检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        8776 results found.
        • Obtaining Cluster Daemonset Information - Host Security Service

          Obtaining Cluster Daemonset Information - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Container Installation and Configuration
        • Obtaining Cluster Configurations - Host Security Service

          Obtaining Cluster Configurations - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Cluster Management
        • Querying the Check Result of a Security Configuration Item - Host Security Service

          Querying the Check Result of a Security Configuration Item - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Response Parameters Status code: 200 Table 4 Response body parameters Parameter Type Description severity String Risk level.

          Help > Host Security Service > API Reference > API Description > Baseline Management
        • Querying the Check Item List of a Specified Security Configuration Item of an Image - Host Security Service

          Querying the Check Item List of a Specified Security Configuration Item of an Image - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Container Image
        • Creating Tags in Batches - Host Security Service

          Creating Tags in Batches - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Tag Management
        • Viewing Details About a Specified Policies - Host Security Service

          Viewing Details About a Specified Policies - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Cluster Protection
        • Querying Product and Offering Information - Host Security Service

          Querying Product and Offering Information - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Quota Management
        • Querying the List of Protected Servers - Host Security Service

          Querying the List of Protected Servers - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.

          Help > Host Security Service > API Reference > API Description > Application Protection
        • Querying Java Applications of a Protected Server - Host Security Service

          Querying Java Applications of a Protected Server - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Application Protection
        • Modifying a Vulnerability Scan Policy - Host Security Service

          Modifying a Vulnerability Scan Policy - Host Security Service

          It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.

          Help > Host Security Service > API Reference > API Description > Vulnerability Management
        • This API is used to handle virus scan results. - Host Security Service

          This API is used to handle virus scan results. - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Table 4 Request body parameters Parameter Mandatory Type Description operate_type Yes String Handling method.

          Help > Host Security Service > API Reference > API Description > Virus Scan
        • Querying the Status of Dynamic WTP for a Server - Host Security Service

          Querying the Status of Dynamic WTP for a Server - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Web Tamper Protection
        • Deleting Isolated Files - Host Security Service

          Deleting Isolated Files - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Event Management
        • Querying Image Vulnerability Information - Host Security Service

          Querying Image Vulnerability Information - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Container Image
        • Querying the Cluster Component Protection Policy Templates - Host Security Service

          Querying the Cluster Component Protection Policy Templates - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Cluster Management
        • Querying the Mirror Configuration Check Report - Host Security Service

          Querying the Mirror Configuration Check Report - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Container Image
        • Editing a Server Group - Host Security Service

          Editing a Server Group - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Server Management
        • Querying the Result List of Server Security Configuration Check - Host Security Service

          Querying the Result List of Server Security Configuration Check - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Baseline Management
        • Obtaining the Cluster Protection Policies - Host Security Service

          Obtaining the Cluster Protection Policies - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Cluster Protection
        • Creating a CCE Integrated Protection Configuration - Host Security Service

          Creating a CCE Integrated Protection Configuration - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. region Yes String Region ID Table 4 Request body parameters Parameter Mandatory Type Description cluster_type No String CCE cluster type.

          Help > Host Security Service > API Reference > API Description > Cluster Management
        Total results: 8776
        • Previous
        • 1
        • ...
        • 381
        • 382
        • 383
        • ...
        • 439
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement