tccli 3.0.1348.1__py2.py3-none-any.whl → 3.0.1350.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +0 -76
- tccli/services/ai3d/v20250513/api.json +1 -1
- tccli/services/aiart/v20221229/api.json +2 -2
- tccli/services/autoscaling/v20180419/api.json +11 -0
- tccli/services/batch/v20170312/api.json +44 -0
- tccli/services/cdb/v20170320/api.json +8 -8
- tccli/services/cdb/v20170320/examples.json +1 -1
- tccli/services/cdn/v20180606/api.json +5 -5
- tccli/services/cdwch/v20200915/api.json +11 -1
- tccli/services/cdwdoris/v20211228/api.json +145 -7
- tccli/services/cfg/v20210820/api.json +20 -0
- tccli/services/cfs/v20190719/api.json +10 -10
- tccli/services/cfw/cfw_client.py +53 -0
- tccli/services/cfw/v20190904/api.json +272 -0
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/ckafka/ckafka_client.py +0 -53
- tccli/services/ckafka/v20190819/api.json +0 -215
- tccli/services/ckafka/v20190819/examples.json +0 -8
- tccli/services/csip/csip_client.py +833 -144
- tccli/services/csip/v20221121/api.json +3304 -1436
- tccli/services/csip/v20221121/examples.json +105 -7
- tccli/services/ctem/v20231128/api.json +20 -0
- tccli/services/cvm/v20170312/api.json +3 -3
- tccli/services/cwp/v20180228/api.json +9 -0
- tccli/services/cwp/v20180228/examples.json +6 -0
- tccli/services/dts/v20211206/api.json +21 -1
- tccli/services/emr/v20190103/api.json +219 -4
- tccli/services/es/v20250101/api.json +22 -0
- tccli/services/ess/v20201111/api.json +10 -1
- tccli/services/essbasic/v20210526/api.json +3 -3
- tccli/services/faceid/v20180301/api.json +3 -3
- tccli/services/gs/v20191118/api.json +38 -0
- tccli/services/igtm/igtm_client.py +159 -0
- tccli/services/igtm/v20231024/api.json +577 -0
- tccli/services/igtm/v20231024/examples.json +24 -0
- tccli/services/iotexplorer/v20190423/api.json +3 -3
- tccli/services/lcic/lcic_client.py +53 -0
- tccli/services/lcic/v20220817/api.json +53 -0
- tccli/services/lcic/v20220817/examples.json +8 -0
- tccli/services/live/live_client.py +224 -65
- tccli/services/live/v20180801/api.json +275 -1
- tccli/services/live/v20180801/examples.json +25 -1
- tccli/services/lke/v20231130/api.json +248 -2
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/mrs/v20200910/api.json +10 -0
- tccli/services/nlp/nlp_client.py +4 -322
- tccli/services/nlp/v20190408/api.json +0 -459
- tccli/services/nlp/v20190408/examples.json +0 -48
- tccli/services/ocr/v20181119/api.json +60 -5
- tccli/services/omics/v20221128/api.json +41 -3
- tccli/services/redis/v20180412/api.json +6 -6
- tccli/services/redis/v20180412/examples.json +1 -1
- tccli/services/ses/v20201002/api.json +100 -5
- tccli/services/tcb/v20180608/api.json +1 -1
- tccli/services/tcb/v20180608/examples.json +1 -1
- tccli/services/tdmq/v20200217/api.json +19 -0
- tccli/services/teo/teo_client.py +281 -16
- tccli/services/teo/v20220901/api.json +611 -6
- tccli/services/teo/v20220901/examples.json +48 -2
- tccli/services/tione/v20211111/api.json +16 -0
- tccli/services/tke/tke_client.py +57 -4
- tccli/services/tke/v20180525/api.json +24 -24
- tccli/services/tke/v20220501/api.json +52 -0
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tmt/v20180321/api.json +4 -4
- tccli/services/tsf/v20180326/api.json +4 -4
- tccli/services/vclm/v20240523/api.json +2 -2
- tccli/services/vod/v20180717/api.json +5 -5
- tccli/services/vod/v20180717/examples.json +9 -9
- tccli/services/vpc/v20170312/api.json +1 -1
- tccli/services/vrs/v20200824/api.json +1 -1
- {tccli-3.0.1348.1.dist-info → tccli-3.0.1350.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1348.1.dist-info → tccli-3.0.1350.1.dist-info}/RECORD +78 -180
- tccli/services/cis/__init__.py +0 -4
- tccli/services/cis/cis_client.py +0 -525
- tccli/services/cis/v20180408/api.json +0 -737
- tccli/services/cis/v20180408/examples.json +0 -93
- tccli/services/dataintegration/__init__.py +0 -4
- tccli/services/dataintegration/dataintegration_client.py +0 -207
- tccli/services/dataintegration/v20220613/api.json +0 -87
- tccli/services/dataintegration/v20220613/examples.json +0 -13
- tccli/services/dtf/__init__.py +0 -4
- tccli/services/dtf/dtf_client.py +0 -207
- tccli/services/dtf/v20200506/api.json +0 -274
- tccli/services/dtf/v20200506/examples.json +0 -13
- tccli/services/gpm/__init__.py +0 -4
- tccli/services/gpm/gpm_client.py +0 -1108
- tccli/services/gpm/v20200820/api.json +0 -1959
- tccli/services/gpm/v20200820/examples.json +0 -149
- tccli/services/gse/__init__.py +0 -4
- tccli/services/gse/gse_client.py +0 -4076
- tccli/services/gse/v20191112/api.json +0 -7095
- tccli/services/gse/v20191112/examples.json +0 -615
- tccli/services/iecp/__init__.py +0 -4
- tccli/services/iecp/iecp_client.py +0 -4500
- tccli/services/iecp/v20210914/api.json +0 -9770
- tccli/services/iecp/v20210914/examples.json +0 -691
- tccli/services/iir/__init__.py +0 -4
- tccli/services/iir/iir_client.py +0 -207
- tccli/services/iir/v20200417/api.json +0 -204
- tccli/services/iir/v20200417/examples.json +0 -13
- tccli/services/iottid/__init__.py +0 -4
- tccli/services/iottid/iottid_client.py +0 -631
- tccli/services/iottid/v20190411/api.json +0 -553
- tccli/services/iottid/v20190411/examples.json +0 -95
- tccli/services/mgobe/__init__.py +0 -4
- tccli/services/mgobe/mgobe_client.py +0 -530
- tccli/services/mgobe/v20190929/api.json +0 -52
- tccli/services/mgobe/v20190929/examples.json +0 -13
- tccli/services/mgobe/v20201014/api.json +0 -671
- tccli/services/mgobe/v20201014/examples.json +0 -61
- tccli/services/mvj/__init__.py +0 -4
- tccli/services/mvj/mvj_client.py +0 -207
- tccli/services/mvj/v20190926/api.json +0 -123
- tccli/services/mvj/v20190926/examples.json +0 -19
- tccli/services/pds/__init__.py +0 -4
- tccli/services/pds/pds_client.py +0 -260
- tccli/services/pds/v20210701/api.json +0 -193
- tccli/services/pds/v20210701/examples.json +0 -21
- tccli/services/smpn/__init__.py +0 -4
- tccli/services/smpn/smpn_client.py +0 -260
- tccli/services/smpn/v20190822/api.json +0 -191
- tccli/services/smpn/v20190822/examples.json +0 -21
- tccli/services/solar/__init__.py +0 -4
- tccli/services/solar/solar_client.py +0 -1055
- tccli/services/solar/v20181011/api.json +0 -1760
- tccli/services/solar/v20181011/examples.json +0 -125
- tccli/services/tan/__init__.py +0 -4
- tccli/services/tan/tan_client.py +0 -207
- tccli/services/tan/v20220420/api.json +0 -65
- tccli/services/tan/v20220420/examples.json +0 -19
- tccli/services/tav/__init__.py +0 -4
- tccli/services/tav/tav_client.py +0 -366
- tccli/services/tav/v20190118/api.json +0 -262
- tccli/services/tav/v20190118/examples.json +0 -37
- tccli/services/tbm/__init__.py +0 -4
- tccli/services/tbm/tbm_client.py +0 -631
- tccli/services/tbm/v20180129/api.json +0 -1037
- tccli/services/tbm/v20180129/examples.json +0 -77
- tccli/services/tcex/__init__.py +0 -4
- tccli/services/tcex/tcex_client.py +0 -260
- tccli/services/tcex/v20200727/api.json +0 -158
- tccli/services/tcex/v20200727/examples.json +0 -21
- tccli/services/tci/__init__.py +0 -4
- tccli/services/tci/tci_client.py +0 -2327
- tccli/services/tci/v20190318/api.json +0 -4958
- tccli/services/tci/v20190318/examples.json +0 -333
- tccli/services/tic/__init__.py +0 -4
- tccli/services/tic/tic_client.py +0 -843
- tccli/services/tic/v20201117/api.json +0 -1067
- tccli/services/tic/v20201117/examples.json +0 -121
- tccli/services/ticm/__init__.py +0 -4
- tccli/services/ticm/ticm_client.py +0 -313
- tccli/services/ticm/v20181127/api.json +0 -1391
- tccli/services/ticm/v20181127/examples.json +0 -53
- tccli/services/tics/__init__.py +0 -4
- tccli/services/tics/tics_client.py +0 -366
- tccli/services/tics/v20181115/api.json +0 -694
- tccli/services/tics/v20181115/examples.json +0 -37
- tccli/services/tiems/__init__.py +0 -4
- tccli/services/tiems/tiems_client.py +0 -1479
- tccli/services/tiems/v20190416/api.json +0 -3144
- tccli/services/tiems/v20190416/examples.json +0 -217
- tccli/services/trdp/__init__.py +0 -4
- tccli/services/trdp/trdp_client.py +0 -207
- tccli/services/trdp/v20220726/api.json +0 -843
- tccli/services/trdp/v20220726/examples.json +0 -13
- tccli/services/ump/__init__.py +0 -4
- tccli/services/ump/ump_client.py +0 -1055
- tccli/services/ump/v20200918/api.json +0 -2168
- tccli/services/ump/v20200918/examples.json +0 -141
- tccli/services/youmall/__init__.py +0 -4
- tccli/services/youmall/v20180228/api.json +0 -3572
- tccli/services/youmall/v20180228/examples.json +0 -313
- tccli/services/youmall/youmall_client.py +0 -1797
- {tccli-3.0.1348.1.dist-info → tccli-3.0.1350.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1348.1.dist-info → tccli-3.0.1350.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1348.1.dist-info → tccli-3.0.1350.1.dist-info}/license_files/LICENSE +0 -0
@@ -376,6 +376,14 @@
|
|
376
376
|
"title": "创建共享 CNAME"
|
377
377
|
}
|
378
378
|
],
|
379
|
+
"CreateWebSecurityTemplate": [
|
380
|
+
{
|
381
|
+
"document": "在 zone-2wkpkd52pwsk 站点中创建“Web安全策略模板”。",
|
382
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateWebSecurityTemplate\n<公共请求参数>\n\n{\n \"ZoneId\": \"zone-2wkpkd52pwsk\",\n \"TemplateName\": \"Web安全策略模板\",\n \"SecurityPolicy\": {\n \"CustomRules\": {\n \"Rules\": [\n {\n \"Name\": \"acl1\",\n \"Condition\": \"${http.request.host} in ['111']\",\n \"Action\": {\n \"Name\": \"Deny\"\n },\n \"Enabled\": \"on\",\n \"RuleType\": \"PreciseMatchRule\",\n \"Priority\": 35\n },\n {\n \"Name\": \"iptable1\",\n \"Condition\": \"${http.request.headers['referer']} in ['123']\",\n \"Action\": {\n \"Name\": \"Deny\"\n },\n \"Enabled\": \"on\",\n \"RuleType\": \"BasicAccessRule\"\n }\n ]\n },\n \"ExceptionRules\": {\n \"Rules\": [\n {\n \"Name\": \"SampleSkipManagedRule\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit']\",\n \"SkipScope\": \"ManagedRules\",\n \"SkipOption\": \"SkipOnAllRequestFields\",\n \"ManagedRulesForException\": [\n \"4401215074\",\n \"4368124487\"\n ],\n \"Enabled\": \"on\"\n },\n {\n \"Name\": \"SampleSkipManagedRule2\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit']\",\n \"SkipScope\": \"ManagedRules\",\n \"SkipOption\": \"SkipOnAllRequestFields\",\n \"ManagedRuleGroupsForException\": [\n \"wafgroup-sql-injection-attacks\"\n ],\n \"Enabled\": \"on\"\n },\n {\n \"Name\": \"SampleSkipManagedRuleForField\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit'] \",\n \"SkipScope\": \"ManagedRules\",\n \"ManagedRulesForException\": [\n \"4401215074\",\n \"4368124487\"\n ],\n \"SkipOption\": \"SkipOnSpecifiedRequestFields\",\n \"RequestFieldsForException\": [\n {\n \"Scope\": \"cookie\",\n \"Condition\": \"\",\n \"TargetField\": \"key\"\n }\n ],\n \"Enabled\": \"on\"\n }\n ]\n },\n \"HttpDDoSProtection\": {\n \"AdaptiveFrequencyControl\": {\n \"Action\": {\n \"ChallengeActionParameters\": {\n \"ChallengeOption\": \"JSChallenge\"\n },\n \"Name\": \"Challenge\"\n },\n \"Enabled\": \"on\",\n \"Sensitivity\": \"Loose\"\n },\n \"BandwidthAbuseDefense\": {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"Enabled\": \"off\"\n },\n \"ClientFiltering\": {\n \"Action\": {\n \"ChallengeActionParameters\": {\n \"ChallengeOption\": \"JSChallenge\"\n },\n \"Name\": \"Challenge\"\n },\n \"Enabled\": \"on\"\n },\n \"SlowAttackDefense\": {\n \"Action\": {\n \"Name\": \"Deny\"\n },\n \"Enabled\": \"off\",\n \"MinimalRequestBodyTransferRate\": {\n \"CountingPeriod\": \"60s\",\n \"Enabled\": \"off\",\n \"MinimalAvgTransferRateThreshold\": \"80bps\"\n },\n \"RequestBodyTransferTimeout\": {\n \"Enabled\": \"off\",\n \"IdleTimeout\": \"5s\"\n }\n }\n },\n \"ManagedRules\": {\n \"AutoUpdate\": {\n \"AutoUpdateToLatestVersion\": \"on\"\n },\n \"DetectionOnly\": \"on\",\n \"Enabled\": \"on\",\n \"ManagedRuleGroups\": [\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-webshell-attacks\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-xss-attacks\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-xxe-attacks\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-vulnerability-scanners\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-non-compliant-protocol-usages\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-cms-vulnerabilities\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-file-upload-attacks\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-other-vulnerabilities\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-command-and-code-injections\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-sql-injections\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-shiro-vulnerabilities\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-unauthorized-file-accesses\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-ldap-injections\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-oa-vulnerabilities\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-ssrf-attacks\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-ssti-attacks\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-unauthorized-accesses\",\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n }\n ],\n \"SemanticAnalysis\": \"off\"\n },\n \"RateLimitingRules\": {\n \"Rules\": [\n {\n \"Enabled\": \"on\",\n \"Name\": \"SampleHttpDdosRule\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit']\",\n \"CountBy\": [\n \"http.request.ip\",\n \"http.request.cookies['UserSession']\"\n ],\n \"MaxRequestThreshold\": 1000,\n \"CountingPeriod\": \"2m\",\n \"ActionDuration\": \"20h\",\n \"Action\": {\n \"Name\": \"Deny\"\n },\n \"Priority\": 100\n }\n ]\n }\n }\n}",
|
383
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"09ce3d28-1119-49cd-a99f-27cb34dac669\",\n \"TemplateId\": \"temp-ygt2paxl\"\n }\n}",
|
384
|
+
"title": "创建安全策略配置模板"
|
385
|
+
}
|
386
|
+
],
|
379
387
|
"CreateZone": [
|
380
388
|
{
|
381
389
|
"document": "创建NS接入模式站点 example.com,服务区域为中国大陆可用区,绑定套餐 edgeone-37q0w6qali10。接口将返回 DNS 服务器信息,您需要前往域名注册商处修改,可参考 [修改 DNS 服务器](https://cloud.tencent.com/document/product/1552/90452)。",
|
@@ -540,6 +548,14 @@
|
|
540
548
|
"title": "删除共享 CNAME"
|
541
549
|
}
|
542
550
|
],
|
551
|
+
"DeleteWebSecurityTemplate": [
|
552
|
+
{
|
553
|
+
"document": "删除 zone-2wkpkd52pku8 站点下的 temp-o3xctdd2 安全策略模板。",
|
554
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteWebSecurityTemplate\n<公共请求参数>\n\n{\n \"ZoneId\": \"zone-2wkpkd52pku8\",\n \"TemplateId\": \"temp-o3xctdd2\"\n}",
|
555
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"09ce3d28-1119-49cd-f0e3-27cb34dac669\"\n }\n}",
|
556
|
+
"title": "删除安全策略配置模板"
|
557
|
+
}
|
558
|
+
],
|
543
559
|
"DeleteZone": [
|
544
560
|
{
|
545
561
|
"document": "",
|
@@ -908,13 +924,13 @@
|
|
908
924
|
{
|
909
925
|
"document": "查询指定站点的所有安全 IP 分组的配置信息。",
|
910
926
|
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecurityIPGroup\n<公共请求参数>\n\n{\n \"ZoneId\": \"zone-nqicqhasui\"\n}",
|
911
|
-
"output": "{\n \"Response\": {\n \"IPGroups\": [\n {\n \"GroupId\": 97,\n \"Name\": \"ExampleIpGroup\",\n \"Content\": [\n \"2.2.2.2\",\n \"23.23.23.0/24\"\n ],\n \"IPExpireInfo\": [\n {\n \"ExpireTime\": \"2026-03-24T16:03:00+08:00\",\n \"IPList\": [\n \"2.2.2.2\"\n ]\n }\n ]\n }\n ],\n \"RequestId\": \"ddf831fc-cf45-40fe-81b0-2d9cdd4c1bd6\"\n }\n}",
|
927
|
+
"output": "{\n \"Response\": {\n \"IPGroups\": [\n {\n \"GroupId\": 97,\n \"Name\": \"ExampleIpGroup\",\n \"IPTotalCount\": 2,\n \"Content\": [\n \"2.2.2.2\",\n \"23.23.23.0/24\"\n ],\n \"IPExpireInfo\": [\n {\n \"ExpireTime\": \"2026-03-24T16:03:00+08:00\",\n \"IPList\": [\n \"2.2.2.2\"\n ]\n }\n ]\n }\n ],\n \"RequestId\": \"ddf831fc-cf45-40fe-81b0-2d9cdd4c1bd6\"\n }\n}",
|
912
928
|
"title": "查询站点下所有安全 IP 分组的配置信息"
|
913
929
|
},
|
914
930
|
{
|
915
931
|
"document": "查询站点中指定 ID 的安全 IP 分组配置信息",
|
916
932
|
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeSecurityIPGroup\n<公共请求参数>\n\n{\n \"ZoneId\": \"zone-ncacqeabax\",\n \"GroupIds\": [\n 100,\n 200\n ]\n}",
|
917
|
-
"output": "{\n \"Response\": {\n \"IPGroups\": [\n {\n \"GroupId\": 100,\n \"Name\": \"ExampleIpGroup-1\",\n \"Content\": [\n \"2.2.2.2\",\n \"23.23.23.0/24\"\n ],\n \"IPExpireInfo\": [\n {\n \"ExpireTime\": \"2026-03-24T16:03:00+08:00\",\n \"IPList\": [\n \"2.2.2.2\"\n ]\n }\n ]\n },\n {\n \"GroupId\": 200,\n \"Name\": \"ExampleIpGroup-2\",\n \"Content\": [\n \"1.1.1.1\",\n \"23.23.23.0/24\"\n ],\n \"IPExpireInfo\": [\n {\n \"ExpireTime\": \"2025-03-24T16:03:00+08:00\",\n \"IPList\": [\n \"1.1.1.1\"\n ]\n }\n ]\n }\n ],\n \"RequestId\": \"ddf831fc-cf45-40fe-81b0-2d9cdd4c1bd6\"\n }\n}",
|
933
|
+
"output": "{\n \"Response\": {\n \"IPGroups\": [\n {\n \"GroupId\": 100,\n \"Name\": \"ExampleIpGroup-1\",\n \"IPTotalCount\": 2,\n \"Content\": [\n \"2.2.2.2\",\n \"23.23.23.0/24\"\n ],\n \"IPExpireInfo\": [\n {\n \"ExpireTime\": \"2026-03-24T16:03:00+08:00\",\n \"IPList\": [\n \"2.2.2.2\"\n ]\n }\n ]\n },\n {\n \"GroupId\": 200,\n \"Name\": \"ExampleIpGroup-2\",\n \"IPTotalCount\": 2,\n \"Content\": [\n \"1.1.1.1\",\n \"23.23.23.0/24\"\n ],\n \"IPExpireInfo\": [\n {\n \"ExpireTime\": \"2025-03-24T16:03:00+08:00\",\n \"IPList\": [\n \"1.1.1.1\"\n ]\n }\n ]\n }\n ],\n \"RequestId\": \"ddf831fc-cf45-40fe-81b0-2d9cdd4c1bd6\"\n }\n}",
|
918
934
|
"title": "查询指定 ID 的安全 IP 分组的配置信息"
|
919
935
|
}
|
920
936
|
],
|
@@ -994,6 +1010,22 @@
|
|
994
1010
|
"title": "查询指定状态码的top流量数据"
|
995
1011
|
}
|
996
1012
|
],
|
1013
|
+
"DescribeWebSecurityTemplate": [
|
1014
|
+
{
|
1015
|
+
"document": "查询 zone-a012rw4m76cy 站点中 temp-a9s1ekqt 策略模板的配置内容。",
|
1016
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeWebSecurityTemplate\n<公共请求参数>\n\n{\n \"ZoneId\": \"zone-a012rw4m76cy\",\n \"TemplateId\": \"temp-a9s1ekqt\"\n}",
|
1017
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"cb5d2c0e-295e-412a-891a-9f8ab6057b4a\",\n \"SecurityPolicy\": {\n \"ExceptionRules\": {\n \"Rules\": [\n {\n \"Id\": \"1492837231\",\n \"Name\": \"ExampleSkipModule\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit'] and ${http.request.method} in ['POST']\",\n \"SkipScope\": \"WebSecurityModules\",\n \"WebSecurityModulesForException\": [\n \"websec-mod-custom-rules\",\n \"websec-mod-rate-limiting\"\n ],\n \"Enabled\": \"On\"\n },\n {\n \"Id\": \"1492837231\",\n \"Name\": \"SampleSkipManagedRule\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit'] and ${http.request.method} in ['POST']\",\n \"SkipScope\": \"ManagedRules\",\n \"SkipOption\": \"SkipOnAllRequestFields\",\n \"ManagedRulesForException\": [\n \"4401215074\",\n \"4368124487\"\n ],\n \"Enabled\": \"On\"\n },\n {\n \"Id\": \"1492837231\",\n \"Name\": \"SampleSkipManagedRule\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit'] and ${http.request.method} in ['POST']\",\n \"SkipScope\": \"ManagedRules\",\n \"SkipOption\": \"SkipOnAllRequestFields\",\n \"ManagedRuleGroupsForException\": [\n \"wafgroup-sql-injection-attacks\"\n ],\n \"Enabled\": \"On\"\n },\n {\n \"Id\": \"1492837231\",\n \"Name\": \"SampleSkipManagedRuleForField\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit'] and ${http.request.method} in ['POST']\",\n \"SkipScope\": \"ManagedRules\",\n \"ManagedRulesForException\": [\n \"4401215074\",\n \"4368124487\"\n ],\n \"SkipOption\": \"SkipOnSpecifiedRequestFields\",\n \"RequestFieldsForException\": [\n {\n \"Scope\": \"cookie\",\n \"Condition\": \"\",\n \"TargetField\": \"key\"\n },\n {\n \"Scope\": \"cookie\",\n \"Condition\": \"${key} in ['session-id']\",\n \"TargetField\": \"value\"\n },\n {\n \"Scope\": \"cookie\",\n \"Condition\": \"${key} in ['account-id'] and ${value} like ['prefix-*']\",\n \"TargetField\": \"value\"\n },\n {\n \"Scope\": \"header\",\n \"Condition\": \"\",\n \"TargetField\": \"key\"\n },\n {\n \"Scope\": \"header\",\n \"Condition\": \"${key} in ['x-trace-id']\",\n \"TargetField\": \"value\"\n },\n {\n \"Scope\": \"header\",\n \"Condition\": \"${key} like ['x-auth-*'] and ${value} like ['Bearer *']\",\n \"TargetField\": \"value\"\n },\n {\n \"Scope\": \"uri.query\",\n \"Condition\": \"\",\n \"TargetField\": \"key\"\n },\n {\n \"Scope\": \"uri.query\",\n \"Condition\": \"${key} in ['action']\",\n \"TargetField\": \"value\"\n },\n {\n \"Scope\": \"uri.query\",\n \"Condition\": \"${key} in ['action'] and ${value} in ['upload', 'delete']\",\n \"TargetField\": \"value\"\n },\n {\n \"Scope\": \"uri\",\n \"Condition\": \"\",\n \"TargetField\": \"query\"\n },\n {\n \"Scope\": \"uri\",\n \"Condition\": \"\",\n \"TargetField\": \"path\"\n },\n {\n \"Scope\": \"uri\",\n \"Condition\": \"\",\n \"TargetField\": \"fullpath\"\n },\n {\n \"Scope\": \"body.json\",\n \"Condition\": \"\",\n \"TargetField\": \"key\"\n },\n {\n \"Scope\": \"body.json\",\n \"Condition\": \"${key} in ['user.id']\",\n \"TargetField\": \"value\"\n },\n {\n \"Scope\": \"body.json\",\n \"Condition\": \"${key} in ['user.id'] and ${value} in ['1234', '5678']\",\n \"TargetField\": \"value\"\n },\n {\n \"Scope\": \"body\",\n \"Condition\": \"\",\n \"TargetField\": \"fullbody\"\n },\n {\n \"Scope\": \"body\",\n \"Condition\": \"\",\n \"TargetField\": \"multipart\"\n }\n ],\n \"Enabled\": \"On\"\n }\n ]\n },\n \"CustomRules\": {\n \"Rules\": [\n {\n \"Id\": \"1492837231\",\n \"Name\": \"ASimpleIPRule\",\n \"Condition\": \"${http.request.ip} in ['1.1.1.1', '10.10.10.0/24'] or ${http.request.ip.asn} in ['132203']\",\n \"Action\": {\n \"Name\": \"Deny\"\n },\n \"Enabled\": \"on\",\n \"RuleType\": \"PreciseMatchRule\",\n \"Priority\": 50\n }\n ]\n },\n \"HttpDDoSProtection\": {\n \"AdaptiveFrequencyControl\": {\n \"Enabled\": \"on\",\n \"Sensitivity\": \"Loose\",\n \"Action\": {\n \"Name\": \"Monitor\"\n }\n },\n \"ClientFiltering\": {\n \"Enabled\": \"on\",\n \"Action\": {\n \"Name\": \"Monitor\"\n }\n },\n \"BandwidthAbuseDefense\": {\n \"Enabled\": \"on\",\n \"Action\": {\n \"Name\": \"Monitor\"\n }\n },\n \"SlowAttackDefense\": {\n \"Enabled\": \"on\",\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"MinimalRequestBodyTransferRate\": {\n \"MinimalAvgTransferRateThreshold\": \"50bps\",\n \"CountingPeriod\": \"60s\"\n },\n \"RequestBodyTransferTimeout\": {\n \"IdleTimeout\": \"5s\"\n }\n }\n },\n \"RateLimitingRules\": {\n \"Rules\": [\n {\n \"Enabled\": \"on\",\n \"Name\": \"SampleHttpDdosRule\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit']\",\n \"CountBy\": [\n \"http.request.ip\",\n \"http.request.cookies['UserSession']\"\n ],\n \"MaxRequestThreshold\": 1000,\n \"CountingPeriod\": \"2m\",\n \"ActionDuration\": \"20h\",\n \"Action\": {\n \"Name\": \"ManagedChallenge\"\n },\n \"Id\": \"2181399690\",\n \"Priority\": 100\n }\n ]\n },\n \"ManagedRules\": {\n \"Enabled\": \"on\",\n \"AutoUpdate\": {\n \"AutoUpdateToLatestVersion\": \"off\",\n \"RulesetVersion\": \"2023-12-21T12:00:32Z\"\n },\n \"SemanticAnalysis\": \"on\",\n \"DetectionOnly\": \"on\",\n \"ManagedRuleGroups\": [\n {\n \"GroupId\": \"wafmanagedrulegroup-vulnerability-scanners\",\n \"SensitivityLevel\": \"loose\",\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"MetaData\": {\n \"GroupDetail\": \"扫描器攻击漏洞防护\",\n \"GroupName\": \"扫描器攻击漏洞防护\",\n \"RuleDetails\": [\n {\n \"RuleId\": \"4401215444\",\n \"RiskLevel\": \"extreme\",\n \"Description\": \"针对dedecms历史sql注入漏洞的防护规则\",\n \"Tags\": [],\n \"RuleVersion\": \"2023-12-21T12:00:32Z\"\n },\n {\n \"RuleId\": \"4401214877\",\n \"RiskLevel\": \"medium\",\n \"Description\": \"拦截常见扫描器的xss验证payload\",\n \"Tags\": [],\n \"RuleVersion\": \"2023-12-21T12:00:32Z\"\n }\n ]\n }\n }\n ]\n }\n }\n }\n}",
|
1018
|
+
"title": "查询安全策略配置模板详情"
|
1019
|
+
}
|
1020
|
+
],
|
1021
|
+
"DescribeWebSecurityTemplates": [
|
1022
|
+
{
|
1023
|
+
"document": "查询安全策略配置模板列表",
|
1024
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeWebSecurityTemplates\n<公共请求参数>\n\n{\n \"ZoneIds\": [\n \"zone-2bu6nf2gwsax\",\n \"zone-6wkpkd5gzvms\"\n ]\n}",
|
1025
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"e56b198e-e7ca-4fa6-904d-2b81927e5663\",\n \"TotalCount\": 2,\n \"SecurityPolicyTemplates\": [\n {\n \"ZoneId\": \"zone-2wkpkd5gzvms\",\n \"TemplateId\": \"temp-1m9la413\",\n \"TemplateName\": \"CC防护模板\",\n \"BindDomains\": [\n {\n \"Domain\": \"t.teo-secdev01.top\",\n \"ZoneId\": \"zone-2wkpkd5gzvms\",\n \"Status\": \"online\"\n },\n {\n \"Domain\": \"a.teo-secdev02.top\",\n \"ZoneId\": \"zone-9ac5swm0293l\",\n \"Status\": \"fail\"\n }\n ]\n },\n {\n \"ZoneId\": \"zone-8bu6nf2gwsax\",\n \"TemplateId\": \"temp-ws139la4\",\n \"TemplateName\": \"Bot防护模板\",\n \"BindDomains\": [\n {\n \"Domain\": \"a.teo-secdev03.top\",\n \"ZoneId\": \"zone-8bu6nf2gwsax\",\n \"Status\": \"process\"\n }\n ]\n }\n ]\n }\n}",
|
1026
|
+
"title": "查询安全策略配置模板列表"
|
1027
|
+
}
|
1028
|
+
],
|
997
1029
|
"DescribeZoneConfigImportResult": [
|
998
1030
|
{
|
999
1031
|
"document": "查询站点 zone-21xfqlh4qjee 下七层加速配置项的导入结果。",
|
@@ -1538,6 +1570,20 @@
|
|
1538
1570
|
"title": "修改安全配置中的例外规则并加白Header指定key字段的场景"
|
1539
1571
|
}
|
1540
1572
|
],
|
1573
|
+
"ModifyWebSecurityTemplate": [
|
1574
|
+
{
|
1575
|
+
"document": "修改 zone-2wkpkd52pku2 站点下 temp-cuwgt1ca 模板的名称为“Web防护标准模板V2”。",
|
1576
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyWebSecurityTemplate\n<公共请求参数>\n\n{\n \"ZoneId\": \"zone-2wkpkd52pku2\",\n \"TemplateId\": \"temp-cuwgt1ca\",\n \"TemplateName\": \"Web防护标准模板V2\"\n}",
|
1577
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"09ce3d28-1119-49cd-d5a9-27cb34dac669\"\n }\n}",
|
1578
|
+
"title": "修改策略模板名称"
|
1579
|
+
},
|
1580
|
+
{
|
1581
|
+
"document": "修改 zone-2wkpkd52pku2 站点下 temp-cuwgt1ca 模板的配置内容。",
|
1582
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyWebSecurityTemplate\n<公共请求参数>\n\n{\n \"ZoneId\": \"zone-2wkpkd52pku2\",\n \"TemplateId\": \"temp-cuwgt1ca\",\n \"TemplateName\": \"安全模板_rename\",\n \"SecurityPolicy\": {\n \"CustomRules\": {\n \"Rules\": [\n {\n \"Action\": {\n \"Name\": \"Deny\"\n },\n \"Condition\": \"${http.request.host} in ['111']\",\n \"Enabled\": \"on\",\n \"Id\": \"1492837231\",\n \"Name\": \"acl1\",\n \"Priority\": 35,\n \"RuleType\": \"PreciseMatchRule\"\n },\n {\n \"Action\": {\n \"Name\": \"Deny\"\n },\n \"Condition\": \"${http.request.headers['referer']} in ['123']\",\n \"Enabled\": \"on\",\n \"Id\": \"1492837231\",\n \"Name\": \"iptable1\",\n \"Priority\": 1,\n \"RuleType\": \"BasicAccessRule\"\n }\n ]\n },\n \"ExceptionRules\": {\n \"Rules\": [\n {\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit'] \",\n \"Enabled\": \"on\",\n \"Id\": \"1492837231\",\n \"ManagedRuleGroupsForException\": [\n\n ],\n \"ManagedRulesForException\": [\n \"4401215074\",\n \"4368124487\"\n ],\n \"Name\": \"SampleSkipManagedRuleForField\",\n \"RequestFieldsForException\": [\n {\n \"Scope\": \"cookie\",\n \"TargetField\": \"key\",\n \"Condition\": \"\"\n }\n ],\n \"SkipOption\": \"SkipOnSpecifiedRequestFields\",\n \"SkipScope\": \"ManagedRules\",\n \"WebSecurityModulesForException\": [\n\n ]\n }\n ]\n },\n \"HttpDDoSProtection\": {\n \"AdaptiveFrequencyControl\": {\n \"Action\": {\n \"ChallengeActionParameters\": {\n \"ChallengeOption\": \"JSChallenge\"\n },\n \"Name\": \"Challenge\"\n },\n \"Enabled\": \"on\",\n \"Sensitivity\": \"Loose\"\n },\n \"BandwidthAbuseDefense\": {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"Enabled\": \"off\"\n },\n \"ClientFiltering\": {\n \"Action\": {\n \"ChallengeActionParameters\": {\n \"ChallengeOption\": \"JSChallenge\"\n },\n \"Name\": \"Challenge\"\n },\n \"Enabled\": \"on\"\n },\n \"SlowAttackDefense\": {\n \"Action\": {\n \"Name\": \"Deny\"\n },\n \"Enabled\": \"off\",\n \"MinimalRequestBodyTransferRate\": {\n \"CountingPeriod\": \"60s\",\n \"Enabled\": \"off\",\n \"MinimalAvgTransferRateThreshold\": \"80bps\"\n },\n \"RequestBodyTransferTimeout\": {\n \"Enabled\": \"off\",\n \"IdleTimeout\": \"5s\"\n }\n }\n },\n \"ManagedRules\": {\n \"AutoUpdate\": {\n \"AutoUpdateToLatestVersion\": \"on\"\n },\n \"DetectionOnly\": \"on\",\n \"Enabled\": \"on\",\n \"ManagedRuleGroups\": [\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-webshell-attacks\",\n \"MetaData\": {\n \"GroupDetail\": \"Webshell检测防护\",\n \"GroupName\": \"Webshell检测防护\",\n \"RuleDetails\": [\n {\n \"Description\": \"此条规则拦截恶意混淆的PHP Webshell\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-05-16T03:02:25Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"防护php代码注入和webshell上传攻击\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2019-04-03T08:25:00Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"此条规则拦截ASP Webshell和JSP Webshell中的恶意函数调用特征\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-05-16T03:04:30Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"此条规则拦截Webshell中存在的登录密码特征\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-01-10T09:39:02Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"针对冰蝎 default_json 传输协议的检测规则\\n\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-07-28T06:24:01Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"针对asp.net webshell的防护规则,基于asp.net webshell的标签特征\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-01-19T09:12:31Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"针对出现在 header 中的 webshell 写入特征\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-03-31T09:37:39Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"此条规则拦截Webshell中可疑的函数调用行为\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-01-12T07:29:50Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"此条规则拦截PHP Webshell中的高危函数调用特征\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-05-16T03:06:10Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"此条规则拦截PHP Webshell中变量定义的行为\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-06-13T03:55:11Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"此条规则基于一些常见的webshell工具连接特征拦截webshell文件\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-08-13T06:35:48Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"防护java代码注入和jsp webshell上传攻击\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2017-11-01T08:53:30Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"针对冰蝎 default_image 传输协议的检测规则\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-07-28T06:24:25Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"此条规则拦截在Webshell中可能会出现的敏感字符串特征\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-01-10T09:43:16Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"防护webshell攻击,检测$_GET/$_POST等敏感变量使用\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2018-11-28T06:51:52Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"此条规则检测恶意混淆的Webshell\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-01-12T07:33:55Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"此条规则拦截具有可疑编码字符串特征的Webshell\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-01-12T07:21:46Z\",\n \"Tags\": [\n\n ]\n }\n ]\n },\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n },\n {\n \"Action\": {\n \"Name\": \"Monitor\"\n },\n \"GroupId\": \"wafgroup-xss-attacks\",\n \"MetaData\": {\n \"GroupDetail\": \"xss跨站脚本攻击防护\",\n \"GroupName\": \"xss跨站脚本攻击防护\",\n \"RuleDetails\": [\n {\n \"Description\": \"严格xss规则,针对一些html标签注入的场景\",\n \"RiskLevel\": \"low\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-03-23T05:32:56Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"此条规则拦截通过data伪协议注入HTML的行为\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-06-20T06:26:44Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"防护xss攻击中的flash xss攻击,检测能调用敏感函数的swf文件的访问请求\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2018-04-18T06:37:44Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对HTTP请求中的cookie字段,防护xss攻击中一些敏感标签及其敏感属性,如<script src=xxx>/<iframe src=javascript:xxx>等攻击特征\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-06-24T12:35:37Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"基于javascript伪装协议特征,拦截GET请求参数中,使用javascript伪协议进行xss利用的行为\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-07-22T03:07:14Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"此条规则拦截XSS攻击中敏感的伪协议调用特征\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-11-22T12:31:05Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对 Ecommerse-1.0 xss漏洞的防护规则\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-11-30T08:47:05Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"拦截在同一HTML标签内调用多个伪协议的攻击特征\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-08-09T02:41:51Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对xss中,针对javascript伪协议的防护\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-04-01T03:47:49Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对一些xss特殊攻击探测防护\",\n \"RiskLevel\": \"low\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2024-11-19T06:37:27Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"防护xss攻击中的一些敏感事件及敏感JS函数,形如onload=xxx和document.cookie等\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2019-01-03T07:36:29Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"此条规则拦截攻击者通过对浏览器伪协议进行实体编码等方式进行的绕过攻击行为\",\n \"RiskLevel\": \"low\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-10-25T12:34:40Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"中等防护模式下,防护常见的反射型/存储型XSS攻击\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-08-17T08:25:13Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对输出点在js环境中xss漏洞利用的场景,如使用 ;new Function(atob(` 执行恶意js代码的操作\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2020-12-28T06:29:01Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"防护在上传请求中存在的反射型/存储型XSS攻击\",\n \"RiskLevel\": \"low\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-08-17T08:23:02Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对xss漏洞利用中,使用on事件执行js的操作,本规则用于覆盖新增的,可用于执行javascript的on事件\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-01-18T08:14:05Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"拦截尝试使用 <isindex 标签进行XSS利用的防护规则\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-11-30T08:43:55Z\",\n \"Tags\": [\n\n ]\n },\n {\n \"Description\": \"防护flash xss攻击\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2017-11-01T03:03:57Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"防护xss攻击,检测攻击者调用alert/prompt等进行弹窗验证或添加恶意DOM节点的敏感操作\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2018-01-02T02:05:19Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"防护攻击者针对XSS漏洞的探测利用行为\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-04-02T08:25:47Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对HTTP请求中的cookie字段,防护XSS攻击中使用实体编码进行绕过的敏感操作\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-06-24T09:24:55Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"严格xss规则,针对一些特殊编码的防护规则\",\n \"RiskLevel\": \"low\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-03-23T12:45:22Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"防护xss攻击,检测攻击者试图通过调用getScript/CreateElement函数来注入外部JS脚本的敏感操作\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2018-01-02T02:09:14Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"防护xss攻击中一些敏感标签及其敏感属性,如<script src=xxx>/<iframe src=javascript:xxx>等攻击特征\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2019-12-31T07:48:29Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对HTTP请求中的cookie字段,检测 xss攻击中 data uri/base64 等攻击特征\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-06-24T10:09:09Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对一些客户端原型链污染探测请求的防护规则\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-09-03T09:26:42Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"超严格模式下,针对特定xss探测payload的拦截规则\",\n \"RiskLevel\": \"low\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-11-10T08:57:34Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"检测 xss中 data uri/base64 的攻击特征\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2017-09-01T03:18:36Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"严格xss规则,针对js中的预定义全局变量\",\n \"RiskLevel\": \"low\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-03-23T05:33:41Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"严格xss规则,针对IE下使用css执行javascript的场景\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-03-23T04:58:47Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"防护恶意的XSS漏洞利用探测行为\",\n \"RiskLevel\": \"low\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-03-23T13:17:23Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"防护利用angularjs特性的XSS攻击\",\n \"RiskLevel\": \"medium\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-04-06T06:21:17Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"防护XSS攻击中实体编码绕过攻击\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2018-01-02T02:21:34Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"宽松模式下,xss防护规则\",\n \"RiskLevel\": \"extreme\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2020-12-07T02:45:26Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"拦截在同一HTML标签内调用多个伪协议的攻击特征\",\n \"RiskLevel\": \"high\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2021-08-09T02:40:05Z\",\n \"Tags\": [\n \"owasp\"\n ]\n },\n {\n \"Description\": \"针对一些历史的XSS攻击向量的防护规则\",\n \"RiskLevel\": \"low\",\n \"RuleId\": \"1492837231\",\n \"RuleVersion\": \"2022-05-16T09:28:20Z\",\n \"Tags\": [\n \"owasp\"\n ]\n }\n ]\n },\n \"RuleActions\": [\n\n ],\n \"SensitivityLevel\": \"strict\"\n }\n ],\n \"SemanticAnalysis\": \"off\"\n },\n \"RateLimitingRules\": {\n \"Rules\": [\n {\n \"Action\": {\n \"Name\": \"Deny\"\n },\n \"ActionDuration\": \"20h\",\n \"Condition\": \"${http.request.uri.path} in ['/api/v3/test','/api/v3/submit']\",\n \"CountBy\": [\n \"http.request.ip\",\n \"http.request.cookies['UserSession']\"\n ],\n \"CountingPeriod\": \"2m\",\n \"Enabled\": \"on\",\n \"Id\": \"1492837231\",\n \"MaxRequestThreshold\": 1000,\n \"Name\": \"SampleHttpDdosRule\",\n \"Priority\": 100\n }\n ]\n }\n }\n}",
|
1583
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"09ce3d28-1119-49cd-d5a9-27cb34dac669\"\n }\n}",
|
1584
|
+
"title": "修改策略模板配置内容"
|
1585
|
+
}
|
1586
|
+
],
|
1541
1587
|
"ModifyZone": [
|
1542
1588
|
{
|
1543
1589
|
"document": "修改站点。",
|
@@ -7336,6 +7336,17 @@
|
|
7336
7336
|
"required": false,
|
7337
7337
|
"type": "string",
|
7338
7338
|
"value_allowed_null": false
|
7339
|
+
},
|
7340
|
+
{
|
7341
|
+
"disabled": false,
|
7342
|
+
"document": "数据源的配置",
|
7343
|
+
"example": "无",
|
7344
|
+
"member": "PublicDataSourceFS",
|
7345
|
+
"name": "PublicDataSource",
|
7346
|
+
"output_required": false,
|
7347
|
+
"required": false,
|
7348
|
+
"type": "object",
|
7349
|
+
"value_allowed_null": false
|
7339
7350
|
}
|
7340
7351
|
],
|
7341
7352
|
"usage": "both"
|
@@ -9339,6 +9350,11 @@
|
|
9339
9350
|
],
|
9340
9351
|
"usage": "both"
|
9341
9352
|
},
|
9353
|
+
"PublicDataSourceFS": {
|
9354
|
+
"document": "公有云数据源结构",
|
9355
|
+
"members": [],
|
9356
|
+
"usage": "both"
|
9357
|
+
},
|
9342
9358
|
"PushTrainingMetricsRequest": {
|
9343
9359
|
"document": "PushTrainingMetrics请求参数结构体",
|
9344
9360
|
"members": [
|
tccli/services/tke/tke_client.py
CHANGED
@@ -1319,6 +1319,58 @@ def doGetUpgradeInstanceProgress(args, parsed_globals):
|
|
1319
1319
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1320
1320
|
|
1321
1321
|
|
1322
|
+
def doModifyNodePoolDesiredCapacityAboutAsg(args, parsed_globals):
|
1323
|
+
g_param = parse_global_arg(parsed_globals)
|
1324
|
+
|
1325
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1326
|
+
cred = credential.CVMRoleCredential()
|
1327
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1328
|
+
cred = credential.STSAssumeRoleCredential(
|
1329
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1330
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1331
|
+
)
|
1332
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1333
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1334
|
+
else:
|
1335
|
+
cred = credential.Credential(
|
1336
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1337
|
+
)
|
1338
|
+
http_profile = HttpProfile(
|
1339
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1340
|
+
reqMethod="POST",
|
1341
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1342
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1343
|
+
)
|
1344
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1345
|
+
if g_param[OptionsDefine.Language]:
|
1346
|
+
profile.language = g_param[OptionsDefine.Language]
|
1347
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1348
|
+
client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
|
1349
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1350
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1351
|
+
model = models.ModifyNodePoolDesiredCapacityAboutAsgRequest()
|
1352
|
+
model.from_json_string(json.dumps(args))
|
1353
|
+
start_time = time.time()
|
1354
|
+
while True:
|
1355
|
+
rsp = client.ModifyNodePoolDesiredCapacityAboutAsg(model)
|
1356
|
+
result = rsp.to_json_string()
|
1357
|
+
try:
|
1358
|
+
json_obj = json.loads(result)
|
1359
|
+
except TypeError as e:
|
1360
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1361
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1362
|
+
break
|
1363
|
+
cur_time = time.time()
|
1364
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1365
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1366
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1367
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1368
|
+
else:
|
1369
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1370
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1371
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1372
|
+
|
1373
|
+
|
1322
1374
|
def doModifyPrometheusAgentExternalLabels(args, parsed_globals):
|
1323
1375
|
g_param = parse_global_arg(parsed_globals)
|
1324
1376
|
|
@@ -6051,7 +6103,7 @@ def doModifyPrometheusTemplate(args, parsed_globals):
|
|
6051
6103
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6052
6104
|
|
6053
6105
|
|
6054
|
-
def
|
6106
|
+
def doSetMachineLogin(args, parsed_globals):
|
6055
6107
|
g_param = parse_global_arg(parsed_globals)
|
6056
6108
|
|
6057
6109
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6080,11 +6132,11 @@ def doModifyNodePoolDesiredCapacityAboutAsg(args, parsed_globals):
|
|
6080
6132
|
client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
|
6081
6133
|
client._sdkVersion += ("_CLI_" + __version__)
|
6082
6134
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6083
|
-
model = models.
