1. 接口描述
接口请求域名: cwp.tencentcloudapi.com 。
应用防护事件列表接口
默认接口请求频率限制:20次/秒。
推荐使用 API Explorer
点击调试
API Explorer 提供了在线调用、签名验证、SDK 代码生成和快速检索接口等能力。您可查看每次调用的请求内容和返回结果以及自动生成 SDK 调用示例。
2. 输入参数
以下请求参数列表仅列出了接口请求参数和部分公共参数,完整公共参数列表见 公共请求参数。
| 参数名称 | 必选 | 类型 | 描述 |
|---|---|---|---|
| Action | 是 | String | 公共参数,本接口取值:DescribeRaspEventTCSS。 |
| Version | 是 | String | 公共参数,本接口取值:2018-02-28。 |
| Region | 否 | String | 公共参数,此参数为可选参数。 |
| Filters.N | 否 | Array of Filter | 过滤条件:Keywords: ip或者主机名, VulKeywords漏洞名或者CveId模糊查询;AttackTypeKeywords攻击类型名模糊查询;Quuid,VulId,EventType,Status精确匹配,CreateBeginTime,CreateEndTime时间段查询 示例值:[{ "Name": "Keywords", "Values": [“127.0.0.1”], "ExactMatch": false }] |
| Offset | 否 | Integer | 数据偏移 示例值:0 |
| Limit | 否 | Integer | 数据限制 示例值:10 |
| Order | 否 | String | 排序,大小写无关:asc 升序,desc降序 示例值:asc |
| By | 否 | String | 排序列,严格相等:CreateTime创建时间,MergeTime合并时间,Count事件数量 示例值:CreateTime |
3. 输出参数
| 参数名称 | 类型 | 描述 |
|---|---|---|
| TotalCount | Integer | 数据总数 示例值:1 |
| List | Array of RaspEvent | 漏洞防御事件列表 |
| RequestId | String | 唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。 |
4. 示例
示例1 容器视角应用防护事件列表
输入示例
POST / HTTP/1.1
Host: cwp.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeRaspEventTCSS
<公共请求参数>
{}
输出示例
{
"Response": {
"List": [
{
"Alias": "eklet-subnet-0xubkp3m-cxta723y",
"AttackPort": 8080,
"AttackType": 28,
"AttackTypeName": "内存马注入",
"City": "局域网",
"ClusterId": "cls-57v6lmfy",
"ClusterName": "tcss-serverless",
"ContainerId": "ea7107e1acca9ed1472ad2b375b6fd446dd08b417a741a382d9c852c2c761893",
"ContainerName": "tomcat",
"ContainerNetStatus": "NORMAL",
"ContainerStatus": "RUNNING",
"Count": 2,
"CreateTime": "2025-06-25 16:22:27",
"CveId": "",
"EventType": 1,
"Id": 106286,
"ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
"ImageName": "ccr.ccs.tencentyun.com/os_images/yancyw:javamemhorse_scan_and_inject",
"InstanceID": "eklet-subnet-0xubkp3m-cxta723y",
"MergeTime": "2025-06-25 16:57:28",
"NodeId": "eklet-subnet-0xubkp3m-cxta723y",
"NodeName": "eklet-subnet-0xubkp3m-cxta723y",
"NodeType": "SUPER",
"NodeUniqueID": "19312f17bdfe56d44739f2b4dfc0417f",
"Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
"PocID": "",
"PodIp": "10.0.0.61",
"PodName": "tomcat-deployment-7b5599d474-jpcps",
"PrivateIp": "",
"PublicIp": "",
"Quuid": "e6b85182-534c-4d80-8c4e-d5548636e279",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.0.0.61:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
"SourceIp": "10.0.0.32",
"Status": 0,
"Url": "http://10.0.0.61:8080/shell_inject.jsp",
"Uuid": "e6b85182-534c-4d80-8c4e-d5548636e279",
"VulId": 0,
"VulName": ""
},
{
"Alias": "eklet-subnet-0xubkp3m-xve59hdg",
"AttackPort": 8080,
"AttackType": 28,
"AttackTypeName": "内存马注入",
"City": "局域网",
"ClusterId": "cls-57v6lmfy",
"ClusterName": "tcss-serverless",
"ContainerId": "634c6324bfec618430f58304f3e372c3a169b00f0bf6d6bd5474a5f4d38bb34c",
"ContainerName": "tomcat",
"ContainerNetStatus": "",
"ContainerStatus": "",
"Count": 1,
"CreateTime": "2025-06-24 16:52:24",
"CveId": "",
"EventType": 1,
"Id": 106263,
"ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
"ImageName": "ccr.ccs.tencentyun.com/os_images/yancyw@sha256:0f20d56d544e04a60fb21feecddc7f256d3eaef3a34a9b9380082ca67f229d73",
"InstanceID": "eklet-subnet-0xubkp3m-xve59hdg",
"MergeTime": "2025-06-24 16:52:24",
"NodeId": "eklet-subnet-0xubkp3m-xve59hdg",
"NodeName": "eklet-subnet-0xubkp3m-xve59hdg",
"NodeType": "SUPER",
"NodeUniqueID": "",
"Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
"PocID": "",
"PodIp": "10.0.0.79",
"PodName": "tomcat-deployment-7b5599d474-r24hn",
"PrivateIp": "",
"PublicIp": "",
"Quuid": "e9c09e92-d7bb-494f-915d-d790d56acf5f",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.0.0.79:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
"SourceIp": "10.0.0.32",
"Status": 0,
"Url": "http://10.0.0.79:8080/shell_inject.jsp",
"Uuid": "e9c09e92-d7bb-494f-915d-d790d56acf5f",
"VulId": 0,
"VulName": ""
},
{
"Alias": "容器tcss - yancyw",
"AttackPort": 8080,
"AttackType": 28,
"AttackTypeName": "内存马注入",
"City": "局域网",
"ClusterId": "bd4c542c12cc1379051fbaa785edac24",
"ClusterName": "yancyw自建",
"ContainerId": "d3a3afee5898b7c0c65b1b0b5ab373fe4485ea874d7982148125076825e340b0",
"ContainerName": "/k8s_tomcat_tomcat-deployment-7869cf68f8-lbkmn_default_100c0737-f874-41f9-aaf2-d876efc7d844_0",
"ContainerNetStatus": "",
"ContainerStatus": "",
"Count": 1,
"CreateTime": "2025-06-24 16:23:36",
"CveId": "",
"EventType": 1,
"Id": 106262,
"ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
"ImageName": "ccr.ccs.tencentyun.com/os_images/yancyw:javamemhorse_scan_and_inject",
"InstanceID": "ins-p9dtz756",
"MergeTime": "2025-06-24 16:23:36",
"NodeId": "ins-p9dtz756",
"NodeName": "容器tcss - yancyw",
"NodeType": "NORMAL",
"NodeUniqueID": "",
"Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
"PocID": "",
"PodIp": "",
"PodName": "",
"PrivateIp": "172.16.48.109",
"PublicIp": "43.139.121.191",
"Quuid": "1fb8340e-5bf1-4b1d-959a-1a2987e57a36",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.96.65.126:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
"SourceIp": "172.16.48.109",
"Status": 0,
"Url": "http://10.96.65.126:8080/shell_inject.jsp",
"Uuid": "1fb8340e-5bf1-4b1d-959a-1a2987e57a36",
"VulId": 0,
"VulName": ""
},
{
"Alias": "容器tcss - yancyw",
"AttackPort": 8080,
"AttackType": 28,
"AttackTypeName": "内存马注入",
"City": "局域网",
"ClusterId": "bd4c542c12cc1379051fbaa785edac24",
"ClusterName": "yancyw自建",
"ContainerId": "7c53ddedb5a3b94924f4f17a0eb8618ee8a814db50ea4918bf9b9fc3c10591a6",
"ContainerName": "/k8s_tomcat_tomcat-deployment-7869cf68f8-wrw84_default_ba02ced0-d4fe-4661-a986-f17a24127f01_0",
"ContainerNetStatus": "",
"ContainerStatus": "",
"Count": 2,
"CreateTime": "2025-06-24 16:13:34",
"CveId": "",
"EventType": 1,
"Id": 106260,
"ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
"ImageName": "ccr.ccs.tencentyun.com/os_images/yancyw:javamemhorse_scan_and_inject",
"InstanceID": "ins-p9dtz756",
"MergeTime": "2025-06-24 16:14:19",
"NodeId": "ins-p9dtz756",
"NodeName": "容器tcss - yancyw",
"NodeType": "NORMAL",
"NodeUniqueID": "",
"Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
"PocID": "",
"PodIp": "",
"PodName": "",
"PrivateIp": "172.16.48.109",
"PublicIp": "43.139.121.191",
"Quuid": "1fb8340e-5bf1-4b1d-959a-1a2987e57a36",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.96.65.126:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
"SourceIp": "172.16.48.109",
"Status": 0,
"Url": "http://10.96.65.126:8080/shell_inject.jsp",
"Uuid": "1fb8340e-5bf1-4b1d-959a-1a2987e57a36",
"VulId": 0,
"VulName": ""
},
{
"Alias": "eklet-subnet-0xubkp3m-rf316qva",
"AttackPort": 8080,
"AttackType": 28,
"AttackTypeName": "内存马注入",
"City": "局域网",
"ClusterId": "cls-57v6lmfy",
"ClusterName": "tcss-serverless",
"ContainerId": "f53646ba8712b54b3a3bf3a027679fec9a61495e426112903c515419042e1edd",
"ContainerName": "tomcat",
"ContainerNetStatus": "",
"ContainerStatus": "",
"Count": 1079,
"CreateTime": "2025-06-24 10:22:13",
"CveId": "",
"EventType": 1,
"Id": 105069,
"ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
"ImageName": "testss",
"InstanceID": "eklet-subnet-0xubkp3m-rf316qva",
"MergeTime": "2025-06-24 11:31:20",
"NodeId": "eklet-subnet-0xubkp3m-rf316qva",
"NodeName": "eklet-subnet-0xubkp3m-rf316qva",
"NodeType": "SUPER",
"NodeUniqueID": "",
"Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
"PocID": "",
"PodIp": "10.0.0.42",
"PodName": "tomcat-deployment-7b5599d474-vbthg",
"PrivateIp": "",
"PublicIp": "",
"Quuid": "b9bd26ce-fda8-436c-8097-f605b93e3741",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.0.0.42:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
"SourceIp": "10.0.0.32",
"Status": 0,
"Url": "http://10.0.0.42:8080/shell_inject.jsp",
"Uuid": "b9bd26ce-fda8-436c-8097-f605b93e3741",
"VulId": 0,
"VulName": ""
},
{
"Alias": "eklet-subnet-0xubkp3m-cxta723y",
"AttackPort": 0,
"AttackType": 1,
"AttackTypeName": "",
"City": "",
"ClusterId": "cls-57v6lmfy",
"ClusterName": "tcss-serverless",
"ContainerId": "440fb71ea10b531dd8eed3057e472596a6ab31f7e234ebc318f72e4a384985dc",
"ContainerName": "solr-container",
"ContainerNetStatus": "NORMAL",
"ContainerStatus": "RUNNING",
"Count": 21,
"CreateTime": "2025-06-23 17:55:55",
"CveId": "CVE-2021-44228",
"EventType": 1,
"Id": 74692,
"ImageId": "sha256:052794134d434bc2db0775211589beb372412af333a262dbf7977d28ec8d2142",
"ImageName": "docker.io/vulhub/solr:8.11.0",
"InstanceID": "eklet-subnet-0xubkp3m-cxta723y",
"MergeTime": "2025-06-23 22:50:31",
"NodeId": "eklet-subnet-0xubkp3m-cxta723y",
"NodeName": "eklet-subnet-0xubkp3m-cxta723y",
"NodeType": "SUPER",
"NodeUniqueID": "19312f17bdfe56d44739f2b4dfc0417f",
"Poc": "bGRhcDovLzEuOC4wXzEwMi5leGFtcGxlLmNvbQ==",
"PocID": "pcmgr-333393",
"PodIp": "10.0.0.85",
"PodName": "solr-deployment-5f5c757bc4-tfrsq",
"PrivateIp": "",
"PublicIp": "",
"Quuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"na\"},{\"name\":\"Poc\",\"value\":\"bGRhcDovLzEuOC4wXzEwMi5leGFtcGxlLmNvbQ==\"}]",
"SourceIp": "",
"Status": 0,
"Url": "na",
"Uuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
"VulId": 333393,
"VulName": "Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)"
},
{
"Alias": "eklet-subnet-0xubkp3m-cxta723y",
"AttackPort": 0,
"AttackType": 9,
"AttackTypeName": "任意文件读取",
"City": "",
"ClusterId": "cls-57v6lmfy",
"ClusterName": "tcss-serverless",
"ContainerId": "440fb71ea10b531dd8eed3057e472596a6ab31f7e234ebc318f72e4a384985dc",
"ContainerName": "solr-container",
"ContainerNetStatus": "NORMAL",
"ContainerStatus": "RUNNING",
"Count": 1,
"CreateTime": "2025-06-23 15:56:13",
"CveId": "",
"EventType": 1,
"Id": 74668,
"ImageId": "sha256:052794134d434bc2db0775211589beb372412af333a262dbf7977d28ec8d2142",
"ImageName": "docker.io/vulhub/solr:8.11.0",
"InstanceID": "eklet-subnet-0xubkp3m-cxta723y",
"MergeTime": "2025-06-23 15:56:13",
"NodeId": "eklet-subnet-0xubkp3m-cxta723y",
"NodeName": "eklet-subnet-0xubkp3m-cxta723y",
"NodeType": "SUPER",
"NodeUniqueID": "19312f17bdfe56d44739f2b4dfc0417f",
"Poc": "L2V0Yy9qYXZhLTgtb3Blbmpkay9uZXQucHJvcGVydGllcw==",
"PocID": "",
"PodIp": "10.0.0.85",
"PodName": "solr-deployment-5f5c757bc4-tfrsq",
"PrivateIp": "",
"PublicIp": "",
"Quuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"na\"},{\"name\":\"Poc\",\"value\":\"L2V0Yy9qYXZhLTgtb3Blbmpkay9uZXQucHJvcGVydGllcw==\"}]",
"SourceIp": "",
"Status": 0,
"Url": "na",
"Uuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
"VulId": 0,
"VulName": ""
},
{
"Alias": "eklet-subnet-0xubkp3m-cxta723y",
"AttackPort": 0,
"AttackType": 14,
"AttackTypeName": "JNDI注入",
"City": "",
"ClusterId": "cls-57v6lmfy",
"ClusterName": "tcss-serverless",
"ContainerId": "440fb71ea10b531dd8eed3057e472596a6ab31f7e234ebc318f72e4a384985dc",
"ContainerName": "solr-container",
"ContainerNetStatus": "NORMAL",
"ContainerStatus": "RUNNING",
"Count": 39,
"CreateTime": "2025-06-23 15:56:13",
"CveId": "",
"EventType": 1,
"Id": 74667,
"ImageId": "sha256:052794134d434bc2db0775211589beb372412af333a262dbf7977d28ec8d2142",
"ImageName": "docker.io/vulhub/solr:8.11.0",
"InstanceID": "eklet-subnet-0xubkp3m-cxta723y",
"MergeTime": "2025-06-23 22:50:31",
"NodeId": "eklet-subnet-0xubkp3m-cxta723y",
"NodeName": "eklet-subnet-0xubkp3m-cxta723y",
"NodeType": "SUPER",
"NodeUniqueID": "19312f17bdfe56d44739f2b4dfc0417f",
"Poc": "bGRhcDovLzEuOC4wXzEwMi5leGFtcGxlLmNvbQ==",
"PocID": "",
"PodIp": "10.0.0.85",
"PodName": "solr-deployment-5f5c757bc4-tfrsq",
"PrivateIp": "",
"PublicIp": "",
"Quuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"na\"},{\"name\":\"Poc\",\"value\":\"bGRhcDovLzEuOC4wXzEwMi5leGFtcGxlLmNvbQ==\"}]",
"SourceIp": "",
"Status": 0,
"Url": "na",
"Uuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
"VulId": 0,
"VulName": ""
},
{
"Alias": "dy-test-linux2-rasp测试中勿动",
"AttackPort": 0,
"AttackType": 38,
"AttackTypeName": "其他类型反序列化漏洞",
"City": "",
"ClusterId": "",
"ClusterName": "",
"ContainerId": "38c145520c6ba6ec8698dc0be1fb353c93a7e0001624ce1799c90e547de71d58",
"ContainerName": "/nacos-standalone-mysql",
"ContainerNetStatus": "",
"ContainerStatus": "",
"Count": 1,
"CreateTime": "2025-06-23 15:51:58",
"CveId": "",
"EventType": 2,
"Id": 74666,
"ImageId": "sha256:440657d52bc38d9436aef0c8148abd381a2f88832f043a7691e08365511c2be3",
"ImageName": "ccr.ccs.tencentyun.com/vultarget/nacos_jraft_rce:2.2.0",
"InstanceID": "ins-hbzudk94",
"MergeTime": "2025-06-23 15:51:58",
"NodeId": "ins-hbzudk94",
"NodeName": "dy-test-linux2-rasp测试中勿动",
"NodeType": "NORMAL",
"NodeUniqueID": "",
"Poc": "amF2YXguc3dpbmcuVUlEZWZhdWx0cw==",
"PocID": "",
"PodIp": "",
"PodName": "",
"PrivateIp": "172.17.17.11",
"PublicIp": "43.136.74.150",
"Quuid": "470dd074-4d37-47bf-a204-c4fec27ef152",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"na\"},{\"name\":\"Poc\",\"value\":\"amF2YXguc3dpbmcuVUlEZWZhdWx0cw==\"}]",
"SourceIp": "",
"Status": 1,
"Url": "na",
"Uuid": "470dd074-4d37-47bf-a204-c4fec27ef152",
"VulId": 0,
"VulName": ""
},
{
"Alias": "dy-test-linux2-rasp测试中勿动",
"AttackPort": 8080,
"AttackType": 26,
"AttackTypeName": "恶意外链",
"City": "局域网",
"ClusterId": "",
"ClusterName": "",
"ContainerId": "1ed5588c3c9720e892e5c34b4d42acfe3186148f64f4aa391c1d5b3daa7d654b",
"ContainerName": "/vultarget-jira-1",
"ContainerNetStatus": "",
"ContainerStatus": "",
"Count": 1,
"CreateTime": "2025-06-23 15:50:28",
"CveId": "",
"EventType": 2,
"Id": 74636,
"ImageId": "sha256:96cd3224e4e45966046be09a63efed90ac9290d17056122bd05ebd9aa1202ea2",
"ImageName": "ccr.ccs.tencentyun.com/vultarget/jira_ssrf-cve_2017_9506:latest",
"InstanceID": "ins-hbzudk94",
"MergeTime": "2025-06-23 15:50:28",
"NodeId": "ins-hbzudk94",
"NodeName": "dy-test-linux2-rasp测试中勿动",
"NodeType": "NORMAL",
"NodeUniqueID": "",
"Poc": "aHR0cDovL2Ruc2xvZy5jbg==",
"PocID": "",
"PodIp": "",
"PodName": "",
"PrivateIp": "172.17.17.11",
"PublicIp": "43.136.74.150",
"Quuid": "470dd074-4d37-47bf-a204-c4fec27ef152",
"RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://127.0.0.1:8080/plugins/servlet/oauth/users/icon-uri\"},{\"name\":\"Poc\",\"value\":\"aHR0cDovL2Ruc2xvZy5jbg==\"}]",
"SourceIp": "172.18.0.1",
"Status": 1,
"Url": "http://127.0.0.1:8080/plugins/servlet/oauth/users/icon-uri",
"Uuid": "470dd074-4d37-47bf-a204-c4fec27ef152",
"VulId": 0,
"VulName": ""
}
],
"RequestId": "6c565545-b0aa-4572-b6f7-08b0daa791bd",
"TotalCount": 444
}
}
5. 开发者资源
腾讯云 API 平台
腾讯云 API 平台 是综合 API 文档、错误码、API Explorer 及 SDK 等资源的统一查询平台,方便您从同一入口查询及使用腾讯云提供的所有 API 服务。
API Inspector
用户可通过 API Inspector 查看控制台每一步操作关联的 API 调用情况,并自动生成各语言版本的 API 代码,也可前往 API Explorer 进行在线调试。
SDK
云 API 3.0 提供了配套的开发工具集(SDK),支持多种编程语言,能更方便的调用 API。
- Tencent Cloud SDK 3.0 for Python: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for Java: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for PHP: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for Go: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for Node.js: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for .NET: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for C++: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for Ruby: CNB, GitHub, Gitee
命令行工具
6. 错误码
该接口暂无业务逻辑相关的错误码,其他错误码详见 公共错误码。