检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Memory Usage Exceeds the Threshold ALM-45739 TokenServer Non-Heap Memory Usage Exceeds the Threshold ALM-45740 TokenServer GC Duration Exceeds the Threshold ALM-45741 Failed to Call the ECS securitykey API ALM-45742 Failed to Call the ECS Metadata API ALM-45743 Failed to Call the IAM
It can be obtained by calling the IAM API (value of X-Subject-Token in the response header). Table 3 Request body parameters Parameter Mandatory Type Description jobs Yes Array of Job objects Job list. For details, see the descriptions of jobs parameters.
It can be obtained by calling the IAM API (value of X-Subject-Token in the response header). Table 3 Request body parameters Parameter Mandatory Type Description jobs Yes Array of Job objects Job list. For details, see the descriptions of jobs parameters.
It can be obtained through the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Content-Type Yes String Message body type (format). The default value is application/json.
It can be obtained through the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Content-Type Yes String Message body type (format). The default value is application/json.
It can be obtained through the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Content-Type Yes String Message body type (format). The default value is application/json.
Table 18 Identity and Access Management (IAM) Event Source Event Name Event ID Event Severity IAM Login login Minor Logout logout Minor Password changed changePassword Major User created createUser Minor User deleted deleteUser Major User updated updateUser Minor User group created
Table 18 Identity and Access Management (IAM) Event Source Event Name Event ID Event Severity IAM Login login Minor Logout logout Minor Password changed changePassword Major User created createUser Minor User deleted deleteUser Major User updated updateUser Minor User group created
Minimum: 1 Maximum: 64 Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).
Minimum: 1 Maximum: 64 Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
Minimum length: 1 character Maximum length: 1,024 characters Request Table 3 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String The token used for IAM authentication.
It can be obtained by calling the IAM API (value of X-Subject-Token in the response header).
Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String Specifies the token used for IAM authentication.
It can be obtained by calling the IAM API (value of X-Subject-Token in the response header). X-Language Yes String Request language Table 3 Request body parameters Parameter Mandatory Type Description jobs Yes Array of Job objects Job list.
You can obtain the token by calling the IAM API Obtaining a User Token Through Password Authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.
You can obtain the token by calling the IAM API Obtaining a User Token Through Password Authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.
It can be obtained by calling the IAM API used to obtain a user token.
This section describes the elements used by IAM custom identity policies and Organizations SCPs. The elements include actions, resources, and conditions. For details about how to use these elements to create a custom SCP, see Creating an SCP.