检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
project_id}/policies Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token The token can be obtained by calling the IAM
LOG_BUCKET = "***oss log bucket***" OSS_ENDPOINT = "***oss endpoint***" # Huawei Cloud information #Use the AK/SK pair of an account that has only the required IAM and OMS permissions.
required_providers {\n huaweicloud = {\n source = \"huawei.com/provider/huaweicloud\"\n version = \"1.41.0\"\n }\n }\n}\nprovider \"huaweicloud\"{\n insecure = true\n cloud = \"{cloud_name}\"\n region = \"{region}\"\n endpoints = {\n iam
JDBC of this version does not support identity & access management suite (IAM) for authentication. The GaussDB JDBC driver has the following enhanced features: The SHA256 encryption mode is supported for login.
Preparations Prepare a Huawei account or an IAM user that can access MgC. For details, see Preparations. Create an application migration project on the MgC console. Add the AK/SK pair used for accessing the source cloud platform to MgC.
Agency An agency is created by the account administrator on the IAM console. Using an agency, you can share your cloud server resources with another account, or entrust a more professional person or team to manage your resources.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token. Table 2 Request body parameters Parameter Mandatory Type Description project_id Yes String Parameter description: Project ID.
auth_url: "https://iam.ap-southeast-1.myhuaweicloud.com/v3" project_name: "ap-southeast-1" access_key: "********" secret_key: "***********" region: "ap-southeast-1" Parameters in the preceding content are described as follows: auth_url: indicates the IAM
It can be obtained by calling the IAM API used to obtain a user token.
You can obtain the token by calling the IAM API Obtaining a User Token Through Password Authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.
You can obtain the token by calling the IAM API Obtaining a User Token Through Password Authentication. X-Subject-Token in the response header returned by the API is the desired user token. For details about how to obtain the token, see Token Authentication.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Table 3 Request body parameters Parameter Mandatory Type Description name Yes String Response name. Enter 1 to 64 characters.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Table 3 Request body parameters Parameter Mandatory Type Description name Yes String Response name. Enter 1 to 64 characters.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Table 3 Request body parameters Parameter Mandatory Type Description orchestration_name Yes String Orchestration mapping rule name.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Authorization No String Authentication information. This parameter is mandatory for AK/SK authentication.
For details, see Granting LTS Permissions to IAM Users. This section uses a Linux ECS as an example. Prepare an ECS for log collection. For details, see Purchasing an ECS in Custom Config Mode. If you already have an available ECS, skip this step.