检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
ECS(弹性云服务器) 对象存储服务 OBS Bucket(桶) 虚拟私有云 VPC VPC(虚拟私有云) Subnet(子网) 弹性公网IP EIP EIP(弹性公网IP) 云硬盘 EVS Disk(磁盘) 云硬盘备份 VBS Backup(云硬盘备份) Backup policy(备份策略)
您也可以在标签管理服务控制台搜索指定区域下的全部资源标签和预定义标签,并支持为标签批量绑定多个云资源,每次操作支持批量绑定500个云资源。 本章节指导您如何利用标签对资源进行查询,如何创建标签键、添加资源标签以及对资源进行标签的刷新、修改、删除等操作,还包括如何将多个云资源批量绑定标签。 约束与限制
"**********", "email": "email", "description": "IAM User Description" } } 到这里为止这个请求需要的内容就具备齐全了,您可以使用curl、Postman或
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
scaling_group, images, disk,vpcs,security-groups, shared_bandwidth,eip, cdn等,具体请参见“查询标签管理支持的服务”章节。 tags 是 Array of Tag objects 标签列表 without_any_tag
scaling_group, images, disk,vpcs,security-groups, shared_bandwidth,eip, cdn等,具体请参见“查询标签管理支持的服务”章节。 表4 CreateTagRequest 参数 是否必选 参数类型 描述 key 是 String
scaling_group, images, disk,vpcs,security-groups, shared_bandwidth,eip, cdn等,具体请参见“查询标签管理支持的服务”章节。 请求参数 表3 请求Header参数 参数 是否必选 参数类型 描述 X-Auth-Token
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"c131886aec...", "name": "IAMUser", "description": "IAM User Description", "areacode": "", "phone": "",
scaling_group, images, disk,vpcs,security-groups, shared_bandwidth,eip, cdn等,具体请参见“查询标签管理支持的服务”章节。 表4 DeleteTagRequest 参数 是否必选 参数类型 描述 key 是 String
5sghjlse684b", "name": "project_name", "description": "", "links": { "next": null,
密码等信息。 区域(Region) 从地理位置和网络时延维度划分,同一个Region内共享弹性计算、块存储、对象存储、VPC网络、弹性公网IP、镜像等公共服务。Region分为通用Region和专属Region,通用Region指面向公共租户提供通用云服务的Region;专属Re
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted