检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
description = "Specifies the resource type list. " type = list(string) default = [] } variable "BucketName" { description =
合规” ecs-instance-in-vpc ECS资源属于指定虚拟私有云ID ecs,vpc 指定虚拟私有云ID,不属于此VPC的ECS资源,视为“不合规” ecs-instance-no-public-ip ECS资源不能公网访问 ecs ECS资源具有弹性公网IP,视为“不合规”
"description" : "预定义合规包模板示例。", "template_body" : "Omit it.", "parameters" : { "listOfAllowedFlavors" : { "description" : "The
"description" : "预定义合规包模板示例。", "template_body" : "Omit it.", "parameters" : { "listOfAllowedFlavors" : { "description" :
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
资源详细属性 用例参考如下: 示例1:查询资源聚合器下关机状态的弹性云服务器名称 SELECT domainId, name FROM aggregator_resources WHERE provider = 'ecs' AND type = 'cloudservers' AND
规则详情 表1 规则详情 参数 说明 规则名称 volume-unused-check 规则展示名 云硬盘闲置检测 规则描述 云硬盘未挂载给任何云服务器,视为“不合规”。 标签 evs 规则触发方式 配置变更 规则评估的资源类型 evs.volumes 规则参数 无 父主题: 云硬盘 EVS
规则类型,包括预定义合规规则(builtin)和用户自定义合规规则(custom) id String 规则ID。 name String 规则名称。 description String 规则描述。 policy_filter PolicyFilterDefinition object 规则过滤器。 period
"version" : 4, "OsExtIpsMacAddr" : "fa:16:3e:6e:cf:33" } ], "accessIpv4" : "", "accessIpv6" : "", "configDrive" : ""
String 策略名称。 display_name String 策略展示名。 policy_type String 策略类型。 description String 策略描述。 policy_rule_type String 策略语法类型。 policy_rule Object 策略规则。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"organization_policy_assignment_name" : "allowed-images-by-id", "description" : "The ECS resource is non-compliant if the image it used is not in the
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted