Illumio ASP 19.3.0 REST API
19.3.0
Known Issues: Some parameter tables, JSON request bodies, and JSON response bodies are currently not included.
This Illumio ASP 19.3.0 v2 REST API Reference Preview includes all Public Stable and Public Experimental APIs in this release. It contains curl code examples, parameter definitions, and JSON request and response bodies.
For detailed curl code examples and in-depth information about methods, parameters, and API calls, see the Illumio ASP 19.3.0 REST API Developer Guide.
README
API Properties
Code Examples
The $KEY and $TOKEN constants in the code examples represent authentication credentials (session and token, API key and token, or username and password as appropriate).
Required Parameters
Required parameters in the parameter tables have a Required field of true with an orange asterisk. However, the requirements are based on nesting, so if you're not using any parameters in an indented nested block then none of the parameters in the nested block are required, even if they have an asterisk.
If at least one of multiple parameters is required, their Required fields are false with two orange asterisks, indicating that at least one of the parameters with two asterisks must be defined. For example, when creating a workload, a name and/or a hostname for the workload must be defined.
Search
Use the search field at the top of the left column for whole words like IP Lists.
Use Ctrl-F to search for whole words or words joined by underscores and/or slashes like ip_lists or workloads/bulk_create.
Agents
Get an Agent
Example Code
curl -X GET /orgs/{org_id}/agents/{agent_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/agents/{agent_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| agent_id | path | integer | true* | Agent ID |
Example Response Body
200 Response
{
"name": "string",
"description": "string",
"online": true,
"mode": "idle",
"uid": "string",
"last_heartbeat_on": null,
"uptime_seconds": null,
"hostname": "string",
"agent_version": "string",
"public_ip": "string",
"ip_tables_saved": null,
"os_id": "string",
"os_detail": "string",
"log_traffic": true,
"target_pce_fqdn": "string",
"active_pce_fqdn": "string",
"labels": [
{
"href": "string"
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | agents_get |
Update an Agent
Example Code
curl -X PUT /orgs/{org_id}/agents/{agent_id}/update \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/agents/{agent_id}/update
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"target_pce_fqdn": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| agent_id | path | integer | true* | Agent ID |
| body | body | agents_update_put | false | none |
| » target_pce_fqdn | body | string | false | cluster FQDN for target PCE |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Create an Agent Traffic Flow
Example Code
curl -X POST /orgs/{org_id}/agents/bulk_traffic_flows
POST /api/v2/orgs/{org_id}/agents/bulk_traffic_flows
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
API Keys
Get API Keys
Example Code
curl -X GET /users/{user_id}/api_keys \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/users/{user_id}/api_keys
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_id | path | integer | true* | User ID |
Example Response Body
200 Response
{
"key_id": "string",
"auth_username": "string",
"created_at": "2019-11-01T00:36:33Z",
"name": "string",
"description": "string",
"href": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | users_api_keys_get |
Get an API Key
Example Code
curl -X GET /users/{user_id}/api_keys/{key_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/users/{user_id}/api_keys/{key_id}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_id | path | integer | true* | User ID |
| key_id | path | string | true* | key_id |
Example Response Body
200 Response
{
"key_id": "string",
"auth_username": "string",
"created_at": "2019-11-01T00:36:33Z",
"name": "string",
"description": "string",
"href": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | users_api_keys_get |
Create an API Key
Example Code
curl -X POST /users/{user_id}/api_keys \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/users/{user_id}/api_keys
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"description": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_id | path | integer | true* | User ID |
| body | body | users_api_keys_post | false | none |
| » name | body | string | true* | The key name - just a label to be used |
| » description | body | string | false | The description of the key |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update an API Key
Example Code
curl -X PUT /users/{user_id}/api_keys/{key_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/users/{user_id}/api_keys/{key_id}
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"description": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_id | path | integer | true* | User ID |
| key_id | path | string | true* | key_id |
| body | body | users_api_keys_put | false | none |
| » name | body | string | false | The key name - just a label to be used |
| » description | body | string | false | The description of the key |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete an API Key
Example Code
curl -X DELETE /users/{user_id}/api_keys/{key_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/users/{user_id}/api_keys/{key_id}
Auditable: Yes
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_id | path | integer | true* | User ID |
| key_id | path | string | true* | key_id |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Auth Security Principals
Get Auth Security Principals
Example Code
curl -X GET /orgs/{org_id}/auth_security_principals \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/auth_security_principals
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| name | query | string | false | name of the auth_security_principal to filter on |
| type | query | string | false | type (user or group) to filter on |
Example Response Body
200 Response
[
{
"type": "user",
"name": "string",
"display_name": "string",
"href": "string"
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | orgs_auth_security_principals_get |
Get an Auth Security Principal
Example Code
curl -X GET /orgs/{org_id}/auth_security_principals/{auth_security_principal_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/auth_security_principals/{auth_security_principal_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| auth_security_principal_id | path | string | true* | UUID of the auth_security_principal |
Example Response Body
200 Response
[
{
"type": "user",
"name": "string",
"display_name": "string",
"href": "string"
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | orgs_auth_security_principals_get |
Create an Auth Security Principal
Example Code
curl -X POST /orgs/{org_id}/auth_security_principals \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/auth_security_principals
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"type": "user",
"name": "string",
"display_name": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| body | body | orgs_auth_security_principals_post | false | none |
| » type | body | string | true* | type of the auth_security_principal |
| » name | body | string | true* | name of auth_security_principal |
| » display_name | body | string | false | name of auth_security_principal |
Enumerated Values
| Parameter | Value |
|---|---|
| » type | user |
| » type | group |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update an Auth Security Principal
Example Code
curl -X PUT /orgs/{org_id}/auth_security_principals/{auth_security_principal_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/auth_security_principals/{auth_security_principal_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| auth_security_principal_id | path | string | true* | UUID of the auth_security_principal |
| body | body | orgs_auth_security_principals_put | false | none |
| » type | body | string | false | type of the auth_security_principal |
| » name | body | string | false | name of the auth_security_principal |
| » display_name | body | string | false | display name of the auth_security_principal |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
Enumerated Values
| Parameter | Value |
|---|---|
| » type | user |
| » type | group |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete an Auth Security Principal
Example Code
curl -X DELETE /orgs/{org_id}/auth_security_principals/{auth_security_principal_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/auth_security_principals/{auth_security_principal_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| auth_security_principal_id | path | string | true* | UUID of the auth_security_principal |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Authentication Settings
Get Password Policy
Example Code
curl -X GET /authentication_settings/password_policy \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/authentication_settings/password_policy
Auditable: No
Exposure: Public Experimental
Example Response Body
200 Response
{
"require_type_number": true,
"require_type_lowercase": true,
"require_type_uppercase": true,
"require_type_symbol": true,
"min_characters_per_type": 0,
"min_length": 0,
"min_changed_characters": 0,
"history_count": 0,
"expire_time_days": 0,
"session_timeout_minutes": 0,
"updated_at": "2019-11-01T00:36:33Z",
"updated_by": {
"username": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | authentication_settings_password_policy_get |
Update Password Policy
Example Code
curl -X PUT /authentication_settings/password_policy \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/authentication_settings/password_policy
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"require_type_number": true,
"require_type_lowercase": true,
"require_type_uppercase": true,
"require_type_symbol": true,
"min_characters_per_type": 0,
"min_length": 0,
"min_changed_characters": 0,
"history_count": 0,
"expire_time_days": 0,
"session_timeout_minutes": 0
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| body | body | authentication_settings_password_policy_put | false | none |
| » require_type_number | body | boolean | false | Flag to indicate whether password must contain numerical digit |
| » require_type_lowercase | body | boolean | false | Flag to indicate whether password must contain lowercase letter |
| » require_type_uppercase | body | boolean | false | Flag to indicate whether password must contain uppercase letter |
| » require_type_symbol | body | boolean | false | Flag to indicate whether password must contain symbol (i.e. !@#$%^&*<>?) |
| » min_characters_per_type | body | integer | false | Minimum number of characters for each character type |
| » min_length | body | integer | false | Minimum length of password |
| » min_changed_characters | body | integer | false | Minimum number of changed characters for new passwords |
| » history_count | body | integer | false | Number of old passwords to remember |
| » expire_time_days | body | integer | false | Number of days password expires; a value of 0 means it never expires |
| » session_timeout_minutes | body | integer | false | Number of minutes to timeout the user session without activity |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Get SSO Configuration
Example Code
curl -X GET /authentication_settings \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/authentication_settings
Auditable: No
Exposure: Public Experimental
Example Response Body
200 Response
{
"authentication_type": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | authentication_settings_get |
Update SSO Configuration
Example Code
curl -X PUT /authentication_settings \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/authentication_settings
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"authentication_type": "Local"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| body | body | authentication_settings_put | false | none |
| » authentication_type | body | string | true* | Authentication types |
Enumerated Values
| Parameter | Value |
|---|---|
| » authentication_type | Local |
| » authentication_type | RADIUS |
| » authentication_type | SAML |
| » authentication_type | LDAP |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Blocked Traffic Flows
Get Blocked Traffic
Example Code
curl -X GET /orgs/{org_id}/blocked_traffic \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/blocked_traffic
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| max_results | query | integer | false | Maximum number of results to return (default 500, maximum 10000) |
Example Response Body
200 Response
{
"blocked_traffic": [
{
"flow_status": "string",
"destination": {
"ip_address": "string",
"workloads": [
{
"name": "string",
"href": "string",
"mode": "string",
"agent": {
"href": "string",
"config": {
"mode": "string"
}
}
}
],
"ip_lists": [
{
"name": "string",
"href": "string"
}
],
"virtual_servers": [
{
"name": "string",
"href": "string"
}
]
},
"port": 0,
"protocol": 0,
"service": "string",
"service_name": "string",
"process_name": "string",
"total_flows": 0,
"href": "string",
"last_occurred_at": "string",
"source": {
"ip_address": "string",
"workloads": [
{
"name": "string",
"href": "string",
"mode": "string",
"agent": {
"href": "string",
"config": {
"mode": "string"
}
}
}
],
"ip_lists": [
{
"name": "string",
"href": "string"
}
],
"virtual_servers": [
{
"name": "string",
"href": "string"
}
]
}
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | blocked_traffic_get |
Get a Blocked Traffic Flow
Example Code
curl -X GET /orgs/{org_id}/blocked_traffic/{uuid} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/blocked_traffic/{uuid}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| uuid | path | string | true* | Blocked Traffic UUID |
Example Response Body
200 Response
{
"blocked_traffic": [
{
"flow_status": "string",
"destination": {
"ip_address": "string",
"workloads": [
{
"name": "string",
"href": "string",
"mode": "string",
"agent": {
"href": "string",
"config": {
"mode": "string"
}
}
}
],
"ip_lists": [
{
"name": "string",
"href": "string"
}
],
"virtual_servers": [
{
"name": "string",
"href": "string"
}
]
},
"port": 0,
"protocol": 0,
"service": "string",
"service_name": "string",
"process_name": "string",
"total_flows": 0,
"href": "string",
"last_occurred_at": "string",
"source": {
"ip_address": "string",
"workloads": [
{
"name": "string",
"href": "string",
"mode": "string",
"agent": {
"href": "string",
"config": {
"mode": "string"
}
}
}
],
"ip_lists": [
{
"name": "string",
"href": "string"
}
],
"virtual_servers": [
{
"name": "string",
"href": "string"
}
]
}
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | blocked_traffic_get |
Get Blocked Traffic Query Results
Example Code
curl -X POST /orgs/{org_id}/blocked_traffic/queries \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/blocked_traffic/queries
Auditable: No
Exposure: Public Experimental
Example Request Body
{
"max_results": 0,
"workload_filters": {
"labels": [
"string"
],
"hrefs": [
"string"
]
},
"flow_status": "blocked"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | blocked_traffic_queries_post | false | none |
| » max_results | body | integer | false | Maximum number of results to return (matching the criteria) |
| » workload_filters | body | object | false | Workload based filters. The response is an intersection of all the filter parameters. |
| » labels | body | [string] | false | List of workload labels to filter on. All the labels should match for the workload |
| » hrefs | body | [string] | false | Workload hrefs to be filtered on |
| » flow_status | body | string | false | The flow type filter |
Enumerated Values
| Parameter | Value |
|---|---|
| » flow_status | blocked |
| » flow_status | potentially_blocked |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Delete a Traffic Flow
Example Code
curl -X PUT /orgs/{org_id}/blocked_traffic/delete \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/blocked_traffic/delete
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"blocked_traffic": [
{
"href": "string"
}
]
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | blocked_traffic_delete_put | false | none |
| » blocked_traffic | body | [object] | true* | hrefs of the blocked_traffic entities to delete |
| » href | body | string | true* | The resource(URI) representation of the virtual server |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Blocked Traffic Flow
Example Code
curl -X DELETE /orgs/{org_id}/blocked_traffic/{uuid}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/blocked_traffic/{uuid}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| uuid | path | string | true* | Blocked Traffic UUID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Containers
Get Container Clusters Workload Profiles
Example Code
curl -X GET /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| container_cluster_id | path | string | true* | Cluster UUID |
| assign_labels | query | string | false | List of lists of label URIs, encoded as a JSON string |
| linked | query | boolean | false | Filter by linked container workload profiles. |
| log_traffic | query | boolean | false | Return container workload profile(s) with log traffic true or false |
| max_results | query | integer | false | Maximum number of container workloads to return. |
| mode | query | string | false | Filter by mode. |
| name | query | string | false | Name string to match.Supports partial matches. |
| namespace | query | string | false | Namespace string to match.Supports partial matches. |
Example Response Body
200 Response
{
"href": "string",
"name": null,
"namespace": null,
"description": "string",
"assign_labels": [
{
"href": "string"
}
],
"mode": "string",
"log_traffic": true,
"linked": true,
"created_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"updated_at": "2019-11-01T00:36:33Z"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | container_clusters_container_workload_profiles_get |
Create a Container Cluster Workload Profile
Example Code
curl -X POST /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": null,
"description": "string",
"assign_labels": [
{
"href": "string"
}
],
"mode": "unmanaged",
"log_traffic": true
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| container_cluster_id | path | string | true* | Cluster UUID |
| body | body | container_clusters_container_workload_profiles_post | false | none |
| » name | body | string,null | true* | A friendly name given to a profile if the namespace is not user friendly |
| » description | body | string | false | Description of the profile |
| » assign_labels | body | [object] | false | Assigned labels |
| » href | body | string | true* | Label URI |
| » mode | body | string | false | none |
| » log_traffic | body | boolean | false | True if we want to log traffic events from this workload |
Enumerated Values
| Parameter | Value |
|---|---|
| » mode | unmanaged |
| » mode | illuminated |
| » mode | enforced |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update the Container Cluster Workload Profile
Example Code
curl -X PUT /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/{container_workload_profile_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/ {container_workload_profile_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": null,
"description": null,
"assign_labels": [
{
"href": "string"
}
],
"mode": "unmanaged",
"log_traffic": true
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| container_cluster_id | path | string | true* | Cluster UUID |
| container_workload_profile_id | path | string | true* | Container workload profile UUID |
| body | body | container_clusters_container_workload_profiles_put | false | none |
| » name | body | string,null | false | A friendly name given to a profile if the namespace is not user friendly |
| » description | body | string,null | false | Description of the profile |
| » assign_labels | body | [object] | false | Assigned labels |
| » href | body | string | true* | Label URI |
| » mode | body | string | false | none |
| » log_traffic | body | boolean | false | True if we want to log traffic events from this workload |
Enumerated Values
| Parameter | Value |
|---|---|
| » mode | unmanaged |
| » mode | illuminated |
| » mode | enforced |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Get Container Clusters
Example Code
curl -X GET /orgs/{org_id}/container_clusters \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/container_clusters
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| max_results | query | integer | false | Maximum number of container clusters to return |
| name | query | string | false | Name of the container cluster(s) to return. Supports partial matches |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"description": "string",
"nodes": [
{
"pod_subnet": "string"
}
],
"manager_type": "string",
"network_type": "string",
"last_connected": "2019-11-01T00:36:33Z",
"online": true,
"errors": [
{
"audit_event": {
"href": "string"
},
"duplicate_ids": [],
"error_type": "string"
}
],
"kubelink_version": "string",
"pce_fqdn": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | container_clusters_get |
Create a Container Cluster
Example Code
curl -X POST /orgs/{org_id}/container_clusters \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/container_clusters
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": "string",
"description": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | container_clusters_post | false | none |
| » name | body | string | false | User assigned name of the cluster |
| » description | body | string | false | User assigned description of the cluster |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Container Cluster
Example Code
curl -X PUT /orgs/{org_id}/container_clusters/{container_cluster_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": "string",
"description": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| container_cluster_id | path | string | true* | Cluster UUID |
| body | body | container_clusters_put | false | none |
| » name | body | string | false | User assigned name of the cluster |
| » description | body | string | false | User assigned description of the cluster |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Get Container Clusters Service Backend
Example Code
curl -X GET /orgs/{org_id}/container_clusters/{container_cluster_id}/service_backends \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/service_backends
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| container_cluster_id | path | string | true* | Cluster UUID |
Example Response Body
200 Response
[
{
"name": "string",
"kind": "string",
"namespace": "string",
"updated_at": "string",
"created_at": "string",
"virtual_services": {
"href": "string",
"name": "string"
}
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | container_clusters_service_backends_get |
Get Container Clusters Workload Profiles
Example Code
curl -X GET /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/{container_workload_profile_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/ {container_workload_profile_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| container_cluster_id | path | string | true* | Cluster UUID |
| container_workload_profile_id | path | string | true* | Container workload profile UUID |
Example Response Body
200 Response
{
"href": "string",
"name": null,
"namespace": null,
"description": "string",
"assign_labels": [
{
"href": "string"
}
],
"mode": "string",
"log_traffic": true,
"linked": true,
"created_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"updated_at": "2019-11-01T00:36:33Z"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | container_clusters_container_workload_profiles_get |
Delete Container Clusters Container Workload Profiles
Example Code
curl -X DELETE /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/{container_workload_profile_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/ {container_workload_profile_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| container_cluster_id | path | string | true* | Cluster UUID |
| container_workload_profile_id | path | string | true* | Container workload profile UUID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Get a Container Cluster
Example Code
curl -X GET /orgs/{org_id}/container_clusters/{container_cluster_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| container_cluster_id | path | string | true* | Cluster UUID |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"description": "string",
"nodes": [
{
"pod_subnet": "string"
}
],
"manager_type": "string",
"network_type": "string",
"last_connected": "2019-11-01T00:36:33Z",
"online": true,
"errors": [
{
"audit_event": {
"href": "string"
},
"duplicate_ids": [],
"error_type": "string"
}
],
"kubelink_version": "string",
"pce_fqdn": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | container_clusters_get |
Delete a Container Cluster
Example Code
curl -X DELETE /orgs/{org_id}/container_clusters/{container_cluster_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| container_cluster_id | path | string | true* | Cluster UUID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Datafiles
Get Job Results
Example Code
curl -X GET /orgs/{org_id}/datafiles/{uuid}
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/datafiles/{uuid}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| uuid | path | string | true* | uuid of file resource |
| filename | query | string | false | Filename to save as |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | None |
Events
Get Events
Example Code
curl -X GET /orgs/{org_id}/events \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/events
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| created_by | query | string | false | User, agent, or system that created the event |
| event_type | query | string | false | Type of event |
| max_results | query | integer | false | Maximum number of results to return |
| severity | query | string | false | Severity of event |
| status | query | string | false | Status of event |
| timestamp[gte] | query | string | false | Earliest event date to return (RFC 3339 format) |
| timestamp[lte] | query | string | false | Latest event date to return (RFC 3339 format) |
Enumerated Values
| Parameter | Value |
|---|---|
| severity | emerg |
| severity | alert |
| severity | crit |
| severity | warning |
| severity | err |
| severity | notice |
| severity | info |
| severity | debug |
| status | success |
| status | failure |
| status | nil |
| timestamp[gte] | success |
| timestamp[gte] | failure |
| timestamp[gte] | nil |
| timestamp[lte] | success |
| timestamp[lte] | failure |
| timestamp[lte] | nil |
Example Response Body
200 Response
{
"href": "string",
"org_id": 0,
"version": "string",
"event_id": "string",
"event_type": "string",
"status": "string",
"severity": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"action": {
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"event_type": "string",
"status": "string",
"severity": "string",
"task_name": "string",
"api_endpoint": "string",
"api_method": "string",
"http_status_code": 0,
"src_ip": "string",
"errors": [
{
"token": "string",
"message": "string"
}
],
"info": {}
},
"resource_changes": [
{
"href": "string",
"version": "string",
"org_id": 0,
"uuid": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"resource": null,
"changes": {},
"change_type": "string"
}
],
"notifications": [
{
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"notification_type": "string",
"severity": "err",
"info": {}
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | events_get |
Get an Event
Example Code
curl -X GET /orgs/{org_id}/events/{composite_log_event_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/events/{composite_log_event_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| composite_log_event_id | path | string | true* | UUID of event to return |
Example Response Body
200 Response
{
"href": "string",
"org_id": 0,
"version": "string",
"event_id": "string",
"event_type": "string",
"status": "string",
"severity": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"action": {
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"event_type": "string",
"status": "string",
"severity": "string",
"task_name": "string",
"api_endpoint": "string",
"api_method": "string",
"http_status_code": 0,
"src_ip": "string",
"errors": [
{
"token": "string",
"message": "string"
}
],
"info": {}
},
"resource_changes": [
{
"href": "string",
"version": "string",
"org_id": 0,
"uuid": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"resource": null,
"changes": {},
"change_type": "string"
}
],
"notifications": [
{
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"notification_type": "string",
"severity": "err",
"info": {}
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | events_get |
Explorer
Get Traffic
Example Code
curl -X POST /orgs/{org_id}/traffic_flows/traffic_analysis_queries \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/traffic_flows/traffic_analysis_queries
Auditable: No
Exposure: Public Experimental
Example Request Body
{
"start_date": "2019-11-01",
"end_date": "2019-11-01",
"sources_destinations_query_op": "and",
"sources": {
"include": [
[
{
"label": {
"href": "string"
}
}
]
],
"exclude": [
{
"label": {
"href": "string"
}
}
]
},
"destinations": {
"include": [
[
{
"label": {
"href": "string"
}
}
]
],
"exclude": [
{
"label": {
"href": "string"
}
}
]
},
"services": {
"include": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"process_name": "string",
"windows_service_name": "string"
}
],
"exclude": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"process_name": "string",
"windows_service_name": "string"
}
]
},
"policy_decisions": [
"allowed"
],
"max_results": 0
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | traffic_flows_traffic_analysis_queries_post | false | none |
| » start_date | body | string(date) | false | Starting date for query |
| » end_date | body | string(date) | false | Ending date for query |
| » sources_destinations_query_op | body | string | false | Query logical operator between sources and destinations |
| » sources | body | object | true* | Source labels, workloads, IP addresses to include or exclude |
| » include | body | [array] | true* | List of included sources or targets |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/0 | false | A label parameter for a traffic query |
| » label | body | object | true* | none |
| » href | body | string | true* | Label URI |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/1 | false | A workload parameter for a traffic query |
| » workload | body | object | true* | none |
| » href | body | string | true* | Workload URI |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/2 | false | An IP address parameter for a traffic query |
| » ip_address | body | string | true* | IP address value |
| » exclude | body | [anyOf] | true* | List of excluded sources or targets |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/0 | false | A label parameter for a traffic query |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/1 | false | A workload parameter for a traffic query |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/2 | false | An IP address parameter for a traffic query |
| » destinations | body | object | true* | Target labels, workloads, IP addresses, domain names, transmission to include or exclude |
| » include | body | [array] | true* | List of included sources or targets |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/0 | false | A label parameter for a traffic query |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/1 | false | A workload parameter for a traffic query |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/2 | false | An IP address parameter for a traffic query |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/destinations/properties/include/items/items/oneOf/3 | false | An DNS parameter for a traffic query |
| » fqdn | body | string | true* | parameter for querying the matched fqdn |
| » exclude | body | [anyOf] | true* | List of excluded sources or targets |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/0 | false | A label parameter for a traffic query |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/1 | false | A workload parameter for a traffic query |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/2 | false | An IP address parameter for a traffic query |
| » anonymous | body | traffic_flows_traffic_analysis_queries_post/properties/destinations/properties/include/items/items/oneOf/3 | false | An DNS parameter for a traffic query |
| » anonymous | body | object | false | Parameter representing broadcast/multiccast |
| » transmission | body | string | true* | transmission type |
| » services | body | object | true* | Services (5-tuple of port/to_port/proto/process/service) to include or exclude |
| » include | body | [object] | true* | List of included services (5-tuple of port/to_port/proto/process/service) |
| » port | body | integer | false | Port Number (integer 0-65535). Also the starting port when specifying a range. |
| » to_port | body | integer | false | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | body | integer | false | protocol number |
| » process_name | body | string | false | Process Name |
| » windows_service_name | body | string | false | Windows Service Name |
| » exclude | body | [object] | true* | List of excluded services (5-tuple of port/to_port/proto/process/service) |
| » port | body | integer | false | Port Number (integer 0-65535). Also the starting port when specifying a range. |
| » to_port | body | integer | false | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | body | integer | false | protocol number |
| » process_name | body | string | false | Process Name |
| » windows_service_name | body | string | false | Windows Service Name |
| » policy_decisions | body | [string] | true* | List of policy decisions |
| » max_results | body | integer | false | maximum number of flows to return |
Enumerated Values
| Parameter | Value |
|---|---|
| » sources_destinations_query_op | and |
| » sources_destinations_query_op | or |
| » transmission | broadcast |
| » transmission | multicast |
| » transmission | unicast |
| » policy_decisions | allowed |
| » policy_decisions | potentially_blocked |
| » policy_decisions | blocked |
| » policy_decisions | unknown |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Firewall Settings
Get Firewall Policies
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/firewall_settings \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/firewall_settings
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
Example Response Body
200 Response
{
"static_policy_scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"firewall_coexistence": null,
"containers_inherit_host_policy_scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"update_type": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_firewall_settings_get |
Update Firewall Policies
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/firewall_settings \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/firewall_settings
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"update_type": "create",
"static_policy_scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"firewall_coexistence": null,
"containers_inherit_host_policy_scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
]
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| body | body | sec_policy_firewall_settings_put | false | none |
| » update_type | body | string | false | Type of update |
| » static_policy_scopes | body | [array] | false | Rule set scopes |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » firewall_coexistence | body | array,null | false | none |
| » scope | body | [object] | true* | Assigned labels |
| » href | body | string | true* | Label URI |
| » workload_mode | body | string | false | Additional match criteria to select workload(s) |
| » illumio_primary | body | boolean | true* | Configure Illumio to be the primary firewall |
| » containers_inherit_host_policy_scopes | body | [array] | false | Rule set scopes |
Enumerated Values
| Parameter | Value |
|---|---|
| » update_type | create |
| » update_type | update |
| » update_type | delete |
| » workload_mode | enforced |
| » workload_mode | illuminated |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Health
Get Health
Example Code
curl -X GET /health \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/health
Auditable: No
Exposure: Public Experimental
Example Response Body
200 Response
{
"status": "string",
"type": "string",
"fqdn": "string",
"available_seconds": 0,
"notifications": [
{
"status": "string",
"token": "string",
"message": "string"
}
],
"listen_only_mode_enabled_at": null,
"nodes": [
{
"hostname": null,
"ip_address": null,
"runlevel": null,
"uptime_seconds": null,
"cpu": {
"status": "normal",
"percent": 0
},
"disk": [
{
"location": "string",
"value": {
"status": "normal",
"percent": 0
}
}
],
"memory": {
"status": "normal",
"percent": 0
},
"services": {
"status": "string",
"running": [
"string"
],
"not_running": [
"string"
],
"partial": [
"string"
],
"optional": [
"string"
],
"unknown": [
"string"
]
},
"generated_at": null
}
],
"network": {
"replication": [
{
"type": "string",
"details": {
"database_name": "string",
"master_fqdn": "string",
"slave_fqdn": "string"
},
"value": {
"status": "string",
"lag_seconds": 0
}
}
]
},
"generated_at": null
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | health_get |
IP Lists
Get IP Lists
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/ip_lists \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| description | query | string | false | Description of IP list(s) to return. Supports partial matches |
| external_data_reference | query | string | false | A unique identifier within the external data source |
| external_data_set | query | string | false | The data source from which a resource originates |
| fqdn | query | string | false | IP lists matching FQDN. Supports partial matches |
| ip_address | query | string | false | IP address matching IP list(s) to return. Supports partial matches |
| max_results | query | integer | false | Maximum number of IP Lists to return. |
| name | query | string | false | Name of IP list(s) to return. Supports partial matches |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ip_ranges": [
{
"description": "string",
"from_ip": "string",
"to_ip": "string",
"exclusion": true
}
],
"fqdns": [
{
"fqdn": "string",
"description": "string"
}
],
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_ip_lists_get |
Get an IP List
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| ip_list_id | path | string | true* | IP list ID |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ip_ranges": [
{
"description": "string",
"from_ip": "string",
"to_ip": "string",
"exclusion": true
}
],
"fqdns": [
{
"fqdn": "string",
"description": "string"
}
],
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_ip_lists_get |
Create an IP List
Example Code
curl -X POST /orgs/{org_id}/sec_policy/{pversion}/ip_lists \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ip_ranges": [
{
"description": "string",
"from_ip": "string",
"to_ip": "string",
"exclusion": true
}
],
"fqdns": [
{
"fqdn": "string",
"description": "string"
}
]
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| body | body | sec_policy_ip_lists_post | false | none |
| » name | body | string | true* | Name (must be unique) |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » ip_ranges | body | [object] | false | IP addresses or ranges |
| » description | body | string | false | Description |
| » from_ip | body | string | true* | IP address or a low end of IP range. Might be specified with CIDR notation |
| » to_ip | body | string | false | High end of an IP range |
| » exclusion | body | boolean | false | Whether this IP address is an exclusion. Exclusions must be a strict subset of inclusive IP addresses. |
| » fqdns | body | [object] | false | Collection of FQDN |
| » fqdn | body | string | true* | none |
| » description | body | string | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update an IP List
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id}
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ip_ranges": [
{
"description": "string",
"from_ip": "string",
"to_ip": "string",
"exclusion": true
}
],
"fqdns": [
{
"fqdn": "string",
"description": "string"
}
]
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| ip_list_id | path | string | true* | IP list ID |
| body | body | sec_policy_ip_lists_put | false | none |
| » name | body | string | false | Name (must be unique) |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » ip_ranges | body | [object] | false | IP addresses or ranges |
| » description | body | string | false | Description |
| » from_ip | body | string | true* | IP address or a low end of IP range. Might be specified with CIDR notation |
| » to_ip | body | string | false | High end of an IP range |
| » exclusion | body | boolean | false | Whether this IP address is an exclusion. Exclusions must be a strict subset of inclusive IP addresses. |
| » fqdns | body | [object] | false | Collection of FQDN |
| » fqdn | body | string | true* | none |
| » description | body | string | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete an IP List
Example Code
curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id}
Auditable: Yes
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| ip_list_id | path | string | true* | IP list ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Jobs
Get Jobs
Example Code
curl -X GET /orgs/{org_id}/jobs \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/jobs
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| job_type | query | string | false | The job-type value to use for filtering the results. |
| max_results | query | integer | false | Maximum number of jobs to return. |
Example Response Body
200 Response
{
"href": "string",
"job_type": "string",
"description": "string",
"status": "string",
"requested_at": "2019-11-01T00:36:33Z",
"requested_by": {
"href": "string"
},
"terminated_at": "2019-11-01T00:36:33Z",
"result": {
"href": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | jobs_get |
Get a Job
Example Code
curl -X GET /orgs/{org_id}/jobs/{job_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/jobs/{job_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| job_id | path | string | true* | ID of a job. |
Example Response Body
200 Response
{
"href": "string",
"job_type": "string",
"description": "string",
"status": "string",
"requested_at": "2019-11-01T00:36:33Z",
"requested_by": {
"href": "string"
},
"terminated_at": "2019-11-01T00:36:33Z",
"result": {
"href": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | jobs_get |
Delete a Job
Example Code
curl -X DELETE /orgs/{org_id}/jobs/{job_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/jobs/{job_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| job_id | path | string | true* | ID of a job. |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Labels
Get Labels
Example Code
curl -X GET /orgs/{org_id}/labels \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/labels
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| external_data_reference | query | string | false | A unique identifier within the external data source |
| external_data_set | query | string | false | The data source from which a resource originates |
| include_deleted | query | boolean | false | Include deleted labels |
| key | query | string | false | Key by which to filter |
| max_results | query | integer | false | Maximum number of Labels to return. |
| usage | query | boolean | false | Include label usage flags as well |
| value | query | string | false | Value on which to filter. Supports partial matches |
Example Response Body
200 Response
[
{
"href": "string",
"deleted": true,
"key": "string",
"value": "string",
"external_data_set": null,
"external_data_reference": null,
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
}
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | labels_get |
Get a Label
Example Code
curl -X GET /orgs/{org_id}/labels/{label_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/labels/{label_id}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| label_id | path | integer | true* | Label ID |
| usage | query | boolean | false | Include label usage flags as well |
Example Response Body
200 Response
[
{
"href": "string",
"deleted": true,
"key": "string",
"value": "string",
"external_data_set": null,
"external_data_reference": null,
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
}
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | labels_get |
Create a Label
Example Code
curl -X POST /orgs/{org_id}/labels \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/labels
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"key": "role",
"value": "string",
"external_data_set": null,
"external_data_reference": null
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | labels_post | false | none |
| » key | body | string | true* | Key in key-value pair |
| » value | body | string | true* | Value in key-value pair |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
Enumerated Values
| Parameter | Value |
|---|---|
| » key | role |
| » key | loc |
| » key | env |
| » key | app |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Label
Example Code
curl -X PUT /orgs/{org_id}/labels/{label_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/labels/{label_id}
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"value": "string",
"external_data_set": null,
"external_data_reference": null
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| label_id | path | integer | true* | Label ID |
| body | body | labels_put | false | none |
| » value | body | string | false | Value in key-value pair |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Label
Example Code
curl -X DELETE /orgs/{org_id}/labels/{label_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/labels/{label_id}
Auditable: Yes
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| label_id | path | integer | true* | Label ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Label Groups
Get Label Groups
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/label_groups \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| description | query | string | false | Description of Label Group(s) to return. Supports partial matches |
| external_data_reference | query | string | false | A unique identifier within the external data source |
| external_data_set | query | string | false | The data source from which a resource originates |
| key | query | string | false | Key by which to filter |
| max_results | query | integer | false | Maximum number of Labels to return. |
| name | query | string | false | Name of Label Group(s) to return. Supports partial matches |
| usage | query | boolean | false | Include label usage flags as well |
Example Response Body
200 Response
{
"name": "string",
"description": "string",
"key": "string",
"labels": [
{
"href": "string",
"value": "string"
}
],
"sub_groups": [
{
"href": "string",
"name": "string"
}
],
"usage": {
"label_group": true,
"ruleset": true,
"rule": true,
"static_policy_scopes": true,
"containers_inherit_host_policy_scopes": true
},
"external_data_set": null,
"external_data_reference": null
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_label_groups_get |
Get a Label Group
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| label_group_id | path | string | true* | Label Group UUID |
| usage | query | boolean | false | Include label usage flags as well |
Example Response Body
200 Response
{
"name": "string",
"description": "string",
"key": "string",
"labels": [
{
"href": "string",
"value": "string"
}
],
"sub_groups": [
{
"href": "string",
"name": "string"
}
],
"usage": {
"label_group": true,
"ruleset": true,
"rule": true,
"static_policy_scopes": true,
"containers_inherit_host_policy_scopes": true
},
"external_data_set": null,
"external_data_reference": null
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_label_groups_get |
Is Group Member of Other Groups?
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}/member_of \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}/member_of
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| label_group_id | path | string | true* | Label Group UUID |
Example Response Body
200 Response
[
{
"href": "string",
"name": "string"
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_label_groups_member_of_get |
Create a Label Group
Example Code
curl -X POST /orgs/{org_id}/sec_policy/{pversion}/label_groups \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": "string",
"description": "string",
"key": "string",
"labels": [
{
"href": "string"
}
],
"sub_groups": [
{
"href": "string"
}
],
"external_data_set": null,
"external_data_reference": null
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| body | body | sec_policy_label_groups_post | false | none |
| » name | body | string | true* | Name of the label group |
| » description | body | string | false | The long description of the label group |
| » key | body | string | true* | Key in key-value pair of contained labels or label groups |
| » labels | body | [object] | false | Contained labels |
| » href | body | string | true* | Label URI |
| » sub_groups | body | [object] | false | Contained label groups |
| » href | body | string | true* | Sub label group URI |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Label Group
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": "string",
"description": "string",
"labels": [
{
"href": "string"
}
],
"sub_groups": [
{
"href": "string"
}
],
"external_data_set": null,
"external_data_reference": null
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| label_group_id | path | string | true* | Label Group UUID |
| body | body | sec_policy_label_groups_put | false | none |
| » name | body | string | false | Name of the label group |
| » description | body | string | false | The long description of the label group |
| » labels | body | [object] | false | Contained labels |
| » href | body | string | true* | Label URI |
| » sub_groups | body | [object] | false | Contained label groups |
| » href | body | string | true* | Sub label group URI |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Label Group
Example Code
curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| label_group_id | path | string | true* | Label Group UUID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Login Users
Create a User Auth Token
Example Code
curl -X POST /login_users/authenticate?pce_fqdn=string \
-u user@my-company.com:'password' -H 'Content-Type: application/json'
POST /api/v2/login_users/authenticate
Auditable: Yes
Exposure: Public Stable
Example Request Body
{}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| pce_fqdn | query | string | true* | Fully qualified name of PCE |
| body | body | login_users_authenticate_post | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update User Password
Example Code
curl -X PUT /login_users/{user_uuid}/password \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/login_users/{user_uuid}/password
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"password": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_uuid | path | string | true* | User UUID; use 'me' for the currently authenticated user |
| body | body | login_users_password_put | false | none |
| » password | body | string | true* | New password |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Pairing Profiles
Get Pairing Profiles
Example Code
curl -X GET /orgs/{org_id}/pairing_profiles \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/pairing_profiles
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| agent_software_release | query | string | false | The agent software release for pairing profiles |
| description | query | string | false | Description of Pairing Profile(s) to return. Supports partial matches |
| external_data_reference | query | string | false | A unique identifier within the external data source |
| external_data_set | query | string | false | The data source from which a resource originates |
| labels | query | string | false | List of lists of label URIs, encoded as a JSON string |
| max_results | query | integer | false | Maximum number of Pairing Profiles to return. |
| name | query | string | false | Name of Pairing Profile(s) to return. Supports partial matches |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"description": "string",
"mode": "idle",
"enabled": true,
"total_use_count": 0,
"allowed_uses_per_key": 1,
"key_lifespan": 1,
"last_pairing_at": "string",
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"is_default": true,
"labels": [
{
"href": "string"
}
],
"env_label_lock": true,
"loc_label_lock": true,
"role_label_lock": true,
"app_label_lock": true,
"mode_lock": true,
"log_traffic": true,
"log_traffic_lock": true,
"visibility_level": "string",
"visibility_level_lock": true,
"external_data_set": null,
"external_data_reference": null,
"agent_software_release": null
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | pairing_profiles_get |
Get a Pairing Profile
Example Code
curl -X GET /orgs/{org_id}/pairing_profiles/{pairing_profile_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/pairing_profiles/{pairing_profile_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pairing_profile_id | path | integer | true* | Pairing Profile ID |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"description": "string",
"mode": "idle",
"enabled": true,
"total_use_count": 0,
"allowed_uses_per_key": 1,
"key_lifespan": 1,
"last_pairing_at": "string",
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"is_default": true,
"labels": [
{
"href": "string"
}
],
"env_label_lock": true,
"loc_label_lock": true,
"role_label_lock": true,
"app_label_lock": true,
"mode_lock": true,
"log_traffic": true,
"log_traffic_lock": true,
"visibility_level": "string",
"visibility_level_lock": true,
"external_data_set": null,
"external_data_reference": null,
"agent_software_release": null
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | pairing_profiles_get |
Create a Pairing Profile
Example Code
curl -X POST /orgs/{org_id}/pairing_profiles \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/pairing_profiles
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": "string",
"description": "string",
"mode": "idle",
"enabled": true,
"allowed_uses_per_key": 1,
"key_lifespan": 1,
"labels": [
{
"href": "string"
}
],
"env_label_lock": true,
"loc_label_lock": true,
"role_label_lock": true,
"app_label_lock": true,
"mode_lock": true,
"log_traffic": true,
"log_traffic_lock": true,
"visibility_level": "flow_full_detail",
"visibility_level_lock": true,
"external_data_set": null,
"external_data_reference": null,
"agent_software_release": null
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | pairing_profiles_post | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Create a Pairing Key
Example Code
curl -X POST /orgs/{org_id}/pairing_profiles/{pairing_profile_id}/pairing_key \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/pairing_profiles/{pairing_profile_id}/pairing_key
Auditable: Yes
Exposure: Public Stable
Example Request Body
{}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pairing_profile_id | path | integer | true* | Pairing Profile ID |
| body | body | pairing_profiles_pairing_key_post | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Pairing Profile
Example Code
curl -X PUT /orgs/{org_id}/pairing_profiles/{pairing_profile_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/pairing_profiles/{pairing_profile_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": "string",
"description": "string",
"mode": "idle",
"enabled": true,
"allowed_uses_per_key": 1,
"key_lifespan": 1,
"labels": [
{
"href": "string"
}
],
"env_label_lock": true,
"loc_label_lock": true,
"role_label_lock": true,
"app_label_lock": true,
"mode_lock": true,
"log_traffic": true,
"log_traffic_lock": true,
"visibility_level": "flow_full_detail",
"visibility_level_lock": true,
"external_data_set": null,
"external_data_reference": null,
"agent_software_release": null
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pairing_profile_id | path | integer | true* | Pairing Profile ID |
| body | body | pairing_profiles_put | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Pairing Profile
Example Code
curl -X DELETE /orgs/{org_id}/pairing_profiles/{pairing_profile_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/pairing_profiles/{pairing_profile_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pairing_profile_id | path | integer | true* | Pairing Profile ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Permissions
Get All Permissions
Example Code
curl -X GET /orgs/{org_id}/permissions \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/permissions
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| auth_security_principal | query | string | false | Auth_security_principal URI (JSON-encoded string) to filter on |
| role | query | string | false | Role URI (JSON-encoded string) to filter on |
| scope | query | string | false | Scope to filter on, where scope is a list of label URIs, encoded as a JSON string |
Example Response Body
200 Response
[
{
"role": {
"href": "string"
},
"scope": [
{
"href": "string"
}
],
"auth_security_principal": {
"href": "string"
},
"href": "string"
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | orgs_permissions_get |
Get a Permission
Example Code
curl -X GET /orgs/{org_id}/permissions/{permission_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/permissions/{permission_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| permission_id | path | string | true* | UUID of the permission |
Example Response Body
200 Response
[
{
"role": {
"href": "string"
},
"scope": [
{
"href": "string"
}
],
"auth_security_principal": {
"href": "string"
},
"href": "string"
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | orgs_permissions_get |
Create a Permission
Example Code
curl -X POST /orgs/{org_id}/permissions \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/permissions
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"role": {
"href": "string"
},
"scope": [
{
"href": "string"
}
],
"auth_security_principal": {
"href": "string"
}
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| body | body | orgs_permissions_post | false | none |
| » role | body | orgs_permissions_put/properties/role | true* | none |
| » href | body | string | true* | URI of Role |
| » scope | body | [object] | true* | Assigned labels |
| » href | body | string | true* | Label URI |
| » auth_security_principal | body | orgs_permissions_put/properties/auth_security_principal | true* | none |
| » href | body | string | true* | URI of auth_security_principal |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Permission
Example Code
curl -X PUT /orgs/{org_id}/permissions/{permission_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/permissions/{permission_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| permission_id | path | string | true* | UUID of the permission |
| body | body | orgs_permissions_put | false | none |
| » role | body | orgs_permissions_put/properties/role | false | none |
| » href | body | string | true* | URI of Role |
| » scope | body | [object] | false | Assigned labels |
| » href | body | string | true* | Label URI |
| » auth_security_principal | body | orgs_permissions_put/properties/auth_security_principal | false | none |
| » href | body | string | true* | URI of auth_security_principal |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Permission
Example Code
curl -X DELETE /orgs/{org_id}/permissions/{permission_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/permissions/{permission_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| permission_id | path | string | true* | UUID of the permission |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Organization Settings
Get Events Settings
Example Code
curl -X GET /orgs/{org_id}/settings/events \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/settings/events
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
Example Response Body
200 Response
{
"audit_event_retention_seconds": 0,
"audit_event_min_severity": "error",
"format": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | settings_events_get |
Update Events Settings
Example Code
curl -X PUT /orgs/{org_id}/settings/events \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/settings/events
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"audit_event_retention_seconds": 86400,
"audit_event_min_severity": "error",
"format": "JSON"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| body | body | settings_events_put | false | none |
| » audit_event_retention_seconds | body | integer | false | The time in seconds an audit event is stored in the database |
| » audit_event_min_severity | body | settings_events_get/properties/audit_event_min_severity | false | Minimum severity level of audit event messages. |
| » format | body | string | false | The log format (JSON, CEF, LEEF), which applies to all syslog destinations |
Enumerated Values
| Parameter | Value |
|---|---|
| » audit_event_min_severity | error |
| » audit_event_min_severity | warning |
| » audit_event_min_severity | informational |
| » format | JSON |
| » format | CEF |
| » format | LEEF |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Root Level Methods
Get Supercluster Leader
Example Code
curl -X GET /supercluster/leader
GET /api/v2/supercluster/leader
Authorization: Anyone
Exposure: Public Experimental
Auditable: No
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | None |
Get Available Node
Example Code
curl -X GET /node_available
GET /api/v2/node_available
Authorization: Anyone
Exposure: Public Stable
Auditable: No
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | None |
Get Illumio ASP Version
Example Code
curl -X GET /product_version \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/product_version
Auditable: No
Exposure: Public Stable
Example Response Body
200 Response
{
"product_version": {
"version": "string",
"build": 0,
"release_info": "string",
"engineering_info": "string",
"long_display": "string",
"short_display": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | product_version_get |
Get No Op
Example Code
curl -X GET /noop \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/noop
Auditable: No
Exposure: Public Stable
Example Response Body
200 Response
{}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | noop_get |
Rulesets and Rules
Get Rulesets
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/rule_sets \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| description | query | string | false | Description of Rule Set(s) to return. Supports partial matches |
| external_data_reference | query | string | false | A unique identifier within the external data source |
| external_data_set | query | string | false | The data source from which a resource originates |
| labels | query | string | false | List of lists of label URIs, encoded as a JSON string |
| max_results | query | integer | false | Maximum number of Rule Sets to return. |
| name | query | string | false | Name of Rule Set(s) to return. Supports partial matches |
Example Response Body
200 Response
{
"href": "string",
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"update_type": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"enabled": true,
"scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"rules": [
{
"href": "string",
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true,
"update_type": "string"
}
],
"ip_tables_rules": [
{
"href": "string",
"enabled": true,
"description": "string",
"statements": [
{
"table_name": "nat",
"chain_name": "PREROUTING",
"parameters": "string"
}
],
"actors": [
{
"actors": "string",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
}
}
],
"ip_version": "4"
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_rule_sets_get |
Get a Ruleset
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| rule_set_id | path | integer | true* | Rule Set ID |
Example Response Body
200 Response
{
"href": "string",
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"update_type": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"enabled": true,
"scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"rules": [
{
"href": "string",
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true,
"update_type": "string"
}
],
"ip_tables_rules": [
{
"href": "string",
"enabled": true,
"description": "string",
"statements": [
{
"table_name": "nat",
"chain_name": "PREROUTING",
"parameters": "string"
}
],
"actors": [
{
"actors": "string",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
}
}
],
"ip_version": "4"
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_rule_sets_get |
Create a Ruleset
Example Code
curl -X POST /orgs/{org_id}/sec_policy/{pversion}/rule_sets \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"enabled": true,
"scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"rules": [
{
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true
}
],
"ip_tables_rules": [
{
"enabled": true,
"description": "string",
"statements": [
{
"table_name": "nat",
"chain_name": "PREROUTING",
"parameters": "string"
}
],
"actors": [
{
"actors": "string",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
}
}
],
"ip_version": "4"
}
]
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| body | body | sec_policy_rule_sets_post | false | none |
| » name | body | string | true* | Name (must be unique) |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » enabled | body | boolean | false | Enabled flag |
| » scopes | body | [array] | true* | Rule set scopes |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » rules | body | [object] | false | Array of sec rules (access rules) in this rule set |
| » enabled | body | boolean | true* | Enabled flag |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » ingress_services | body | [oneOf] | true* | Array of service URI and port/protocol combinations |
| » anonymous | body | sec_policy_dependencies_post/properties/change_subset/properties/virtual_services/items | false | none |
| » href | body | string | true* | none |
| » anonymous | body | object | false | none |
| » port | body | integer | false | Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol. |
| » to_port | body | integer | false | Upper end of port range; this field should not be included if specifying an individual port. |
| » proto | body | integer | true* | Transport protocol (numeric) |
| » resolve_labels_as | body | sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as | true* | none |
| » providers | body | [string] | true* | none |
| » consumers | body | [string] | true* | none |
| » sec_connect | body | boolean | false | Whether a secure connection is established |
| » stateless | body | boolean | false | Whether packet filtering is stateless for the rule |
| » machine_auth | body | boolean | false | Whether machine authentication is enabled |
| » providers | body | [object] | true* | Providers |
| » actors | body | string | false | Rule actors are all workloads ('ams') |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » virtual_service | body | object | false | none |
| » href | body | string | true* | Virtual service URI |
| » virtual_server | body | object | false | none |
| » href | body | string | true* | Virtual server URI |
| » ip_list | body | object | false | URI of associated IP List |
| » href | body | string | true* | IP List URI |
| » consumers | body | [object] | true* | Consumers |
| » actors | body | string | false | Rule actors are all workloads or container host |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » virtual_service | body | object | false | none |
| » href | body | string | true* | Virtual service URI |
| » ip_list | body | object | false | URI of associated IP List |
| » href | body | string | true* | IP List URI |
| » consuming_security_principals | body | [object] | false | Hrefs of consuming security principals |
| » href | body | string | false | none |
| » unscoped_consumers | body | boolean | false | Set the scope for rule consumers to All |
| » ip_tables_rules | body | [object] | false | Array of custom iptables rules in this rule set |
| » enabled | body | boolean | true* | Enabled flag |
| » description | body | string | false | Description |
| » statements | body | [sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/statements/items] | true* | list of the iptables statements in this rule |
| » table_name | body | string | true* | name of the iptables table for this rule |
| » chain_name | body | string | true* | name of the iptables chain for this rule |
| » parameters | body | string | true* | the remainder of the iptables rules (excluding table/chain) |
| » actors | body | [object] | true* | none |
| » actors | body | string | false | Rule Actors are all workloads ('ams') |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » ip_version | body | string | true* | IP version for the rules to be applied to |
Enumerated Values
| Parameter | Value |
|---|---|
| » proto | 6 |
| » proto | 17 |
| » providers | workloads |
| » providers | virtual_services |
| » consumers | workloads |
| » consumers | virtual_services |
| » actors | ams |
| » actors | ams |
| » actors | container_host |
| » table_name | nat |
| » table_name | mangle |
| » table_name | filter |
| » chain_name | PREROUTING |
| » chain_name | INPUT |
| » chain_name | OUTPUT |
| » chain_name | FORWARD |
| » chain_name | POSTROUTING |
| » ip_version | 4 |
| » ip_version | 6 |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Ruleset
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"enabled": true,
"update_type": "create",
"scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"rules": [
{}
],
"ip_tables_rules": [
{}
]
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| rule_set_id | path | integer | true* | Rule Set ID |
| body | body | sec_policy_rule_sets_put | false | none |
| » name | body | string | false | Name (must be unique) |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » enabled | body | boolean | false | Enabled flag |
| » update_type | body | string | false | Type of update |
| » scopes | body | [array] | false | Rule set scopes |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » rules | body | [anyOf] | false | Array of rules in this rule set |
| » href | body | string | false | URI of Rule |
| » enabled | body | boolean | false | Enabled flag |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string | false | External data reference identifier |
| » ingress_services | body | [oneOf] | false | Array of service URI and port/protocol combinations |
| » anonymous | body | sec_policy_dependencies_post/properties/change_subset/properties/virtual_services/items | false | none |
| » href | body | string | true* | none |
| » anonymous | body | object | false | none |
| » port | body | integer | false | Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol. |
| » to_port | body | integer | false | Upper end of port range; this field should not be included if specifying an individual port. |
| » proto | body | integer | true* | Transport protocol (numeric) |
| » resolve_labels_as | body | sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as | false | none |
| » providers | body | [string] | true* | none |
| » consumers | body | [string] | true* | none |
| » sec_connect | body | boolean | false | Whether a secure connection is established |
| » stateless | body | boolean | false | Whether packet filtering is stateless for the rule |
| » machine_auth | body | boolean | false | Whether machine authentication is enabled |
| » providers | body | [object] | false | Providers |
| » actors | body | string | false | Rule actors are all workloads ('ams') |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » virtual_service | body | object | false | none |
| » href | body | string | true* | Virtual service URI |
| » virtual_server | body | object | false | none |
| » href | body | string | true* | Virtual server URI |
| » ip_list | body | object | false | URI of associated IP List |
| » href | body | string | true* | IP List URI |
| » consumers | body | [object] | false | Consumers |
| » actors | body | string | false | Rule actors are all workloads or container host |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » virtual_service | body | object | false | none |
| » href | body | string | true* | Virtual service URI |
| » ip_list | body | object | false | URI of associated IP List |
| » href | body | string | true* | IP List URI |
| » consuming_security_principals | body | [object] | false | Hrefs of consuming security principals |
| » href | body | string | false | none |
| » update_type | body | string | false | Type of update |
| » unscoped_consumers | body | boolean | false | Set the scope for rule consumers to All |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
| » ip_tables_rules | body | [anyOf] | false | Array of iptables rules in this ruleset |
| » href | body | string | false | URI of Rule |
| » enabled | body | boolean | false | Enabled flag |
| » description | body | string | false | Description |
| » statements | body | [sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/statements/items] | false | list of the iptables statements in this rule |
| » table_name | body | string | true* | name of the iptables table for this rule |
| » chain_name | body | string | true* | name of the iptables chain for this rule |
| » parameters | body | string | true* | the remainder of the iptables rules (excluding table/chain) |
| » actors | body | [object] | false | none |
| » actors | body | string | false | Rule Actors are all workloads ('ams') |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » ip_version | body | string | false | IP version for the rules to be applied to |
| » update_type | body | string | false | Type of update |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
Enumerated Values
| Parameter | Value |
|---|---|
| » update_type | create |
| » update_type | update |
| » update_type | delete |
| » proto | 6 |
| » proto | 17 |
| » providers | workloads |
| » providers | virtual_services |
| » consumers | workloads |
| » consumers | virtual_services |
| » actors | ams |
| » actors | ams |
| » actors | container_host |
| » update_type | create |
| » update_type | update |
| » update_type | delete |
| » table_name | nat |
| » table_name | mangle |
| » table_name | filter |
| » chain_name | PREROUTING |
| » chain_name | INPUT |
| » chain_name | OUTPUT |
| » chain_name | FORWARD |
| » chain_name | POSTROUTING |
| » ip_version | 4 |
| » ip_version | 6 |
| » update_type | create |
| » update_type | update |
| » update_type | delete |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Ruleset
Example Code
curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}
Auditable: Yes
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| rule_set_id | path | integer | true* | Rule Set ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Get Security Rules
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| rule_set_id | path | integer | true* | Rule Set ID |
| external_data_reference | query | string | false | A unique identifier within the external data source |
| external_data_set | query | string | false | The data source from which a resource originates |
Example Response Body
200 Response
{
"href": "string",
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true,
"update_type": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_rule_sets_sec_rules_get |
Get a Security Rule
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| rule_set_id | path | integer | true* | Rule Set ID |
| sec_rule_id | path | integer | true* | Rule ID |
Example Response Body
200 Response
{
"href": "string",
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true,
"update_type": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_rule_sets_sec_rules_get |
Create a Security Rule
Example Code
curl -X POST /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| rule_set_id | path | integer | true* | Rule Set ID |
| body | body | sec_policy_rule_sets_sec_rules_post | false | none |
| » enabled | body | boolean | true* | Enabled flag |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » ingress_services | body | [oneOf] | true* | Array of service URI and port/protocol combinations |
| » anonymous | body | sec_policy_dependencies_post/properties/change_subset/properties/virtual_services/items | false | none |
| » href | body | string | true* | none |
| » anonymous | body | object | false | none |
| » port | body | integer | false | Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol. |
| » to_port | body | integer | false | Upper end of port range; this field should not be included if specifying an individual port. |
| » proto | body | integer | true* | Transport protocol (numeric) |
| » resolve_labels_as | body | sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as | true* | none |
| » providers | body | [string] | true* | none |
| » consumers | body | [string] | true* | none |
| » sec_connect | body | boolean | false | Whether a secure connection is established |
| » stateless | body | boolean | false | Whether packet filtering is stateless for the rule |
| » machine_auth | body | boolean | false | Whether machine authentication is enabled |
| » providers | body | [object] | true* | Providers |
| » actors | body | string | false | Rule actors are all workloads ('ams') |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » virtual_service | body | object | false | none |
| » href | body | string | true* | Virtual service URI |
| » virtual_server | body | object | false | none |
| » href | body | string | true* | Virtual server URI |
| » ip_list | body | object | false | URI of associated IP List |
| » href | body | string | true* | IP List URI |
| » consumers | body | [object] | true* | Consumers |
| » actors | body | string | false | Rule actors are all workloads or container host |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » virtual_service | body | object | false | none |
| » href | body | string | true* | Virtual service URI |
| » ip_list | body | object | false | URI of associated IP List |
| » href | body | string | true* | IP List URI |
| » consuming_security_principals | body | [object] | false | Hrefs of consuming security principals |
| » href | body | string | false | none |
| » unscoped_consumers | body | boolean | false | Set the scope for rule consumers to All |
Enumerated Values
| Parameter | Value |
|---|---|
| » proto | 6 |
| » proto | 17 |
| » providers | workloads |
| » providers | virtual_services |
| » consumers | workloads |
| » consumers | virtual_services |
| » actors | ams |
| » actors | ams |
| » actors | container_host |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Security Rule
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id}
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"update_type": "create",
"unscoped_consumers": true
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| rule_set_id | path | integer | true* | Rule Set ID |
| sec_rule_id | path | integer | true* | Rule ID |
| body | body | sec_policy_rule_sets_sec_rules_put | false | none |
| » enabled | body | boolean | false | Enabled flag |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » ingress_services | body | [oneOf] | false | Array of service URI and port/protocol combinations |
| » anonymous | body | sec_policy_dependencies_post/properties/change_subset/properties/virtual_services/items | false | none |
| » href | body | string | true* | none |
| » anonymous | body | object | false | none |
| » port | body | integer | false | Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol. |
| » to_port | body | integer | false | Upper end of port range; this field should not be included if specifying an individual port. |
| » proto | body | integer | true* | Transport protocol (numeric) |
| » resolve_labels_as | body | sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as | false | none |
| » providers | body | [string] | true* | none |
| » consumers | body | [string] | true* | none |
| » sec_connect | body | boolean | false | Whether a secure connection is established |
| » stateless | body | boolean | false | Whether packet filtering is stateless for the rule |
| » machine_auth | body | boolean | false | Whether machine authentication is enabled |
| » providers | body | [object] | false | Providers |
| » actors | body | string | false | Rule actors are all workloads ('ams') |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » virtual_service | body | object | false | none |
| » href | body | string | true* | Virtual service URI |
| » virtual_server | body | object | false | none |
| » href | body | string | true* | Virtual server URI |
| » ip_list | body | object | false | URI of associated IP List |
| » href | body | string | true* | IP List URI |
| » consumers | body | [object] | false | Consumers |
| » actors | body | string | false | Rule actors are all workloads or container host |
| » label | body | object | false | none |
| » href | body | string | true* | Label URI |
| » label_group | body | object | false | none |
| » href | body | string | true* | Label group URI |
| » workload | body | object | false | none |
| » href | body | string | true* | Workload URI |
| » virtual_service | body | object | false | none |
| » href | body | string | true* | Virtual service URI |
| » ip_list | body | object | false | URI of associated IP List |
| » href | body | string | true* | IP List URI |
| » consuming_security_principals | body | [object] | false | Hrefs of consuming security principals |
| » href | body | string | false | none |
| » update_type | body | string | false | Type of update |
| » unscoped_consumers | body | boolean | false | Set the scope for rule consumers to All |
Enumerated Values
| Parameter | Value |
|---|---|
| » proto | 6 |
| » proto | 17 |
| » providers | workloads |
| » providers | virtual_services |
| » consumers | workloads |
| » consumers | virtual_services |
| » actors | ams |
| » actors | ams |
| » actors | container_host |
| » update_type | create |
| » update_type | update |
| » update_type | delete |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Security Rule
Example Code
curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id}
Auditable: Yes
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| rule_set_id | path | integer | true* | Rule Set ID |
| sec_rule_id | path | integer | true* | Rule ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Security Policies
Get Security Policy Versions
Example Code
curl -X GET /orgs/{org_id}/sec_policy \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
Example Response Body
200 Response
{
"href": "string",
"version": "string",
"workloads_affected": 0,
"commit_message": "string",
"object_counts": {
"rule_sets": 0,
"ip_lists": 0,
"services": 0,
"virtual_services": 0,
"label_groups": 0,
"virtual_servers": 0,
"firewall_settings": 0,
"secure_connect_gateways": 0
},
"created_at": "string",
"created_by": {
"href": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_get |
Get a Security Policy Version
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
Example Response Body
200 Response
{
"href": "string",
"version": "string",
"workloads_affected": 0,
"commit_message": "string",
"object_counts": {
"rule_sets": 0,
"ip_lists": 0,
"services": 0,
"virtual_services": 0,
"label_groups": 0,
"virtual_servers": 0,
"firewall_settings": 0,
"secure_connect_gateways": 0
},
"created_at": "string",
"created_by": {
"href": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_get |
Get Security Policy Modifications
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/modified_objects \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/modified_objects
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
Example Response Body
200 Response
{
"update_type": null,
"object_type": null,
"href": null,
"name": "string",
"modified_at": "string",
"modified_by": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_modified_objects_get |
Get Pending Security Policy
Example Code
curl -X GET /orgs/{org_id}/sec_policy/pending \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/pending
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
Example Response Body
200 Response
{
"rule_sets": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "string",
"related_ip_lists": [
{
"href": "string"
}
],
"related_services": [
{
"href": "string"
}
]
}
],
"firewall_settings": {
"href": "string",
"update_type": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z"
},
"ip_lists": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"services": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"virtual_servers": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"label_groups": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"secure_connect_gateways": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"virtual_services": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_pending_get |
Revert Pending Security Policy
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/delete \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/delete
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"change_subset": {
"label_groups": [
{
"href": "string"
}
],
"services": [
{
"href": "string"
