\"\n },\n {\n \"Group\": \"CONTAINER_ESCAPE\",\n \"IsEnable\": true,\n \"Name\": \"篡改敏感文件逃逸\",\n \"Type\": \"ESCAPE_TAMPER_SENSITIVE_FILE\"\n },\n {\n \"Group\": \"CONTAINER_ESCAPE\",\n \"IsEnable\": true,\n \"Name\": \"利用cgroup机制逃逸\",\n \"Type\": \"ESCAPE_CGROUPS\"\n }\n ]\n }\n}",
1344
+ "title": "getescapeRule"
1345
+ }
1346
+ ],
1347
+ "DescribeEscapeSafeState": [
1348
+ {
1349
+ "document": "",
1350
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeEscapeSafeState\n&<公共请求参数>",
1351
+ "output": "{\n \"Response\": {\n \"IsSafe\": \"Unsafe\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1352
+ "title": "查询容器逃逸安全状态"
1353
+ }
1354
+ ],
1355
+ "DescribeEscapeWhiteList": [
1356
+ {
1357
+ "document": "",
1358
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeEscapeWhiteList\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
1359
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ContainerCount\": 0,\n \"EventType\": [\n \"MOUNT_SENSITIVE_PTAH\"\n ],\n \"SuperNodeCount\": 5,\n \"HostCount\": 4,\n \"ID\": 7172,\n \"ImageID\": \"sha256:a24bb4013296f61e89ba57005a7b3e52274d8edd3ae2077d04395f806b63d83e\",\n \"ImageName\": \"alpine:3.12.0\",\n \"ImageSize\": 10000000,\n \"InsertTime\": \"2024-10-17 22:31:18\",\n \"UpdateTime\": \"2024-10-27 08:51:02\"\n }\n ],\n \"RequestId\": \"ef5c9885-aaaa-bbbb-cccc-4fccf03883cf\",\n \"TotalCount\": 1\n }\n}",
1360
+ "title": "查询逃逸白名单"
1361
+ }
1362
+ ],
1363
+ "DescribeEventEscapeImageList": [
1364
+ {
1365
+ "document": "",
1366
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskContainerList\n<公共请求参数>\n\n{\n \"Limit\": 1,\n \"Offset\": 1,\n \"Filters\": [\n {\n \"Name\": \"EventType\",\n \"Values\": [\n \"MOUNT_SENSITIVE_PTAH\"\n ],\n \"ExactMatch\": true\n }\n ],\n \"Order\": \"asc\",\n \"By\": \"Status\"\n}",
1367
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ImageId\": \"sha256:9aae1601d6832af6c69ef257f09\",\n \"EventType\": \"local\",\n \"OriginEventType\": \"MOUNT_SENSITIVE_PTAH\",\n \"UniqueKey\": \"1398abd1-98x71134\",\n \"ImageName\": \"centos-7.6\",\n \"ContainerCount\": 0,\n \"FoundTime\": \"2020-09-22 00:00:00\",\n \"LatestFoundTime\": \"2020-09-22 00:00:00\",\n \"EventCount\": 0,\n \"Status\": \"EVENT_INGNORE\",\n \"Description\": \"Description\",\n \"Solution\": \"Solution\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1368
+ "title": "查询风险容器镜像列表"
1369
+ }
1370
+ ],
1371
+ "DescribeExportJobDownloadURL": [
1372
+ {
1373
+ "document": "",
1374
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobDownloadURL\n<公共请求参数>\n\n{\n \"JobID\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n}",
1375
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"DownloadURL\": \"http://1.2.3.4/result.csv\"\n }\n}",
1376
+ "title": "查询导出任务下载URL"
1377
+ }
1378
+ ],
1379
+ "DescribeExportJobManageList": [
1380
+ {
1381
+ "document": "",
1382
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobManageList\n<公共请求参数>\n\n{}",
1383
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ExportProgress\": 0,\n \"ExportStatus\": \"RUNNING\",\n \"FailureMsg\": \"FailureMsg\",\n \"InsertTime\": \"2024-10-30 10:47:57\",\n \"JobID\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"JobName\": \"LocalImage-253332865-343433341-1\",\n \"Source\": \"LocalImage\",\n \"Timeout\": \"2024-10-30 10:47:57\"\n }\n ],\n \"RequestId\": \"b0990d92-0eff-4bc3-8484-ffd61d8daa89\",\n \"TotalCount\": 11\n }\n}",
1384
+ "title": "查询导出任务管理列表"
1385
+ }
1386
+ ],
1387
+ "DescribeExportJobResult": [
1388
+ {
1389
+ "document": "查询导出任务的结果",
1390
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExportJobResult\n<公共请求参数>\n\n{\n \"JobId\": \"e4409223-8e92-45db-a857-11b1ff547c79\"\n}",
1391
+ "output": "{\n \"Response\": {\n \"DownloadURL\": \"https://yunjing.cos.ap-guangzhou.myqcloud.com\",\n \"ExportProgress\": 100,\n \"ExportStatus\": \"SUCCESS\",\n \"FailureMsg\": \"FailureMsg\",\n \"RequestId\": \"c66b2b1f-9c85-481a-8eea-1a254ffd61df\"\n }\n}",
1392
+ "title": "查询导出任务的结果"
1393
+ }
1394
+ ],
1395
+ "DescribeImageAuthorizedInfo": [
1396
+ {
1397
+ "document": "",
1398
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageAuthorizedInfo\n&<公共请求参数>",
1399
+ "output": "{\n \"Response\": {\n \"CanApplyFreeImageAuthorize\": false,\n \"ImageScanInquireInfo\": {\n \"Capcity\": 18601,\n \"EndTime\": \"2024-12-24 13:01:18\",\n \"InquireKey\": \"sv_yunjing_cssil_image\",\n \"PurchaseStatus\": \"Normal\",\n \"ResourceID\": \"427c59056cbd64e30b3990e8d7b25c19\",\n \"StartTime\": \"2024-09-24 13:01:18\",\n \"Useage\": 17365\n },\n \"NotScannedImageCnt\": 38,\n \"NotScannedLocalImageCnt\": 12,\n \"PurchasedAuthorizedCnt\": 300000,\n \"RepeatImageIdCnt\": 2,\n \"RequestId\": \"0ad4465e-cf84-411f-bd10-75bbb3a9c9aa\",\n \"ScannedImageCnt\": 11687,\n \"TotalAuthorizedCnt\": 300000,\n \"TrialAuthorizedCnt\": 0,\n \"UsedAuthorizedCnt\": 300000,\n \"UsedPurchasedAuthorizedCnt\": 300000,\n \"UsedTrialAuthorizedCnt\": 0\n }\n}",
1400
+ "title": "查询镜像授权信息"
1401
+ }
1402
+ ],
1403
+ "DescribeImageAutoAuthorizedLogList": [
1404
+ {
1405
+ "document": "",
1406
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageAutoAuthorizedLogList\n&TaskId=1\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1407
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"List\": [\n {\n \"Status\": \"SUCCESS\",\n \"AuthorizedTime\": \"2022-01-01 00:00:00\",\n \"ImageName\": \"imageName-01\",\n \"IsAuthorized\": 1,\n \"ImageId\": \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\"\n }\n ]\n }\n}",
1408
+ "title": "查询镜像自动授权结果列表"
1409
+ }
1410
+ ],
1411
+ "DescribeImageAutoAuthorizedRule": [
1412
+ {
1413
+ "document": "",
1414
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageAutoAuthorizedRule\n&<公共请求参数>",
1415
+ "output": "{\n \"Response\": {\n \"MaxDailyCount\": 0,\n \"RangeType\": \"ALL\",\n \"RuleId\": 1,\n \"HostCount\": 0,\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\",\n \"IsEnabled\": 0\n }\n}",
1416
+ "title": "查询本地镜像自动授权规则"
1417
+ }
1418
+ ],
1419
+ "DescribeImageAutoAuthorizedTaskList": [
1420
+ {
1421
+ "document": "",
1422
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageAutoAuthorizedTaskList\n&StartTime=2022-01-01\n&EndTime=2022-01-07\n\n&<公共请求参数>",
1423
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"LastAuthorizedTime\": \"2020-09-22\",\n \"AuthorizedDate\": \"2020-09-22\",\n \"LatestFailCode\": \"REACH_LIMIT\",\n \"SuccessCount\": 0,\n \"FailCount\": 0,\n \"Source\": \"LOCAL\",\n \"TaskId\": 1,\n \"Type\": \"AUTO\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1424
+ "title": "DescribeImageAutoAuthorizedTaskList"
1425
+ }
1426
+ ],
1427
+ "DescribeImageComponentList": [
1428
+ {
1429
+ "document": "",
1430
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageComponentList\n&ImageID=image-id\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1431
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"ImageID\": \"sha256:2ebe27d\",\n \"Name\": \"name\",\n \"Path\": \"Path\",\n \"Type\": \"SYSTEM_COMPONENT\",\n \"Version\": \"2.2.51-12.el7\",\n \"VulCount\": 0\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1432
+ "title": "查询本地镜像组件列表"
1433
+ }
1434
+ ],
1435
+ "DescribeImageRegistryNamespaceList": [
1436
+ {
1437
+ "document": "",
1438
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeImageRegistryNamespaceList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10\n}",
1439
+ "output": "{\n \"Response\": {\n \"NamespaceDetail\": [\n {\n \"ImageCnt\": 54,\n \"Namespace\": \"os_images\",\n \"RegistryCnt\": 1,\n \"RiskImageCnt\": 50\n }\n ],\n \"NamespaceList\": [\n \"adadadadmin\"\n ],\n \"RequestId\": \"fe6d6a40-fe7e-43d9-818e-e0afd7975663\",\n \"TotalCount\": 33\n }\n}",
1440
+ "title": "查询用户仓库的项目空间列表"
1441
+ }
1442
+ ],
1443
+ "DescribeImageRegistryTimingScanTask": [
1444
+ {
1445
+ "document": "镜像仓库查看定时任务",
1446
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeImageRegistryTimingScanTask\n<公共请求参数>\n\n{}",
1447
+ "output": "{\n \"Response\": {\n \"RequestId\": \"f60f0ef9-a105-4535-8dfd-42ad8b3a9c73\",\n \"ScanTime\": \"03:00:00\",\n \"ScanPeriod\": 1,\n \"ScanType\": [\n \"risk\",\n \"virus\"\n ],\n \"All\": false,\n \"Images\": [\n {\n \"ImageDigest\": \"sha256:1319b1eaa0b7bcebae63af321fa67559b9517e8494060403d083bb3508fe52c8\",\n \"RegistryType\": \"ccr\",\n \"ImageRepoAddress\": \"ccr.ccs.tencentyun.com/yunding/luping:v1\",\n \"InstanceId\": \"ins-apqv42***\",\n \"InstanceName\": \"InstanceName\",\n \"Namespace\": \"tcss\",\n \"ImageName\": \"yunding/luping\",\n \"ImageTag\": \"v1\",\n \"Force\": \"Force\"\n }\n ],\n \"Id\": [\n 1\n ],\n \"Enable\": true,\n \"Latest\": true\n }\n}",
1448
+ "title": "镜像仓库查看定时任务"
1449
+ }
1450
+ ],
1451
+ "DescribeImageRiskSummary": [
1452
+ {
1453
+ "document": "",
1454
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageRiskSummary\n&<公共请求参数>",
1455
+ "output": "{\n \"Response\": {\n \"RiskCnt\": [\n {\n \"Cnt\": 1,\n \"Level\": \"HIGH\"\n }\n ],\n \"VulnerabilityCnt\": [\n {\n \"Cnt\": 1,\n \"Level\": \"HIGH\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"MalwareVirusCnt\": [\n {\n \"Cnt\": 1,\n \"Level\": \"HIGH\"\n }\n ]\n }\n}",
1456
+ "title": "查询本地镜像风险概览"
1457
+ }
1458
+ ],
1459
+ "DescribeImageRiskTendency": [
1460
+ {
1461
+ "document": "",
1462
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageRiskTendency\n&EndTime=2020-09-22\n&StartTime=2020-09-22\n&<公共请求参数>",
1463
+ "output": "{\n \"Response\": {\n \"ImageRiskTendencySet\": [\n {\n \"ImageRiskSet\": [\n {\n \"Cnt\": 1,\n \"CurTime\": \"2020-09-22\"\n }\n ],\n \"ImageRiskType\": \"IRT_VULNERABILITY\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1464
+ "title": "获取运行时安全事件新增趋势"
1465
+ }
1466
+ ],
1467
+ "DescribeImageSimpleList": [
1468
+ {
1469
+ "document": "",
1470
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeImageSimpleList\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1471
+ "output": "{\n \"Response\": {\n \"ImageCnt\": 1,\n \"ImageList\": [\n {\n \"Size\": 1,\n \"ImageName\": \"centos:7.6\",\n \"ContainerCnt\": 0,\n \"HostCnt\": 1,\n \"ImageType\": \"3\",\n \"ImageID\": \"c826b9fa-68b5-4603-bf25-a5eb9b65c768\"\n }\n ],\n \"RequestId\": \"965c55c5-8ab1-4e32-8425-4c44acb5edec\"\n }\n}",
1472
+ "title": "查询全部镜像列表"
1473
+ }
1474
+ ],
1475
+ "DescribeIndexList": [
1476
+ {
1477
+ "document": "",
1478
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeIndexList\n<公共请求参数>\n\n{}",
1479
+ "output": "{\n \"Response\": {\n \"Data\": \"{\\\"indexSort\\\":{\\\"k8sapi日志\\\":[\\\"userlog-k8s-api\\\"],\\\"容器bash日志\\\":[\\\"userlog-container-bash\\\"],\\\"容器启动日志\\\":[\\\"userlog-container-start\\\"]},\\\"indexArr\\\":[\\\"userlog-container-bash\\\",\\\"userlog-container-start\\\",\\\"userlog-k8s-api\\\"],\\\"fieldArr\\\":[{\\\"_feature\\\":{\\\"_feature\\\":{\\\"type\\\":\\\"_feature\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_field_names\\\":{\\\"_field_names\\\":{\\\"type\\\":\\\"_field_names\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_id\\\":{\\\"_id\\\":{\\\"type\\\":\\\"_id\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_ignored\\\":{\\\"_ignored\\\":{\\\"type\\\":\\\"_ignored\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_index\\\":{\\\"_index\\\":{\\\"type\\\":\\\"_index\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_routing\\\":{\\\"_routing\\\":{\\\"type\\\":\\\"_routing\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_seq_no\\\":{\\\"_seq_no\\\":{\\\"type\\\":\\\"_seq_no\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_source\\\":{\\\"_source\\\":{\\\"type\\\":\\\"_source\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"_type\\\":{\\\"_type\\\":{\\\"type\\\":\\\"_type\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_version\\\":{\\\"_version\\\":{\\\"type\\\":\\\"_version\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"annotations\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"annotations.authorization\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"annotations.authorization.k8s\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"annotations.authorization.k8s.io/decision\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"annotations.authorization.k8s.io/reason\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"apiVersion\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"appid\\\":{\\\"long\\\":{\\\"type\\\":\\\"long\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"auditID\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"container_id\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"container_name\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"event_time\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"image_id\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"image_name\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"insert_time\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"kind\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"level\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"objectRef\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"objectRef.apiVersion\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"objectRef.namespace\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"objectRef.resource\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"quuid\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"requestReceivedTimestamp\\\":{\\\"date\\\":{\\\"type\\\":\\\"date\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"requestURI\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"responseStatus\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"responseStatus.code\\\":{\\\"long\\\":{\\\"type\\\":\\\"long\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"sourceIPs\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"stage\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"stageTimestamp\\\":{\\\"date\\\":{\\\"type\\\":\\\"date\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"user\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"user.groups\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"user.uid\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"user.username\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"userAgent\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"uuid\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"verb\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}}},{\\\"Action\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"Actor\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"Actor.Attributes\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"Actor.Attributes.image\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"Actor.Attributes.name\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"Actor.Attributes.org\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"Actor.Attributes.org.label-schema\\\":{\\\"object\\\":{\\\"type\\\":\\\"object\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"Actor.Attributes.org.label-schema.build-date\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"Actor.Attributes.org.label-schema.license\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"Actor.Attributes.org.label-schema.name\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"Actor.Attributes.org.label-schema.schema-version\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"Actor.Attributes.org.label-schema.vendor\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"Actor.ID\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"Type\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_feature\\\":{\\\"_feature\\\":{\\\"type\\\":\\\"_feature\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_field_names\\\":{\\\"_field_names\\\":{\\\"type\\\":\\\"_field_names\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_id\\\":{\\\"_id\\\":{\\\"type\\\":\\\"_id\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_ignored\\\":{\\\"_ignored\\\":{\\\"type\\\":\\\"_ignored\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_index\\\":{\\\"_index\\\":{\\\"type\\\":\\\"_index\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_routing\\\":{\\\"_routing\\\":{\\\"type\\\":\\\"_routing\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_seq_no\\\":{\\\"_seq_no\\\":{\\\"type\\\":\\\"_seq_no\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_source\\\":{\\\"_source\\\":{\\\"type\\\":\\\"_source\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"_type\\\":{\\\"_type\\\":{\\\"type\\\":\\\"_type\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_version\\\":{\\\"_version\\\":{\\\"type\\\":\\\"_version\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"appid\\\":{\\\"long\\\":{\\\"type\\\":\\\"long\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"container_id\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"container_name\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"event_time\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"from\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"id\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"image_id\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"image_name\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"insert_time\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"quuid\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"scope\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"status\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"time\\\":{\\\"long\\\":{\\\"type\\\":\\\"long\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"timeNano\\\":{\\\"long\\\":{\\\"type\\\":\\\"long\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"uuid\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}}},{\\\"_feature\\\":{\\\"_feature\\\":{\\\"type\\\":\\\"_feature\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_field_names\\\":{\\\"_field_names\\\":{\\\"type\\\":\\\"_field_names\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_id\\\":{\\\"_id\\\":{\\\"type\\\":\\\"_id\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_ignored\\\":{\\\"_ignored\\\":{\\\"type\\\":\\\"_ignored\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_index\\\":{\\\"_index\\\":{\\\"type\\\":\\\"_index\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_routing\\\":{\\\"_routing\\\":{\\\"type\\\":\\\"_routing\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":false}},\\\"_seq_no\\\":{\\\"_seq_no\\\":{\\\"type\\\":\\\"_seq_no\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_source\\\":{\\\"_source\\\":{\\\"type\\\":\\\"_source\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"_type\\\":{\\\"_type\\\":{\\\"type\\\":\\\"_type\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"_version\\\":{\\\"_version\\\":{\\\"type\\\":\\\"_version\\\",\\\"searchable\\\":false,\\\"aggregatable\\\":false}},\\\"appid\\\":{\\\"long\\\":{\\\"type\\\":\\\"long\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"cmd\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"container_id\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"container_name\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"event_time\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"image_id\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"image_name\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"insert_time\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"quuid\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}},\\\"uuid\\\":{\\\"keyword\\\":{\\\"type\\\":\\\"keyword\\\",\\\"searchable\\\":true,\\\"aggregatable\\\":true}}}]}\",\n \"RequestId\": \"49082d4a-71b4-4e32-9ca1-b33872a4a63a\"\n }\n}",
1480
+ "title": "获取索引列表"
1481
+ }
1482
+ ],
1483
+ "DescribeInspectionReport": [
1484
+ {
1485
+ "document": "",
1486
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeInspectionReport\n<公共请求参数>\n\n{}",
1487
+ "output": "{\n \"Response\": {\n \"ReportName\": \"report.csv\",\n \"ReportUrl\": \"https://cwp-1258344699.cos.ap-guangzhou.myqcloud.com/report.csv\",\n \"RequestId\": \"d1be9e4b-99db-47cb-8aa1-11b4c4b7becd\"\n }\n}",
1488
+ "title": "查询检查报告"
1489
+ }
1490
+ ],
1491
+ "DescribeK8sApiAbnormalEventInfo": [
1492
+ {
1493
+ "document": "",
1494
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalEventInfo\n<公共请求参数>\n\n{\n \"ID\": 10\n}",
1495
+ "output": "{\n \"Response\": {\n \"Info\": {\n \"AlarmCount\": 1,\n \"ClusterID\": \"cls-abhq0j4o-666\",\n \"ClusterMasterIP\": \"10.0.1.92\",\n \"ClusterName\": \"clsfoo***\",\n \"ClusterRunningStatus\": \"CSR_RUN****\",\n \"Desc\": \"检测到您的K8s API Server存在匿名用户访问请求,攻击者可利用匿名用户,通过API Server访问集群资源,如进入容器执行命令等。\",\n \"FirstCreateTime\": \"2024-10-22T11:00:45Z\",\n \"HighLightFields\": [\n \"RequestUser\"\n ],\n \"Info\": \"{\\\"Verb\\\": \\\"list\\\", \\\"AuditID\\\": \\\"4e477a26-b171-4702-a2ac-1ac494ae8c85\\\", \\\"PodNameIP\\\": \\\"\\\", \\\"SourceIPS\\\": \\\"[\\\\\\\"10.0.0.4\\\\\\\"]\\\", \\\"UserAgent\\\": \\\"tcss_agent_cluster/v0.0.0 (linux/amd64) kubernetes/$Format\\\", \\\"RequestURI\\\": \\\"/api/v1/namespaces?limit=1\\\", \\\"RequestUser\\\": \\\"{\\\\\\\"groups\\\\\\\":\\\\\\\"[\\\\\\\\\\\\\\\"system:unauthenticated\\\\\\\\\\\\\\\"]\\\\\\\",\\\\\\\"uid\\\\\\\":\\\\\\\"\\\\\\\",\\\\\\\"username\\\\\\\":\\\\\\\"system:anonymous\\\\\\\"}\\\", \\\"MountHostDir\\\": \\\"\\\", \\\"RequestObject\\\": \\\"{\\\\\\\"metadata\\\\\\\":\\\\\\\"\\\\\\\"}\\\", \\\"ResponseObject\\\": \\\"{\\\\\\\"metadata\\\\\\\":\\\\\\\"\\\\\\\"}\\\", \\\"ResponseStatusCode\\\": \\\"200\\\"}\",\n \"K8sVersion\": \"1.0.1\",\n \"LastCreateTime\": \"2024-10-22T11:00:45Z\",\n \"MatchRule\": {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"HIGH\",\n \"Scope\": \"{\\\"RequestUser\\\": \\\"system:anonymous\\\", \\\"RequestUserGroups\\\": \\\"system:anonymous\\\"}\",\n \"Status\": false\n },\n \"MatchRuleID\": \"SYSTEM\",\n \"MatchRuleName\": \"系统规则\",\n \"MatchRuleType\": \"ANONYMOUS_ACCESS\",\n \"RiskLevel\": \"HIGH\",\n \"RunningComponent\": [],\n \"Status\": \"EVENT_UNDEAL\",\n \"Suggestion\": \"启用匿名用户存在较高的风险,建议您及时停用匿名用户,避免被攻击者利用;并排查来源IP和操作的资源是否属于正常运维操作。\\n1、修改API Server 配置文件(如:/etc/kubernetes/manifests/kube-apiserver.yaml)将anonymous-auth改为false;并修改bind-address,避免监听在0.0.0.0,或使用安全组限制;去掉insecure-port配置。\\n2、禁用kubelet的匿名认证功能,如去除kubelet服务配置文件中的anonymous-auth配置。\\n建议修改配置前,确认是否为业务所需;在修改配置文件前,做好备份。\"\n },\n \"RequestId\": \"8d8d41ab-6dfd-4f66-ad09-4a882485e733\"\n }\n}",
1496
+ "title": "查询k8s api 异常事件详情"
1497
+ }
1498
+ ],
1499
+ "DescribeK8sApiAbnormalEventList": [
1500
+ {
1501
+ "document": "",
1502
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalEventList\n<公共请求参数>\n\n{}",
1503
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AlarmCount\": 1,\n \"ClusterID\": \"cls-abhq0j4o-666\",\n \"ClusterName\": \"clsfoo***\",\n \"ClusterRunningStatus\": \"CSR_RUN****\",\n \"Desc\": \"检测到您的K8s API Server存在匿名用户访问请求,攻击者可利用匿名用户,通过API Server访问集群资源,如进入容器执行命令等。\",\n \"FirstCreateTime\": \"2024-10-22T11:00:45Z\",\n \"ID\": 501472,\n \"LastCreateTime\": \"2024-10-22T11:00:45Z\",\n \"MatchRule\": {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"HIGH\",\n \"Scope\": \"{\\\"RequestUser\\\": \\\"system:anonymous\\\", \\\"RequestUserGroups\\\": \\\"system:anonymous\\\"}\",\n \"Status\": false\n },\n \"MatchRuleType\": \"ANONYMOUS_ACCESS\",\n \"RiskLevel\": \"HIGH\",\n \"RuleName\": \"系统规则\",\n \"RuleType\": \"SYSTEM_DEFINED_RULE\",\n \"Status\": \"EVENT_UNDEAL\",\n \"Suggestion\": \"启用匿名用户存在较高的风险,建议您及时停用匿名用户,避免被攻击者利用;并排查来源IP和操作的资源是否属于正常运维操作。\\n1、修改API Server 配置文件(如:/etc/kubernetes/manifests/kube-apiserver.yaml)将anonymous-auth改为false;并修改bind-address,避免监听在0.0.0.0,或使用安全组限制;去掉insecure-port配置。\\n2、禁用kubelet的匿名认证功能,如去除kubelet服务配置文件中的anonymous-auth配置。\\n建议修改配置前,确认是否为业务所需;在修改配置文件前,做好备份。\"\n }\n ],\n \"RequestId\": \"74b6dcb5-f38e-45f4-9f3f-be848b52466f\",\n \"TotalCount\": 218\n }\n}",
1504
+ "title": "查询k8s api异常事件列表"
1505
+ }
1506
+ ],
1507
+ "DescribeK8sApiAbnormalRuleInfo": [
1508
+ {
1509
+ "document": "",
1510
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalRuleInfo\n<公共请求参数>\n\n{\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\"\n}",
1511
+ "output": "{\n \"Response\": {\n \"Info\": {\n \"Status\": true,\n \"RuleType\": \"USER_DEFINED_RULE\",\n \"RuleInfoList\": [\n {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"NOTICE\",\n \"Scope\": \"{\\\"RequestURI\\\":\\\"/apis/cowsajhhoa.k8s.io/v\\\",\\\"RequestUser\\\":\\\"“name”:”sanpasahsad-contaosaer-leader”)\\\\\\\"\\\",\\\"ResponseStatusCode\\\":\\\"200\\\",\\\"SourceIPS\\\":\\\"10.255.0.43\\\",\\\"UserAgent\\\":\\\"snapshot-controller\\\",\\\"Verb\\\":\\\"update\\\"}\",\n \"Status\": true\n }\n ],\n \"EffectClusterIDSet\": [],\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"EffectAllCluster\": true,\n \"RuleName\": \"rulename-test\"\n },\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1512
+ "title": "查询k8sapi异常请求规则详情"
1513
+ }
1514
+ ],
1515
+ "DescribeK8sApiAbnormalRuleList": [
1516
+ {
1517
+ "document": "",
1518
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalRuleList\n<公共请求参数>\n\n{}",
1519
+ "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"TotalCount\": 0\n }\n}",
1520
+ "title": "查询k8sapi异常请求规则列表"
1521
+ }
1522
+ ],
1523
+ "DescribeK8sApiAbnormalRuleScopeList": [
1524
+ {
1525
+ "document": "",
1526
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalRuleScopeList\n<公共请求参数>\n\n{\n \"Offset\": 1,\n \"Limit\": 1,\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"Filters\": []\n}",
1527
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"NOTICE\",\n \"Scope\": \"{\\\"RequestURI\\\":\\\"/apis/cowsajhhoa.k8s.io/v\\\",\\\"RequestUser\\\":\\\"“name”:”sanpasahsad-contaosaer-leader”)\\\\\\\"\\\",\\\"ResponseStatusCode\\\":\\\"200\\\",\\\"SourceIPS\\\":\\\"10.255.0.43\\\",\\\"UserAgent\\\":\\\"snapshot-controller\\\",\\\"Verb\\\":\\\"update\\\"}\",\n \"Status\": true\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1528
+ "title": "查询k8sapi异常规则中范围列表"
1529
+ }
1530
+ ],
1531
+ "DescribeK8sApiAbnormalSummary": [
1532
+ {
1533
+ "document": "",
1534
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalSummary\n<公共请求参数>\n\n{}",
1535
+ "output": "{\n \"Response\": {\n \"UnhandleEventCount\": 1,\n \"UnhandleHighLevelEventCount\": 1,\n \"UnhandleNoticeLevelEventCount\": 1,\n \"UnhandleLowLevelEventCount\": 1,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\",\n \"UnhandleMediumLevelEventCount\": 1\n }\n}",
1536
+ "title": "查询k8sapi异常事件统计"
1537
+ }
1538
+ ],
1539
+ "DescribeK8sApiAbnormalTendency": [
1540
+ {
1541
+ "document": "",
1542
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeK8sApiAbnormalTendency\n<公共请求参数>\n\n{\n \"TendencyPeriod\": 7\n}",
1543
+ "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\"\n }\n}",
1544
+ "title": "查询k8sapi异常请求趋势列表"
1545
+ }
1546
+ ],
1547
+ "DescribeLogStorageStatistic": [
1548
+ {
1549
+ "document": "",
1550
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeLogStorageStatistic\n<公共请求参数>\n\n{}",
1551
+ "output": "{\n \"Response\": {\n \"UsedSize\": 89546766804,\n \"TotalSize\": 1073741824000,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1552
+ "title": "获取日志检索容量使用统计"
1553
+ }
1554
+ ],
1555
+ "DescribeNetworkFirewallAuditRecord": [
1556
+ {
1557
+ "document": "",
1558
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallAuditRecord\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1559
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"AuditList\": [\n {\n \"ClusterName\": \"tke_test\",\n \"Region\": \"ap-guangzhou\",\n \"ClusterId\": \" cls-jvrv0kf2\",\n \"Uin\": \"10023234334\",\n \"NetworkPolicyName\": \"NetworkPolicyName\",\n \"AppId\": 346456456,\n \"PolicyId\": \"54645\",\n \"Action\": \"add\",\n \"Operation\": \"Running\",\n \"OperationTime\": \"2024-10-30 12:21:51\"\n }\n ],\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\"\n }\n}",
1560
+ "title": "查询集群策略审计列表示例"
1561
+ }
1562
+ ],
1563
+ "DescribeNetworkFirewallClusterList": [
1564
+ {
1565
+ "document": "",
1566
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallClusterList\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1567
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"ClusterInfoList\": [\n {\n \"ClusterVersion\": \"1.0.0\",\n \"EnableRuleCount\": 8,\n \"ClusterName\": \"tke_test\",\n \"NetworkPolicyPluginError\": \" 网络插件运行状态非RUNNING\",\n \"Region\": \"ap-guangzhou\",\n \"ClusterId\": \"cls-jvrv0kf2\",\n \"ClusterType\": \"MANAGED_CLUSTER\",\n \"NetworkPolicyPlugin\": \" Kube-router\",\n \"NetworkPolicyPluginStatus\": \"Running\",\n \"ClusterStatus\": \"Running\",\n \"ClusterOs\": \" ubuntu18.04.1x86_64\",\n \"ClusterNetworkSettings\": \"Cilium-Overlay\",\n \"TotalRuleCount\": 5\n }\n ],\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\"\n }\n}",
1568
+ "title": "查询结果"
1569
+ }
1570
+ ],
1571
+ "DescribeNetworkFirewallClusterRefreshStatus": [
1572
+ {
1573
+ "document": "",
1574
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallClusterRefreshStatus\n<公共请求参数>\n\n{\n \"TaskId\": \"34702\"\n}",
1575
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ed202021-696e-4c03-a726-ca459c47c4ea\",\n \"TaskStatus\": \"Task_Succ\"\n }\n}",
1576
+ "title": "容器网络查询资产任务进度示例"
1577
+ }
1578
+ ],
1579
+ "DescribeNetworkFirewallNamespaceLabelList": [
1580
+ {
1581
+ "document": "",
1582
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallNamespaceLabelList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-new\",\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1583
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a6405e01-bf4f-4044-abe9-4458783a3066\",\n \"TotalCount\": 9,\n \"ClusterNamespaceLabelList\": [\n {\n \"Name\": \"hello\",\n \"Labels\": \"new=test\"\n }\n ]\n }\n}",
1584
+ "title": "查询集群网络空间标签列表示例"
1585
+ }
1586
+ ],
1587
+ "DescribeNetworkFirewallNamespaceList": [
1588
+ {
1589
+ "document": "",
1590
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallNamespaceList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-new\",\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1591
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a6405e01-bf4f-4044-abe9-4458783a3066\",\n \"TotalCount\": 9,\n \"ClusterNamespaceList\": [\n {\n \"Name\": \"hello\",\n \"Labels\": \"new=value\"\n }\n ]\n }\n}",
1592
+ "title": "查询结果"
1593
+ },
1594
+ {
1595
+ "document": "",
1596
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallNamespaceList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-o9mfjg0i\"\n}",
1597
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dee2fbd3-3114-4b17-9cf7-5c456cd703b1\",\n \"TotalCount\": 14,\n \"ClusterNamespaceList\": [\n {\n \"Labels\": \"key=value\",\n \"Name\": \"app-team1\"\n }\n ]\n }\n}",
1598
+ "title": "命名空间列表"
1599
+ }
1600
+ ],
1601
+ "DescribeNetworkFirewallPodLabelsList": [
1602
+ {
1603
+ "document": "查询集群网络pod标签",
1604
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPodLabelsList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-new\",\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1605
+ "output": "{\n \"Response\": {\n \"RequestId\": \"a6405e01-bf4f-4044-abe9-4458783a3066\",\n \"TotalCount\": 9,\n \"PodList\": [\n {\n \"PodName\": \"hello\",\n \"Namespace\": \"default\",\n \"Labels\": \"newlabel\",\n \"WorkloadKind\": \"deployment\"\n }\n ]\n }\n}",
1606
+ "title": "查询集群网络pod标签"
1607
+ }
1608
+ ],
1609
+ "DescribeNetworkFirewallPolicyDetail": [
1610
+ {
1611
+ "document": "",
1612
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 1\n}",
1613
+ "output": "{\n \"Response\": {\n \"PolicyName\": \"name01\",\n \"CustomPolicy\": [\n {\n \"Peer\": [\n {\n \"NamespaceSelector\": \"default\",\n \"PeerType\": \"peer type\",\n \"PodSelector\": \"a=b\",\n \"IPBlock\": \"ip block\"\n }\n ],\n \"Direction\": \"FROM\",\n \"Ports\": [\n {\n \"Protocol\": \"tcp\",\n \"Port\": \"80\"\n }\n ]\n }\n ],\n \"Description\": \"desc content\",\n \"ClusterId\": \"cls-dsfhuisdhfis\",\n \"FromPolicyRule\": 0,\n \"PublishResult\": \"success\",\n \"Namespace\": \"default\",\n \"NetworkPolicyPlugin\": \"plugin\",\n \"PodSelector\": \"a=b\",\n \"PublishStatus\": \"running\",\n \"ToPolicyRule\": 0,\n \"RequestId\": \"392f05bd-bf86-4911-8cf9-b8c2ac0f62ab\",\n \"PolicyCreateTime\": \"2024-10-30 12:27:01\",\n \"PolicySourceType\": \"type\"\n }\n}",
1614
+ "title": "容器网络集群查看策略详情示例"
1615
+ }
1616
+ ],
1617
+ "DescribeNetworkFirewallPolicyDiscover": [
1618
+ {
1619
+ "document": "",
1620
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyDiscover\n<公共请求参数>\n\n{\n \"TaskId\": \"1002\"\n}",
1621
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ed202021-696e-4c03-a726-ca459c47c4ea\",\n \"TaskStatus\": \"Task_Succ\"\n }\n}",
1622
+ "title": "容器网络查询网络策略自动发现任务进度示例"
1623
+ }
1624
+ ],
1625
+ "DescribeNetworkFirewallPolicyList": [
1626
+ {
1627
+ "document": "",
1628
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-o9mfjg0i\"\n}",
1629
+ "output": "{\n \"Response\": {\n \"RequestId\": \"0f209045-f906-4ba4-9f61-105b73ecfcc6\",\n \"TotalCount\": 0,\n \"NetPolicy\": [\n {\n \"Id\": 1021,\n \"Name\": \"backend-ingress-deny\",\n \"Description\": \"dev\",\n \"PolicySourceType\": \"System\",\n \"PodSelector\": \"new=roopingliu\",\n \"Namespace\": \"default\",\n \"FromPolicyRule\": 0,\n \"ToPolicyRule\": 0,\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishStatus\": \"PublishedNoConfirm\",\n \"PublishResult\": \"success\",\n \"PolicyCreateTime\": \"2022-05-10 03:04:34\"\n },\n {\n \"Id\": 8,\n \"Name\": \"policy_test_add\",\n \"Description\": \"dev\",\n \"PolicySourceType\": \"Manual\",\n \"PodSelector\": \"good=labeld\",\n \"Namespace\": \"default\",\n \"FromPolicyRule\": 3,\n \"ToPolicyRule\": 0,\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishStatus\": \"unPublishEdit\",\n \"PublishResult\": \"success\",\n \"PolicyCreateTime\": \"2022-06-23 05:40:13\"\n }\n ]\n }\n}",
