getRootPasswordServerInstanceList
- Print
- PDF
getRootPasswordServerInstanceList
- Print
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Can be used in a VPC environment.
Overview
This searches the list of root passwords using the login key of the server instance (VM).
If privateKey is not entered, then it searches the encrypted password of the corresponding server instance.
Request
Request parameters
Parameter name | Required | Type | Restrictions | Description |
---|---|---|---|---|
regionCode | No | String | Region code You can decide the region of the server instance list in which the root account password will be queried. regionCode can be obtained through the getRegionList action. Default: Select the first region of the getRegionList search results | |
rootPasswordServerInstanceList.N.serverInstanceNo | Yes | String | Server instance number serverInstanceNo can be obtained through the getServerInstanceList action. ex) rootPasswordServerInstanceList.1.serverInstanceNo=1234&rootPasswordServerInstanceList.2.serverInstanceNo=2345 | |
rootPasswordServerInstanceList.N.privateKey | No | String | Login key assigned to the server instance Enter the personal key text of the created or imported login key. It can be obtained through the login key file (.pem) of the server. Since the login key content should be kept intact, you need to attach "\n" and use URL encoding when using the GET method. ex) rootPasswordServerInstanceList.1.privateKey=private-key-1&rootPasswordServerInstanceList.2.privateKey=private-key-2 | |
responseFormatType | No | String | Format type of the response results Options : xml | json Default : xml |
Response
Response body
Example
Request Example
GET {API_URL}/getRootPasswordServerInstanceList
?regionCode=KR
&rootPasswordServerInstanceList.1.serverInstanceNo=***4299
&rootPasswordServerInstanceList.1.privateKey=-----BEGIN RSA PRIVATE KEY-----\nMIIEpAIBAAKCAQEAzbhX0SkB+N3yAe799tP1xuYEL23uaZhqnKSup0IGOICea***\nQC/H2xrYsRgrjDz8Ot6KsTGOFFroMXnBVbSjr2wD7P5OBh/tYqHrIWkraR/49***\netHnir+lQVIWXW7VSd2YMBOp0/u49vuGInhzUetp2XMmVBBnHEAMkfz/yibG5***\nd9qB4VSW/ha4YtbXi3d2d908GbPhYznlY/vI68zgT2OP878d/kob0mIWZixdv***\nt62vYOy/pq3+CMtBwHuZ+YKHM/zxkZh2PUvfxYwCo9kaq+WFQqmgzzw5KSH6v***\nMeZCY+qzGDZe6gtePUu+iTV4UmU6OQcM8uF2DQIDAQABAoIBABaHTo6oSAACB***\n8Xv7YFoEzIaJKmfD+kDnQ/0rHNVJOJAEqOyUjvVurjZOqE42S4UC4/tdquqNv***\nBJgnLRnD4XYtr0u6aVu40bAZ/VgI2VH4GnhVzl6CeE17+NkIjzEEpGr3bEy7r***\n2K6jtDVPa4sVsifYmAIe/YFrTHPNswwn7ZIa9LzsEJYWhj4Cp42kxY8ee2h6A***\nv53S+rMIuLyzd+QJ2PuVry8l/wBfPiGUi6k/W1WDGbM0dWNKhENy/eCfLcFPJ***\niu9Ha0FAzYh7I61A/dBwpKPfijzQbHFg7Fvowoowz7EeUm/1FenoQs7/hMYdA***\nI6qgRD0CgYEA6Hvc0einnngHlc7X7G3NuH1L8dm3mKiVerVVV2aYCRaEtSt8h***\nRLRIEBPEPtVisQEZFvSm30kDDfZLThOhxf00cG6+Gp0v/oAKIUiJ66teuayPv***\nRTBIm8/Urq0PxC/EfqK7cZljWVv8hWPNPYxIB/QXFL+NiK16dTHD8K8CgYEA4***\n1DADhlqcrBJZW9QwDWNok7W5HO8EW4mRFtVPwXk0M6ZyDL/6bR+uH7CXjxJwD***\n9U8ZoCiE9LN7q6aMxH5/giislWCoVh9Mx1Gg3m1I5p1yYEqzjVEIsvB8+XCY/***\nmMC1O59/r47/Hi2e+ZkS9EgPmCC+TXgB09SFnAMCgYEAjsrNJYyNr5Kvrf7et***\nwDMNO13rG3OoZDcOVOFpzmMrXY95LJWMgylr/Zv2dFViCa/P9j6MZCaXHrNBK***\nUX8k/021q+kR+nIwRqMkO0EFrGtl2malpTBz2Ge9jRA0194zBUj0cmCxGcibA***\nR6lq8J+msZK53tIWnfbUD3cCgYBDlORoCWsDykSzkUXXf5ZWaDHq32w6lZRXO***\nXHVO4zoPrriX1S6BH9Jy4dxVcsq7aVqjNNYQUgZYerOKokWc2aBw1HGonw2Zo***\n+hZkRXZaVt6om6C1qFdQCy89u7npkgqQx+1JvGv7lE3IUxP6oxBkkJsWZ65er***\nQ6oYwQKBgQCyjjZ3Lz7cRFHHmmsfUW1SmKmijv+HQYZjTUR7O/4os3jMJZOXx***\n42lAglPh6jkQMROdOyJcJy/waJvKMaOcNBxrHsE6Wxr/CxAjxtdWWUcieLv2W***\nQVy9ggBROA6vB1r4qtlMJI8AYymztJreCiOl7hBaFqezYdQHughrPA==\n-----END RSA PRIVATE KEY-----\n
Response Example
<getRootPasswordServerInstanceListResponse>
<requestId></requestId>
<returnCode>0</returnCode>
<returnMessage>success</returnMessage>
<totalRows>1</totalRows>
<rootPasswordServerInstanceList>
<rootPasswordServerInstance>
<serverInstanceNo>***4299</serverInstanceNo>
<rootPassword>P3e7fLnd6=***</rootPassword>
</rootPasswordServerInstance>
</rootPasswordServerInstanceList>
</getRootPasswordServerInstanceListResponse>
Was this article helpful?