tccli 3.0.1326.1__py2.py3-none-any.whl → 3.0.1328.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (70) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/ams/v20201229/api.json +9 -9
  3. tccli/services/apm/v20210622/api.json +10 -1
  4. tccli/services/apm/v20210622/examples.json +2 -2
  5. tccli/services/bh/v20230418/api.json +9 -0
  6. tccli/services/cbs/v20170312/api.json +2 -2
  7. tccli/services/cdb/v20170320/api.json +30 -12
  8. tccli/services/cdc/v20201214/api.json +5 -5
  9. tccli/services/cfs/v20190719/api.json +4 -4
  10. tccli/services/chc/chc_client.py +53 -0
  11. tccli/services/chc/v20230418/api.json +62 -0
  12. tccli/services/chc/v20230418/examples.json +8 -0
  13. tccli/services/clb/clb_client.py +53 -0
  14. tccli/services/clb/v20180317/api.json +100 -0
  15. tccli/services/clb/v20180317/examples.json +8 -0
  16. tccli/services/cvm/v20170312/api.json +2 -2
  17. tccli/services/cwp/v20180228/api.json +92 -1
  18. tccli/services/dbbrain/v20210527/api.json +4 -4
  19. tccli/services/dcdb/v20180411/examples.json +1 -1
  20. tccli/services/dts/v20211206/api.json +3 -3
  21. tccli/services/emr/v20190103/api.json +193 -9
  22. tccli/services/ess/ess_client.py +126 -20
  23. tccli/services/ess/v20201111/api.json +135 -1
  24. tccli/services/ess/v20201111/examples.json +22 -0
  25. tccli/services/essbasic/v20210526/api.json +1 -1
  26. tccli/services/gs/gs_client.py +836 -147
  27. tccli/services/gs/v20191118/api.json +964 -28
  28. tccli/services/gs/v20191118/examples.json +106 -2
  29. tccli/services/iotexplorer/v20190423/api.json +5 -5
  30. tccli/services/iotexplorer/v20190423/examples.json +1 -1
  31. tccli/services/lowcode/v20210108/api.json +60 -0
  32. tccli/services/mariadb/v20170312/api.json +10 -10
  33. tccli/services/monitor/monitor_client.py +117 -11
  34. tccli/services/monitor/v20180724/api.json +151 -0
  35. tccli/services/monitor/v20180724/examples.json +16 -0
  36. tccli/services/mrs/v20200910/api.json +1 -1
  37. tccli/services/oceanus/v20190422/api.json +15 -5
  38. tccli/services/oceanus/v20190422/examples.json +8 -2
  39. tccli/services/ocr/v20181119/api.json +74 -9
  40. tccli/services/partners/v20180321/api.json +7 -7
  41. tccli/services/privatedns/privatedns_client.py +53 -0
  42. tccli/services/privatedns/v20201028/api.json +179 -0
  43. tccli/services/privatedns/v20201028/examples.json +8 -0
  44. tccli/services/tcss/v20201101/api.json +248 -35
  45. tccli/services/tcss/v20201101/examples.json +8 -8
  46. tccli/services/tem/tem_client.py +53 -0
  47. tccli/services/tem/v20210701/api.json +107 -0
  48. tccli/services/tem/v20210701/examples.json +8 -0
  49. tccli/services/teo/v20220901/api.json +807 -74
  50. tccli/services/teo/v20220901/examples.json +2 -2
  51. tccli/services/tms/v20201229/api.json +2 -2
  52. tccli/services/tms/v20201229/examples.json +1 -1
  53. tccli/services/trtc/v20190722/api.json +2 -2
  54. tccli/services/vclm/v20240523/api.json +173 -0
  55. tccli/services/vclm/v20240523/examples.json +16 -0
  56. tccli/services/vclm/vclm_client.py +106 -0
  57. tccli/services/vm/v20210922/api.json +13 -13
  58. tccli/services/vm/v20210922/examples.json +2 -2
  59. tccli/services/vod/v20180717/api.json +13 -11
  60. tccli/services/vod/v20180717/examples.json +4 -4
  61. tccli/services/vpc/v20170312/api.json +12 -3
  62. tccli/services/waf/v20180125/api.json +2 -2
  63. tccli/services/wedata/v20210820/api.json +952 -0
  64. tccli/services/wedata/v20210820/examples.json +8 -0
  65. tccli/services/wedata/wedata_client.py +53 -0
  66. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/METADATA +2 -2
  67. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/RECORD +70 -70
  68. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/WHEEL +0 -0
  69. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/entry_points.txt +0 -0
  70. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/license_files/LICENSE +0 -0
@@ -4111,6 +4111,15 @@
4111
4111
  "name": "WebhookToken",
4112
4112
  "required": false,
4113
4113
  "type": "string"
4114
+ },
4115
+ {
4116
+ "disabled": false,
4117
+ "document": "tcr实例ID",
4118
+ "example": "tcr-xxx",
4119
+ "member": "string",
4120
+ "name": "InstanceId",
4121
+ "required": false,
4122
+ "type": "string"
4114
4123
  }
4115
4124
  ],
4116
4125
  "type": "object"
@@ -6237,6 +6246,16 @@
6237
6246
  "output_required": false,
6238
6247
  "type": "string",
6239
6248
  "value_allowed_null": false
6249
+ },
6250
+ {
6251
+ "disabled": false,
6252
+ "document": "所有者名称",
6253
+ "example": "fx-qi",
6254
+ "member": "string",
6255
+ "name": "OwnerName",
6256
+ "output_required": false,
6257
+ "type": "string",
6258
+ "value_allowed_null": false
6240
6259
  }
6241
6260
  ],
6242
6261
  "usage": "out"
@@ -12108,6 +12127,24 @@
12108
12127
  "name": "Uuid",
12109
12128
  "required": true,
12110
12129
  "type": "string"
12130
+ },
12131
+ {
12132
+ "disabled": false,
12133
+ "document": "超级节点唯一id",
12134
+ "example": "[\"7c9e719e-6236-bbbb-aaaa-20c9b9a1f6b1\"]",
12135
+ "member": "string",
12136
+ "name": "NodeUniqueIds",
12137
+ "required": false,
12138
+ "type": "list"
12139
+ },
12140
+ {
12141
+ "disabled": false,
12142
+ "document": "uuid列表",
12143
+ "example": "[\"7c9e719e-6236-bbbb-aaaa-20c9b9a1f6b1\"]",
12144
+ "member": "string",
12145
+ "name": "UUIDs",
12146
+ "required": false,
12147
+ "type": "list"
12111
12148
  }
12112
12149
  ],
12113
12150
  "type": "object"
@@ -12400,7 +12437,7 @@
12400
12437
  {
12401
12438
  "disabled": false,
12402
12439
  "document": "事件基本信息",
12403
- "example": "{ \"ClientIP\": \"106.55.163.***\", \"ClusterID\": \"cls-13nfdn****\", \"ClusterName\": \"demo-dev\", \"ContainerId\": \"1***5fe59dbd61071f16d6165480d381********\", \"ContainerIsolateOperationSrc\": \"system\", \"ContainerName\": \"/adoring_ishizaka\", \"ContainerNetStatus\": \"NORMAL\", \"ContainerNetSubStatus\": \"NONE\", \"EventCount\": 2, \"EventId\": \"10302329\", \"EventName\": \"异常进程事件-告警\", \"EventType\": \"FILE_ABNORMAL_READ\", \"FoundTime\": \"2024-10-21 15:55:45\", \"HostID\": \"1414-18a1-4775-9e3f-cdfc898********\", \"HostIP\": \"172.16.0.34\", \"ImageId\": \"sha256:1413413431fd9255658c128086395d3********\", \"ImageName\": \"alpine:latest\", \"LatestFoundTime\": \"2024-10-21 20:57:12\", \"Namespace\": \"default\", \"NodeID\": \"d41d8cd98f00******\", \"NodeName\": \"d41d8cd98f00*****\", \"NodeSubNetCIDR\": \"fe80::8132:1b51:52******\", \"NodeSubNetID\": \"sub-fn4nf***\", \"NodeSubNetName\": \"dev\", \"NodeType\": \"NORMAL\", \"NodeUniqueID\": \"fe8dfjf2d2****\", \"PodIP\": \"1.1.1.1\", \"PodName\": \"pod-dev\", \"PodStatus\": \"RUNNING\", \"Status\": \"EVENT_DEALED\", \"WorkloadType\": \"StatefulSet\" }",
12440
+ "example": "",
12404
12441
  "member": "RunTimeEventBaseInfo",
12405
12442
  "name": "EventBaseInfo",
12406
12443
  "output_required": true,
@@ -12420,7 +12457,7 @@
12420
12457
  {
12421
12458
  "disabled": false,
12422
12459
  "document": "父进程信息",
12423
- "example": "{ \"ProcessId\": 330852, \"ProcessName\": \"containerd-shim\", \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\", \"ProcessPath\": \"/usr/bin/containerd-shim\", \"ProcessStartUser\": \"root\", \"ProcessUserGroup\": \"root\" }",
12460
+ "example": "",
12424
12461
  "member": "ProcessDetailBaseInfo",
12425
12462
  "name": "ParentProcessInfo",
12426
12463
  "output_required": true,
@@ -12430,7 +12467,7 @@
12430
12467
  {
12431
12468
  "disabled": false,
12432
12469
  "document": "事件描述",
12433
- "example": "{ \"Description\": \"检测到疑似反弹shell命令执行\", \"GroupName\": \"SYSTEM_DEFINED_RULE\", \"MatchRule\": { \"ProcessPath\": \"/usr/bin\", \"RuleId\": \"100000000000000000000004\", \"RuleLevel\": \"HIGH\", \"RuleMode\": \"RULE_MODE_ALERT\" }, \"OperationTime\": \"2024-10-23 17:38:12\", \"Remark\": \"for dev\", \"RuleId\": \"124\", \"RuleName\": \"REVERSE_SHELL\", \"Solution\": \"排查反弹shell行为及目标地址是否为业务正常需要\" }",
12470
+ "example": "",
12434
12471
  "member": "AbnormalProcessEventDescription",
12435
12472
  "name": "EventDetail",
12436
12473
  "output_required": true,
@@ -12800,7 +12837,7 @@
12800
12837
  {
12801
12838
  "disabled": false,
12802
12839
  "document": "事件基本信息",
12803
- "example": " \"EventBaseInfo\": { \"ClientIP\": \"175.178.**.**\", \"ClusterID\": \"cls-demo1\", \"ClusterName\": \"web-demo\", \"ContainerId\": \"75D3326A-9B9C-4275-895A-16FDA1*****\", \"ContainerIsolateOperationSrc\": \"\", \"ContainerName\": \"/k8s_xenon_mysql-tce-cwp-mysql-2_sso_c9fdfba4-e31a-46bc-a43a-****\", \"ContainerNetStatus\": \"NORMAL\", \"ContainerNetSubStatus\": \"NONE\", \"EventCount\": 130, \"EventId\": \"5124493\", \"EventName\": \"高危系统调用\", \"EventType\": \"RISK_SYSCALL_EVENT_TYPE\", \"FoundTime\": \"2024-10-23 00:05:17\", \"HostID\": \"11141114-66fd-4171-93eb-2f4fc36ef1e1\", \"HostIP\": \"10.0.0.105\", \"ImageId\": \"sha256:11141114e95dce36e8455cf657e1e54d74bb8fac6111411141114\", \"ImageName\": \"registry.tce.com/service-vendors/mysql-xenon:8.0.32-20240524-155426-11141114.rhel.amd64\", \"LatestFoundTime\": \"2024-10-23 17:02:47\", \"Namespace\": \"default\", \"NodeID\": \"pod-dj4xjf***\", \"NodeName\": \"tcs-10-0-0-105\", \"NodeSubNetCIDR\": \"fe80::8132:1b51:5********\", \"NodeSubNetID\": \"subnet-dfj4***\", \"NodeSubNetName\": \"default\", \"NodeType\": \"NORMAL\", \"NodeUniqueID\": \"node-4jfjfgdnvnd****\", \"PodIP\": \"10.0.0.11\", \"PodName\": \"demonset\", \"PodStatus\": \"running\", \"Status\": \"EVENT_UNDEAL\", \"WorkloadType\": \"StatefulSet\" }",
12840
+ "example": "",
12804
12841
  "member": "RunTimeEventBaseInfo",
12805
12842
  "name": "EventBaseInfo",
12806
12843
  "output_required": true,
@@ -12810,7 +12847,7 @@
12810
12847
  {
12811
12848
  "disabled": false,
12812
12849
  "document": "进程信息",
12813
- "example": "{ \"ProcessAuthority\": \"-rwxr-xr-x\", \"ProcessId\": 2907621, \"ProcessMd5\": \"8a5772dee965c8223aebc1225e*****\", \"ProcessName\": \"xenoncli\", \"ProcessParam\": \"xenoncli xenon ping\", \"ProcessPath\": \"/usr/local/bin/xenoncli\", \"ProcessStartUser\": \"root\", \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\", \"ProcessUserGroup\": \"0\" }",
12850
+ "example": "",
12814
12851
  "member": "ProcessDetailInfo",
12815
12852
  "name": "ProcessInfo",
12816
12853
  "output_required": true,
@@ -12820,7 +12857,7 @@
12820
12857
  {
12821
12858
  "disabled": false,
12822
12859
  "document": "被篡改信息",
12823
- "example": "{ \"FileCreateTime\": \"2024-10-11 11:02:58\", \"FileDiff\": \"UNKNOW\", \"FileName\": \"pwnkit.so:.\", \"FilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\", \"FileSize\": 24, \"FileType\": \"UNKNOWN\", \"LatestTamperedFileMTime\": \"2024-10-11 11:02:58\", \"NewFile\": \"default.txt\" }",
12860
+ "example": "",
12824
12861
  "member": "FileAttributeInfo",
12825
12862
  "name": "TamperedFileInfo",
12826
12863
  "output_required": true,
@@ -12830,7 +12867,7 @@
12830
12867
  {
12831
12868
  "disabled": false,
12832
12869
  "document": "事件描述",
12833
- "example": "{ \"Description\": \"检测到系统命令被篡改\", \"MatchRule\": { \"ProcessPath\": \"/home/yunjing_testing_x86/events_trigger_x86\", \"RuleId\": \"200000000000000000000002\", \"RuleMode\": \"RULE_MODE_ALERT\", \"TargetFilePath\": \"/home/yunjing_testing_x86/GCONV_PATH=./pwnkit.so:.\" }, \"OperationTime\": \"1970-01-01 00:00:01\", \"Remark\": \"demoset\", \"RuleId\": \"222222222222222222222222\", \"RuleName\": \"系统策略\", \"Solution\": \"排查是否为正常业务需要的系统命令替换\" }",
12870
+ "example": "",
12834
12871
  "member": "AccessControlEventDescription",
12835
12872
  "name": "EventDetail",
12836
12873
  "output_required": true,
@@ -12840,7 +12877,7 @@
12840
12877
  {
12841
12878
  "disabled": false,
12842
12879
  "document": "父进程信息",
12843
- "example": "{ \"ProcessId\": 330852, \"ProcessName\": \"containerd-shim\", \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\", \"ProcessPath\": \"/usr/bin/containerd-shim\", \"ProcessStartUser\": \"root\", \"ProcessUserGroup\": \"root\" }",
12880
+ "example": "",
12844
12881
  "member": "ProcessBaseInfo",
12845
12882
  "name": "ParentProcessInfo",
12846
12883
  "output_required": true,
@@ -12850,7 +12887,7 @@
12850
12887
  {
12851
12888
  "disabled": false,
12852
12889
  "document": "祖先进程信息",
12853
- "example": "{ \"ProcessParam\": \"/usr/bin/containerd-shim-runc-v2 -namespace moby -address /run/containerd/containerd.sock\", \"ProcessPath\": \"/usr/bin/containerd-shim-runc-v2\", \"ProcessStartUser\": \"0\", \"ProcessUserGroup\": \"0\" }",
12890
+ "example": "",
12854
12891
  "member": "ProcessBaseInfo",
12855
12892
  "name": "AncestorProcessInfo",
12856
12893
  "output_required": true,
@@ -13025,13 +13062,33 @@
13025
13062
  {
13026
13063
  "disabled": false,
13027
13064
  "document": "访问控制事件数组",
13028
- "example": "[ { \"Behavior\": \"BEHAVIOR_ALERT\", \"ClusterID\": \"cls-fdj4****\", \"ClusterName\": \"demoset\", \"ContainerId\": \"a41351f3384159740167f25d83fcb206ffa154ab31d50c6594580ca6bac0b2cf\", \"ContainerIsolateOperationSrc\": \"system\", \"ContainerName\": \"container1\", \"ContainerNetStatus\": \"NORMAL\", \"ContainerNetSubStatus\": \"NONE\", \"ContainerStatus\": \"STOPPED\", \"Description\": \"检测到系统计划任务被修改\", \"EventCount\": 10012, \"EventType\": \"NORMAL\", \"FileName\": \"cron.update\", \"FilePath\": \"/etc/crontabs/cron.update\", \"FoundTime\": \"2020-10-29 18:11:10\", \"HostID\": \"f5a89f72-aaad-bbbc-cccc-eb3b3b74c2f0\", \"HostIP\": \"10.86.68.35\", \"Id\": \"4904016\", \"ImageId\": \"sha256:3926aaa0fe2ece5cbe51aaaf242b074c211beb8e046c9d4db4959c220be0171f\", \"ImageName\": \"iamge1\", \"LatestFoundTime\": \"2020-10-29 18:11:10\", \"MatchAction\": \"RULE_MODE_ALERT\", \"MatchFilePath\": \"/etc/crontabs/cron.update\", \"MatchProcessPath\": \"/bin/busybox\", \"MatchRuleId\": \"200000000000000000000001\", \"MatchRuleName\": \"系统策略\", \"NodeID\": \"8a5772dee965c8223aebc*****\", \"NodeName\": \"host1\", \"NodeType\": \"NORMAL\", \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\", \"PodIP\": \"10.0.0.11\", \"PodName\": \"demoset\", \"ProcessName\": \"/bin/busybox\", \"PublicIP\": \"1.1.1.1\", \"RuleExist\": true, \"RuleId\": \"222222222222222222222222\", \"Solution\": \"排查是否为正常业务需要的计划任务修改\", \"Status\": \"EVENT_UNDEAL\" } ]",