}
],
"rule_sets": [
{
"href": "string"
}
],
"ip_lists": [
{
"href": "string"
}
],
"virtual_services": [
{
"href": "string"
}
],
"firewall_settings": [
{
"href": "string"
}
],
"secure_connect_gateways": [
{
"href": "string"
}
],
"virtual_servers": [
{
"href": "string"
}
]
}
}
Parameters
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Get Security Policy Dependencies
Example Code
curl -X POST /orgs/{org_id}/sec_policy/{pversion}/dependencies \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/dependencies
Auditable: No
Exposure: Public Experimental
Example Request Body
{
"operation": "commit",
"change_subset": {
"label_groups": [
{
"href": "string"
}
],
"services": [
{
"href": "string"
}
],
"rule_sets": [
{
"href": "string"
}
],
"ip_lists": [
{
"href": "string"
}
],
"virtual_services": [
{
"href": "string"
}
],
"firewall_settings": [
{
"href": "string"
}
],
"secure_connect_gateways": [
{
"href": "string"
}
],
"virtual_servers": [
{
"href": "string"
}
]
}
}
Parameters
Enumerated Values
| Parameter | Value |
|---|---|
| » operation | commit |
| » operation | revert |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Provision Security Policy Changes
Example Code
curl -X POST /orgs/{org_id}/sec_policy \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/sec_policy
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"update_description": "string",
"change_subset": {
"label_groups": [
{
"href": "string"
}
],
"services": [
{
"href": "string"
}
],
"rule_sets": [
{
"href": "string"
}
],
"ip_lists": [
{
"href": "string"
}
],
"virtual_services": [
{
"href": "string"
}
],
"firewall_settings": [
{
"href": "string"
}
],
"secure_connect_gateways": [
{
"href": "string"
}
],
"virtual_servers": [
{
"href": "string"
}
]
}
}
Parameters
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Restore Previous Security Policy
Example Code
curl -X POST /orgs/{org_id}/sec_policy/{pversion}/restore \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/restore
Auditable: No
Exposure: Public Stable
Example Request Body
{}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| body | body | sec_policy_restore_post | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Security Policy Check
Get Rules Allowing Communication
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/allow \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/allow
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| dst_container_workload | query | string | false | The URI of the destination container workload |
| dst_external_ip | query | string | false | The external IP of the destination workload |
| dst_workload | query | string | false | The URI of the destination workload |
| port | query | integer | false | The specific port number to check |
| protocol | query | integer | false | The specific protocol number to check |
| service | query | string | false | The specific service to check |
| src_container_workload | query | string | false | The URI of the source container workload |
| src_external_ip | query | string | false | The external IP of the source workload |
| src_workload | query | string | false | The URI of the source workload |
Example Response Body
200 Response
[
{
"href": "string",
"enabled": true,
"description": "string",
"service": {
"href": "string"
},
"ub_service": null,
"sec_connect": true,
"providers": [
{
"actors": "string",
"label": {
"href": "string"
},
"agent": {
"href": "string"
},
"workload": {
"href": "string"
},
"bound_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "string",
"label": {
"href": "string"
},
"agent": {
"href": "string"
},
"workload": {
"href": "string"
},
"bound_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
]
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_allow_get |
Security Principals
Get Security Principals
Example Code
curl -X GET /orgs/{org_id}/security_principals \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/security_principals
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| max_results | query | integer | false | Maximum number of entries to return |
| name | query | string | false | Name of security principal to filter by |
| sid | query | string | false | SID of security principal to filter by |
Example Response Body
200 Response
{
"sid": "string",
"name": "string",
"description": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | security_principals_get |
Get a Security Principal
Example Code
curl -X GET /orgs/{org_id}/security_principals/{sid} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/security_principals/{sid}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| sid | path | string | true* | Security principal SID |
Example Response Body
200 Response
{
"sid": "string",
"name": "string",
"description": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | security_principals_get |
Create a Security Principal
Example Code
curl -X POST /orgs/{org_id}/security_principals \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/security_principals
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"sid": "string",
"name": "string",
"description": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | security_principals_get | false | none |
| » sid | body | string | true* | Active Directory SID (or any other unique identifier) |
| » name | body | string | true* | Name of the security principal |
| » description | body | string | false | A longer description of the security principal |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Bulk Create Security Principals
Example Code
curl -X PUT /orgs/{org_id}/security_principals/bulk_create \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/security_principals/bulk_create
Auditable: Yes
Exposure: Public Stable
Example Request Body
[
{
"sid": "string",
"name": "string",
"description": "string"
}
]
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | security_principals_bulk_create_put | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Update a Security Principal
Example Code
curl -X PUT /orgs/{org_id}/security_principals/{sid} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/security_principals/{sid}
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"description": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| sid | path | string | true* | Security principal SID |
| body | body | security_principals_put | false | none |
| » name | body | string | false | Name of the security principal |
| » description | body | string | false | A longer description of the security principal |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Security Principal
Example Code
curl -X DELETE /orgs/{org_id}/security_principals/{sid}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/security_principals/{sid}
Auditable: Yes
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| sid | path | string | true* | Security principal SID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Services
Get Security Policy Services
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/services \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/services
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| description | query | string | false | Description of Service(s) to return. Supports partial matches |
| external_data_reference | query | string | false | A unique identifier within the external data source |
| external_data_set | query | string | false | The data source from which a resource originates |
| max_results | query | integer | false | Maximum number of Services to return. |
| name | query | string | false | Name of Service(s) to return. Supports partial matches |
| port | query | string | false | Specify port or port range to filter results. The range is from -1 to 65535 (0 is not supported). |
| proto | query | integer | false | Protocol to filter on |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"description": "string",
"description_url": "string",
"process_name": "string",
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"windows_services": [
{
"service_name": "string",
"process_name": "string",
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"external_data_set": null,
"external_data_reference": null,
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"update_type": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_services_get |
Get a Security Policy Service
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/services/{service_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/services/{service_id}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| service_id | path | string | true* | Service ID |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"description": "string",
"description_url": "string",
"process_name": "string",
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"windows_services": [
{
"service_name": "string",
"process_name": "string",
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"external_data_set": null,
"external_data_reference": null,
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"update_type": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_services_get |
Create a Security Policy Service
Example Code
curl -X POST /orgs/{org_id}/sec_policy/{pversion}/services \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/services
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"description": "string",
"process_name": "string",
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"windows_services": [
{
"service_name": "string",
"process_name": "string",
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"external_data_set": null,
"external_data_reference": null
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| body | body | sec_policy_services_post | false | none |
| » name | body | string | true* | Name (does not need to be unique) |
| » description | body | string | false | Description |
| » process_name | body | string | false | The process name |
| » service_ports | body | [object] | false | Service ports |
| » port | body | integer | false | Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range. |
| » to_port | body | integer | false | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | body | workloads_get/properties/services/properties/open_service_ports/items/properties/protocol | true* | Transport protocol |
| » icmp_type | body | integer | false | ICMP Type (integer 0-255 for icmp protocol) |
| » icmp_code | body | integer | false | ICMP Code (integer 0-15 for icmp protocol) |
| » windows_services | body | [sec_policy_rule_search_post/properties/ingress_services/items/oneOf/1] | false | Windows services |
| » service_name | body | string | false | Name of Windows Service |
| » process_name | body | string | false | Name of running process |
| » port | body | integer | false | Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range. |
| » to_port | body | integer | false | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | body | workloads_get/properties/services/properties/open_service_ports/items/properties/protocol | false | Transport protocol |
| » icmp_type | body | integer | false | ICMP Type (integer 0-255 for icmp protocol) |
| » icmp_code | body | integer | false | ICMP Code (integer 0-15 for icmp protocol) |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Security Policy Service
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/services/{service_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/services/{service_id}
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"description": "string",
"process_name": "string",
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"windows_services": [
{
"service_name": "string",
"process_name": "string",
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"external_data_set": null,
"external_data_reference": null
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| service_id | path | string | true* | Service ID |
| body | body | sec_policy_services_put | false | none |
| » name | body | string | false | Name (does not need to be unique) |
| » description | body | string | false | Description |
| » process_name | body | string | false | The process name |
| » service_ports | body | [object] | false | Service ports |
| » port | body | integer | false | Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range. |
| » to_port | body | integer | false | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | body | workloads_get/properties/services/properties/open_service_ports/items/properties/protocol | true* | Transport protocol |
| » icmp_type | body | integer | false | ICMP Type (integer 0-255 for icmp protocol) |
| » icmp_code | body | integer | false | ICMP Code (integer 0-15 for icmp protocol) |
| » windows_services | body | [sec_policy_rule_search_post/properties/ingress_services/items/oneOf/1] | false | Windows services |
| » service_name | body | string | false | Name of Windows Service |
| » process_name | body | string | false | Name of running process |
| » port | body | integer | false | Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range. |
| » to_port | body | integer | false | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | body | workloads_get/properties/services/properties/open_service_ports/items/properties/protocol | false | Transport protocol |
| » icmp_type | body | integer | false | ICMP Type (integer 0-255 for icmp protocol) |
| » icmp_code | body | integer | false | ICMP Code (integer 0-15 for icmp protocol) |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Security Policy Service
Example Code
curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/services/{service_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/services/{service_id}
Auditable: Yes
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| service_id | path | string | true* | Service ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Settings
Get Settings Traffic Collectors
Example Code
curl -X GET /orgs/{org_id}/settings/traffic_collector \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/settings/traffic_collector
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
Example Response Body
200 Response
{
"href": "string",
"transmission": "string",
"target": {
"dst_port": 0,
"proto": 0,
"dst_ip": "string"
},
"action": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | settings_traffic_collector_get |