|
6135
|
+
model = models.SetMachineLoginRequest()
|
6084
6136
|
model.from_json_string(json.dumps(args))
|
6085
6137
|
start_time = time.time()
|
6086
6138
|
while True:
|
6087
|
-
rsp = client.
|
6139
|
+
rsp = client.SetMachineLogin(model)
|
6088
6140
|
result = rsp.to_json_string()
|
6089
6141
|
try:
|
6090
6142
|
json_obj = json.loads(result)
|
@@ -12745,6 +12797,7 @@ ACTION_MAP = {
|
|
12745
12797
|
"DescribeIPAMD": doDescribeIPAMD,
|
12746
12798
|
"CreateClusterRouteTable": doCreateClusterRouteTable,
|
12747
12799
|
"GetUpgradeInstanceProgress": doGetUpgradeInstanceProgress,
|
12800
|
+
"ModifyNodePoolDesiredCapacityAboutAsg": doModifyNodePoolDesiredCapacityAboutAsg,
|
12748
12801
|
"ModifyPrometheusAgentExternalLabels": doModifyPrometheusAgentExternalLabels,
|
12749
12802
|
"DescribePodsBySpec": doDescribePodsBySpec,
|
12750
12803
|
"DescribeReservedInstances": doDescribeReservedInstances,
|
@@ -12836,7 +12889,7 @@ ACTION_MAP = {
|
|
12836
12889
|
"DescribeEKSContainerInstanceRegions": doDescribeEKSContainerInstanceRegions,
|
12837
12890
|
"DescribePrometheusClusterAgents": doDescribePrometheusClusterAgents,
|
12838
12891
|
"ModifyPrometheusTemplate": doModifyPrometheusTemplate,
|
12839
|
-
"
|
12892
|
+
"SetMachineLogin": doSetMachineLogin,
|
12840
12893
|
"CreateEKSCluster": doCreateEKSCluster,
|
12841
12894
|
"DescribeClusterExtraArgs": doDescribeClusterExtraArgs,
|
12842
12895
|
"UpdateClusterKubeconfig": doUpdateClusterKubeconfig,
|
@@ -6798,7 +6798,7 @@
|
|
6798
6798
|
},
|
6799
6799
|
{
|
6800
6800
|
"disabled": false,
|
6801
|
-
"document": "
|
6801
|
+
"document": "预留券名称,名称不得超过60个字符。",
|
6802
6802
|
"example": "eks",
|
6803
6803
|
"member": "string",
|
6804
6804
|
"name": "InstanceName",
|
@@ -8292,8 +8292,8 @@
|
|
8292
8292
|
"members": [
|
8293
8293
|
{
|
8294
8294
|
"disabled": false,
|
8295
|
-
"document": "预留券实例ID
|
8296
|
-
"example": "[\"
|
8295
|
+
"document": "预留券实例ID。可通过 [DescribeReservedInstances](https://cloud.tencent.com/document/product/457/99162) 接口返回值中的ReservedInstanceId获取。",
|
8296
|
+
"example": "[\"eksri-1cghhuuu\"]",
|
8297
8297
|
"member": "string",
|
8298
8298
|
"name": "ReservedInstanceIds",
|
8299
8299
|
"required": true,
|
@@ -12126,7 +12126,7 @@
|
|
12126
12126
|
"members": [
|
12127
12127
|
{
|
12128
12128
|
"disabled": false,
|
12129
|
-
"document": "集群ID",
|
12129
|
+
"document": "集群 ID。TKE 集群可通过 [DescribeClusters](https://cloud.tencent.com/document/api/457/31862) 接口返回值中的ClusterId获取。",
|
12130
12130
|
"example": "cls-qbc3zefo",
|
12131
12131
|
"member": "string",
|
12132
12132
|
"name": "ClusterId",
|
@@ -12153,7 +12153,7 @@
|
|
12153
12153
|
},
|
12154
12154
|
{
|
12155
12155
|
"disabled": false,
|
12156
|
-
"document": "Pod的Uid",
|
12156
|
+
"document": "Pod的Uid,可以通过Uids 来批量查询,也可以通过 Namespace 和 Name 来查询某个 Pod 的计费信息。Uids 不传时,Namespace 和 Name 必须同时传。",
|
12157
12157
|
"example": "4df5eb56-df50-4bd4-b84e-8c3f7fdf7ab8",
|
12158
12158
|
"member": "string",
|
12159
12159
|
"name": "Uids",
|
@@ -12208,7 +12208,7 @@
|
|
12208
12208
|
},
|
12209
12209
|
{
|
12210
12210
|
"disabled": false,
|
12211
|
-
"document": "
|
12211
|
+
"document": "节点 ID",
|
12212
12212
|
"example": "eklet-subnet-0j105iya",
|
12213
12213
|
"member": "string",
|
12214
12214
|
"name": "NodeName",
|
@@ -12254,7 +12254,7 @@
|
|
12254
12254
|
},
|
12255
12255
|
{
|
12256
12256
|
"disabled": false,
|
12257
|
-
"document": "
|
12257
|
+
"document": "内存,单位:GiB",
|
12258
12258
|
"example": "2",
|
12259
12259
|
"member": "float",
|
12260
12260
|
"name": "Memory",
|
@@ -12263,7 +12263,7 @@
|
|
12263
12263
|
},
|
12264
12264
|
{
|
12265
12265
|
"disabled": false,
|
12266
|
-
"document": "卡数,有0.25、0.5、1、2、4
|
12266
|
+
"document": "卡数,有0.25、0.5、1、2、4和8",
|
12267
12267
|
"example": "0.25",
|
12268
12268
|
"member": "string",
|
12269
12269
|
"name": "GpuNum",
|
@@ -12290,7 +12290,7 @@
|
|
12290
12290
|
},
|
12291
12291
|
{
|
12292
12292
|
"disabled": false,
|
12293
|
-
"document": "
|
12293
|
+
"document": "节点 ID",
|
12294
12294
|
"example": "eklet-subnet-0j105iya",
|
12295
12295
|
"member": "string",
|
12296
12296
|
"name": "NodeName",
|
@@ -13800,7 +13800,7 @@
|
|
13800
13800
|
},
|
13801
13801
|
{
|
13802
13802
|
"disabled": false,
|
13803
|
-
"document": "
|
13803
|
+
"document": "节点 ID",
|
13804
13804
|
"example": "eklet-subnet-0j105iya",
|
13805
13805
|
"member": "string",
|
13806
13806
|
"name": "NodeName",
|
@@ -13875,7 +13875,7 @@
|
|
13875
13875
|
},
|
13876
13876
|
{
|
13877
13877
|
"disabled": false,
|
13878
|
-
"document": "status\n按照**【状态**】进行过滤。状态:Creating
|
13878
|
+
"document": "status\n按照**【状态**】进行过滤。状态:Creating:创建中、Active:生效中、Expired:已过期、Refunded:已退还。\n类型:String\n必选:否\n\nresource-type\n按照**【资源类型**】进行过滤。资源类型:common、amd、v100、t4、a10\\*gnv4、a10\\*gnv4v等,common表示通用类型。\n类型:String\n必选:否\n\ncpu\n按照**【核数**】进行过滤。\n类型:String\n必选:否\n\nmemory\n按照**【内存**】进行过滤。\n类型:String\n必选:否\n\ngpu\n按照**【GPU卡数**】进行过滤,取值有0.25、0.5、1、2、4等。\n类型:String\n必选:否\n\ncluster-id\n按照**【集群ID**】进行过滤。\n类型:String\n必选:否\n\nnode-name\n按照**【节点名称**】进行过滤。\n类型:String\n必选:否\n\nscope\n按照**【可用区**】进行过滤。比如:ap-guangzhou-2,为空字符串表示地域抵扣范围。如果只过滤可用区抵扣范围,需要同时将cluster-id、node-name设置为空字符串。\n类型:String\n必选:否\n\nreserved-instance-id\n按照**【预留实例ID**】进行过滤。预留实例ID形如:eksri-xxxxxxxx。\n类型:String\n必选:否\n\nreserved-instance-name\n按照**【预留实例名称**】进行过滤。\n类型:String\n必选:否\n\nreserved-instance-deduct\n按照**【上个周期抵扣的预留券**】进行过滤。Values可不设置。\n必选:否\n\nreserved-instance-not-deduct\n按照**【上个周期未抵扣的预留券**】进行过滤。Values可不设置。\n必选:否",
|
13879
13879
|
"example": "无",
|
13880
13880
|
"member": "Filter",
|
13881
13881
|
"name": "Filters",
|
@@ -17750,7 +17750,7 @@
|
|
17750
17750
|
"members": [
|
17751
17751
|
{
|
17752
17752
|
"disabled": false,
|
17753
|
-
"document": "购买实例的时长,单位:月。取值范围:1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 24, 36
|
17753
|
+
"document": "购买实例的时长,单位:月。取值范围:1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 24, 36。",
|
17754
17754
|
"example": "1",
|
17755
17755
|
"member": "uint64",
|
17756
17756
|
"name": "Period",
|
@@ -20008,7 +20008,7 @@
|
|
20008
20008
|
"members": [
|
20009
20009
|
{
|
20010
20010
|
"disabled": false,
|
20011
|
-
"document": "
|
20011
|
+
"document": "预留券实例ID。可通过 [DescribeReservedInstances](https://cloud.tencent.com/document/product/457/99162) 接口返回值中的ReservedInstanceId获取。",
|
20012
20012
|
"example": "[\"eksri-mloz4700\"]",
|
20013
20013
|
"member": "string",
|
20014
20014
|
"name": "ReservedInstanceIds",
|
@@ -21011,7 +21011,7 @@
|
|
21011
21011
|
},
|
21012
21012
|
{
|
21013
21013
|
"disabled": false,
|
21014
|
-
"document": "Pod
|
21014
|
+
"document": "Pod 的内存,单位:GiB",
|
21015
21015
|
"example": "40",
|
21016
21016
|
"member": "float",
|
21017
21017
|
"name": "Memory",
|
@@ -21021,7 +21021,7 @@
|
|
21021
21021
|
},
|
21022
21022
|
{
|
21023
21023
|
"disabled": false,
|
21024
|
-
"document": " Pod
|
21024
|
+
"document": " Pod 的类型, intel,amd,windows-common,windows-amd,sa4,sa5,s7,s8,t4,v100,l20,l40,a10\\*gnv4,a10\\*gnv4v,a10\\*pnv4",
|
21025
21025
|
"example": "v100",
|
21026
21026
|
"member": "string",
|
21027
21027
|
"name": "Type",
|
@@ -21169,7 +21169,7 @@
|
|
21169
21169
|
},
|
21170
21170
|
{
|
21171
21171
|
"disabled": false,
|
21172
|
-
"document": "
|
21172
|
+
"document": "节点 ID",
|
21173
21173
|
"example": "eklet-subnet-0j105iya",
|
21174
21174
|
"member": "string",
|
21175
21175
|
"name": "NodeName",
|
@@ -23343,7 +23343,7 @@
|
|
23343
23343
|
},
|
23344
23344
|
{
|
23345
23345
|
"disabled": false,
|
23346
|
-
"document": "
|
23346
|
+
"document": "工作负载类型,如 deployment、statefulset和pod等。",
|
23347
23347
|
"example": "pod",
|
23348
23348
|
"member": "string",
|
23349
23349
|
"name": "Kind",
|
@@ -23912,7 +23912,7 @@
|
|
23912
23912
|
"members": [
|
23913
23913
|
{
|
23914
23914
|
"disabled": false,
|
23915
|
-
"document": "预留券实例ID
|
23915
|
+
"document": "预留券实例ID。可通过 [DescribeReservedInstances](https://cloud.tencent.com/document/product/457/99162) 接口返回值中的ReservedInstanceId获取,每次请求实例的上限为100。",
|
23916
23916
|
"example": "[\"eksri-103ypth4\", \"eksri-mloz4700\"]",
|
23917
23917
|
"member": "string",
|
23918
23918
|
"name": "ReservedInstanceIds",
|
@@ -24107,7 +24107,7 @@
|
|
24107
24107
|
},
|
24108
24108
|
{
|
24109
24109
|
"disabled": false,
|
24110
|
-
"document": " 上个周期预留券的抵扣状态,Deduct
|
24110
|
+
"document": " 上个周期预留券的抵扣状态,Deduct:已抵扣、NotDeduct:未抵扣",
|
24111
24111
|
"example": "Deduct",
|
24112
24112
|
"member": "string",
|
24113
24113
|
"name": "DeductStatus",
|
@@ -24150,7 +24150,7 @@
|
|
24150
24150
|
},
|
24151
24151
|
{
|
24152
24152
|
"disabled": false,
|
24153
|
-
"document": "
|
24153
|
+
"document": "节点 ID",
|
24154
24154
|
"example": "eks-subnet-l6gtb5p0-0",
|
24155
24155
|
"member": "string",
|
24156
24156
|
"name": "NodeName",
|
@@ -24183,7 +24183,7 @@
|
|
24183
24183
|
},
|
24184
24184
|
{
|
24185
24185
|
"disabled": false,
|
24186
|
-
"document": "
|
24186
|
+
"document": "内存,单位:GiB",
|
24187
24187
|
"example": "2",
|
24188
24188
|
"member": "float",
|
24189
24189
|
"name": "Memory",
|
@@ -24237,7 +24237,7 @@
|
|
24237
24237
|
},
|
24238
24238
|
{
|
24239
24239
|
"disabled": false,
|
24240
|
-
"document": "
|
24240
|
+
"document": "内存,单位:GiB",
|
24241
24241
|
"example": "1.0",
|
24242
24242
|
"member": "float",
|
24243
24243
|
"name": "Memory",
|
@@ -24247,7 +24247,7 @@
|
|
24247
24247
|
},
|
24248
24248
|
{
|
24249
24249
|
"disabled": false,
|
24250
|
-
"document": "
|
24250
|
+
"document": " 预留券类型, common:CPU通用,amd:AMD专用,windows-common: Windows容器 CPU通用,windows-amd:Windows容器 AMD专用,sa4,sa5,s7,s8,t4,v100,l20,l40,a10\\*gnv4,a10\\*gnv4v,a10\\*pnv4",
|
24251
24251
|
"example": "common",
|
24252
24252
|
"member": "string",
|
24253
24253
|
"name": "Type",
|
@@ -24287,7 +24287,7 @@
|
|
24287
24287
|
},
|
24288
24288
|
{
|
24289
24289
|
"disabled": false,
|
24290
|
-
"document": "
|
24290
|
+
"document": "节点 ID",
|
24291
24291
|
"example": "eklet-subnet-qbc3zefo",
|
24292
24292
|
"member": "string",
|
24293
24293
|
"name": "NodeName",
|