13065
+ "example": "",
13029
13066
  "member": "AccessControlEventInfo",
13030
13067
  "name": "EventSet",
13031
13068
  "output_required": true,
13032
13069
  "type": "list",
13033
13070
  "value_allowed_null": false
13034
13071
  },
13072
+ {
13073
+ "disabled": false,
13074
+ "document": "支持的内核版本",
13075
+ "example": "4.15.0-142-|4.18.0-80|4.18.0-193.28.1*|5.4.0-77-*|5.4.119.19.009.56",
13076
+ "member": "string",
13077
+ "name": "SupportCoreVersion",
13078
+ "output_required": false,
13079
+ "type": "string",
13080
+ "value_allowed_null": false
13081
+ },
13082
+ {
13083
+ "disabled": false,
13084
+ "document": "拦截失败可能的原因",
13085
+ "example": "非读写操作暂未支持拦截,如新建/重命名等,touch/mv 等操作。",
13086
+ "member": "string",
13087
+ "name": "InterceptionFailureTip",
13088
+ "output_required": false,
13089
+ "type": "string",
13090
+ "value_allowed_null": false
13091
+ },
13035
13092
  {
13036
13093
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
13037
13094
  "member": "string",
@@ -15841,7 +15898,7 @@
15841
15898
  "example": "[\"Instance****\"]",
15842
15899
  "member": "string",
15843
15900
  "name": "ExportField",
15844
- "required": true,
15901
+ "required": false,
15845
15902
  "type": "list"
15846
15903
  },
15847
15904
  {
@@ -15914,6 +15971,16 @@
15914
15971
  "type": "string",
15915
15972
  "value_allowed_null": false
15916
15973
  },
15974
+ {
15975
+ "disabled": false,
15976
+ "document": "导出任务id",
15977
+ "example": "1012",
15978
+ "member": "string",
15979
+ "name": "JobId",
15980
+ "output_required": true,
15981
+ "type": "string",
15982
+ "value_allowed_null": false
15983
+ },
15917
15984
  {
15918
15985
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
15919
15986
  "member": "string",
@@ -16657,7 +16724,7 @@
16657
16724
  "example": "[Name]",
16658
16725
  "member": "string",
16659
16726
  "name": "ExportField",
16660
- "required": true,
16727
+ "required": false,
16661
16728
  "type": "list"
16662
16729
  },
16663
16730
  {
@@ -16714,13 +16781,23 @@
16714
16781
  {
16715
16782
  "disabled": false,
16716
16783
  "document": "excel文件下载地址",
16717
- "example": "https://cwp-1258344699.cos.ap-guangzhou.myqcloud.com/ImageVirusListExport-1256299843-241101101930.csv?q-sign-algorithm=sha1&q-ak=AKID******&q-sign-time=1730427570%3B1730434770&q-key-time=1730427570%3B1730434770&q-header-list=host&q-url-param-list=&q-signature=ca98fa9ee18dd70c8ff947683262f155452b5f66",
16784
+ "example": "https://cwp-12583446xx.xxx",
16718
16785
  "member": "string",
16719
16786
  "name": "DownloadUrl",
16720
16787
  "output_required": true,
16721
16788
  "type": "string",
16722
16789
  "value_allowed_null": false
16723
16790
  },
16791
+ {
16792
+ "disabled": false,
16793
+ "document": "导出任务id",
16794
+ "example": "1012",
16795
+ "member": "string",
16796
+ "name": "JobId",
16797
+ "output_required": true,
16798
+ "type": "string",
16799
+ "value_allowed_null": false
16800
+ },
16724
16801
  {
16725
16802
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
16726
16803
  "member": "string",
@@ -16822,7 +16899,7 @@
16822
16899
  "example": "[\"CVEId\"]",
16823
16900
  "member": "string",
16824
16901
  "name": "ExportField",
16825
- "required": true,
16902
+ "required": false,
16826
16903
  "type": "list"
16827
16904
  },
16828
16905
  {
@@ -16879,13 +16956,23 @@
16879
16956
  {
16880
16957
  "disabled": false,
16881
16958
  "document": "excel文件下载地址",
16882
- "example": "https://cwp-1258344699.cos.ap-guangzhou.myqcloud.com/RegistryImageList-1256299843-241101101931.csv?q-sign-algorithm=sha1&q-ak=AKID******&q-sign-time=1730427571%3B1730434771&q-key-time=1730427571%3B1730434771&q-header-list=host&q-url-param-list=&q-signature=1ad96620c6cf3c64de52962c33032c3ef3300e5b",
16959
+ "example": "https://cwp-12583446xx.xxx",
16883
16960
  "member": "string",
16884
16961
  "name": "DownloadUrl",
16885
16962
  "output_required": true,
16886
16963
  "type": "string",
16887
16964
  "value_allowed_null": false
16888
16965
  },
16966
+ {
16967
+ "disabled": false,
16968
+ "document": "导出任务id",
16969
+ "example": "1012",
16970
+ "member": "string",
16971
+ "name": "JobId",
16972
+ "output_required": true,
16973
+ "type": "string",
16974
+ "value_allowed_null": false
16975
+ },
16889
16976
  {
16890
16977
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
16891
16978
  "member": "string",
@@ -18389,6 +18476,26 @@
18389
18476
  "type": "int",
18390
18477
  "value_allowed_null": false
18391
18478
  },
18479
+ {
18480
+ "disabled": false,
18481
+ "document": "失败主机数",
18482
+ "example": "10",
18483
+ "member": "uint64",
18484
+ "name": "FailedHostCount",
18485
+ "output_required": true,
18486
+ "type": "int",
18487
+ "value_allowed_null": false
18488
+ },
18489
+ {
18490
+ "disabled": false,
18491
+ "document": "任务id",
18492
+ "example": "1002",
18493
+ "member": "uint64",
18494
+ "name": "TaskId",
18495
+ "output_required": true,
18496
+ "type": "int",
18497
+ "value_allowed_null": false
18498
+ },
18392
18499
  {
18393
18500
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
18394
18501
  "member": "string",
@@ -18889,6 +18996,16 @@
18889
18996
  "type": "string",
18890
18997
  "value_allowed_null": false
18891
18998
  },
18999
+ {
19000
+ "disabled": false,
19001
+ "document": "所有者名称",
19002
+ "example": "tx-qi",
19003
+ "member": "string",
19004
+ "name": "OwnerName",
19005
+ "output_required": false,
19006
+ "type": "string",
19007
+ "value_allowed_null": false
19008
+ },
18892
19009
  {
18893
19010
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
18894
19011
  "member": "string",
@@ -20330,7 +20447,7 @@
20330
20447
  {
20331
20448
  "disabled": false,
20332
20449
  "document": "事件基本信息",
20333
- "example": "{ \"ClientIP\": \"159.75.90.111\", \"ClusterID\": \"cls-sdfw3f3\", \"ClusterName\": \"web-cluster\", \"ContainerId\": \"a960d85856c7a77cb504b638c56f59a28057\", \"ContainerIsolateOperationSrc\": \"system\", \"ContainerName\": \"node1\", \"ContainerNetStatus\": \"NORMAL\", \"ContainerNetSubStatus\": \"NONE\", \"EventCount\": 1, \"EventId\": \"12486\", \"EventName\": \"敏感路径挂载\", \"EventType\": \"MOUNT_SENSITIVE_PTAH\", \"FoundTime\": \"2024-10-23 17:13:51\", \"HostID\": \"3b6b1bbc-1c7a-47e2-9ca8-e9c27ec9d068\", \"HostIP\": \"172.17.1.6\", \"ImageId\": \"sha256:b760a4831f5aab71c711f7537a107b751d0d0ce90dd32d8b358df3c5da385426\", \"ImageName\": \"centos:7.6\", \"LatestFoundTime\": \"2024-10-23 17:13:51\", \"Namespace\": \"default\", \"NodeID\": \"web-node1\", \"NodeName\": \"VM-1-6-tencentos\", \"NodeSubNetCIDR\": \"172.16.0.0/24\", \"NodeSubNetID\": \"sub-ndifn***\", \"NodeSubNetName\": \"dev\", \"NodeType\": \"NORMAL\", \"NodeUniqueID\": \"d41d8cd98f00b20*******\", \"PodIP\": \"10.0.0.121\", \"PodName\": \"kube-system/cilium-m2gkw\", \"PodStatus\": \"NORMAL\", \"Status\": \"EVENT_UNDEAL\", \"WorkloadType\": \"StatefulSet\" }",
20450
+ "example": "",
20334
20451
  "member": "RunTimeEventBaseInfo",
20335
20452
  "name": "EventBaseInfo",
20336
20453
  "output_required": true,
@@ -20340,7 +20457,7 @@
20340
20457
  {
20341
20458
  "disabled": false,
20342
20459
  "document": "进程信息",
20343
- "example": "{ \"ProcessAuthority\": \"-rwxr-xr-x\", \"ProcessId\": 2743103, \"ProcessMd5\": \"81a7701a194c3a1179cfe4a7ac836626\", \"ProcessName\": \"runc\", \"ProcessParam\": \"cilium-agent --config-dir=/tmp/cilium/config-map\", \"ProcessPath\": \"/opt/containerd/bin/runc\", \"ProcessStartUser\": \"root\", \"ProcessTree\": \"runc(2743103)|containerd-shim-runc-v2(289436)|systemd(1)\", \"ProcessUserGroup\": \"root\" }",
20460
+ "example": "",
20344
20461
  "member": "ProcessDetailInfo",
20345
20462
  "name": "ProcessInfo",
20346
20463
  "output_required": true,
@@ -20350,7 +20467,7 @@
20350
20467
  {
20351
20468
  "disabled": false,
20352
20469
  "document": "事件描述",
20353
- "example": "{ \"Description\": \"容器(ID:5893711bb2...)挂载了敏感目录/lib/modules,/proc/sys/net,/proc/sys/kernel,存在容器逃逸的风险,当攻击者攻破容器后,可通过篡改该目录下的敏感文件,从而实现容器逃逸,获得宿主机系统的控制权限,威胁宿主机上其它容器及内网的安全。\", \"OperationTime\": \"1970-01-01 00:00:01\", \"Remark\": \"dev\", \"Solution\": \"修改挂载路径,只将必须的路径挂载到容器中,避免挂载敏感路径。\" }",
20470
+ "example": "",
20354
20471
  "member": "EscapeEventDescription",
20355
20472
  "name": "EventDetail",
20356
20473
  "output_required": true,
@@ -20360,7 +20477,7 @@
20360
20477
  {
20361
20478
  "disabled": false,
20362
20479
  "document": "父进程信息",
20363
- "example": "{ \"ProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 613d6792485871ca66ab6dc4d1c24e827e1ff4ae6aff87b187e40059cd3ba3b9 -address /run/containerd/containerd.sock \", \"ProcessPath\": \"containerd-shim-runc-v2\", \"ProcessStartUser\": \"root\", \"ProcessUserGroup\": \"root\" }",
20480
+ "example": "",
20364
20481
  "member": "ProcessBaseInfo",
20365
20482
  "name": "ParentProcessInfo",
20366
20483
  "output_required": true,
@@ -20370,7 +20487,7 @@
20370
20487
  {
20371
20488
  "disabled": false,
20372
20489
  "document": "祖先进程信息",
20373
- "example": " \"AncestorProcessInfo\": { \"ProcessParam\": \"/usr/lib/systemd/systemd --switched-root --system --deserialize 18 \", \"ProcessPath\": \"systemd\", \"ProcessStartUser\": \"root\", \"ProcessUserGroup\": \"root\" }",
20490
+ "example": "",
20374
20491
  "member": "ProcessBaseInfo",
20375
20492
  "name": "AncestorProcessInfo",
20376
20493
  "output_required": true,
@@ -24070,7 +24187,7 @@
24070
24187
  {
24071
24188
  "disabled": false,
24072
24189
  "document": "事件基本信息",
24073
- "example": "{\"ClientIP\":\"43.138.**.**\",\"ClusterID\":\"12\",\"ClusterName\":\"name1\",\"ContainerId\":\"dc56fda9-58c8-4c4f-9e8c-b7296836c1fe\",\"ContainerIsolateOperationSrc\":\"ContainerIsolateOperationSrc\",\"ContainerName\":\"/fervent_goodall\",\"ContainerNetStatus\":\"NORMAL\",\"ContainerNetSubStatus\":\"NONE\",\"EventCount\":1,\"EventId\":\"464567\",\"EventName\":\"反弹shell\",\"EventType\":\"REVERSE_SHELL_EVENT_TYPE\",\"FoundTime\":\"2024-10-09 10:17:07\",\"HostID\":\"45641324-6360-4fd4-bfc7-843162cb8116\",\"HostIP\":\"10.0.1.233\",\"ImageId\":\"sha256:345234541324b561b4c16bcb82328cfe5809ab675bb17ab3a16c517c9\",\"ImageName\":\"centos:7\",\"LatestFoundTime\":\"2024-10-09 10:17:07\",\"Namespace\":\"Namespace\",\"NodeID\":\"NodeID\",\"NodeName\":\"k8s-node1\",\"NodeSubNetCIDR\":\"NodeSubNetCIDR\",\"NodeSubNetID\":\"NodeSubNetID\",\"NodeSubNetName\":\"NodeSubNetName\",\"NodeType\":\"NORMAL\",\"NodeUniqueID\":\"NodeUniqueID\",\"PodIP\":\"10.0.0.1\",\"PodName\":\"PodName\",\"PodStatus\":\"2\",\"Status\":\"EVENT_UNDEAL\",\"WorkloadType\":\"3\"}",
24190
+ "example": "",
24074
24191
  "member": "RunTimeEventBaseInfo",
24075
24192
  "name": "EventBaseInfo",
24076
24193
  "output_required": true,
@@ -24080,7 +24197,7 @@
24080
24197
  {
24081
24198
  "disabled": false,
24082
24199
  "document": "进程信息",
24083
- "example": "{\"ProcessAuthority\":\"-rwxr-xr-x\",\"ProcessId\":737357,\"ProcessMd5\":\"81a7701a194c3a1179cfe4a7ac836626\",\"ProcessName\":\"bash\",\"ProcessParam\":\"bash -i\",\"ProcessPath\":\"/usr/bin/bash\",\"ProcessStartUser\":\"ProcessStartUser\",\"ProcessTree\":\"bash(737357)|bash(737356)|bash(733933)|containerd-shim-runc-v2(2178890)|systemd(1)\",\"ProcessUserGroup\":\"root\"}",
24200
+ "example": "",
24084
24201
  "member": "ProcessDetailInfo",
24085
24202
  "name": "ProcessInfo",
24086
24203
  "output_required": true,
@@ -24090,7 +24207,7 @@
24090
24207
  {
24091
24208
  "disabled": false,
24092
24209
  "document": "父进程信息",
24093
- "example": "{\"ProcessId\":737356,\"ProcessName\":\"bash\",\"ProcessParam\":\"sh -c bash \",\"ProcessPath\":\"/usr/bin/bash\",\"ProcessStartUser\":\"ProcessStartUser\",\"ProcessUserGroup\":\"ProcessUserGroup\"}",
24210
+ "example": "",
24094
24211
  "member": "ProcessDetailBaseInfo",
24095
24212
  "name": "ParentProcessInfo",
24096
24213
  "output_required": true,
@@ -24100,7 +24217,7 @@
24100
24217
  {
24101
24218
  "disabled": false,
24102
24219
  "document": "事件描述",
24103
- "example": "{\"Description\":\"/fervent_goodall容器(ID:b18a9a3726...)内存在疑似反弹shell行为\",\"DstAddress\":\"175.178.**.**:3387\",\"OperationTime\":\"1970-01-01 00:00:01\",\"Remark\":\"Remark\",\"Solution\":\"清理容器内反弹shell进程,检查容器内服务是否存在漏洞、弱密码等风险\"}",
24220
+ "example": "",
24104
24221
  "member": "ReverseShellEventDescription",
24105
24222
  "name": "EventDetail",
24106
24223
  "output_required": true,
@@ -24110,7 +24227,7 @@
24110
24227
  {
24111
24228
  "disabled": false,
24112
24229
  "document": "祖先进程信息",
24113
- "example": "{\"ProcessParam\":\"bash\",\"ProcessPath\":\"/usr/bin/bash\",\"ProcessStartUser\":\"root\",\"ProcessUserGroup\":\"root\"}",
24230
+ "example": "",
24114
24231
  "member": "ProcessBaseInfo",
24115
24232
  "name": "AncestorProcessInfo",
24116
24233
  "output_required": true,
@@ -25065,7 +25182,7 @@
25065
25182
  {
25066
25183
  "disabled": false,
25067
25184
  "document": "恶意请求事件列表",
25068
- "example": "[{\"Address\": \"r4v4icyaaltpqelvmj2w45dvgeytcmbnpa4dmljwgq.h.nessus****\", \"City\": \"\", \"ClusterID\": \"cls-55jm****\", \"ClusterName\": \"k8s-tool\", \"ContainerID\": \"23800b52164fef1266ab259abf2476e7f498c01f98adeb1b4cb53f224000****\", \"ContainerIsolateOperationSrc\": \"\", \"ContainerName\": \"/nessus\", \"ContainerNetStatus\": \"NORMAL\", \"ContainerNetSubStatus\": \"NONE\", \"ContainerStatus\": \"DESTR****\", \"Description\": \"\", \"EventCount\": 3, \"EventID\": 1774008, \"EventStatus\": \"EVENT_UN****\", \"EventType\": \"DOMAIN\", \"FoundTime\": \"2024-02-02 10:4****\", \"HostID\": \"1e7c4560-8b24-4990-838b-8023d621****\", \"HostIP\": \"10.0.1****\", \"HostName\": \"VM-7-17-ce****\", \"ImageID\": \"sha256:b2362acbac0b6df9775a039560482a7a744fe54403aa45a9669b3163f68e****\", \"ImageName\": \"ramisec/nessus:la****\", \"LatestFoundTime\": \"2024-02-02 16:5****\", \"NodeID\": \"ins-2zwg****\", \"NodeName\": \"VM-7-17-ce****\", \"NodeType\": \"NORMAL\", \"NodeUniqueID\": \"ddcc216281ee8c098076deaa9717****\", \"PodIP\": \"10.0.1****\", \"PodName\": \"/\", \"PublicIP\": \"10.0.1****\", \"Solution\": \"\"}]",
25185
+ "example": "",
25069
25186
  "member": "RiskDnsEventInfo",
25070
25187
  "name": "List",
25071
25188
  "output_required": true,
@@ -25204,7 +25321,7 @@
25204
25321
  {
25205
25322
  "disabled": false,
25206
25323
  "document": "事件基本信息",
25207
- "example": "{ \"ClientIP\": \"175.178.113.111\", \"ClusterID\": \"cls-demo1\", \"ClusterName\": \"web-demo\", \"ContainerId\": \"75D3326A-9B9C-4275-895A-16FDA1*****\", \"ContainerIsolateOperationSrc\": \"ContainerIsolateOperationSrc\", \"ContainerName\": \"/k8s_xenon_mysql-tce-cwp-mysql-2_sso_c9fdfba4-e31a-46bc-a43a-****\", \"ContainerNetStatus\": \"NORMAL\", \"ContainerNetSubStatus\": \"NONE\", \"EventCount\": 130, \"EventId\": \"5124493\", \"EventName\": \"高危系统调用\", \"EventType\": \"RISK_SYSCALL_EVENT_TYPE\", \"FoundTime\": \"2024-10-23 00:05:17\", \"HostID\": \"11141114-66fd-4171-93eb-2f4fc36ef1e1\", \"HostIP\": \"10.0.0.105\", \"ImageId\": \"sha256:11141114e95dce36e8455cf657e1e54d74bb8fac6111411141114\", \"ImageName\": \"registry.tce.com/service-vendors/mysql-xenon:8.0.32-20240524-155426-11141114.rhel.amd64\", \"LatestFoundTime\": \"2024-10-23 17:02:47\", \"Namespace\": \"default\", \"NodeID\": \"pod-dj4xjf***\", \"NodeName\": \"tcs-10-0-0-105\", \"NodeSubNetCIDR\": \"fe80::8132:1b51:5********\", \"NodeSubNetID\": \"subnet-dfj4***\", \"NodeSubNetName\": \"default\", \"NodeType\": \"NORMAL\", \"NodeUniqueID\": \"node-4jfjfgdnvnd****\", \"PodIP\": \"10.0.0.11\", \"PodName\": \"demonset\", \"PodStatus\": \"running\", \"Status\": \"EVENT_UNDEAL\", \"WorkloadType\": \"StatefulSet\" }",
25324
+ "example": "",
25208
25325
  "member": "RunTimeEventBaseInfo",
25209
25326
  "name": "EventBaseInfo",
25210
25327
  "output_required": true,
@@ -25214,7 +25331,7 @@
25214
25331
  {
25215
25332
  "disabled": false,
25216
25333
  "document": "进程信息",
25217
- "example": "{ \"ProcessAuthority\": \"-rwxr-xr-x\", \"ProcessId\": 2907621, \"ProcessMd5\": \"8a5772dee965c8223aebc1225e*****\", \"ProcessName\": \"xenoncli\", \"ProcessParam\": \"xenoncli xenon ping\", \"ProcessPath\": \"/usr/local/bin/xenoncli\", \"ProcessStartUser\": \"root\", \"ProcessTree\": \"xenoncli(2907621)|containerd-shim(330852)|containerd(17863)|dockerd(17838)|systemd(1)\", \"ProcessUserGroup\": \"0\" },",
25334
+ "example": "",
25218
25335
  "member": "ProcessDetailInfo",
25219
25336
  "name": "ProcessInfo",
25220
25337
  "output_required": true,
@@ -25224,7 +25341,7 @@
25224
25341
  {
25225
25342
  "disabled": false,
25226
25343
  "document": "父进程信息",
25227
- "example": "{ \"ProcessId\": 330852, \"ProcessName\": \"containerd-shim\", \"ProcessParam\": \"containerd-shim -namespace moby -workdir /data/kubernetes/docker/containerd/daemon/io.containerd.runtime.v1.linux/moby/ /var/run/docker/runtime-runc\", \"ProcessPath\": \"/usr/bin/containerd-shim\", \"ProcessStartUser\": \"root\", \"ProcessUserGroup\": \"root\" }",
25344
+ "example": "",
25228
25345
  "member": "ProcessDetailBaseInfo",
25229
25346
  "name": "ParentProcessInfo",
25230
25347
  "output_required": true,
@@ -25234,7 +25351,7 @@
25234
25351
  {
25235
25352
  "disabled": false,
25236
25353
  "document": "事件描述",
25237
- "example": "{ \"Description\": \"sergid会导致运行进程的账号权限变更,可能带来安全风险\", \"OperationTime\": \"1970-01-01 00:00:01\", \"Remark\": \"user config\", \"Solution\": \"使用存在潜在风险的系统调用,可能导致容器逃逸。建议对于不常用的系统调用,禁止容器使用,并及时更新宿主机的系统漏洞\", \"SyscallName\": \"chroot\" }",
25354
+ "example": "",
25238
25355
  "member": "RiskSyscallEventDescription",
25239
25356
  "name": "EventDetail",
25240
25357
  "output_required": true,
@@ -25244,7 +25361,7 @@
25244
25361
  {
25245
25362
  "disabled": false,
25246
25363
  "document": "祖先进程信息",
25247
- "example": "{ \"ProcessParam\": \"containerd --config /var/run/docker/containerd/containerd.toml --log-level warn\", \"ProcessPath\": \"/usr/bin/containerd\", \"ProcessStartUser\": \"0\", \"ProcessUserGroup\": \"0\" }",
25364
+ "example": "",
25248
25365
  "member": "ProcessBaseInfo",
25249
25366
  "name": "AncestorProcessInfo",
25250
25367
  "output_required": true,
@@ -28194,6 +28311,16 @@
28194
28311
  "type": "string",
28195
28312
  "value_allowed_null": false
28196
28313
  },
28314
+ {
28315
+ "disabled": false,
28316
+ "document": "容器状态",
28317
+ "example": "RUNNING",
28318
+ "member": "string",
28319
+ "name": "ContainerStatus",
28320
+ "output_required": true,
28321
+ "type": "string",
28322
+ "value_allowed_null": false
28323
+ },
28197
28324
  {
28198
28325
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
28199
28326
  "member": "string",
@@ -35658,8 +35785,8 @@
35658
35785
  "members": [
35659
35786
  {
35660
35787
  "disabled": false,
35661
- "document": "全部同步,俩参数必选一个 All优先",
35662
- "example": "True",
35788
+ "document": "同步全部普通节点",
35789
+ "example": "true",
35663
35790
  "member": "bool",
35664
35791
  "name": "All",
35665
35792
  "required": false,
@@ -35667,12 +35794,39 @@
35667
35794
  },
35668
35795
  {
35669
35796
  "disabled": false,
35670
- "document": "要同步的主机列表uuid ,俩参数必选一个 All优先",
35797
+ "document": "要同步的主机列表uuid ",
35671
35798
  "example": "[\"f63e2bbb-1070-4178-9934-9639ef33363b\"]",
35672
35799
  "member": "string",
35673
35800
  "name": "Hosts",
35674
35801
  "required": false,
35675
35802
  "type": "list"
35803
+ },
35804
+ {
35805
+ "disabled": false,
35806
+ "document": "同步全部超级节点",
35807
+ "example": "true",
35808
+ "member": "bool",
35809
+ "name": "AllSuperHost",
35810
+ "required": false,
35811
+ "type": "bool"
35812
+ },
35813
+ {
35814
+ "disabled": false,
35815
+ "document": "要同步的超级节点唯一id",
35816
+ "example": "[\"dac9bff62384e6b3d7db830f7bf2b0a8\"]",
35817
+ "member": "string",
35818
+ "name": "NodeUniqueIds",
35819
+ "required": false,
35820
+ "type": "list"
35821
+ },
35822
+ {
35823
+ "disabled": false,
35824
+ "document": "超时时间(秒) 最低3600s",
35825
+ "example": "3600",
35826
+ "member": "uint64",
35827
+ "name": "TimeoutSec",
35828
+ "required": false,
35829
+ "type": "int"
35676
35830
  }
35677
35831
  ],
35678
35832
  "type": "object"
@@ -35690,6 +35844,16 @@
35690
35844
  "type": "string",
35691
35845
  "value_allowed_null": false
35692
35846
  },
35847
+ {
35848
+ "disabled": false,
35849
+ "document": "任务id",
35850
+ "example": "10086",
35851
+ "member": "uint64",
35852
+ "name": "TaskId",
35853
+ "output_required": true,
35854
+ "type": "int",
35855
+ "value_allowed_null": false
35856
+ },
35693
35857
  {
35694
35858
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
35695
35859
  "member": "string",
@@ -39618,6 +39782,26 @@
39618
39782
  "output_required": true,
39619
39783
  "type": "string",
39620
39784
  "value_allowed_null": false
39785
+ },
39786
+ {
39787
+ "disabled": false,
39788
+ "document": "镜像ID",
39789
+ "example": "sha256:b2362acbac0b6df9775a039560482a7a744fe54403aa45a9669b3163f68e****",
39790
+ "member": "string",
39791
+ "name": "ImageId",
39792
+ "output_required": false,
39793
+ "type": "string",
39794
+ "value_allowed_null": false
39795
+ },
39796
+ {
39797
+ "disabled": false,
39798
+ "document": "容器ID",
39799
+ "example": "23800b52164fef1266ab259abf2476e7f498c01f98adeb1b4cb53f224000****",
39800
+ "member": "string",
39801
+ "name": "ContainerId",
39802
+ "output_required": false,
39803
+ "type": "string",
39804
+ "value_allowed_null": false
39621
39805
  }
39622
39806
  ],
39623
39807
  "usage": "out"
@@ -40518,6 +40702,16 @@
40518
40702
  "output_required": true,
40519
40703
  "type": "string",
40520
40704
  "value_allowed_null": false
40705
+ },
40706
+ {
40707
+ "disabled": false,
40708
+ "document": "容器运行状态",
40709
+ "example": "EVENT_UNDEAL",
40710
+ "member": "string",
40711
+ "name": "ContainerStatus",
40712
+ "output_required": false,
40713
+ "type": "string",
40714
+ "value_allowed_null": false
40521
40715
  }
40522
40716
  ],
40523
40717
  "usage": "out"
@@ -42733,6 +42927,15 @@
42733
42927
  "name": "NeedScan",
42734
42928
  "required": false,
42735
42929
  "type": "bool"
42930
+ },
42931
+ {
42932
+ "disabled": false,
42933
+ "document": "tcr实例ID",
42934
+ "example": "tcr-xxx",
42935
+ "member": "string",
42936
+ "name": "InstanceId",
42937
+ "required": false,
42938
+ "type": "string"
42736
42939
  }
42737
42940
  ],
42738
42941
  "type": "object"
@@ -43345,7 +43548,7 @@
43345
43548
  {
43346
43549
  "disabled": false,
43347
43550
  "document": "建议方案",
43348
- "example": "1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\n2.隔离或者删除相关的木马文件;\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \n【Linux】https://cloud.tencent.com/document/product/296/9604 \n【Windows】https://cloud.tencent.com/document/product/296/****",
43551
+ "example": "1.检查恶意进程及非法端口",
43349
43552
  "member": "string",
43350
43553
  "name": "SuggestScheme",
43351
43554
  "output_required": true,
@@ -43531,6 +43734,16 @@
43531
43734
  "output_required": true,
43532
43735
  "type": "string",
43533
43736
  "value_allowed_null": false
43737
+ },
43738
+ {
43739
+ "disabled": false,
43740
+ "document": "节点内网IP,同innerIP",
43741
+ "example": "10.72.20****",
43742
+ "member": "string",
43743
+ "name": "HostIP",
43744
+ "output_required": true,
43745
+ "type": "string",
43746
+ "value_allowed_null": false
43534
43747
  }
43535
43748
  ],
43536
43749
  "usage": "out"