检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
String 策略名称。 display_name String 策略展示名。 policy_type String 策略类型。 description String 策略描述。 policy_rule_type String 策略语法类型。 policy_rule Object 策略规则。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"organization_policy_assignment_name" : "allowed-images-by-id", "description" : "The ECS resource is non-compliant if the image it used is not in the
应用容器化改造介绍 应用容器化改造流程 步骤1:对应用进行分析 步骤2:准备应用运行环境 步骤2:准备应用运行环境 步骤2:准备应用运行环境 更多 云服务器卡顿 应用容器化改造介绍 应用容器化改造流程 步骤1:对应用进行分析 步骤2:准备应用运行环境 更多 Ping不通 应用容器化改造介绍 应用容器化改造流程
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"010d95bd-87cd-4f22-ac00-db7fba7d927e", "resource_name" : "ecs-cc-image-test1", "resource_provider" : "ecs", "resource_type" : "cloudservers", "trigger_type"
"010d95bd-87cd-4f22-ac00-db7fba7d927e", "resource_name" : "ecs-cc-image-test1", "resource_provider" : "ecs", "resource_type" : "cloudservers", "trigger_type"
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
display_name最大长度为64个字符。 description 合规策略的描述 description最大长度为512个字符。 parameters 合规策略的规则参数,即每个合规策略下包含的参数。 具有如下属性: name description type default_value
"010d95bd-87cd-4f22-ac00-db7fba7d927e", "resource_name" : "ecs-cc-image-test1", "resource_provider" : "ecs", "resource_type" : "cloudservers", "trigger_type"
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"version" : 4, "OsExtIpsMacAddr" : "fa:16:3e:6e:cf:33" } ], "accessIpv4" : "", "accessIpv6" : "", "configDrive" : ""
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"organization_policy_assignment_name" : "allowed-images-by-id", "description" : "The ECS resource is non-compliant if the image it used is not in the
"resource_id": "special-ecs1-with-public-ip-with-tag", "resource_name": "ecs1-with-public-ip-with-tag", "resource_provider": "ecs", "resource_type":