检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
最小长度:1 最大长度:64 ip String 访问所连接的终端节点服务的IP。 仅当同时满足如下条件时,返回该参数: 当查询连接interface类型终端节点服务的终端节点时。 终端节点服务启用“连接审批”功能,且已经“接受”连接审批。
最小长度:0 最大长度:32 ip String 访问所连接的终端节点服务的IP。 仅当同时满足如下条件时,返回该参数: 当查询连接interface类型终端节点服务的终端节点时。 终端节点服务启用“连接审批”功能,且已经“接受”连接审批。
VPC终端节点(VPC Endpoint),可以在VPC内提供便捷、安全、私密的通道与终端节点服务(华为云服务、用户私有服务)进行连接,该服务使用华为云内部网络,无需弹性公网IP。 VPC终端节点服务在本方案中主要用于实现通过华为云内网访问云上VPC内的资源和其他云服务。
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
终端节点的访问控制:支持通过白名单设置允许访问终端节点的IP地址或网段。在购买终端节点时以及购买完成后,均可以开启或关闭终端节点的访问控制功能,也可以添加或删除白名单,详情参见设置终端节点的访问控制 父主题: 安全
pendingAcceptance:待接受 creating:创建中 accepted:已接受 rejected:已拒绝 failed:失败 deleting:删除中 description String 终端节点连接描述。
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
endpoint:虚拟IP,适用于作为虚IP场景使用 请求参数 表2 请求Header参数 参数 是否必选 参数类型 描述 X-Auth-Token 是 String 用户Token。
"is_domain": false, "parent_id": "65ewtrgaggshhk1223245sghjlse684b", "name": "project_name", "description
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
Endpoint:指定承载REST服务端点的服务器域名或IP,不同服务不同区域的Endpoint不同,您可以从地区和终端节点中获取。
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure