All Products
Search
Document Center

Security Center:DeleteVulAutoRepairConfig

Last Updated:Jan 20, 2026

Deletes configurations of of an automatic vulnerability fixing task at a time on the Playbook page.

Debugging

You can run this interface directly in OpenAPI Explorer, saving you the trouble of calculating signatures. After running successfully, OpenAPI Explorer can automatically generate SDK code samples.

Authorization information

There is currently no authorization information disclosed in the API.

Request parameters

ParameterTypeRequiredDescriptionExample
TypestringNo

The type of the vulnerability. Valid values:

  • cve: Linux software vulnerability
  • sys: Windows system vulnerability
cve
AliasNamestringNo

The alias of the vulnerability.

RHSA-2017:0184-Important: mysql security update
ConfigIdListarrayNo

The IDs of the configurations.

Note You can call the ListVulAutoRepairConfig operation to query the IDs.
longNo

The ID of the configuration.

1

Response parameters

ParameterTypeDescriptionExample
object
RequestIdstring

The request ID.

3956048F-9D73-5EDB-834B-4827BB48****

Examples

Sample success responses

JSONformat

{
  "RequestId": "3956048F-9D73-5EDB-834B-4827BB48****"
}

Error codes

HTTP status codeError codeError messageDescription
400InnerErrorInnerError-
403NoPermissioncaller has no permissionYou are not authorized to do this operation.
500ServerErrorServerError-

For a list of error codes, visit the Service error codes.

Change history

Change timeSummary of changesOperation
No change history