1630
+ "title": "策略列表"
1631
+ }
1632
+ ],
1633
+ "DescribeNetworkFirewallPolicyStatus": [
1634
+ {
1635
+ "document": "",
1636
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyStatus\n<公共请求参数>\n\n{\n \"TaskId\": \"34702\"\n}",
1637
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ed202021-696e-4c03-a726-ca459c47c4ea\",\n \"TaskResult\": [\n \"NameRepeat\"\n ],\n \"TaskStatus\": \"Task_Succ\"\n }\n}",
1638
+ "title": "容器网络查询网络策略策略执行状态示例"
1639
+ }
1640
+ ],
1641
+ "DescribeNetworkFirewallPolicyYamlDetail": [
1642
+ {
1643
+ "document": "",
1644
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Id\": 1\n}",
1645
+ "output": "{\n \"Response\": {\n \"PolicyName\": \"name1\",\n \"PolicySourceType\": \"System\",\n \"NetworkPolicyPlugin\": \"KubeRouter\",\n \"PublishResult\": \"success\",\n \"ClusterId\": \"cls-jvrv0kf2\",\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\",\n \"PublishStatus\": \"PublishedNoConfirm\",\n \"RequestId\": \"965c55c5-8ab1-4e32-8425-4c44acb5edec\",\n \"PolicyCreateTime\": \"2024-10-30 14:35:57\",\n \"Description\": \"desc content\"\n }\n}",
1646
+ "title": "容器网络集群查看Yaml网络策略详情示例"
1647
+ }
1648
+ ],
1649
+ "DescribeNewestVul": [
1650
+ {
1651
+ "document": "",
1652
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeNewestVul\n&<公共请求参数>",
1653
+ "output": "{\n \"Response\": {\n \"CVEID\": \"pcmgr-515959\",\n \"PocID\": \"pcmgr-515959\",\n \"RequestId\": \"5da5a2f4-2945-47d1-8b41-84a151fcc007\",\n \"Status\": \"SCANNED\",\n \"SubmitTime\": \"2024-08-27 09:55:12\",\n \"VulName\": \"Nacos Jraft 远程代码执行漏洞\"\n }\n}",
1654
+ "title": "查询最新披露漏洞列表"
1655
+ }
1656
+ ],
1657
+ "DescribePostPayDetail": [
1658
+ {
1659
+ "document": "",
1660
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribePostPayDetail\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1661
+ "output": "{\n \"Response\": {\n \"SoftQuotaDayDetail\": [\n {\n \"PayTime\": \"2024-10-30 10:02:45\",\n \"CoresCnt\": 1341\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1662
+ "title": "查询后付费详情"
1663
+ }
1664
+ ],
1665
+ "DescribeProVersionInfo": [
1666
+ {
1667
+ "document": "",
1668
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeProVersionInfo\n&<公共请求参数>",
1669
+ "output": "{\n \"Response\": {\n \"BuyStatus\": \"Normal\",\n \"CoresCnt\": 0,\n \"EndTime\": \"2024-11-19 17:06:40\",\n \"IsPurchased\": false,\n \"MaxPostPayCoresCnt\": 5000,\n \"RequestId\": \"393d941b-835e-44ac-998e-49c07465132a\",\n \"ResourceId\": \"144d0c4a5b622359fd8a382ca914ddd4\",\n \"StartTime\": \"2024-05-19 17:06:40\"\n }\n}",
1670
+ "title": "查询专业版需购买信息"
1671
+ }
1672
+ ],
1673
+ "DescribePromotionActivity": [
1674
+ {
1675
+ "document": "",
1676
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribePromotionActivity\n<公共请求参数>\n\n{\n \"ActiveID\": 10\n}",
1677
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"MonthNum\": 1,\n \"ProfessionalDiscount\": 1,\n \"CoresCountLimit\": 1,\n \"ImageAuthorizationNum\": 1\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
1678
+ "title": "查询促销活动"
1679
+ }
1680
+ ],
1681
+ "DescribePublicKey": [
1682
+ {
1683
+ "document": "",
1684
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribePublicKey\n<公共请求参数>\n\n{}",
1685
+ "output": "{\n \"Response\": {\n \"PublicKey\": \"-----BEGIN PUBLIC KEY-----MIIBIjANBgkqhOs2lWq8CUPB5wGPBYSG5cqW8Txho92EpR9/av7ySRMlZJh5st771IuWH/iaEbyq2XlwIDAQAB-----END PUBLIC KEY----****\",\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1686
+ "title": "获取公钥"
1687
+ }
1688
+ ],
1689
+ "DescribePurchaseStateInfo": [
1690
+ {
1691
+ "document": "",
1692
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribePurchaseStateInfo\n<公共请求参数>\n\n{}",
1693
+ "output": "{\n \"Response\": {\n \"AllCoresCnt\": 154,\n \"AuthorizedCoresCnt\": 147,\n \"AuthorizedImageCnt\": 287756,\n \"AutomaticRenewal\": 194,\n \"BeginTime\": \"2024-09-24 13:01:18\",\n \"CoresCnt\": 68,\n \"CurrentFlexibleCoresCnt\": 0,\n \"DefendClusterCoresCnt\": 48,\n \"DefendHostCoresCnt\": 20,\n \"DefendPolicy\": \"Part\",\n \"ExpirationTime\": \"2024-12-24 13:01:18\",\n \"FlexibleCoresLimit\": 5000,\n \"GivenAuthorizedCnt\": 0,\n \"GivenAuthorizedCoresCnt\": 0,\n \"ImageCnt\": 291209,\n \"InquireKey\": \"sv_yunjing_css_pem\",\n \"PurchasedAuthorizedCnt\": 300000,\n \"RequestId\": \"e40cad09-f295-42a8-914d-ea84767fb6f1\",\n \"State\": 3,\n \"SubState\": \"NORMAL\",\n \"UndefendCoresCnt\": 86,\n \"TrialCoresCnt\": 0\n }\n}",
1694
+ "title": "查询容器安全服务已购买信息"
1695
+ }
1696
+ ],
1697
+ "DescribeRaspRuleVuls": [
1698
+ {
1699
+ "document": "查询漏洞白名单里的漏洞列表",
1700
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRuleVuls\n<公共请求参数>\n\n{\n \"Filters\": [\n {\n \"Name\": \"WhiteType\",\n \"Values\": [\n \"1\"\n ]\n }\n ]\n}",
1701
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102851,\n \"VulVulsName\": \"Weblogic T3/IIOP 反序列化漏洞\"\n },\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102413,\n \"VulVulsName\": \"xstream反序列化漏洞系列\"\n },\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102408,\n \"VulVulsName\": \"Jackson反序列化漏洞\"\n },\n {\n \"CveID\": \"pcmgr-9102137\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102137,\n \"VulVulsName\": \"Apache Struts2 远程代码执行漏洞\"\n },\n {\n \"CveID\": \"\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102094,\n \"VulVulsName\": \"java反序列化漏洞\"\n },\n {\n \"CveID\": \"pcmgr-9102071\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9102071,\n \"VulVulsName\": \"Fastjson 反序列化任意代码执行漏洞\"\n },\n {\n \"CveID\": \"pcmgr-9100547\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9100547,\n \"VulVulsName\": \"Fastjson 远程代码执行漏洞\"\n },\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9100414,\n \"VulVulsName\": \"Fastjson 反序列化远程代码执行漏洞\"\n },\n {\n \"CveID\": \"pcmgr-9100399\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9100399,\n \"VulVulsName\": \"Fastjson 远程代码执行漏洞\"\n },\n {\n \"CveID\": \"cveid\",\n \"SupportDefense\": 1,\n \"VulVulsID\": 9100388,\n \"VulVulsName\": \"Fastjson 远程代码执行漏洞\"\n }\n ],\n \"RequestId\": \"bbeddb8a-f99d-43a1-aadb-c32e148fdb94\",\n \"TotalCount\": 215\n }\n}",
1702
+ "title": "查询漏洞白名单里的漏洞列表"
1703
+ }
1704
+ ],
1705
+ "DescribeRaspRules": [
1706
+ {
1707
+ "document": "查询漏洞防御白名单",
1708
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRules\n<公共请求参数>\n\n{}",
1709
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CreateTime\": \"2024-11-19 19:16:26\",\n \"CveID\": \"CVE-2024-37032\",\n \"Id\": 463,\n \"ModifyTime\": \"2024-11-19 19:16:26\",\n \"Status\": 0,\n \"SupportDefense\": 2,\n \"URLRegexp\": \"\",\n \"VulVulsID\": 105333,\n \"VulVulsName\": \"Ollama远程代码执行漏洞(CVE-2024-37032)\",\n \"WhiteType\": 1\n }\n ],\n \"RequestId\": \"43acddb3-20bf-41d2-a5ca-824cae917760\",\n \"TotalCount\": 1\n }\n}",
1710
+ "title": "查询漏洞防御白名单"
1711
+ }
1712
+ ],
1713
+ "DescribeRefreshTask": [
1714
+ {
1715
+ "document": "",
1716
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRefreshTask\n<公共请求参数>\n\n{\n \"TaskId\": \"34702\"\n}",
1717
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ed202021-696e-4c03-a726-ca459c47c4ea\",\n \"TaskStatus\": \"Task_Finish\"\n }\n}",
1718
+ "title": "任务执行结束示例"
1719
+ }
1720
+ ],
1721
+ "DescribeReverseShellDetail": [
1722
+ {
1723
+ "document": "",
1724
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellDetail\n&EventId=100\n&<公共请求参数>",
1725
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"bash\",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"43.138.**.**\",\n \"ClusterID\": \"12\",\n \"ClusterName\": \"name1\",\n \"ContainerId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"ContainerIsolateOperationSrc\": \"ContainerIsolateOperationSrc\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 1,\n \"EventId\": \"464567\",\n \"EventName\": \"反弹shell\",\n \"EventType\": \"REVERSE_SHELL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-09 10:17:07\",\n \"HostID\": \"45641324-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"ImageId\": \"sha256:345234541324b561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-10-09 10:17:07\",\n \"Namespace\": \"Namespace\",\n \"NodeID\": \"NodeID\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"NodeSubNetCIDR\",\n \"NodeSubNetID\": \"NodeSubNetID\",\n \"NodeSubNetName\": \"NodeSubNetName\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"NodeUniqueID\",\n \"PodIP\": \"10.0.0.1\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"2\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"3\"\n },\n \"EventDetail\": {\n \"Description\": \"/fervent_goodall容器(ID:b18a9a3726...)内存在疑似反弹shell行为\",\n \"DstAddress\": \"175.178.**.**:3387\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"Remark\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 737356,\n \"ProcessName\": \"bash\",\n \"ProcessParam\": \"sh -c bash \",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"ProcessStartUser\",\n \"ProcessUserGroup\": \"ProcessUserGroup\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 737357,\n \"ProcessMd5\": \"81a7701a194c3a1179cfe4a7ac836626\",\n \"ProcessName\": \"bash\",\n \"ProcessParam\": \"bash -i\",\n \"ProcessPath\": \"/usr/bin/bash\",\n \"ProcessStartUser\": \"ProcessStartUser\",\n \"ProcessTree\": \"bash(737357)|bash(737356)|bash(733933)|containerd-shim-runc-v2(2178890)|systemd(1)\",\n \"ProcessUserGroup\": \"root\"\n },\n \"RequestId\": \"a14b6d46-6fa0-48bb-829f-acfa7a58b47a\"\n }\n}",
1726
+ "title": "运行时反弹shell事件详细信息"
1727
+ }
1728
+ ],
1729
+ "DescribeReverseShellEvents": [
1730
+ {
1731
+ "document": "运行时反弹shell列表",
1732
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellEvents\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1733
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"b49a9fd917d30b736e76bff07a81e016bb1ced7bd9428b5d076628c80f8c62fd\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"policy\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"policy1\",\n \"DstAddress\": \"10.*.*.27:9000\",\n \"EventCount\": 1,\n \"EventId\": \"5075001\",\n \"FoundTime\": \"2024-10-24 08:38:49\",\n \"HostID\": \"0c4f6c1d-8215-43e2-8dcf-a4fb1db12f41\",\n \"HostIP\": \"10.*.*.152\",\n \"ImageId\": \"sha256:8415e883970de94c3131ff24ffaf9943ea81b3eca0c3d8d747b98581730bcdb6\",\n \"ImageName\": \"registry-cn-shanghai-vpc.ack.aliyuncs.com/acs/terway:v1.8.13\",\n \"LatestFoundTime\": \"2020-10-24 08:38:49\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"i-node***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PProcessName\": \"socat\",\n \"PodIP\": \"10.*.*.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessName\": \"dash\",\n \"ProcessPath\": \"/usr/bin/dash\",\n \"PublicIP\": \"10.*.*.92\",\n \"Remark\": \"myremark***\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\",\n \"Status\": \"EVENT_UNDEAL\"\n },\n {\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"b15e610a7f62b5873902923dfeee2d3ab642f76bd7f1777b3f628158c5b39586\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"policy\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"policy1\",\n \"DstAddress\": \"100.*.*.*:10556\",\n \"EventCount\": 1,\n \"EventId\": \"5067003\",\n \"FoundTime\": \"2020-10-24 08:03:10\",\n \"HostID\": \"fc472648-37ed-4946-a4c9-d72c75e162c4\",\n \"HostIP\": \"10.*.*.213\",\n \"ImageId\": \"sha256:41481aae5e2d135b2624fc09aa1875eb84c6472eaa0929f6d827699e67edd041\",\n \"ImageName\": \"registry\",\n \"LatestFoundTime\": \"2020-10-24 08:03:10\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"i-node***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PProcessName\": \"socat\",\n \"PodIP\": \"10.*.*.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"ProcessName\": \"dash\",\n \"ProcessPath\": \"/usr/bin/dash\",\n \"PublicIP\": \"10.*.*.92\",\n \"Remark\": \"myremark***\",\n \"Solution\": \"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"c73a7252-0f68-4203-8b18-52037ab5efd1\",\n \"TotalCount\": 253\n }\n}",
1734
+ "title": "运行时反弹shell列表"
1735
+ }
1736
+ ],
1737
+ "DescribeReverseShellEventsExport": [
1738
+ {
1739
+ "document": "",
1740
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellEventsExport\n&<公共请求参数>",
1741
+ "output": "{\n \"Response\": {\n \"DownloadUrl\": \"https://cwp-1258344***.cos.ap-guangzhou.myqcloud.com/file.txt\",\n \"JobId\": \"94b72f91-5827-4314-bc65-6b07c0d77a9c\",\n \"RequestId\": \"2f5665c4-6bf5-4d99-a3b5-ee16d5f9bae9\"\n }\n}",
1742
+ "title": "查询运行时反弹shell事件列表信息导出"
1743
+ }
1744
+ ],
1745
+ "DescribeReverseShellWhiteListDetail": [
1746
+ {
1747
+ "document": "",
1748
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellWhiteListDetail\n&WhiteListId=3hg7edh873hf\n&<公共请求参数>",
1749
+ "output": "{\n \"Response\": {\n \"RequestId\": \"6281f7822403e60601d1dba6\",\n \"WhiteListDetailInfo\": {\n \"ImageIds\": [\n \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5b*****\"\n ],\n \"ProcessName\": \"/bin/apitest\",\n \"DstIp\": \"1.1.1.1\",\n \"Id\": \"3hg7edh873hf\",\n \"DstPort\": \"1222\"\n }\n }\n}",
1750
+ "title": "运行时反弹shell白名单详细信息"
1751
+ }
1752
+ ],
1753
+ "DescribeReverseShellWhiteLists": [
1754
+ {
1755
+ "document": "",
1756
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeReverseShellWhiteLists\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1757
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1021,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"ImageIds\": [\n \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f23*******\"\n ],\n \"IsGlobal\": true,\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessName\": \"/bin/apitest\",\n \"DstIp\": \"1.1.1.1\",\n \"DstPort\": \"1222\",\n \"Id\": \"6281f7822403e60601d1dba6\",\n \"ImageCount\": 1021\n }\n ]\n }\n}",
1758
+ "title": "运行时反弹shell白名单列表"
1759
+ }
1760
+ ],
1761
+ "DescribeRiskDnsEventDetail": [
1762
+ {
1763
+ "document": "查询恶意请求事件详情",
1764
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDnsEventDetail\n<公共请求参数>\n\n{\n \"EventID\": \"1\"\n}",
1765
+ "output": "{\n \"Response\": {\n \"Address\": \"www.iuyiyo.cc\",\n \"AncestorProcessParam\": \"/usr/bin/containerd-shim-runc-v2 -namespace moby -id b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5 -address /run/containerd/containerd.sock\",\n \"AncestorProcessPath\": \"/usr/bin/containerd-shim-runc-v2\",\n \"AncestorProcessStartUser\": \"root\",\n \"AncestorProcessUserGroup\": \"0:0\",\n \"City\": \"103\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 1,\n \"EventID\": 306602,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FeatureLabel\": \"label1\",\n \"FoundTime\": \"2024-09-29 17:27:15\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.233\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:27:15\",\n \"MatchRuleType\": \"USER\",\n \"Namespace\": \"tcss\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"k8s-node1\",\n \"NodeSubNetCIDR\": \"10.0.200.0/24\",\n \"NodeSubNetID\": \"subnet-5gu2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"OperationTime\": \"2024-09-29 17:27:17\",\n \"ParentProcessParam\": \"/bin/bash\",\n \"ParentProcessPath\": \"/usr/bin/bash\",\n \"ParentProcessStartUser\": \"root\",\n \"ParentProcessUserGroup\": \"root:root\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"Running\",\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessMd5\": \"b8b1ce2ef81accb7febb8ab7f56c1576\",\n \"ProcessParam\": \"curl www.iuyiyo.cc\",\n \"ProcessPath\": \"/usr/bin/curl\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"curl(2206566)_bash(2178914)_containerd-shim-runc-v2(2178890)_systemd(1)\",\n \"ProcessUserGroup\": \"root:root\",\n \"PublicIP\": \"43.138.142.208\",\n \"Reference\": [\n \"Reference\"\n ],\n \"Remark\": \"myremark***\",\n \"RequestId\": \"52fe1ea9-4826-4f8e-bc8b-61faae09683b\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\",\n \"WorkloadType\": \"DaemonSet\"\n }\n}",
1766
+ "title": "查询恶意请求事件详情"
1767
+ }
1768
+ ],
1769
+ "DescribeRiskDnsList": [
1770
+ {
1771
+ "document": "查询恶意请求事件列表",
1772
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDnsList\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
1773
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Address\": \"www.iuyiyo.cc\",\n \"City\": \"shenzhen\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 1,\n \"EventID\": 306602,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FoundTime\": \"2024-09-29 17:27:15\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.92\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:27:15\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"k8s-node1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"PodName\",\n \"PublicIP\": \"43.138.142.208\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\"\n },\n {\n \"Address\": \"www.baidu.com\",\n \"City\": \"beijing\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"b18a9a372645caefdca4cf9a4e1078122ecf4081bfab0034f85f664b81df0da5\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/fervent_goodall\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"DESTROYED\",\n \"Description\": \"发现容器存在访问恶意IP/域名的行为,您的容器可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"EventCount\": 3,\n \"EventID\": 306601,\n \"EventStatus\": \"EVENT_UNDEAL\",\n \"EventType\": \"DOMAIN\",\n \"FoundTime\": \"2024-09-29 17:15:41\",\n \"HostID\": \"acdd5474-6360-4fd4-bfc7-843162cb8116\",\n \"HostIP\": \"10.0.1.92\",\n \"HostName\": \"k8s-node1\",\n \"ImageID\": \"sha256:eeb6ee3f44bd0b5103bb561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\n \"ImageName\": \"centos:7\",\n \"LatestFoundTime\": \"2024-09-29 17:19:18\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"k8s-node1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"PodName\",\n \"PublicIP\": \"43.138.142.208\",\n \"Solution\": \"1.检查容器内的恶意进程及非法端口,删除可疑的启动项和定时任务;\\n 2.对容器存在的风险进行排查,如进行漏洞扫描、木马扫描等;\\n 3.对容器所使用的的镜像进行加固,并替换运行中的容器。\"\n }\n ],\n \"RequestId\": \"8edec175-6938-41a7-80e1-b685cc37154c\",\n \"TotalCount\": 2\n }\n}",
1774
+ "title": "查询恶意请求事件列表"
1775
+ }
1776
+ ],
1777
+ "DescribeRiskList": [
1778
+ {
1779
+ "document": "",
1780
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-0zmsjvko\",\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
1781
+ "output": "{\n \"Response\": {\n \"RequestId\": \"ada3da6c-7aa9-48a7-9bdd-c9ae192fef65\",\n \"TotalCount\": 18,\n \"ClusterRiskItems\": [\n {\n \"CheckItem\": {\n \"CheckItemId\": 2,\n \"Name\": \"Apache containerd 安全漏洞\",\n \"ItemDetail\": \"containerd是美国阿帕奇(Apache)基金会的一个容器守护进程。该进程根据RunCOCI规范负责控制宿主机上容器的完整周期。containerd1.3.9之前版本和1.4.3版本存在安全漏洞,该漏洞源于containerd-shimAPI被不正确地公开给主机网络容器。shimsAPI套接字的访问控制验证了连接进程的有效UID为0,但是没有限制对抽象Unix域套接字的访问。这将允许在与shim相同的网络名称空间中运行的恶意容器,其有效UID为0,但在其他方面减少了特权,从而导致使用elevat运行新进程。\",\n \"RiskLevel\": \"Middle\",\n \"RiskTarget\": \"Containerd\",\n \"RiskType\": \"CVERisk\",\n \"RiskAttribute\": \"PrivilegePromotion\",\n \"RiskProperty\": \"ExistPOC ExistEXP ServerRestart\",\n \"CVENumber\": \"CVE-2020-15257\",\n \"DiscoverTime\": \"2020-12-01 11:15:00\",\n \"Solution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad\",\n \"CVSS\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N\",\n \"CVSSScore\": \"5.2\",\n \"RelateLink\": \"https://\",\n \"AffectedType\": \"Node\",\n \"AffectedVersion\": \"1.3\",\n \"IgnoredAssetNum\": 0,\n \"IsIgnored\": true,\n \"RiskAssessment\": \"RiskAssessment\"\n },\n \"VerifyInfo\": \"VerifyInfo\",\n \"ErrorMessage\": \"ErrorMessage\",\n \"AffectedClusterCount\": 1,\n \"AffectedNodeCount\": 2\n }\n ]\n }\n}",
1782
+ "title": "查询集群风险项列表示例"
1783
+ }
1784
+ ],
1785
+ "DescribeRiskSyscallDetail": [
1786
+ {
1787
+ "document": "运行时高危系统调用事件详细信息",
1788
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskSyscallDetail\n<公共请求参数>\n\n{\n \"EventId\": \"ad134-cdadfa\"\n}",
1789
+ "output": "{\n \"Response\": {\n \"AncestorProcessInfo\": {\n \"ProcessParam\": \"containerd --config /var/run/docker/containerd/containerd.toml --log-level warn\",\n \"ProcessPath\": \"/usr/bin/containerd\",\n \"ProcessStartUser\": \"0\",\n \"ProcessUserGroup\": \"0\"\n },\n \"EventBaseInfo\": {\n \"ClientIP\": \"175.178.113.111\",\n \"ClusterID\": \"cls-demo1\",\n \"ClusterName\": \"web-demo\",\n \"ContainerId\": \"75D3326A-9B9C-4275-895A-16FDA1*****\",\n \"ContainerIsolateOperationSrc\": \"ContainerIsolateOperationSrc\",\n \"ContainerName\": \"/k8s_xenon_mysql-tce-cwp-mysql-2_sso_c9fdfba4-e31a-46bc-a43a-****\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"EventCount\": 130,\n \"EventId\": \"5124493\",\n \"EventName\": \"高危系统调用\",\n \"EventType\": \"RISK_SYSCALL_EVENT_TYPE\",\n \"FoundTime\": \"2024-10-23 00:05:17\",\n \"HostID\": \"11141114-66fd-4171-93eb-2f4fc36ef1e1\",\n \"HostIP\": \"10.0.0.105\",\n \"ImageId\": \"sha256:11141114e95dce36e8455cf657e1e54d74bb8fac6111411141114\",\n \"ImageName\": \"registry.tce.com/service-vendors/mysql-xenon:8.0.32-20240524-155426-11141114.rhel.amd64\",\n \"LatestFoundTime\": \"2024-10-23 17:02:47\",\n \"Namespace\": \"default\",\n \"NodeID\": \"pod-dj4xjf***\",\n \"NodeName\": \"tcs-10-0-0-105\",\n \"NodeSubNetCIDR\": \"fe80::8132:1b51:5********\",\n \"NodeSubNetID\": \"subnet-dfj4***\",\n \"NodeSubNetName\": \"default\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"node-4jfjfgdnvnd****\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demonset\",\n \"PodStatus\": \"running\",\n \"Status\": \"EVENT_UNDEAL\",\n \"WorkloadType\": \"StatefulSet\"\n },\n \"EventDetail\": {\n \"Description\": \"sergid会导致运行进程的账号权限变更,可能带来安全风险\",\n \"OperationTime\": \"1970-01-01 00:00:01\",\n \"Remark\": \"user config\",\n \"Solution\": \"使用存在潜在风险的系统调用,可能导致容器逃逸。建议对于不常用的系统调用,禁止容器使用,并及时更新宿主机的系统漏洞\",\n \"SyscallName\": \"chroot\"\n },\n \"ParentProcessInfo\": {\n \"ProcessId\": 330852,\n \"ProcessName\": \"containerd-shim\",\n \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\",\n \"ProcessPath\": \"/usr/bin/containerd-shim\",\n \"ProcessStartUser\": \"root\",\n \"ProcessUserGroup\": \"root\"\n },\n \"ProcessInfo\": {\n \"ProcessAuthority\": \"-rwxr-xr-x\",\n \"ProcessId\": 2907621,\n \"ProcessMd5\": \"8a5772dee965c8223aebc1225e*****\",\n \"ProcessName\": \"xenoncli\",\n \"ProcessParam\": \"xenoncli xenon ping\",\n \"ProcessPath\": \"/usr/local/bin/xenoncli\",\n \"ProcessStartUser\": \"root\",\n \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\",\n \"ProcessUserGroup\": \"0\"\n },\n \"RequestId\": \"d1dd6ed1-0424-4dc8-a3e1-*******\"\n }\n}",
1790
+ "title": "运行时高危系统调用事件详细信息"
1791
+ }
1792
+ ],
1793
+ "DescribeRiskSyscallEvents": [
1794
+ {
1795
+ "document": "运行时高危系统调用接口",
1796
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskSyscallEvents\n<公共请求参数>\n\n{}",
1797
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"ProcessName\": \"bash\",\n \"ProcessPath\": \"/home/work/\",\n \"ImageId\": \"81abdbc1427b1983b63a2e7bf48ab156a9a22\",\n \"ContainerId\": \"81abdbc1427b1983b63a2e7bf48ab156a9a22\",\n \"ImageName\": \"镜像名\",\n \"ContainerName\": \"/condescending_allen\",\n \"FoundTime\": \"2020-2-2 13:00:00\",\n \"Solution\": \"解决方案\",\n \"Description\": \"事件描述\",\n \"SyscallName\": \"chroot\",\n \"Status\": \"EVENT_UNDEAL\",\n \"EventId\": \"1\",\n \"NodeName\": \"VM-0-13-centos\",\n \"PodName\": \"pod-name\",\n \"Remark\": \"Remark\",\n \"RuleExist\": true,\n \"EventCount\": 1,\n \"LatestFoundTime\": \"2020-2-2 13:00:00\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerIsolateOperationSrc\": \"RiskSyscall\",\n \"ContainerStatus\": \"RUNNING\",\n \"NodeType\": \"NORMAL\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"PodIP\": \"10.0.1****\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8****\",\n \"PublicIP\": \"10.0.1****\",\n \"NodeID\": \"node-ins1a\",\n \"HostID\": \"27253917-572f-4eb5-9a55-99cc3a7a****\",\n \"HostIP\": \"10.4.4****\",\n \"ClusterName\": \"clsfoo***\"\n }\n ],\n \"RequestId\": \"48d997cd-353a-4457-929f-dc9183161462\",\n \"TotalCount\": 0\n }\n}",
1798
+ "title": "运行时高危系统调用接口"
1799
+ }
1800
+ ],
1801
+ "DescribeRiskSyscallEventsExport": [
1802
+ {
1803
+ "document": "",
1804
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallEventsExport\n&ExportField.0=filed_name\n&<公共请求参数>",
1805
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"DownloadUrl\": \"https://cwp-1258344***.cos.ap-guangzhou.myqcloud.com/file.txt\",\n \"JobId\": \"10001\"\n }\n}",
1806
+ "title": "查询运行时异常进程事件列表信息导出"
1807
+ }
1808
+ ],
1809
+ "DescribeRiskSyscallNames": [
1810
+ {
1811
+ "document": "",
1812
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallNames\n&<公共请求参数>",
1813
+ "output": "{\n \"Response\": {\n \"SyscallNames\": [\n \"chroot\"\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1814
+ "title": "运行时高危系统调用系统名称列表"
1815
+ }
1816
+ ],
1817
+ "DescribeRiskSyscallWhiteListDetail": [
1818
+ {
1819
+ "document": "",
1820
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallWhiteListDetail\n&WhiteListId=1002\n&<公共请求参数>",
1821
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"WhiteListDetailInfo\": {\n \"SyscallNames\": [\n \"chroot\"\n ],\n \"ImageIds\": [\n \"sha256:707540fd8a54ab3ebc086ecc96d2d6143fd92c1cac4d0b23353e1b7078b5937b\"\n ],\n \"Id\": \"10001\",\n \"ProcessPath\": \"/bin/sh\"\n }\n }\n}",
1822
+ "title": "运行时高危系统调用白名单详细信息"
1823
+ }
1824
+ ],
1825
+ "DescribeRiskSyscallWhiteLists": [
1826
+ {
1827
+ "document": "",
1828
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeRiskSyscallWhiteLists\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1829
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1021,\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"WhiteListSet\": [\n {\n \"UpdateTime\": \"2020-09-22 00:00:00\",\n \"SyscallNames\": [\n \"chroot\",\n \"kill\"\n ],\n \"ImageIds\": [\n \"image-id\"\n ],\n \"CreateTime\": \"2020-09-22 00:00:00\",\n \"ProcessPath\": \"/usr/bin/sh\",\n \"Id\": \"10001\",\n \"ImageCount\": 1021,\n \"IsGlobal\": true\n }\n ]\n }\n}",
1830
+ "title": "运行时高危系统调用白名单列表"
1831
+ }
1832
+ ],
1833
+ "DescribeScanIgnoreVulList": [
1834
+ {
1835
+ "document": "",
1836
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeScanIgnoreVulList\n&Limit=10\n&Offset=0\n&<公共请求参数>",
1837
+ "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"CVEID\": \"CVE-2012-6329\",\n \"IsIgnoreAll\": 1,\n \"LocalImageCount\": 0,\n \"PocID\": \"pcmgr-171244\",\n \"RegistryImageCount\": 0,\n \"UpdateTime\": \"2024-05-21 16:56:04\",\n \"VulName\": \"Perl 任意代码执行漏洞(CVE-2012-6329)\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
1838
+ "title": "查询扫描忽略的漏洞列表"
1839
+ }
1840
+ ],
1841
+ "DescribeSearchExportList": [
1842
+ {
1843
+ "document": "",
1844
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSearchExportList\n<公共请求参数>\n\n{\n \"Query\": \"{\\\"index\\\":[\\\"netflow\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1597075200000,\\\"lte\\\":1597161599999}}},\\\"must\\\":[],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\"\n}",
1845
+ "output": "{\n \"Response\": {\n \"JobId\": \"356125\",\n \"RequestId\": \"e4ee7f6c-a036-43e7-b98f-96f174827fea\"\n }\n}",
1846
+ "title": "导出ES查询文档列表"
1847
+ }
1848
+ ],
1849
+ "DescribeSearchLogs": [
1850
+ {
1851
+ "document": "",
1852
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSearchLogs\n<公共请求参数>\n\n{}",
1853
+ "output": "{\n \"Response\": {\n \"Data\": [\n \"\\\"exec_start: bash -ec mysqladmin p****\",\n \"test2\",\n \"test3\"\n ],\n \"RequestId\": \"498e4cab-e95d-430b-bc4c-f5821bb278d4\"\n }\n}",
1854
+ "title": "获取历史搜索记录"
1855
+ }
1856
+ ],
1857
+ "DescribeSearchTemplates": [
1858
+ {
1859
+ "document": "",
1860
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSearchTemplates\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10\n}",
1861
+ "output": "{\n \"Response\": {\n \"TotalCount\": 2,\n \"List\": [\n {\n \"Id\": 17,\n \"Name\": \"Name\",\n \"LogType\": \"malware\",\n \"Condition\": \"src_ip 匹配字符: 193.27.228.98\",\n \"TimeRange\": \"2020-07-31 00:00:00 至 2020-07-31 23:59:59\",\n \"Query\": \"{\\\"index\\\":[\\\"malware\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1596124800000,\\\"lte\\\":1596211199999}}},\\\"must\\\":[{\\\"term\\\":{\\\"src_ip\\\":\\\"193.27.228.98\\\"}}],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"aggs\\\":{\\\"count_stats\\\":{\\\"date_histogram\\\":{\\\"field\\\":\\\"timestamp\\\",\\\"interval\\\":\\\"30m\\\",\\\"time_zone\\\":\\\"Asia/Shanghai\\\",\\\"min_doc_count\\\":1}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\",\n \"Flag\": \"simple\",\n \"DisplayData\": \"[{\\\"id\\\":14401398135,\\\"patternsField\\\":\\\"src_ip\\\",\\\"selectedtype\\\":\\\"is\\\",\\\"selectedOptionsMap\\\":{\\\"is\\\":\\\"匹配字符\\\",\\\"like\\\":\\\"模糊匹配字符\\\",\\\"not\\\":\\\"不包含字符\\\",\\\"is_one_of\\\":\\\"匹配以下任意字符\\\",\\\"not_one_of\\\":\\\"不包含以下任意字符\\\"},\\\"selectedTypeList\\\":[\\\"is\\\",\\\"like\\\",\\\"not\\\",\\\"is_one_of\\\",\\\"not_one_of\\\"],\\\"third_cat\\\":\\\"input\\\",\\\"value\\\":\\\"193.27.228.98\\\"}]\"\n },\n {\n \"Id\": 13,\n \"Name\": \"Name\",\n \"LogType\": \"malware\",\n \"Condition\": \"src_ip 匹配字符: 10.0.0.1\",\n \"TimeRange\": \"2020-06-13 00:00:00 至 2020-07-13 23:59:59\",\n \"Query\": \"{\\\"index\\\":[\\\"malware\\\"],\\\"body\\\":{\\\"query\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"bool\\\":{\\\"filter\\\":{\\\"range\\\":{\\\"timestamp\\\":{\\\"gte\\\":1591977600000,\\\"lte\\\":1594655999999}}},\\\"must\\\":[{\\\"term\\\":{\\\"src_ip\\\":\\\"10.0.0.1\\\"}}],\\\"must_not\\\":[],\\\"should\\\":[]}}}},\\\"aggs\\\":{\\\"count_stats\\\":{\\\"date_histogram\\\":{\\\"field\\\":\\\"timestamp\\\",\\\"interval\\\":\\\"12h\\\",\\\"time_zone\\\":\\\"Asia/Shanghai\\\",\\\"min_doc_count\\\":1}}},\\\"highlight\\\":{\\\"fields\\\":{\\\"*\\\":{}}}},\\\"sort\\\":[{\\\"timestamp\\\":\\\"desc\\\"}]}\",\n \"Flag\": \"simple\",\n \"DisplayData\": \"[{\\\"id\\\":449375484687,\\\"patternsField\\\":\\\"src_ip\\\",\\\"selectedtype\\\":\\\"is\\\",\\\"selectedOptionsMap\\\":{\\\"is\\\":\\\"匹配字符\\\",\\\"like\\\":\\\"模糊匹配字符\\\",\\\"not\\\":\\\"不包含字符\\\",\\\"is_one_of\\\":\\\"匹配以下任意字符\\\",\\\"not_one_of\\\":\\\"不包含以下任意字符\\\"},\\\"selectedTypeList\\\":[\\\"is\\\",\\\"like\\\",\\\"not\\\",\\\"is_one_of\\\",\\\"not_one_of\\\"],\\\"third_cat\\\":\\\"input\\\",\\\"value\\\":\\\"10.0.0.1\\\"}]\"\n }\n ],\n \"RequestId\": \"252ab6a8-3d45-414d-a31e-fb668e99864c\"\n }\n}",
1862
+ "title": "获取快速检索列表"
1863
+ }
1864
+ ],
1865
+ "DescribeSecEventsTendency": [
1866
+ {
1867
+ "document": "",
1868
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeSecEventsTendency\n&EndTime=2020-09-22\n&StartTime=2020-09-22\n&<公共请求参数>",
1869
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"EventTendencySet\": [\n {\n \"EventSet\": [\n {\n \"Cnt\": 1,\n \"CurTime\": \"2020-09-22\"\n }\n ],\n \"EventType\": \"ET_ABNORMAL_PROCESS\"\n }\n ]\n }\n}",
1870
+ "title": "获取运行时安全事件新增趋势"
1871
+ }
1872
+ ],
1873
+ "DescribeSecLogAlertMsg": [
1874
+ {
1875
+ "document": "",
1876
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogAlertMsg\n<公共请求参数>\n\n{\n \"Type\": [\n \"log_reserve_full\"\n ]\n}",
1877
+ "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"627c34c0-e564-4352-92f8-98042f99b1f8\"\n }\n}",
1878
+ "title": "查询安全日志告警信息"
1879
+ }
1880
+ ],
1881
+ "DescribeSecLogCleanSettingInfo": [
1882
+ {
1883
+ "document": "",
1884
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogCleanSettingInfo\n<公共请求参数>\n\n{}",
1885
+ "output": "{\n \"Response\": {\n \"ReservesLimit\": 80,\n \"ReservesDeadline\": 60,\n \"DayLimit\": 180,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1886
+ "title": "DescribeSecLogCleanSettingInfo"
1887
+ }
1888
+ ],
1889
+ "DescribeSecLogDeliveryClsOptions": [
1890
+ {
1891
+ "document": "",
1892
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryClsOptions\n<公共请求参数>\n\n{\n \"ClsRegion\": \"ap-bangkok\"\n}",
1893
+ "output": "{\n \"Response\": {\n \"LogSetList\": [],\n \"RegionList\": [\n {\n \"Region\": \"ap-bangkok\",\n \"RegionName\": \"亚太东南(曼谷)\"\n },\n {\n \"Region\": \"ap-beijing\",\n \"RegionName\": \"华北地区(北京)\"\n },\n {\n \"Region\": \"ap-chengdu\",\n \"RegionName\": \"西南地区(成都)\"\n }\n ],\n \"RequestId\": \"31c5ca59-2ed8-4b22-8ebf-6ba5003caea3\"\n }\n}",
1894
+ "title": "查询安全日志投递cls可选项"
1895
+ }
1896
+ ],
1897
+ "DescribeSecLogDeliveryClsSetting": [
1898
+ {
1899
+ "document": "",
1900
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryClsSetting\n<公共请求参数>\n\n{}",
1901
+ "output": "{\n \"Response\": {\n \"LogTypeList\": [\n {\n \"LogSet\": \"846f4834-7f89-4e97-9c0a-e8623959****\",\n \"LogSetName\": \"tcss\",\n \"LogType\": \"container_bash\",\n \"Region\": \"ap-guangzhou\",\n \"State\": false,\n \"TopicID\": \"72ebf085-f7b7-4efb-961a-6ef37f07****\",\n \"TopicName\": \"tcss_log_****\"\n },\n {\n \"LogSet\": \"LogSet\",\n \"LogSetName\": \"cn\",\n \"LogType\": \"container_launch\",\n \"Region\": \"ap-guangzhou\",\n \"State\": false,\n \"TopicID\": \"TopicID\",\n \"TopicName\": \"TopicName\"\n },\n {\n \"LogSet\": \"LogSet\",\n \"LogSetName\": \"LogSetName\",\n \"LogType\": \"k8s_api\",\n \"Region\": \"ap-guangzhou\",\n \"State\": false,\n \"TopicID\": \"TopicID\",\n \"TopicName\": \"TopicName\"\n }\n ],\n \"RequestId\": \"1279ad3b-a5aa-46ea-825d-3124cc19112a\"\n }\n}",
1902
+ "title": "查询安全日志投递Cls配置"
1903
+ }
1904
+ ],
1905
+ "DescribeSecLogDeliveryKafkaOptions": [
1906
+ {
1907
+ "document": "",
1908
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryKafkaOptions\n<公共请求参数>\n\n{}",
1909
+ "output": "{\n \"Response\": {\n \"InstanceList\": [],\n \"RegionList\": [\n {\n \"Region\": \"ap-bangkok\",\n \"RegionName\": \"亚太东南(曼谷)\"\n },\n {\n \"Region\": \"ap-beijing\",\n \"RegionName\": \"华北地区(北京)\"\n },\n {\n \"Region\": \"ap-beijing-fsi\",\n \"RegionName\": \"华北地区(北京金融)\"\n },\n {\n \"Region\": \"ap-changsha-ec\",\n \"RegionName\": \"华中地区(长沙ec)\"\n },\n {\n \"Region\": \"ap-chengdu\",\n \"RegionName\": \"西南地区(成都)\"\n },\n {\n \"Region\": \"ap-chongqing\",\n \"RegionName\": \"西南地区(重庆)\"\n }\n ],\n \"RequestId\": \"a9761df9-00d1-4102-8176-0c9be0e11c59\"\n }\n}",
1910
+ "title": "查询安全日志投递kafka可选项"
1911
+ }
1912
+ ],
1913
+ "DescribeSecLogDeliveryKafkaSetting": [
1914
+ {
1915
+ "document": "",
1916
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogDeliveryKafkaSetting\n<公共请求参数>\n\n{}",
1917
+ "output": "{\n \"Response\": {\n \"InstanceID\": \"实例ID\",\n \"InstanceName\": \"实例名称\",\n \"Domain\": \"域名\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"主题ID\",\n \"TopicName\": \"主题名称\",\n \"State\": true\n }\n ],\n \"User\": \"user_10086\",\n \"RegionID\": \"ap-beijing\",\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1918
+ "title": "查询安全日志投递kafka配置"
1919
+ }
1920
+ ],
1921
+ "DescribeSecLogJoinObjectList": [
1922
+ {
1923
+ "document": "查询安全日志接入对象列表",
1924
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogJoinObjectList\n<公共请求参数>\n\n{\n \"LogType\": \"container_bash\",\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"Status\",\n \"Values\": [\n \"ONLINE\",\n \"OFFLINE\",\n \"UNINSTALL\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
1925
+ "output": "{\n \"Response\": {\n \"AutoJoin\": false,\n \"ExcludedCount\": 0,\n \"List\": [\n {\n \"ClusterID\": \"cls-q0bc0ed2\",\n \"ClusterMainAddress\": \"10.0.0.1\",\n \"ClusterName\": \"tke2\",\n \"ClusterStatus\": \"3\",\n \"ClusterType\": \"2\",\n \"ClusterVersion\": \"v1.26.1-tke.5\",\n \"ContainerCnt\": 23,\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"HostIP\": \"172.17.1.6\",\n \"HostName\": \"tke_cls-q0bc0ed2_worker\",\n \"HostStatus\": \"ONLINE\",\n \"JoinState\": true,\n \"PublicIP\": \"159.75.90.217\"\n }\n ],\n \"RangeType\": 1,\n \"RequestId\": \"a38b89a7-fbdf-4133-9981-1c09a5a94895\",\n \"TotalCount\": 55\n }\n}",
1926
+ "title": "查询安全日志接入对象列表"
1927
+ }
1928
+ ],
1929
+ "DescribeSecLogJoinTypeList": [
1930
+ {
1931
+ "document": "查询安全日志接入列表",
1932
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogJoinTypeList\n<公共请求参数>\n\n{}",
1933
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Count\": 1931,\n \"SuperNodeCount\": 21,\n \"IsJoined\": true,\n \"LogType\": \"container_bash\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
1934
+ "title": "查询安全日志接入列表"
1935
+ }
1936
+ ],
1937
+ "DescribeSecLogKafkaUIN": [
1938
+ {
1939
+ "document": "",
1940
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogKafkaUIN\n<公共请求参数>\n\n{}",
1941
+ "output": "{\n \"Response\": {\n \"DstUIN\": \"34564565\",\n \"Status\": true,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1942
+ "title": "查询安全日志KafkaUIN"
1943
+ }
1944
+ ],
1945
+ "DescribeSecLogVasInfo": [
1946
+ {
1947
+ "document": "",
1948
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecLogVasInfo\n<公共请求参数>\n\n{}",
1949
+ "output": "{\n \"Response\": {\n \"BuyStatus\": \"Normal\",\n \"EndTime\": \"2024-11-10 10:29:29\",\n \"IsPurchased\": true,\n \"LogCapacity\": 640,\n \"LogSaveMonth\": 13,\n \"RequestId\": \"ca51f9af-a141-4deb-a69d-0f82062946e8\",\n \"ResourceID\": \"9367de1b00589c31fab4c794a97139bf\",\n \"StartTime\": \"2023-10-10 10:29:29\",\n \"TrialCapacity\": 10\n }\n}",
1950
+ "title": "查询安全日志商品信息"
1951
+ }
1952
+ ],
1953
+ "DescribeSuperNodePodList": [
1954
+ {
1955
+ "document": "查询超级节点pod列表",
1956
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSuperNodePodList\n<公共请求参数>\n\n{}",
1957
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"PodName\": \"web-node1\",\n \"PodIP\": \"10.0.0.11\",\n \"NodeUniqueID\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"Status\": \"Running\",\n \"CpuRequest\": 0,\n \"CpuLimit\": 0,\n \"MemRequest\": 0,\n \"MemLimit\": 0,\n \"Namespace\": \"defalut\",\n \"DeploymentName\": \"web-node\",\n \"DeploymentID\": \"5d95adf3-b2b2-4ebe-99ab-70cd18842344\",\n \"StartTime\": \"2024-10-30 10:35:51\",\n \"CreateTime\": \"2024-10-30 10:35:55\",\n \"RelateContainerCount\": 1,\n \"RunningTime\": \"2024-10-30 10:36:02\",\n \"PodUid\": \"392f05bd-bf86-4911-8cf9-b8c34541987\",\n \"ChargeCoresCnt\": 1,\n \"DefendStatus\": \"Defended\"\n }\n ],\n \"TotalCount\": 1,\n \"RequestId\": \"5d95adf3-b2b2-4ebe-99ab-70cd24348884\"\n }\n}",
1958
+ "title": "DescribeSuperNodePodList"
1959
+ }
1960
+ ],
1961
+ "DescribeSupportDefenceVul": [
1962
+ {
1963
+ "document": "",
1964
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSupportDefenceVul\n<公共请求参数>\n\n{}",
1965
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2024-23897\",\n \"CVSSV3Score\": 9.8,\n \"Level\": \"CRITICAL\",\n \"Name\": \"Jenkins任意文件读取导致远程代码执行漏洞(CVE-2024-23897)\",\n \"PocID\": \"pcmgr-469627\",\n \"Status\": 1,\n \"SubmitTime\": \"2024-01-25 02:15:00\",\n \"Tags\": [\n \"NETWORK\",\n \"POC\"\n ],\n \"VulId\": 469627\n }\n ],\n \"RequestId\": \"16b04354-f64d-4d6b-821d-125b3f721d5b\",\n \"TotalCount\": 212\n }\n}",
1966
+ "title": "查询支持防御的漏洞列表"
1967
+ }
1968
+ ],
1969
+ "DescribeSystemVulList": [
1970
+ {
1971
+ "document": "",
1972
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSystemVulList\n<公共请求参数>\n\n{\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
1973
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2023-3341\",\n \"CVSSV3Score\": 7.5,\n \"Category\": \"OUT_OF_BOUNDS_WRITE\",\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"ALL\",\n \"DefenceStatus\": \"DEFENDED\",\n \"DefendedCount\": 0,\n \"FoundTime\": \"2024-08-10 04:34:55\",\n \"ID\": 173268083,\n \"LatestFoundTime\": \"2024-10-18 23:30:37\",\n \"Level\": \"HIGH\",\n \"LocalImageCount\": 2,\n \"Name\": \"ISC BIND 缓冲区错误漏洞\",\n \"PocID\": \"pcmgr-444379\",\n \"RegistryImageCount\": 12,\n \"Tags\": [\n \"NETWORK\"\n ]\n }\n ],\n \"RequestId\": \"5dfca22b-e7b5-408e-b3bf-a930818c5952\",\n \"TotalCount\": 836\n }\n}",
1974
+ "title": "查询系统漏洞列表"
1975
+ }
1976
+ ],
1977
+ "DescribeTaskResultSummary": [
1978
+ {
1979
+ "document": "请求成功获取的实例",
1980
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeTaskResultSummary\n<公共请求参数>\n\n{}",
1981
+ "output": "{\n \"Response\": {\n \"SeriousRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"HighRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"MiddleRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"HintRiskNodeCount\": [\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2,\n 3,\n 2\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
1982
+ "title": "常规请求"
1983
+ }
1984
+ ],
1985
+ "DescribeTcssSummary": [
1986
+ {
1987
+ "document": "",
1988
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeTcssSummary\n<公共请求参数>\n\n{}",
1989
+ "output": "{\n \"Response\": {\n \"RiskLocalImageCnt\": 21,\n \"RiskRepositoryImageCnt\": 12,\n \"RuntimeUnhandleEventCnt\": 51,\n \"RiskBaseLineCnt\": 151,\n \"ScannedImageCnt\": 41,\n \"RiskVulCnt\": 16,\n \"RiskContainerCnt\": 81,\n \"ImageCnt\": 12,\n \"ContainerCnt\": 71,\n \"UnScannedVulCnt\": 81,\n \"UnScannedBaseLineCnt\": 98,\n \"RiskClusterCnt\": 2,\n \"ClusterCnt\": 60,\n \"UnScannedImageCnt\": 20,\n \"LocalImageCnt\": 14,\n \"RepositoryImageCnt\": 12,\n \"UnScannedClusterCnt\": 21,\n \"ScanImageStatus\": true,\n \"ScanClusterStatus\": true,\n \"ScanBaseLineStatus\": true,\n \"ScanVulStatus\": true,\n \"VulRiskImageCnt\": 10,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
1990
+ "title": "查询容器安全概览信息"
1991
+ }
1992
+ ],
1993
+ "DescribeUnauthorizedCoresTendency": [
1994
+ {
1995
+ "document": "",
1996
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUnauthorizedCoresTendency\n<公共请求参数>\n\n{}",
1997
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"DateTime\": \"2020-09-22 00:00:00\",\n \"CoresCount\": 1\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
1998
+ "title": "查询漏洞防御攻击事件趋势"
1999
+ }
2000
+ ],
2001
+ "DescribeUnfinishRefreshTask": [
2002
+ {
2003
+ "document": "",
2004
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUnfinishRefreshTask\n<公共请求参数>\n\n{}",
2005
+ "output": "{\n \"Response\": {\n \"TaskId\": 1,\n \"TaskStatus\": \"AssetCheckFinished\",\n \"NewTaskID\": \"1700157600010579384\",\n \"RequestId\": \"f249013b-c9ca-444c-8430-2f97a422859a\"\n }\n}",
2006
+ "title": "查询是否存在未完成刷新任务示例"
2007
+ }
2008
+ ],
2009
+ "DescribeUserCluster": [
2010
+ {
2011
+ "document": "查询用户集群列表",
2012
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUserCluster\n<公共请求参数>\n\n{\n \"Limit\": \"2\",\n \"Offset\": \"0\"\n}",
2013
+ "output": "{\n \"Response\": {\n \"ClusterInfoList\": [\n {\n \"AccessedStatus\": \"AccessedPartialDefence\",\n \"AccessedSubStatus\": \"AccessedSubNone\",\n \"ChargeCoresCnt\": 4000,\n \"CheckFailReason\": \"SUCCESS\",\n \"CheckStatus\": \"HasRisk\",\n \"ClusterAuditFailedInfo\": \"ClusterAuditFailedInfo\",\n \"ClusterAuditStatus\": \"Opened\",\n \"ClusterAutoCheck\": false,\n \"ClusterCheckMode\": \"ClusterCheckMode\",\n \"ClusterId\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterNodeNum\": 4,\n \"ClusterOs\": \"centos\",\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterSubStatus\": \"3\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ClusterVersion\": \"1.28.3\",\n \"CoresCnt\": 12000,\n \"DefenderErrorReason\": \"DefenderErrorReason\",\n \"DefenderStatus\": \"UnDefended\",\n \"HighRiskCount\": 6,\n \"HintRiskCount\": 3,\n \"MasterAddresses\": [\n \"10.*.*.*;\"\n ],\n \"MiddleRiskCount\": 7,\n \"NodeCount\": 4,\n \"OffLineNodeCount\": 0,\n \"Region\": \"ap-guangzhou\",\n \"SeriousRiskCount\": 1,\n \"TaskCreateTime\": \"2024-10-30 14:41:25\",\n \"UnInstallAgentNodeCount\": 1,\n \"UnreadyNodeNum\": 3\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TotalCount\": 7\n }\n}",
2014
+ "title": "查询用户集群列表"
2015
+ }
2016
+ ],
2017
+ "DescribeUserPodList": [
2018
+ {
2019
+ "document": "",
2020
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeUserPodList\n<公共请求参数>\n\n{\n \"ClusterId\": \"cls-ane0zamq\",\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
2021
+ "output": "{\n \"Response\": {\n \"PodList\": [\n {\n \"Age\": \"303h45m31.069895614s\",\n \"CPU\": 0,\n \"ChargeCoresCnt\": 0,\n \"ClusterId\": \"cls-abhq0j4o\",\n \"ClusterName\": \"bx_test_tmp\",\n \"ClusterStatus\": \"CSR_RUNNING\",\n \"ClusterType\": \"INDEPENDENT_CLUSTER\",\n \"ContainerCount\": 0,\n \"ContainerId\": \"ContainerId\",\n \"ContainerName\": \"ContainerName\",\n \"HostId\": \"ins-qj24hgj0\",\n \"HostName\": \"hn***\",\n \"Labels\": \"3\",\n \"Memory\": 0,\n \"Namespace\": \"default\",\n \"NodeLanIP\": \"10.0.0.14\",\n \"NodeName\": \"i-node***\",\n \"NodeType\": \"NORMAL\",\n \"PodIP\": \"192.168.0.172\",\n \"PodName\": \"tiefighter\",\n \"Region\": \"ap-guangzhou\",\n \"Restarts\": 0,\n \"ServiceCount\": 0,\n \"ServiceName\": \"ServiceName\",\n \"StartTime\": \"2024-10-17 23:03:42\",\n \"Status\": \"Running\",\n \"WorkloadKind\": \"Replic****\",\n \"WorkloadLabels\": \"WorkloadLabels\",\n \"WorkloadName\": \"ka-waybill-router-f877d****\"\n }\n ],\n \"RequestId\": \"1d32a744-4f31-4a6b-8574-7919f034f317\",\n \"TotalCount\": 54\n }\n}",
2022
+ "title": "查询集群的Pod列表"
2023
+ }
2024
+ ],
2025
+ "DescribeValueAddedSrvInfo": [
2026
+ {
2027
+ "document": "",
2028
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeValueAddedSrvInfo\n&<公共请求参数>",
2029
+ "output": "{\n \"Response\": {\n \"LocalImageCnt\": 1,\n \"UnusedAuthorizedCnt\": 1,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"RegistryImageCnt\": 1\n }\n}",
2030
+ "title": "查询增值服务需购买信息"
2031
+ }
2032
+ ],
2033
+ "DescribeVirusAutoIsolateSampleDetail": [
2034
+ {
2035
+ "document": "",
2036
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSampleDetail\n<公共请求参数>\n\n{\n \"MD5\": \"dskaldjskld\"\n}",
2037
+ "output": "{\n \"Response\": {\n \"HarmDescribe\": \"发现容器上存在恶意木马,您的容器可能已经失陷。\\n恶意木马通常会执行挖矿、文件删除、信息窃取和网络攻击等恶意行为。\",\n \"KillEngine\": [],\n \"MD5\": \"5b98800688cae1533ff965ab31baeab1\",\n \"ReferenceLink\": \"https://cloud.tencent.com/document/product/296/9605\",\n \"RequestId\": \"a8304c25-f23b-4638-b994-7bb0ba4c5156\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 52,\n \"SuggestScheme\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [],\n \"VirusName\": \"Bk.YDWebShell.Php.Small.11100534\"\n }\n}",
2038
+ "title": "查询木马自动隔离样本详情"
2039
+ }
2040
+ ],
2041
+ "DescribeVirusAutoIsolateSampleDownloadURL": [
2042
+ {
2043
+ "document": "",
2044
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSampleDownloadURL\n<公共请求参数>\n\n{\n \"MD5\": \"dskaldjskld\"\n}",
2045
+ "output": "{\n \"Response\": {\n \"FileUrl\": \"https://malware-1258344699.cos.ap-guangzhou.myqcloud.com/samples%2F5b98800688cae1533ff965ab31baeab1?q-sign-algorithm=sha1&q-ak=AKID******&q-sign-time=1730427587%3B1730431187&q-key-time=1730427587%3B1730431187&q-header-list=host&q-url-param-list=&q-signature=2aed00b5e98f66d0aeb833036362f98c17c51bd0\",\n \"RequestId\": \"56726fc5-1a50-46ba-ba2a-eb5f7aff4cd3\"\n }\n}",
2046
+ "title": "查询木马自动隔离样本下载链接"
2047
+ }
2048
+ ],
2049
+ "DescribeVirusAutoIsolateSampleList": [
2050
+ {
2051
+ "document": "",
2052
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSampleList\n<公共请求参数>\n\n{}",
2053
+ "output": "{\n \"Response\": {\n \"TotalCount\": 102,\n \"List\": [\n {\n \"MD5\": \"61d7d84e979212bed18ed9aa8748defa\",\n \"VirusName\": \"virus1\",\n \"ModifyTime\": \"2020-09-22T00:00:00+00:00\",\n \"AutoIsolateSwitch\": true\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2054
+ "title": "查询木马自动隔离样本列表"
2055
+ }
2056
+ ],
2057
+ "DescribeVirusAutoIsolateSetting": [
2058
+ {
2059
+ "document": "查询木马自动隔离设置",
2060
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusAutoIsolateSetting\n<公共请求参数>\n\n{}",
2061
+ "output": "{\n \"Response\": {\n \"AutoIsolateSwitch\": true,\n \"IsKillProgress\": true,\n \"UserAutoIsolateKillSwitch\": true,\n \"RequestId\": \"F00A8503-6233-452E-913E-DAFE9******\"\n }\n}",
2062
+ "title": "查询木马自动隔离设置"
2063
+ }
2064
+ ],
2065
+ "DescribeVirusDetail": [
2066
+ {
2067
+ "document": "运行时查询木马文件信息",
2068
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusDetail\n<公共请求参数>\n\n{\n \"Id\": \"10021\"\n}",
2069
+ "output": "{\n \"Response\": {\n \"AncestorProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b4ed805844e07bd15663e4f778acf9bf388719cbcdf794290b9637a550a21d6 -address /run/containerd/containerd.****\",\n \"AncestorProcessPath\": \"/usr/local/bin/containerd-shim-run****\",\n \"AncestorProcessStartUser\": \"0\",\n \"AncestorProcessUserGroup\": \"0\",\n \"CheckPlatform\": [\n \"VDC\",\n \"TAV\"\n ],\n \"ClientIP\": \"10.*.*.1\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"d4c43f9268ecea2aa75b26632299df8aaf496a*******\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/container_name\",\n \"ContainerNetStatus\": \"ISOLATED\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"CreateTime\": \"2024-08-27T03:30:37Z\",\n \"EventType\": \"恶意文件告警\",\n \"FileAccessTime\": \"2018-02-28T07:45:34Z\",\n \"FileMd5\": \"81a7701a194c3a******\",\n \"FileModifyTime\": \"2018-02-28T07:45:34Z\",\n \"FileName\": \"specimen_*******\",\n \"FilePath\": \"/home/virus/specimen_******\",\n \"HarmDescribe\": \"蠕虫病毒Ramnit最早出现在2010年,至今已有8年之久,因传播力强而“闻名于世”。\",\n \"HostIP\": \"10.0.0.1\",\n \"HostId\": \"dc56fda9-58c8-4c4f-9e8c-abb0cd4f92aa\",\n \"HostName\": \"hostname\",\n \"ImageId\": \"sha256:80beff5ff34259ceb7fbe9cd*******\",\n \"ImageName\": \"centos:7\",\n \"Mark\": \"mark reason\",\n \"ModifyTime\": \"2024-10-21T06:42:49Z\",\n \"Namespace\": \"tcss\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeSubNetCIDR\": \"10.*.*.1/24\",\n \"NodeSubNetID\": \"subnet-aau2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"wer41324-18a1-4775-9e3f-**\",\n \"OperationTime\": \"2024-08-27T03:30:37Z\",\n \"PProcessParam\": \"node dist/inde****\",\n \"PProcessPath\": \"/usr/bin/****\",\n \"PProcessStartUser\": \"root\",\n \"PProcessUserGroup\": \"root\",\n \"PodIP\": \"10.0.*.*\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"Running\",\n \"ProcessAccountGroup\": \"root\",\n \"ProcessArgv\": \"git clone --depth=1 https://github.com/busi\",\n \"ProcessChan\": \"git(433802)|node(280016)|containerd-shim-runc-v2(176637)|system****\",\n \"ProcessFileAuthority\": \"-rwxr-****\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"472c65af3f43136472d1a383f5******\",\n \"ProcessName\": \"/bin/a***\",\n \"ProcessPath\": \"/usr/bin****\",\n \"ProcessStartAccount\": \"root\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836*****\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 332155,\n \"SourceType\": 0,\n \"Status\": \"DEAL_NONE\",\n \"SubStatus\": \"FILE_NOT_FOUND\",\n \"SuggestScheme\": \"1.在病毒尚未完全清理干净之前,暂时关闭系统文件共享功能 ,防止感染范围进一步扩大;\\n2.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n3.隔离或者删除相关的木马文件;\\n4.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [\n \"ramnit\",\n \"Worm\",\n \"窃取用户信息,感染用户本地所有的html、exe、dll等格式的文件。\"\n ],\n \"VirusName\": \"Win32.Virus.Ramnit.Qwhl\",\n \"WorkloadType\": \"DaemonSet\"\n }\n}",
2070
+ "title": "运行时查询木马文件信息"
2071
+ }
2072
+ ],
2073
+ "DescribeVirusEventTendency": [
2074
+ {
2075
+ "document": "",
2076
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusEventTendency\n<公共请求参数>\n\n{\n \"TendencyPeriod\": 7\n}",
2077
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"Date\": \"2020-09-22\",\n \"PendingEventCount\": 1,\n \"RiskContainerCount\": 1,\n \"EventCount\": 1,\n \"IsolateEventCount\": 1\n }\n ],\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2078
+ "title": "运行时木马趋势数据获取"
2079
+ }
2080
+ ],
2081
+ "DescribeVirusList": [
2082
+ {
2083
+ "document": "查询运行时文件查杀事件列表",
2084
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusList\n<公共请求参数>\n\n{}",
2085
+ "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"TotalCount\": 0\n }\n}",
2086
+ "title": "查询运行时文件查杀事件列表"
2087
+ }
2088
+ ],
2089
+ "DescribeVirusManualScanEstimateTimeout": [
2090
+ {
2091
+ "document": "",
2092
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusManualScanEstimateTimeout\n<公共请求参数>\n\n{\n \"ScanIds\": [\n \"image-id\"\n ],\n \"ScanRangeAll\": true,\n \"ScanRangeType\": 1\n}",
2093
+ "output": "{\n \"Response\": {\n \"Timeout\": 5,\n \"ContainerScanConcurrencyCount\": 2,\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2094
+ "title": "查询木马一键检测预估超时时间"
2095
+ }
2096
+ ],
2097
+ "DescribeVirusMonitorSetting": [
2098
+ {
2099
+ "document": "运行时查询文件查杀实时监控设置",
2100
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusMonitorSetting\n<公共请求参数>\n\n{}",
2101
+ "output": "{\n \"Response\": {\n \"RequestId\": \"b9cd345d-9d88-4e3b-86b6-e0e5c971731a\",\n \"EnableScan\": true,\n \"ScanPathAll\": true,\n \"ScanPathType\": 0,\n \"ScanPathMode\": \"SCAN_PATH_DEFAULT\",\n \"ScanPath\": []\n }\n}",
2102
+ "title": "运行时查询文件查杀实时监控设置"
2103
+ }
2104
+ ],
2105
+ "DescribeVirusSampleDownloadUrl": [
2106
+ {
2107
+ "document": "",
2108
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusSampleDownloadUrl\n<公共请求参数>\n\n{\n \"ID\": \"1000\"\n}",
2109
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"FileUrl\": \"http://****/a***\"\n }\n}",
2110
+ "title": "查询木马样本下载url"
2111
+ }
2112
+ ],
2113
+ "DescribeVirusScanSetting": [
2114
+ {
2115
+ "document": "运行时查询文件查杀设置",
2116
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusScanSetting\n<公共请求参数>\n\n{}",
2117
+ "output": "{\n \"Response\": {\n \"BeginScanAt\": \"10:59:00\",\n \"ClickTimeout\": 0,\n \"Cycle\": 1,\n \"EnableScan\": true,\n \"RequestId\": \"def074cf-2ad4-4895-bc34-e1607b094a4e\",\n \"ScanIds\": [\n \"ad297b24a4f818d9da49c9bec10d54c179b6751fc362802b077f710b3638e0f0\"\n ],\n \"ScanPath\": [\n \"/tmp\"\n ],\n \"ScanPathAll\": false,\n \"ScanPathMode\": \"SCAN_PATH_USER_DEFINE\",\n \"ScanPathType\": 0,\n \"ScanRangeAll\": false,\n \"ScanRangeType\": 0,\n \"Timeout\": 5\n }\n}",
2118
+ "title": "运行时查询文件查杀设置"
2119
+ }
2120
+ ],
2121
+ "DescribeVirusScanTaskStatus": [
2122
+ {
2123
+ "document": "运行时查询文件查杀任务状态",
2124
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusScanTaskStatus\n<公共请求参数>\n\n{\n \"TaskID\": \"dskaldjskld\"\n}",
2125
+ "output": "{\n \"Response\": {\n \"ContainerScanCnt\": 0,\n \"ContainerTotal\": 339,\n \"LeftSeconds\": 4666,\n \"RequestId\": \"b9e9e86e-5b7e-476c-9be1-a8c6399afef3\",\n \"RiskCnt\": 0,\n \"Schedule\": 0,\n \"Status\": \"SCANNING\",\n \"RiskContainerCnt\": 0,\n \"StartTime\": \"2020-11-21 15:16:00\",\n \"EndTime\": \"2020-11-21 15:16:00\",\n \"ScanType\": \"CYCLE\"\n }\n}",
2126
+ "title": "运行时查询文件查杀任务状态"
2127
+ }
2128
+ ],
2129
+ "DescribeVirusScanTimeoutSetting": [
2130
+ {
2131
+ "document": "",
2132
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusScanTimeoutSetting\n<公共请求参数>\n\n{\n \"ScanType\": 0\n}",
2133
+ "output": "{\n \"Response\": {\n \"RequestId\": \"33ec689a-e026-4700-8dc4-b559b97f0667\",\n \"Timeout\": 5\n }\n}",
2134
+ "title": "运行时文件扫描超时设置查询"
2135
+ }
2136
+ ],
2137
+ "DescribeVirusSummary": [
2138
+ {
2139
+ "document": "运行时查询木马概览信息",
2140
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusSummary\n<公共请求参数>\n\n{}",
2141
+ "output": "{\n \"Response\": {\n \"IsolateCnt\": 1133,\n \"IsolateIncrease\": 0,\n \"RequestId\": \"83b45d62-7383-4257-8de5-f460a3446a2c\",\n \"RiskCnt\": 94,\n \"RiskContainerCnt\": 58,\n \"RiskContainerIncrease\": 0,\n \"RiskIncrease\": 0,\n \"TaskId\": \"67204f7cad8a5e71a40875752cc2f374\",\n \"VirusDataBaseModifyTime\": \"2020-11-21 15:16:00\"\n }\n}",
2142
+ "title": "运行时查询木马概览信息"
2143
+ }
2144
+ ],
2145
+ "DescribeVirusTaskList": [
2146
+ {
2147
+ "document": "运行时查询文件查杀任务列表",
2148
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusTaskList\n<公共请求参数>\n\n{\n \"TaskId\": \"faketaskid\"\n}",
2149
+ "output": "{\n \"Response\": {\n \"List\": [],\n \"RequestId\": \"ff49ad4b-fe52-4f9d-8810-ba377eab9124\",\n \"TotalCount\": 6\n }\n}",
2150
+ "title": "运行时查询文件查杀任务列表"
2151
+ }
2152
+ ],
2153
+ "DescribeVulContainerList": [
2154
+ {
2155
+ "document": "",
2156
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulContainerList\n&PocID=1\n&<公共请求参数>",
2157
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ClusterID\": \"68b68a372df3394bf46f7320707ebdcd\",\n \"ClusterName\": \"default-cluster\",\n \"ContainerID\": \"0b70affcd1c495798c2fbde915a43e94df0457c204848be862ad0689aab868a6\",\n \"ContainerName\": \"containner\",\n \"HostID\": \"5c442550-bbbc-aaaa-ada3-00796bd9fefe\",\n \"HostIP\": \"10.206.64.13\",\n \"HostName\": \"tcs-sssa\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeName\": \"i-node***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"PublicIP\": \"1.2.3.4\"\n }\n ],\n \"RequestId\": \"e33b04ca-8e2f-4242-946f-2804debc5c9b\",\n \"TotalCount\": 31\n }\n}",
2158
+ "title": "查询受漏洞的容器列表"
2159
+ }
2160
+ ],
2161
+ "DescribeVulDefenceEvent": [
2162
+ {
2163
+ "document": "DescribeVulDefenceEvent",
2164
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceEvent\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
2165
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2021-44228\",\n \"City\": \"广东省-深圳市\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"1a00d48467136a768278cbb93fb45b3a7d1cbb7e11ee906eb54cf09bf6a27e5b\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/cve-2021-44228-solr-1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"CreateTime\": \"2023-10-08 11:07:16\",\n \"EventCount\": 4,\n \"EventID\": 20055,\n \"EventType\": \"EVENT_DEFENDED\",\n \"HostIP\": \"10.0.1.92\",\n \"HostName\": \"hn***\",\n \"ImageID\": \"sha256:33f2d4bf4fa944682b9c7c1ed66262fe22d488bab7028ce0f676215bade8d92e\",\n \"ImageName\": \"vulhub/solr:8.11.0\",\n \"MergeTime\": \"2023-10-08 11:07:16\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PocID\": \"pcmgr-333393\",\n \"PublicIP\": \"10.0.1.92\",\n \"QUUID\": \"d9438d70-2689-4013-9ce1-d80edbc29edb\",\n \"SourceIP\": \"10.0.1.92\",\n \"Status\": \"EVENT_DEALED\",\n \"VulName\": \"Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)\",\n \"PodIP\": \"1.1.1.1\",\n \"PodName\": \"PodName\"\n }\n ],\n \"TotalCount\": 0,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2166
+ "title": "查询漏洞防御事件列表"
2167
+ }
2168
+ ],
2169
+ "DescribeVulDefenceEventDetail": [
2170
+ {
2171
+ "document": "查询漏洞防御事件详情",
2172
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceEventDetail\n<公共请求参数>\n\n{\n \"EventID\": \"1002\"\n}",
2173
+ "output": "{\n \"Response\": {\n \"EventDetail\": {\n \"CVEID\": \"CVE-2021-44228\",\n \"City\": \"Beijing\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerID\": \"5457113fd88a5cc8f88391f7387ad2f1b23c4b9a154f12fc725cfa8b134134\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/cve-2021-44228-solr-1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"RUNNING\",\n \"Description\": \"访问源(IP:)在对容器(ID:5457113fd8...)发起漏洞利用攻击\",\n \"EventCount\": 20,\n \"EventID\": 30061,\n \"EventType\": \"EVENT_DEFENDED\",\n \"HostIP\": \"172.16.51.209\",\n \"HostName\": \"harborV2_yancyw\",\n \"ImageID\": \"sha256:052794134d434bc2db0775211589beb372412af333a262d16841893418941894\",\n \"ImageName\": \"vulhub/solr:8.11.0\",\n \"JNDIUrl\": \"http://10.0.0.1\",\n \"MainClass\": \"org.eclipse.jetty.start.Main\",\n \"Namespace\": \"tcss\",\n \"NetworkPayload\": \": \\n\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeSubNetCIDR\": \"10.0.200.0/24\",\n \"NodeSubNetID\": \"subnet-5gu2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"OfficialSolution\": \"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://logging.apache.org/log4j/2.x/security.html\",\n \"PID\": 20545,\n \"PocID\": \"pcmgr-333393\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"PublicIP\": \"127.2.3.4\",\n \"QUUID\": \"380add75-bb06-4cc4-84c5-cf806d102fba\",\n \"RaspDetail\": [\n {\n \"Name\": \"jndiurl\",\n \"Value\": \"ldap://1.8.0_102.example.com\"\n }\n ],\n \"ServerAccount\": \"server account\",\n \"ServerArg\": \"server avg\",\n \"ServerExe\": \"server exe\",\n \"ServerPort\": \"3306\",\n \"SourceIP\": \"10.0.1.2\",\n \"SourcePort\": [\n \"3306\"\n ],\n \"StackTrace\": \"org.apache.logging.log4j.core.lookup.JndiLookup.lookup\\norg.apache.logging.log4j.core.lookup.Interpolator.lookup\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.resolveVariable\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.substitute\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.substitute\\norg.apache.logging.log4j.core.lookup.StrSubstitutor.replace\\norg.apache.logging.log4j.core.pattern.MessagePatternConverter.format\\norg.apache.logging.log4j.core.pattern.PatternFormatter.format\\norg.apache.logging.log4j.core.pattern.MaxLengthConverter.format\\norg.apache.logging.log4j.core.pattern.PatternFormatter.format\\n\",\n \"Status\": \"EVENT_DEFENDED\",\n \"VulName\": \"Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)\",\n \"WorkloadType\": \"DaemonSet\"\n },\n \"RequestId\": \"2f944254-e774-4f19-ac09-c9c1bdf311f6\"\n }\n}",
2174
+ "title": "查询漏洞防御事件详情"
2175
+ }
2176
+ ],
2177
+ "DescribeVulDefenceEventTendency": [
2178
+ {
2179
+ "document": "",
2180
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceEventTendency\n<公共请求参数>\n\n{\n \"EndTime\": \"2021-05-01\",\n \"StartTime\": \"2021-05-07\"\n}",
2181
+ "output": "{\n \"Response\": {\n \"AttackList\": [\n {\n \"Date\": \"2020-09-22\",\n \"EventCount\": 0\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"DefendedList\": [\n {\n \"Date\": \"2020-09-22\",\n \"EventCount\": 0\n }\n ]\n }\n}",
2182
+ "title": "查询漏洞防御攻击事件趋势"
2183
+ }
2184
+ ],
2185
+ "DescribeVulDefenceHost": [
2186
+ {
2187
+ "document": "查询漏洞防御的主机列表",
2188
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceHost\n<公共请求参数>\n\n{\n \"Limit\": \"10\",\n \"Offset\": \"0\"\n}",
2189
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"CreateTime\": \"2023-08-17 15:41:32\",\n \"HostID\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\",\n \"HostIP\": \"1.1.1.1\",\n \"HostName\": \"tcs-test\",\n \"ModifyTime\": \"2024-10-30 14:00:21\",\n \"NodeID\": \"ins-8bc803fd\",\n \"NodeSubNetCIDR\": \"10.0.200.0/24\",\n \"NodeSubNetID\": \"subnet-5gu2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"896e349d-2e7d-4151-a26f-4e9fdafe****\",\n \"PodIP\": \"10.0.1.92\",\n \"PodName\": \"agent-test-2zrp7\",\n \"PublicIP\": \"1.1.1.1\",\n \"Status\": \"SUCCESS\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2190
+ "title": "查询漏洞防御的主机列表"
2191
+ }
2192
+ ],
2193
+ "DescribeVulDefencePlugin": [
2194
+ {
2195
+ "document": "查询漏洞防御插件列表",
2196
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefencePlugin\n<公共请求参数>\n\n{\n \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\",\n \"Limit\": 1,\n \"Offset\": 1,\n \"Filters\": [\n {\n \"Name\": \"Status\",\n \"Values\": [\n \"SUCCESS\"\n ],\n \"ExactMatch\": true\n }\n ]\n}",
2197
+ "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"List\": [\n {\n \"PID\": 0,\n \"MainClass\": \"com.java.main\",\n \"Status\": \"SUCCESS\",\n \"ErrorLog\": \"ErrorLog\"\n }\n ],\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2198
+ "title": "查询漏洞防御插件列表"
2199
+ }
2200
+ ],
2201
+ "DescribeVulDefenceSetting": [
2202
+ {
2203
+ "document": "查询漏洞防御设置信息",
2204
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDefenceSetting\n<公共请求参数>\n\n{}",
2205
+ "output": "{\n \"Response\": {\n \"IsEnabled\": 0,\n \"Scope\": 0,\n \"HostCount\": 0,\n \"ExceptionHostCount\": 0,\n \"HostIDs\": [],\n \"HostTotalCount\": 0,\n \"SupportDefenseVulCount\": 0,\n \"HostNodeCount\": 0,\n \"SuperScope\": 0,\n \"SuperNodeCount\": 0,\n \"SuperNodeIds\": [],\n \"NodeTotalCount\": 0,\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2206
+ "title": "查询漏洞防御设置信息"
2207
+ }
2208
+ ],
2209
+ "DescribeVulDetail": [
2210
+ {
2211
+ "document": "",
2212
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulDetail\n<公共请求参数>\n\n{\n \"PocID\": \"1\"\n}",
2213
+ "output": "{\n \"Response\": {\n \"RequestId\": \"2d770ee1-8360-4c62-badc-257688f1e4de\",\n \"VulInfo\": {\n \"CVEID\": \"CVE-2023-50164\",\n \"CVSSV3Desc\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\n \"CVSSV3Score\": 9.8,\n \"Category\": \"OTHER\",\n \"CategoryType\": \"EMERGENCY\",\n \"ComponentList\": [\n {\n \"FixedVersion\": [\n \">2.3.37\",\n \"2.5.33\",\n \"6.3.0.2\"\n ],\n \"Name\": \"(apache) struts\",\n \"Version\": [\n \"2.0.0<=version<=2.3.37\",\n \"2.5.0<=version<2.5.33\",\n \"6.0.0<=version<6.3.0.2\"\n ]\n }\n ],\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 78,\n \"DefenceScope\": \"ALL\",\n \"DefenceStatus\": \"DEFENDED\",\n \"DefendedCount\": 0,\n \"DefenseSolution\": \"官方已经发布了安全版本,建议受漏洞影响的用户立即更新Apache Struts2到最新安全版本。\\n安全版本:\\nApache Struts2 >= 2.5.33\\nApache Struts2 >= 6.3.0.2\\n官方下载地址:https://struts.apache.org/download.cgi 或修改项目依赖配置文件中的版本信息。\",\n \"Description\": \"Apache Struts2框架是一个用于开发Java EE网络应用程序的Web框架,它本质上相当于一个servlet,在MVC设计模式中,Struts2作为控制器(Controller)来建立模型与视图的数据交互。漏洞源于文件上传逻辑存在缺陷,攻击者可以操纵文件上传参数来启用路径遍历,在某些情况下,这可能导致上传可用于执行远程代码执行的恶意文件。\",\n \"Level\": \"CRITICAL\",\n \"LocalImageCount\": 0,\n \"LocalNewestImageCount\": 0,\n \"Name\": \"Apache Struts2 远程代码执行漏洞(CVE-2023-50164)\",\n \"OfficialSolution\": \"建议关注厂商公告或升级到最新版本。\",\n \"PocID\": \"pcmgr-5555555\",\n \"Reference\": [\n \"https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj\"\n ],\n \"RegistryImageCount\": 0,\n \"RegistryNewestImageCount\": 0,\n \"ScanStatus\": \"SCANNED\",\n \"SubmitTime\": \"2023-12-07 17:01:30\",\n \"Tags\": [\n \"NETWORK\"\n ]\n }\n }\n}",
2214
+ "title": "查询漏洞详情"
2215
+ }
2216
+ ],
2217
+ "DescribeVulIgnoreLocalImageList": [
2218
+ {
2219
+ "document": "",
2220
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulIgnoreLocalImageList\n&PocID=\"poc-testid\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
2221
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ID\": 10001,\n \"ImageID\": \"sha256:84a28c\",\n \"ImageName\": \"image:latest\",\n \"ImageSize\": 511144459,\n \"PocID\": \"pcmgr-10001\"\n }\n ],\n \"RequestId\": \"1549f3da-40f5-4f11-8520-b1e71d33913c\",\n \"TotalCount\": 1\n }\n}",
2222
+ "title": "查询漏洞扫描忽略的本地镜像列表"
2223
+ }
2224
+ ],
2225
+ "DescribeVulIgnoreRegistryImageList": [
2226
+ {
2227
+ "document": "",
2228
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulIgnoreRegistryImageList\n&PocID=\"poc-1256\"\n&Limit=10\n&Offset=0\n&<公共请求参数>",
2229
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"ID\": 10001,\n \"ImageID\": \"sha256:a77a6d2\",\n \"ImageVersion\": \"latest\",\n \"PocID\": \"pcmgr-10001\",\n \"RegistryName\": \"test-registry-name\",\n \"RegistryPath\": \"https://ctr.com/test\"\n }\n ],\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2230
+ "title": "查询漏洞扫描忽略的仓库镜像列表"
2231
+ }
2232
+ ],
2233
+ "DescribeVulImageList": [
2234
+ {
2235
+ "document": "",
2236
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulImageList\n&PocID=1\n&<公共请求参数>",
2237
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ComponentList\": [\n {\n \"FixedVersion\": \">6.0.37,>8.0.0\",\n \"Name\": \"catalina\",\n \"Path\": \"tomcat7/apache-tomcat-7.0.34/lib/catalina.jar\",\n \"Version\": \"7.0.34\"\n }\n ],\n \"ContainerCount\": 0,\n \"HostCount\": 1,\n \"SuperNodeCount\": 1,\n \"ImageID\": \"sha256:5e1476716a780a0bf6d4776d02840254257a6c0711fe0e17a7d693aba0dff8fb\",\n \"ImageName\": \"image\"\n }\n ],\n \"RequestId\": \"940b7fab-b4fc-4740-a719-6c1dd122af3f\",\n \"TotalCount\": 1\n }\n}",
2238
+ "title": "查询漏洞影响的镜像列表"
2239
+ }
2240
+ ],
2241
+ "DescribeVulImageSummary": [
2242
+ {
2243
+ "document": "",
2244
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulImageSummary\n<公共请求参数>\n\n{}",
2245
+ "output": "{\n \"Response\": {\n \"AllAuthorizedImageCount\": 5703,\n \"EmergencyVulCount\": 38,\n \"RequestId\": \"e06df6e9-3f54-41d0-9857-41ed365623a2\",\n \"ScannedImageCount\": 2,\n \"SeriousVulImageCount\": 2,\n \"SupportVulTotalCount\": 70678,\n \"SysTemVulCount\": 634,\n \"VulLibraryUpdateTime\": \"2024-10-29 19:42:56\",\n \"VulTotalCount\": 2086,\n \"WebVulCount\": 1442\n }\n}",
2246
+ "title": "查询受漏洞影响的镜像统计"
2247
+ }
2248
+ ],
2249
+ "DescribeVulLevelImageSummary": [
2250
+ {
2251
+ "document": "",
2252
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulLevelImageSummary\n&<公共请求参数>",
2253
+ "output": "{\n \"Response\": {\n \"LowLevelVulLocalImagePercent\": 0.0,\n \"HighLevelVulLocalImagePercent\": 0.0,\n \"LocalNewestImageCount\": 0,\n \"LowLevelVulRegistryImagePercent\": 0.0,\n \"MediumLevelVulRegistryImagePercent\": 0.0,\n \"HighLevelVulRegistryImagePercent\": 0.0,\n \"MediumLevelVulLocalImagePercent\": 0.0,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"CriticalLevelVulLocalImagePercent\": 0.0,\n \"CriticalLevelVulRegistryImagePercent\": 0.0,\n \"RegistryNewestImageCount\": 0\n }\n}",
2254
+ "title": "查询应急漏洞各威胁等级统计镜像数"
2255
+ }
2256
+ ],
2257
+ "DescribeVulLevelSummary": [
2258
+ {
2259
+ "document": "",
2260
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulLevelSummary\n&CategoryType=SYSTEM\n&<公共请求参数>",
2261
+ "output": "{\n \"Response\": {\n \"MediumLevelVulCount\": 0,\n \"CriticalLevelVulCount\": 0,\n \"HighLevelVulCount\": 0,\n \"LowLevelVulCount\": 0,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2262
+ "title": "查询各类型漏洞各威胁等级统计数"
2263
+ }
2264
+ ],
2265
+ "DescribeVulRegistryImageList": [
2266
+ {
2267
+ "document": "",
2268
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulRegistryImageList\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"OnlyAffectedNewestImage\",\n \"Values\": [\n \"false\"\n ],\n \"ExactMatch\": false\n }\n ],\n \"PocID\": \"pcmgr-448277\"\n}",
2269
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"ComponentList\": [\n {\n \"FixedVersion\": \"0:1.33.0-5.el8_8\",\n \"Name\": \"libnghttp2\",\n \"Path\": \"/a/b\",\n \"Version\": \"1.33.0-3.el8_2.1\"\n }\n ],\n \"ImageAssetId\": 100078588,\n \"ImageID\": \"sha256:0ecdf0d66075bf978f4723e3a41dbf8f984633fb6e6f1ff525666ba58cc6770c\",\n \"ImageName\": \"yancyw999\",\n \"ImageRepoAddress\": \"139.199.178.171:8089/yancyw/yancyw999\",\n \"ImageTag\": \"999\",\n \"IsLatestImage\": true,\n \"Namespace\": \"yancyw\"\n }\n ],\n \"RequestId\": \"d7a94822-5d3c-4d15-9522-56dd70b03b5a\",\n \"TotalCount\": 1\n }\n}",
2270
+ "title": "查询漏洞影响的仓库镜像列表"
2271
+ }
2272
+ ],
2273
+ "DescribeVulScanAuthorizedImageSummary": [
2274
+ {
2275
+ "document": "",
2276
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulScanAuthorizedImageSummary\n&<公共请求参数>",
2277
+ "output": "{\n \"Response\": {\n \"AllAuthorizedImageCount\": 0,\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"UnScanAuthorizedImageCount\": 0\n }\n}",
2278
+ "title": "统计漏洞扫描页已授权和未扫描镜像数"
2279
+ }
2280
+ ],
2281
+ "DescribeVulScanInfo": [
2282
+ {
2283
+ "document": "",
2284
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulScanInfo\n&LocalTaskID=1\n&RegistryTaskID=1\n&<公共请求参数>",
2285
+ "output": "{\n \"Response\": {\n \"FoundRiskImageCount\": 0,\n \"FoundVulCount\": 0,\n \"IgnoreVulCount\": 0,\n \"LocalImageScanCount\": 0,\n \"LocalTaskID\": 0,\n \"RegistryFoundVulCount\": 0,\n \"RegistryImageScanCount\": 0,\n \"RegistryTaskID\": 0,\n \"RemainingTime\": 0,\n \"RequestId\": \"b6cffd6d-b5a4-41d2-8ffc-21e5cbdee3b5\",\n \"ScanEndTime\": \"2020-11-21 15:16:00\",\n \"ScanProgress\": 0,\n \"ScanStartTime\": \"2020-11-21 15:16:00\",\n \"Status\": \"NOT_SCAN\"\n }\n}",
2286
+ "title": "查询漏洞扫描任务信息"
2287
+ }
2288
+ ],
2289
+ "DescribeVulScanLocalImageList": [
2290
+ {
2291
+ "document": "",
2292
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulScanLocalImageList\n&TaskID=1\n&<公共请求参数>",
2293
+ "output": "{\n \"Response\": {\n \"TotalCount\": 1,\n \"List\": [\n {\n \"MediumLevelVulCount\": 0,\n \"ScanStatus\": \"SCANNING\",\n \"ScanEndTime\": \"2006-01-02 15:04:05\",\n \"ScanStartTime\": \"2006-01-02 15:04:05\",\n \"ErrorStatus\": \"0\",\n \"ImageID\": \"sha256:80beff5ff34259ceb7fbe9cd10b2d94912618f5b5595f234349c5bb0cd4f9211\",\n \"ImageName\": \"ImageName\",\n \"CriticalLevelVulCount\": 0,\n \"TaskID\": 0,\n \"ScanDuration\": 0.0,\n \"HighLevelVulCount\": 0,\n \"LowLevelVulCount\": 0,\n \"Size\": 0.0\n }\n ],\n \"RequestId\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\"\n }\n}",
2294
+ "title": "查询漏洞扫描任务的本地镜像列表"
2295
+ }
2296
+ ],
2297
+ "DescribeVulSummary": [
2298
+ {
2299
+ "document": "查询漏洞风险统计概览",
2300
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVulSummary\n<公共请求参数>\n\n{}",
2301
+ "output": "{\n \"Response\": {\n \"EmergencyVulnerabilityCount\": 53,\n \"PocExpLevelVulCount\": 761,\n \"RemoteExpLevelVulCount\": 29,\n \"RequestId\": \"4cfc5e95-49f3-4c71-8048-0db454ed49b7\",\n \"SeriousVulCount\": 2924,\n \"SeriousVulNewestImageCount\": 296,\n \"SeriousVulnerabilityLocalImageCount\": 169,\n \"SeriousVulnerabilityRegistryImageCount\": 127,\n \"SuggestVulCount\": 2013,\n \"SystemVulnerabilityFocusCount\": 1536,\n \"VulTotalCount\": 5513,\n \"WebVulnerabilityFocusCount\": 477\n }\n}",
2302
+ "title": "查询漏洞风险统计概览"
2303
+ }
2304
+ ],
2305
+ "DescribeVulTendency": [
2306
+ {
2307
+ "document": "",
2308
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulTendency\n&EndTime=2020-09-22\n&StartTime=2020-09-22\n&SphereOfInfluence=LATEST\n&<公共请求参数>",
2309
+ "output": "{\n \"Response\": {\n \"VulTendencySet\": [\n {\n \"VulSet\": [\n {\n \"Cnt\": 1,\n \"CurTime\": \"2020-09-22\"\n }\n ],\n \"ImageType\": \"Local\"\n }\n ],\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2310
+ "title": "严重&高危的漏洞趋势"
2311
+ }
2312
+ ],
2313
+ "DescribeVulTopRanking": [
2314
+ {
2315
+ "document": "",
2316
+ "input": "https://tcss.tencentcloudapi.com/?Action=DescribeVulTopRanking\n&CategoryType=SYSTEM\n&<公共请求参数>",
2317
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"AffectedContainerCount\": 0,\n \"AffectedImageCount\": 1,\n \"ID\": 1027671,\n \"Level\": \"HIGH\",\n \"PocID\": \"pcmgr-166817\",\n \"VulName\": \"Telnetd encrypt_keyid: Remote Root function pointer overwrite\"\n }\n ],\n \"RequestId\": \"ce6b8df8-5cc6-4ab5-8401-1394483c0fec\"\n }\n}",
2318
+ "title": "查询漏洞Top排名列表"
2319
+ }
2320
+ ],
2321
+ "DescribeWarningRules": [
2322
+ {
2323
+ "document": "获取告警策略列表",
2324
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeWarningRules\n<公共请求参数>\n\n{}",
2325
+ "output": "{\n \"Response\": {\n \"WarningRules\": [\n {\n \"Type\": \"IMG_VIRUS\",\n \"Switch\": \"ON\",\n \"BeginTime\": \"10:00\",\n \"EndTime\": \"20:00\",\n \"ControlBits\": \"110\"\n }\n ],\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
2326
+ "title": "获取告警策略列表"
2327
+ }
2328
+ ],
2329
+ "DescribeWebVulList": [
2330
+ {
2331
+ "document": "",
2332
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeWebVulList\n<公共请求参数>\n\n{\n \"Limit\": \"1\",\n \"Offset\": \"0\"\n}",
2333
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CVEID\": \"CVE-2022-23302\",\n \"CVSSV3Score\": 8.8,\n \"Category\": \"DESERIALIZATION_OF_UNTRUSTED_DATA\",\n \"ContainerCount\": 0,\n \"DefenceHostCount\": 0,\n \"DefenceScope\": \"ALL\",\n \"DefenceStatus\": \"DEFENDED\",\n \"DefendedCount\": 0,\n \"FoundTime\": \"2024-10-29 11:56:21\",\n \"ID\": 173840040,\n \"LatestFoundTime\": \"2024-10-29 11:56:21\",\n \"Level\": \"HIGH\",\n \"LocalImageCount\": 0,\n \"Name\": \"Apache log4j JMSSink反序列化代码执行漏洞(CVE-2022-23302)\",\n \"PocID\": \"pcmgr-335818\",\n \"RegistryImageCount\": 1,\n \"Tags\": [\n \"NETWORK\",\n \"POC\"\n ]\n }\n ],\n \"RequestId\": \"e8f59b70-321a-423d-9f8a-a587451c19dd\",\n \"TotalCount\": 33\n }\n}",
2334
+ "title": "查询web应用漏洞列表"
2335
+ }
2336
+ ],
2337
+ "ExportVirusList": [
2338
+ {
2339
+ "document": "",
2340
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ExportVirusList\n<公共请求参数>\n\n{}",
2341
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\",\n \"JobId\": \"99fe44ea-3583-479b-a8ec-9932d9b8****\"\n }\n}",
2342
+ "title": "运行时文件查杀事件列表导出"
2343
+ }
2344
+ ],
2345
+ "InitializeUserComplianceEnvironment": [
2346
+ {
2347
+ "document": "在用户首次进入合规安全功能的场景下,调用此接口为用户初始化环境,分配资源和数据。",
2348
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: InitializeUserComplianceEnvironment\n<公共请求参数>\n\n{}",
2349
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2350
+ "title": "初始化用户的合规基线检环境"
2351
+ }
2352
+ ],
2353
+ "ModifyAbnormalProcessRuleStatus": [
2354
+ {
2355
+ "document": "",
2356
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAbnormalProcessRuleStatus\n<公共请求参数>\n\n{\n \"RuleIdSet\": [\n \"5202566\"\n ],\n \"IsEnable\": true\n}",
2357
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
2358
+ "title": "修改规则状态"
2359
+ }
2360
+ ],
2361
+ "ModifyAbnormalProcessStatus": [
2362
+ {
2363
+ "document": "",
2364
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAbnormalProcessStatus\n&EventIdSet.0=10001\n&Status= EVENT_DEALED\n&Remark=Remark\n&<公共请求参数>",
2365
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2366
+ "title": "修改异常进程事件状态"
2367
+ }
2368
+ ],
2369
+ "ModifyAccessControlRuleStatus": [
2370
+ {
2371
+ "document": "",
2372
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAccessControlRuleStatus\n<公共请求参数>\n\n{\n \"RuleIdSet\": [\n \"1002\"\n ],\n \"IsEnable\": true\n}",
2373
+ "output": "{\n \"Response\": {\n \"RequestId\": \"fee1bdb0-c13f-4c65-b567-8e270df211c1\"\n }\n}",
2374
+ "title": "修改规则状态"
2375
+ }
2376
+ ],
2377
+ "ModifyAccessControlStatus": [
2378
+ {
2379
+ "document": "",
2380
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyAccessControlStatus\n&EventIdSet.0=10001\n&Status=EVENT_DEALED\n&Remark=Remark\n&<公共请求参数>",
2381
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2382
+ "title": "修改运行时访问控制事件状态"
2383
+ }
2384
+ ],
2385
+ "ModifyAsset": [
2386
+ {
2387
+ "document": "",
2388
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAsset\n<公共请求参数>\n\n{\n \"All\": true,\n \"Hosts\": []\n}",
2389
+ "output": "{\n \"Response\": {\n \"RequestId\": \"33ec689a-e026-4700-8dc4-b559b97f0667\",\n \"Status\": \"SUCCESS\"\n }\n}",
2390
+ "title": "主机资产刷新"
2391
+ }
2392
+ ],
2393
+ "ModifyAssetImageRegistryScanStop": [
2394
+ {
2395
+ "document": "正常请求",
2396
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAssetImageRegistryScanStop\n<公共请求参数>\n\n{\n \"Id\": [\n 314\n ],\n \"TaskID\": 2\n}",
2397
+ "output": "{\n \"Response\": {\n \"RequestId\": \"18808687-b25a-43d8-9f79-5541bbe47a8e\"\n }\n}",
2398
+ "title": "正常请求"
2399
+ },
2400
+ {
2401
+ "document": "镜像仓库停止镜像一键扫描任务",
2402
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAssetImageRegistryScanStop\n<公共请求参数>\n\n{\n \"Id\": [\n 12034807\n ]\n}",
2403
+ "output": "{\n \"Response\": {\n \"RequestId\": \"459ab056-ab0e-460f-b937-9e5c7d02275f\"\n }\n}",
2404
+ "title": "镜像仓库停止镜像一键扫描任务"
2405
+ }
2406
+ ],
2407
+ "ModifyAssetImageRegistryScanStopOneKey": [
2408
+ {
2409
+ "document": "停止任务",
2410
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAssetImageRegistryScanStopOneKey\n<公共请求参数>\n\n{\n \"TaskID\": 13\n}",
2411
+ "output": "{\n \"Response\": {\n \"RequestId\": \"64c2b99b-ed9d-431b-b0c7-15c73d57c8e4\"\n }\n}",
2412
+ "title": "停止任务"
2413
+ },
2414
+ {
2415
+ "document": "镜像仓库停止镜像一键扫描任务",
2416
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAssetImageRegistryScanStopOneKey\n<公共请求参数>\n\n{\n \"All\": true\n}",
2417
+ "output": "{\n \"Response\": {\n \"RequestId\": \"459ab056-ab0e-460f-b937-9e5c7d02275f\"\n }\n}",
2418
+ "title": "镜像仓库停止镜像一键扫描任务"
2419
+ }
2420
+ ],
2421
+ "ModifyAssetImageScanStop": [
2422
+ {
2423
+ "document": "",
2424
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAssetImageScanStop\n<公共请求参数>\n\n{\n \"TaskID\": \"6013bde934b9a906387abe8a\"\n}",
2425
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8699941c-3c21-43a7-a6d4-aef30cbabd54\",\n \"Status\": \"SUCCESS\"\n }\n}",
2426
+ "title": "停止镜像扫描"
2427
+ }
2428
+ ],
2429
+ "ModifyCompliancePeriodTask": [
2430
+ {
2431
+ "document": "",
2432
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyCompliancePeriodTask\n<公共请求参数>\n\n{\n \"PeriodTaskId\": 1001,\n \"PeriodRule\": {\n \"ExecutionTime\": \"04:00:00\",\n \"Frequency\": 1\n },\n \"StandardSettings\": [\n {\n \"StandardId\": 1001,\n \"Enable\": false\n }\n ]\n}",
2433
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2434
+ "title": "编辑定时任务"
2435
+ }
2436
+ ],
2437
+ "ModifyContainerNetStatus": [
2438
+ {
2439
+ "document": "",
2440
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyContainerNetStatus\n<公共请求参数>\n\n{\n \"ContainerID\": \"289899476e81\",\n \"Status\": \"EVENT_ISOLATE_CONTAINER\"\n}",
2441
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2442
+ "title": "隔离容器网络状态"
2443
+ }
2444
+ ],
2445
+ "ModifyEscapeEventStatus": [
2446
+ {
2447
+ "document": "",
2448
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyEscapeEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"EVENT_IGNORE\",\n \"EventIdSet\": [\n \"33705186\"\n ]\n}",
2449
+ "output": "{\n \"Response\": {\n \"RequestId\": \"3c3b5c8a-727b-4e32-b679-bcb5d6530c67\"\n }\n}",
2450
+ "title": "修改容器逃逸扫描事件状态"
2451
+ }
2452
+ ],
2453
+ "ModifyEscapeRule": [
2454
+ {
2455
+ "document": "",
2456
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyEscapeRule\n&RuleSet.0.Type=\"ESCAPE_HOST_ACESS_FILE\"\n&RuleSet.0.IsEnable=true\n&RuleSet.1.Type=\"ESCAPE_MOUNT_NAMESPACE\"\n&RuleSet.1.IsEnable=true\n&RuleSet.2.Type=\"ESCAPE_PRIVILEDGE\"\n&RuleSet.2.IsEnable=true\n&RuleSet.3.Type=\"ESCAPE_PRIVILEDGE_CONTAINER_START\"\n&RuleSet.3.IsEnable=true\n&RuleSet.4.Type=\"ESCAPE_MOUNT_SENSITIVE_PTAH\"\n&RuleSet.4.IsEnable=true\n&RuleSet.5.Type=\"ESCAPE_SYSCALL\"\n&RuleSet.5.IsEnable=true\n&<公共请求参数>",
2457
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2458
+ "title": "updataEscape"
2459
+ }
2460
+ ],
2461
+ "ModifyEscapeWhiteList": [
2462
+ {
2463
+ "document": "",
2464
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyEscapeWhiteList\n<公共请求参数>\n\n{\n \"EventType\": [\n \"\\\"ESCAPE_DOCKER_API\\\"\"\n ],\n \"IDSet\": [\n \"1\"\n ]\n}",
2465
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2466
+ "title": "修改逃逸白名单"
2467
+ }
2468
+ ],
2469
+ "ModifyImageAuthorized": [
2470
+ {
2471
+ "document": "",
2472
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyImageAuthorized\n<公共请求参数>\n\n{\n \"AllLocalImages\": false,\n \"AllRegistryImages\": false,\n \"ImageSourceType\": \"ASSETIMAGE\",\n \"LocalImageIds\": [\n \"sha256:aaad346fbeab5768b61c75f016128c9189b7d0135053d308ef02958a8c80e6cd\"\n ],\n \"OnlyShowLatest\": true,\n \"UpdatedLocalImageCnt\": 100,\n \"UpdatedRegistryImageCnt\": 0\n}",
2473
+ "output": "{\n \"Response\": {\n \"RequestId\": \"e55bf3cb-f38f-4697-8638-a1e22efe8bb1\"\n }\n}",
2474
+ "title": "批量授权镜像扫描V2.0"
2475
+ }
2476
+ ],
2477
+ "ModifyK8sApiAbnormalEventStatus": [
2478
+ {
2479
+ "document": "",
2480
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyK8sApiAbnormalEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"EVENT_DEALED\",\n \"Remark\": \"Remark\",\n \"EventIDSet\": [\n 1\n ]\n}",
2481
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\"\n }\n}",
2482
+ "title": "修改k8sapi异常事件状态"
2483
+ }
2484
+ ],
2485
+ "ModifyK8sApiAbnormalRuleInfo": [
2486
+ {
2487
+ "document": "",
2488
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyK8sApiAbnormalRuleInfo\n<公共请求参数>\n\n{\n \"RuleInfo\": {\n \"Status\": true,\n \"RuleInfoList\": [\n {\n \"Action\": \"RULE_MODE_ALERT\",\n \"IsDelete\": false,\n \"RiskLevel\": \"NOTICE\",\n \"Scope\": \"{\\\"RequestURI\\\":\\\"/apis/cowsajhhoa.k8s.io/v\\\",\\\"RequestUser\\\":\\\"“name”:”sanpasahsad-contaosaer-leader”)\\\\\\\"\\\",\\\"ResponseStatusCode\\\":\\\"200\\\",\\\"SourceIPS\\\":\\\"10.255.0.43\\\",\\\"UserAgent\\\":\\\"snapshot-controller\\\",\\\"Verb\\\":\\\"update\\\"}\",\n \"Status\": true\n }\n ],\n \"EffectClusterIDSet\": [],\n \"RuleID\": \"d1b9dbe2-f78d-491a-b514-f0aa19d8ae4b\",\n \"RuleType\": \"USER_DEFINED_RULE\",\n \"EffectAllCluster\": true,\n \"RuleName\": \"rulename-test\"\n }\n}",
2489
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\"\n }\n}",
2490
+ "title": "修改k8sapi异常规则信息"
2491
+ }
2492
+ ],
2493
+ "ModifyK8sApiAbnormalRuleStatus": [
2494
+ {
2495
+ "document": "",
2496
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyK8sApiAbnormalRuleStatus\n<公共请求参数>\n\n{\n \"RuleID\": \"dsfsdfee2f4f\",\n \"Status\": true\n}",
2497
+ "output": "{\n \"Response\": {\n \"RequestId\": \"522d7714-ef53-4940-b0ed-46d59a3cf0fd\"\n }\n}",
2498
+ "title": "修改k8sapi异常事件规则状态"
2499
+ }
2500
+ ],
2501
+ "ModifyRaspRules": [
2502
+ {
2503
+ "document": "添加漏洞防御白名单",
2504
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRaspRules\n<公共请求参数>\n\n{\n \"VulVulsIDs\": [\n 105346\n ],\n \"WhiteType\": 1\n}",
2505
+ "output": "{\n \"Response\": {\n \"RequestId\": \"e8ff031f-094b-485d-949f-8b557b4d1b6d\"\n }\n}",
2506
+ "title": "添加漏洞防御白名单"
2507
+ }
2508
+ ],
2509
+ "ModifyReverseShellStatus": [
2510
+ {
2511
+ "document": "",
2512
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyReverseShellStatus\n&EventIdSet.0=\"365456\"\n&Status=EVENT_DEALED\n&Remark=\"删除原因\"\n&<公共请求参数>",
2513
+ "output": "{\n \"Response\": {\n \"RequestId\": \"15cf63db-11a9-4885-b1a3-211dd54b83b7\"\n }\n}",
2514
+ "title": "修改反弹shell事件状态"
2515
+ }
2516
+ ],
2517
+ "ModifyRiskSyscallStatus": [
2518
+ {
2519
+ "document": "",
2520
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyRiskSyscallStatus\n&EventIdSet.0=61c396cb85a03485f10c353e\n&Status=EVENT_INGNORE\n&Remark=备注\n&<公共请求参数>",
2521
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2522
+ "title": "修改高危系统调用事件状态"
2523
+ }
2524
+ ],
2525
+ "ModifySecLogCleanSettingInfo": [
2526
+ {
2527
+ "document": "",
2528
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogCleanSettingInfo\n<公共请求参数>\n\n{\n \"DayLimit\": 180,\n \"ReservesDeadline\": 60,\n \"ReservesLimit\": 80\n}",
2529
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2530
+ "title": "修改安全日志清理设置信息"
2531
+ }
2532
+ ],
2533
+ "ModifySecLogDeliveryClsSetting": [
2534
+ {
2535
+ "document": "",
2536
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogDeliveryClsSetting\n<公共请求参数>\n\n{\n \"List\": [\n {\n \"LogSet\": \"01992e90-8d72-4a4e-b88f-1fd988bfc215\",\n \"LogSetName\": \"audit_k8s\",\n \"LogType\": \"container_launch\",\n \"Region\": \"ap-beijing\",\n \"State\": true,\n \"TopicID\": \"aabb7847-261a-4717-becb-ce37c1689a0a\",\n \"TopicName\": \"audit_container\"\n }\n ]\n}",
2537
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2538
+ "title": "更新安全日志-日志投递cls配置"
2539
+ }
2540
+ ],
2541
+ "ModifySecLogDeliveryKafkaSetting": [
2542
+ {
2543
+ "document": "",
2544
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogDeliveryKafkaSetting\n<公共请求参数>\n\n{\n \"InstanceID\": \"ins_dhsghd\",\n \"InstanceName\": \"xingneng\",\n \"Domain\": \"www.a.com\",\n \"User\": \"root\",\n \"Password\": \"pwd\",\n \"RegionID\": \"ap-beijing\",\n \"LogTypeList\": [\n {\n \"LogType\": \"container_bash\",\n \"TopicID\": \"topicID\",\n \"TopicName\": \"name\",\n \"State\": true\n }\n ]\n}",
2545
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2546
+ "title": "更新安全日志投递kafka设置"
2547
+ }
2548
+ ],
2549
+ "ModifySecLogJoinObjects": [
2550
+ {
2551
+ "document": "修改安全日志接入对象",
2552
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogJoinObjects\n<公共请求参数>\n\n{\n \"LogType\": \"container_bash\",\n \"BindList\": [\n \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\"\n ],\n \"UnBindList\": [],\n \"NodeType\": \"NORMAL\",\n \"RangeType\": 0,\n \"AutoJoin\": false\n}",
2553
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2554
+ "title": "修改安全日志接入对象"
2555
+ }
2556
+ ],
2557
+ "ModifySecLogJoinState": [
2558
+ {
2559
+ "document": "",
2560
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogJoinState\n<公共请求参数>\n\n{\n \"LogType\": \"container_bash\",\n \"State\": true\n}",
2561
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2562
+ "title": "修改安全日志接入状态"
2563
+ }
2564
+ ],
2565
+ "ModifySecLogKafkaUIN": [
2566
+ {
2567
+ "document": "",
2568
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifySecLogKafkaUIN\n<公共请求参数>\n\n{\n \"DstUIN\": \"2684754534\"\n}",
2569
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2570
+ "title": "修改安全日志KafkaUIN"
2571
+ }
2572
+ ],
2573
+ "ModifyVirusAutoIsolateExampleSwitch": [
2574
+ {
2575
+ "document": "",
2576
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusAutoIsolateExampleSwitch\n<公共请求参数>\n\n{\n \"MD5\": \"61d7d84e979212bed18ed9aa8748defa\",\n \"Status\": true\n}",
2577
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2578
+ "title": "修改木马自动隔离样本开关"
2579
+ }
2580
+ ],
2581
+ "ModifyVirusAutoIsolateSetting": [
2582
+ {
2583
+ "document": "修改木马自动隔离设置",
2584
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusAutoIsolateSetting\n<公共请求参数>\n\n{\n \"AutoIsolateSwitch\": true,\n \"IsKillProgress\": true\n}",
2585
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2586
+ "title": "修改木马自动隔离设置"
2587
+ }
2588
+ ],
2589
+ "ModifyVirusFileStatus": [
2590
+ {
2591
+ "document": "",
2592
+ "input": "https://tcss.tencentcloudapi.com/?Action=ModifyVirusFileStatus\n&EventIdSet.0=12afdwasfdasfds\n&Status=EVENT_ADD_WHITE\n&Remark=加白\n&<公共请求参数>",
2593
+ "output": "{\n \"Response\": {\n \"RequestId\": \"safdswwasafd\"\n }\n}",
2594
+ "title": "运行时更新木马文件事件状态"
2595
+ }
2596
+ ],
2597
+ "ModifyVirusMonitorSetting": [
2598
+ {
2599
+ "document": "运行时更新文件查杀实时监控设置",
2600
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusMonitorSetting\n<公共请求参数>\n\n{\n \"EnableScan\": true,\n \"ScanPathType\": 1,\n \"ScanPathAll\": true,\n \"ScanPathMode\": \"SCAN_PATH_DEFAULT\",\n \"ScanPath\": []\n}",
2601
+ "output": "{\n \"Response\": {\n \"RequestId\": \"b9cd345d-9d88-4e3b-86b6-e0e5c971731a\"\n }\n}",
2602
+ "title": "运行时更新文件查杀实时监控设置"
2603
+ }
2604
+ ],
2605
+ "ModifyVirusScanSetting": [
2606
+ {
2607
+ "document": "运行时更新文件查杀设置",
2608
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusScanSetting\n<公共请求参数>\n\n{\n \"Timeout\": 5,\n \"BeginScanAt\": \"10:59:00\",\n \"Cycle\": 1,\n \"ScanPath\": [\n \"/tmp\"\n ],\n \"ScanPathAll\": false,\n \"ScanRangeAll\": false,\n \"EnableScan\": true,\n \"ScanIds\": [\n \"ad297b24a4f818d9da49c9bec10d54c179b6751fc362802b077f710b3638e0f0\"\n ],\n \"ScanPathType\": 0,\n \"ScanRangeType\": 0\n}",
2609
+ "output": "{\n \"Response\": {\n \"RequestId\": \"b9cd345d-9d88-4e3b-86b6-e0e5c971731a\"\n }\n}",
2610
+ "title": "运行时更新文件查杀设置"
2611
+ }
2612
+ ],
2613
+ "ModifyVirusScanTimeoutSetting": [
2614
+ {
2615
+ "document": "",
2616
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVirusScanTimeoutSetting\n<公共请求参数>\n\n{\n \"Timeout\": 1,\n \"ScanType\": 0\n}",
2617
+ "output": "{\n \"Response\": {\n \"RequestId\": \"33ec689a-e026-4700-8dc4-b559b97f0667\"\n }\n}",
2618
+ "title": "运行时文件扫描超时设置"
2619
+ }
2620
+ ],
2621
+ "ModifyVulDefenceEventStatus": [
2622
+ {
2623
+ "document": "",
2624
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVulDefenceEventStatus\n<公共请求参数>\n\n{\n \"Status\": \"EVENT_DEALED\",\n \"EventIDs\": [\n \"1\"\n ],\n \"Remark\": \"remark content\"\n}",
2625
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2626
+ "title": "修改漏洞防御事件状态"
2627
+ }
2628
+ ],
2629
+ "ModifyVulDefenceSetting": [
2630
+ {
2631
+ "document": "编辑漏洞防御设置",
2632
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyVulDefenceSetting\n<公共请求参数>\n\n{\n \"Scope\": \"1\",\n \"IsEnabled\": \"1\"\n}",
2633
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\"\n }\n}",
2634
+ "title": "编辑漏洞防御设置"
2635
+ }
2636
+ ],
2637
+ "OpenTcssTrial": [
2638
+ {
2639
+ "document": "",
2640
+ "input": "https://tcss.tencentcloudapi.com/?Action=OpenTcssTrial\n&<公共请求参数>",
2641
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\n \"EndTime\": \"2022-11-22 00:00:00\",\n \"StartTime\": \"2024-10-30 10:01:11\"\n }\n}",
2642
+ "title": "开通容器安全服务试用"
2643
+ }
2644
+ ],
2645
+ "RemoveAssetImageRegistryRegistryDetail": [
2646
+ {
2647
+ "document": "",
2648
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: RemoveAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"RegistryId\": \"1\"\n}",
2649
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2650
+ "title": "删除单个镜像仓库详细信息"
2651
+ }
2652
+ ],
2653
+ "RenewImageAuthorizeState": [
2654
+ {
2655
+ "document": "",
2656
+ "input": "https://tcss.tencentcloudapi.com/?Action=RenewImageAuthorizeState\n&AllImages=false\n&ImageIds.0=test-image-id\n&<公共请求参数>",
2657
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2658
+ "title": "授权镜像扫描"
2659
+ }
2660
+ ],
2661
+ "ResetSecLogTopicConfig": [
2662
+ {
2663
+ "document": "",
2664
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ResetSecLogTopicConfig\n<公共请求参数>\n\n{\n \"ConfigType\": \"ckafka\",\n \"LogType\": \"k8s_api\"\n}",
2665
+ "output": "{\n \"Response\": {\n \"RequestId\": \"29b37d86-f63d-43d1-b21a-640e82965198\"\n }\n}",
2666
+ "title": "重置安全日志主题设置"
2667
+ }
2668
+ ],
2669
+ "ScanComplianceAssets": [
2670
+ {
2671
+ "document": "",
2672
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 111,\n 456,\n 789\n ]\n}",
2673
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
2674
+ "title": "重新扫描指定的资产"
2675
+ },
2676
+ {
2677
+ "document": "检测资产",
2678
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 2202462\n ],\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
2679
+ "output": "{\n \"Response\": {\n \"RequestId\": \"c8dda80e-f4bc-4a3a-a165-b81e4e4c9cb2\",\n \"TaskId\": 2535\n }\n}",
2680
+ "title": "检测资产"
2681
+ }
2682
+ ],
2683
+ "ScanComplianceAssetsByPolicyItem": [
2684
+ {
2685
+ "document": "",
2686
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceAssetsByPolicyItem\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 10001,\n \"CustomerAssetIdSet\": [\n 111,\n 456,\n 789\n ]\n}",
2687
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
2688
+ "title": "用指定的检测项重新检测选定的资产"
2689
+ },
2690
+ {
2691
+ "document": "检测策略下资产",
2692
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceAssetsByPolicyItem\n<公共请求参数>\n\n{\n \"CustomerPolicyItemId\": 2798,\n \"CustomerAssetIdSet\": [\n 2202462\n ],\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
2693
+ "output": "{\n \"Response\": {\n \"RequestId\": \"1f25995a-d6f2-4b3d-aea5-719288998970\",\n \"TaskId\": 2540\n }\n}",
2694
+ "title": "检测策略下资产"
2695
+ }
2696
+ ],
2697
+ "ScanCompliancePolicyItems": [
2698
+ {
2699
+ "document": "",
2700
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanCompliancePolicyItems\n<公共请求参数>\n\n{\n \"CustomerPolicyItemIdSet\": [\n 111,\n 456,\n 789\n ]\n}",
2701
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
2702
+ "title": "重新检测选定的检测项"
2703
+ }
2704
+ ],
2705
+ "ScanComplianceScanFailedAssets": [
2706
+ {
2707
+ "document": "",
2708
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceScanFailedAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 1002\n ]\n}",
2709
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\",\n \"TaskId\": 1001\n }\n}",
2710
+ "title": "重新检测上次检测失败的资产"
2711
+ },
2712
+ {
2713
+ "document": "再次扫描失败资产",
2714
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ScanComplianceScanFailedAssets\n<公共请求参数>\n\n{\n \"CustomerAssetIdSet\": [\n 2202462\n ],\n \"AssetType\": \"ASSET_CONTAINER\"\n}",
2715
+ "output": "{\n \"Response\": {\n \"RequestId\": \"03546211-26e8-47d0-92f4-ed8250df32c5\",\n \"TaskId\": 2538\n }\n}",
2716
+ "title": "再次扫描失败资产"
2717
+ }
2718
+ ],
2719
+ "SetCheckMode": [
2720
+ {
2721
+ "document": "",
2722
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SetCheckMode\n<公共请求参数>\n\n{\n \"ClusterAutoCheck\": \"1\",\n \"ClusterIds\": [\n \"cls-0zmsjvko\"\n ]\n}",
2723
+ "output": "{\n \"Response\": {\n \"RequestId\": \"4ec127f1-0a8f-4f44-857f-46290bfe23e7\",\n \"SetCheckResult\": \"Succ\"\n }\n}",
2724
+ "title": "设置检测模式和自动检查示例"
2725
+ }
2726
+ ],
2727
+ "StopVirusScanTask": [
2728
+ {
2729
+ "document": "",
2730
+ "input": "https://tcss.tencentcloudapi.com/?Action=StopVirusScanTask\n&TaskId=task-id\n&<公共请求参数>",
2731
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2732
+ "title": "运行时停止木马查杀任务"
2733
+ }
2734
+ ],
2735
+ "StopVulScanTask": [
2736
+ {
2737
+ "document": "",
2738
+ "input": "https://tcss.tencentcloudapi.com/?Action=StopVulScanTask\n&LocalTaskID=1\n&RegistryTaskID=1\n&<公共请求参数>",
2739
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8a64a4f9-864c-49c6-adcb-21b483de477a\"\n }\n}",
2740
+ "title": "停止漏洞扫描任务"
2741
+ }
2742
+ ],
2743
+ "SwitchImageAutoAuthorizedRule": [
2744
+ {
2745
+ "document": "",
2746
+ "input": "https://tcss.tencentcloudapi.com/?Action=SwitchImageAutoAuthorizedRule\n&IsEnabled=1\n&RuleId=1\n\n&<公共请求参数>",
2747
+ "output": "{\n \"Response\": {\n \"RequestId\": \"8bc803fd-d85d-47b8-9e2b-9644674be677\"\n }\n}",
2748
+ "title": "编辑本地镜像自动授权开关"
2749
+ }
2750
+ ],
2751
+ "SyncAssetImageRegistryAsset": [
2752
+ {
2753
+ "document": "",
2754
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SyncAssetImageRegistryAsset\n<公共请求参数>\n\n{\n \"All\": false,\n \"RegistryIds\": [\n 29115\n ]\n}",
2755
+ "output": "{\n \"Response\": {\n \"RequestId\": \"33ec689a-e026-4700-8dc4-b559b97f0667\"\n }\n}",
2756
+ "title": "镜像仓库资产刷新"
2757
+ }
2758
+ ],
2759
+ "UpdateAndPublishNetworkFirewallPolicyDetail": [
2760
+ {
2761
+ "document": "",
2762
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Direction\": \"FROM\",\n \"Ports\": [\n {\n \"Protocol\": \"TCP\",\n \"Port\": \"80\"\n }\n ],\n \"Peer\": [\n {\n \"NamespaceSelector\": \"default\",\n \"PeerType\": \"NamespaceSelector \",\n \"PodSelector\": \"default \",\n \"IPBlock\": \"0.0.0.0/24\"\n }\n ]\n }\n ],\n \"Description\": \"Description\",\n \"ClusterId\": \"cls-cluster-id\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
2763
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2764
+ "title": "容器网络创建网络策略更新并发布任务示例"
2765
+ }
2766
+ ],
2767
+ "UpdateAndPublishNetworkFirewallPolicyYamlDetail": [
2768
+ {
2769
+ "document": "",
2770
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAndPublishNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"desc\",\n \"ClusterId\": \"cls-dff**\",\n \"Id\": 1,\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
2771
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2772
+ "title": "容器网络更新Yaml网络策略并发布任务任务示例"
2773
+ }
2774
+ ],
2775
+ "UpdateAssetImageRegistryRegistryDetail": [
2776
+ {
2777
+ "document": "更新单个镜像仓库详细信息",
2778
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateAssetImageRegistryRegistryDetail\n<公共请求参数>\n\n{\n \"Name\": \"private_aws\",\n \"Username\": \"name01\",\n \"Password\": \"password\",\n \"Url\": \"https://dkr.ecr.us-east-119.amazonaws.com\",\n \"RegistryType\": \"aws\",\n \"RegistryVersion\": \"V1\",\n \"NetType\": \"public\",\n \"RegistryRegion\": \"default\",\n \"SpeedLimit\": 0,\n \"Insecure\": 0,\n \"ConnDetectConfig\": [\n {\n \"Quuid\": \"5a540076-d38a-4078-aa98-e7c86371d322\",\n \"Uuid\": \"5a540076-d38a-4078-aa98-e7c86371d322\"\n }\n ]\n}",
2779
+ "output": "{\n \"Response\": {\n \"HealthCheckErr\": \"connect refused\",\n \"NameRepeatErr\": \"connect refused\",\n \"RegistryId\": 29113,\n \"RequestId\": \"47d03bf3-6ea3-4e79-a7f0-70eae99717bc\"\n }\n}",
2780
+ "title": "更新单个镜像仓库详细信息"
2781
+ }
2782
+ ],
2783
+ "UpdateImageRegistryTimingScanTask": [
2784
+ {
2785
+ "document": "扫描全部已授权的最新版本镜像,扫描类型:漏洞",
2786
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateImageRegistryTimingScanTask\n<公共请求参数>\n\n{\n \"Enable\": true,\n \"ScanPeriod\": 1,\n \"ScanTime\": \"18:10\",\n \"ScanEndTime\": \"20:00\",\n \"ScanScope\": 2,\n \"ContainerRunning\": false,\n \"Id\": [],\n \"Namespace\": [\n \"tke-images\"\n ],\n \"RegistryType\": [\n \"ccr\"\n ],\n \"Latest\": true,\n \"ScanType\": [\n \"CVE\",\n \"VIRUS\",\n \"RISK\"\n ],\n \"ExcludeImageAssetIds\": []\n}",
2787
+ "output": "{\n \"Response\": {\n \"RequestId\": \"5f2acb2d-2775-4ef4-8230-03df2762b1d1\"\n }\n}",
2788
+ "title": "定时扫描-扫描全部已授权的最新版本镜像"
2789
+ }
2790
+ ],
2791
+ "UpdateNetworkFirewallPolicyDetail": [
2792
+ {
2793
+ "document": "",
2794
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyDetail\n<公共请求参数>\n\n{\n \"Id\": 22,\n \"CustomPolicy\": [\n {\n \"Peer\": [],\n \"Direction\": \"FROM\",\n \"Ports\": []\n }\n ],\n \"Description\": \"just for develop\",\n \"ClusterId\": \"cls-sdfdsf\",\n \"FromPolicyRule\": 0,\n \"Namespace\": \"default\",\n \"ToPolicyRule\": 0,\n \"PodSelector\": \"a=b\"\n}",
2795
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2796
+ "title": "容器网络创建网络策略更新任务示例"
2797
+ }
2798
+ ],
2799
+ "UpdateNetworkFirewallPolicyYamlDetail": [
2800
+ {
2801
+ "document": "",
2802
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UpdateNetworkFirewallPolicyYamlDetail\n<公共请求参数>\n\n{\n \"Description\": \"desc\",\n \"ClusterId\": \"cls-67898\",\n \"Id\": 1,\n \"Yaml\": \"YXNkZmFzZGZhZHNmYXNkZmFzZGY=\"\n}",
2803
+ "output": "{\n \"Response\": {\n \"RequestId\": \"345da107-dfdf-48f0-9796-e6723bdc102e\",\n \"TaskId\": 32501,\n \"Result\": \"Succ\"\n }\n}",
2804
+ "title": "容器网络更新Yaml网络策略任务示例"
2805
+ }
2806
+ ]
2807
+ },
2808
+ "version": "1.0"
2809
+ }