ARM hosts do not support security service workflows. |
Security service workflows are used to perform the following operations for hosts in the security zone:
Edit level of classification for VMs.
Add VM disks.
Delete VM disks.
Delete abnormal hosts.
You can view, process, and delete workflows.
Security service workflows are available only when the secure mode is enabled. For more information about the secure mode, see "Configure system parameters."
You can delete only pending workflows.
On the top navigation bar, click Services.
From the left navigation pane, select Security > Security Service Workflows.
Click View in the Actions column for a security service workflow.
On the top navigation bar, click Services.
From the left navigation pane, select Security > Security Service Workflows.
Click Process in the Actions column for a security service workflow.
On the top navigation bar, click Services.
From the left navigation pane, select Security > Security Service Workflows.
Click Delete in the Actions column for a security service workflow.
In the dialog box that opens, click OK.
Status: Status of the workflow. Options include Pending, Approved, and Rejected.
Applicant: Applicant who submitted the workflow.
Submitted At: Time when the workflow was submitted.
Approver: Approver who processed the workflow.
Approved At: Time when the approver processed the workflow.
Result: Implementation result for the workflow. If the result is failure, the reason is recorded.