Create a Settings Traffic Collector
Example Code
curl -X POST /orgs/{org_id}/settings/traffic_collector \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/settings/traffic_collector
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"transmission": "broadcast",
"target": {
"dst_port": 0,
"proto": 0,
"dst_ip": "string"
},
"action": "drop"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| body | body | settings_traffic_collector_post | false | none |
| » transmission | body | string | true* | transmission type: broadcast/multicast |
| » target | body | object | false | none |
| » dst_port | body | integer | false | none |
| » proto | body | integer | true* | none |
| » dst_ip | body | string | false | single ip address or CIDR |
| » action | body | string | true* | drop or aggregate the target traffic |
Enumerated Values
| Parameter | Value |
|---|---|
| » transmission | broadcast |
| » transmission | multicast |
| » action | drop |
| » action | aggregate |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Settings Traffic Collector
Example Code
curl -X PUT /orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"transmission": "broadcast",
"target": {
"dst_port": 0,
"proto": 0,
"dst_ip": "string"
},
"action": "drop"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| traffic_collector_setting_id | path | string | true* | traffic_collector setting UUID |
| body | body | settings_traffic_collector_put | false | none |
| » transmission | body | string | false | transmission type: broadcast/multicast |
| » target | body | object | false | none |
| » dst_port | body | integer | false | none |
| » proto | body | integer | true* | none |
| » dst_ip | body | string | false | single ip address or CIDR |
| » action | body | string | false | drop or aggregate the target traffic |
Enumerated Values
| Parameter | Value |
|---|---|
| » transmission | broadcast |
| » transmission | multicast |
| » action | drop |
| » action | aggregate |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Get a Settings Traffic Collector
Example Code
curl -X GET /orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| traffic_collector_setting_id | path | string | true* | traffic_collector setting UUID |
Example Response Body
200 Response
{
"href": "string",
"transmission": "string",
"target": {
"dst_port": 0,
"proto": 0,
"dst_ip": "string"
},
"action": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | settings_traffic_collector_get |
Delete a Settings Traffic Collector
Example Code
curl -X DELETE /orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| traffic_collector_setting_id | path | string | true* | traffic_collector setting UUID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Syslog Destinations
Get Syslog Destinations
Example Code
curl -X GET /orgs/{org_id}/settings/syslog/destinations \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/settings/syslog/destinations
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
Example Response Body
200 Response
[
{
"href": "string",
"pce_scope": [
"string"
],
"type": "string",
"description": "string",
"audit_event_logger": {
"configuration_event_included": true,
"system_event_included": true,
"min_severity": "error"
},
"traffic_event_logger": {
"traffic_flow_allowed_event_included": true,
"traffic_flow_potentially_blocked_event_included": true,
"traffic_flow_blocked_event_included": true
},
"node_status_logger": {
"node_status_included": true
},
"remote_syslog": {
"address": "string",
"port": 0,
"protocol": 0,
"tls_enabled": true,
"tls_ca_bundle": "string",
"tls_verify_cert": true
}
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | settings_syslog_destinations_get |
Get a Syslog Destination
Example Code
curl -X GET /orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| syslog_destination_id | path | string | true* | PCE destination UUID |
Example Response Body
200 Response
[
{
"href": "string",
"pce_scope": [
"string"
],
"type": "string",
"description": "string",
"audit_event_logger": {
"configuration_event_included": true,
"system_event_included": true,
"min_severity": "error"
},
"traffic_event_logger": {
"traffic_flow_allowed_event_included": true,
"traffic_flow_potentially_blocked_event_included": true,
"traffic_flow_blocked_event_included": true
},
"node_status_logger": {
"node_status_included": true
},
"remote_syslog": {
"address": "string",
"port": 0,
"protocol": 0,
"tls_enabled": true,
"tls_ca_bundle": "string",
"tls_verify_cert": true
}
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | settings_syslog_destinations_get |
Create a Syslog Destination
Example Code
curl -X POST /orgs/{org_id}/settings/syslog/destinations \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/settings/syslog/destinations
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"pce_scope": [
"string"
],
"type": "local_syslog",
"description": "string",
"audit_event_logger": {
"configuration_event_included": true,
"system_event_included": true,
"min_severity": "error"
},
"traffic_event_logger": {
"traffic_flow_allowed_event_included": true,
"traffic_flow_potentially_blocked_event_included": true,
"traffic_flow_blocked_event_included": true
},
"node_status_logger": {
"node_status_included": true
},
"remote_syslog": {
"address": "string",
"port": 0,
"protocol": 0,
"tls_enabled": true,
"tls_ca_bundle": "string",
"tls_verify_cert": true
}
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| body | body | settings_syslog_destinations_post | false | none |
| » pce_scope | body | [string] | true* | none |
| » type | body | string | true* | Destination type |
| » description | body | string | true* | Description of the destination |
| » audit_event_logger | body | object | true* | none |
| » configuration_event_included | body | boolean | true* | Configuration (Northbound) auditable events |
| » system_event_included | body | boolean | true* | System (PCE) auditable events |
| » min_severity | body | settings_events_get/properties/audit_event_min_severity | true* | Minimum severity level of audit event messages. |
| » traffic_event_logger | body | object | true* | none |
| » traffic_flow_allowed_event_included | body | boolean | true* | Set to enable traffic flow events |
| » traffic_flow_potentially_blocked_event_included | body | boolean | true* | Set to enable traffic flow events |
| » traffic_flow_blocked_event_included | body | boolean | true* | Set to enable traffic flow events |
| » node_status_logger | body | object | true* | none |
| » node_status_included | body | boolean | true* | Syslog messages regarding status of the nodes |
| » remote_syslog | body | object | false | none |
| » address | body | string | true* | The remote syslog IP or DNS address |
| » port | body | integer | true* | The remote syslog port |
| » protocol | body | integer | true* | The protocol for streaming syslog messages |
| » tls_enabled | body | boolean | true* | To enable TLS |
| » tls_ca_bundle | body | string | false | Trustee CA bundle |
| » tls_verify_cert | body | boolean | true* | Perform TLS verification |
Enumerated Values
| Parameter | Value |
|---|---|
| » type | local_syslog |
| » type | remote_syslog |
| » min_severity | error |
| » min_severity | warning |
| » min_severity | informational |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a Syslog Destination
Example Code
curl -X PUT /orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"href": "string",
"pce_scope": [
"string"
],
"type": "local_syslog",
"description": "string",
"audit_event_logger": {
"configuration_event_included": true,
"system_event_included": true,
"min_severity": "error"
},
"traffic_event_logger": {
"traffic_flow_allowed_event_included": true,
"traffic_flow_potentially_blocked_event_included": true,
"traffic_flow_blocked_event_included": true
},
"node_status_logger": {
"node_status_included": true
},
"remote_syslog": {
"address": "string",
"port": 0,
"protocol": 0,
"tls_enabled": true,
"tls_ca_bundle": "string",
"tls_verify_cert": true
}
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| syslog_destination_id | path | string | true* | PCE destination UUID |
| body | body | settings_syslog_destinations_put | false | none |
| » href | body | string | false | URI of the destination |
| » pce_scope | body | [string] | false | none |
| » type | body | string | false | Destination type |
| » description | body | string | false | Description of the destination |
| » audit_event_logger | body | object | false | none |
| » configuration_event_included | body | boolean | false | Configuration (Northbound) auditable events |
| » system_event_included | body | boolean | false | System (PCE) auditable events |
| » min_severity | body | settings_events_get/properties/audit_event_min_severity | false | Minimum severity level of audit event messages. |
| » traffic_event_logger | body | object | false | none |
| » traffic_flow_allowed_event_included | body | boolean | false | Set to enable traffic flow events |
| » traffic_flow_potentially_blocked_event_included | body | boolean | false | Set to enable traffic flow events |
| » traffic_flow_blocked_event_included | body | boolean | false | Set to enable traffic flow events |
| » node_status_logger | body | object | false | none |
| » node_status_included | body | boolean | false | Syslog messages regarding status of the nodes |
| » remote_syslog | body | object | false | none |
| » address | body | string | false | The remote syslog IP or DNS address |
| » port | body | integer | false | The remote syslog port |
| » protocol | body | integer | false | The protocol for streaming syslog messages |
| » tls_enabled | body | boolean | false | To enable TLS |
| » tls_ca_bundle | body | string | false | Trustee CA bundle |
| » tls_verify_cert | body | boolean | false | Perform TLS verification |
Enumerated Values
| Parameter | Value |
|---|---|
| » type | local_syslog |
| » type | remote_syslog |
| » min_severity | error |
| » min_severity | warning |
| » min_severity | informational |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Syslog Destination
Example Code
curl -X DELETE /orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| syslog_destination_id | path | string | true* | PCE destination UUID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
System Events
Get System Events
Example Code
curl -X GET /system_events \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/system_events
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| created_by | query | string | false | User, agent, or system that created the event |
| event_type | query | string | false | Type of event |
| max_results | query | integer | false | Maximum number of results to return |
| severity | query | string | false | Severity of event |
| status | query | string | false | Status of event |
| timestamp[gte] | query | string | false | Earliest event date to return (RFC 3339 format) |
| timestamp[lte] | query | string | false | Latest event date to return (RFC 3339 format) |
Enumerated Values
| Parameter | Value |
|---|---|
| severity | emerg |
| severity | alert |
| severity | crit |
| severity | warning |
| severity | err |
| severity | notice |
| severity | info |
| severity | debug |
| status | success |
| status | failure |
| timestamp[gte] | success |
| timestamp[gte] | failure |
| timestamp[lte] | success |
| timestamp[lte] | failure |
Example Response Body
200 Response
{
"href": "string",
"org_id": 0,
"version": "string",
"event_id": "string",
"event_type": "string",
"status": "string",
"severity": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"action": {
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"event_type": "string",
"status": "string",
"severity": "string",
"task_name": "string",
"api_endpoint": "string",
"api_method": "string",
"http_status_code": 0,
"src_ip": "string",
"errors": [
{
"token": "string",
"message": "string"
}
],
"info": {}
},
"resource_changes": [
{
"href": "string",
"version": "string",
"org_id": 0,
"uuid": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"resource": null,
"changes": {},
"change_type": "string"
}
],
"notifications": [
{
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"notification_type": "string",
"severity": "err",
"info": {}
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | system_events_get |
Get a System Event
Example Code
curl -X GET /system_events/{composite_log_event_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/system_events/{composite_log_event_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| composite_log_event_id | path | string | true* | UUID of system event to return |
Example Response Body
200 Response
{
"href": "string",
"org_id": 0,
"version": "string",
"event_id": "string",
"event_type": "string",
"status": "string",
"severity": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"action": {
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"event_type": "string",
"status": "string",
"severity": "string",
"task_name": "string",
"api_endpoint": "string",
"api_method": "string",
"http_status_code": 0,
"src_ip": "string",
"errors": [
{
"token": "string",
"message": "string"
}
],
"info": {}
},
"resource_changes": [
{
"href": "string",
"version": "string",
"org_id": 0,
"uuid": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"resource": null,
"changes": {},
"change_type": "string"
}
],
"notifications": [
{
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"notification_type": "string",
"severity": "err",
"info": {}
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | system_events_get |
Users
Get All Users' Information
Example Code
curl -X GET /users \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/users
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| type | query | string | false | User type which to filter, (e.g. local or external) |
Example Response Body
200 Response
{
"href": "string",
"username": "string",
"last_login_on": "string",
"last_login_ip_address": "string",
"login_count": 0,
"full_name": "string",
"time_zone": "string",
"locked": true,
"effective_groups": [
"string"
],
"local_profile": {},
"updated_at": "2019-11-01T00:36:33Z",
"created_at": "2019-11-01T00:36:33Z",
"type": "string",
"presence_status": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | users_get |
Get All Org Users' Information
Example Code
curl -X GET /users/{id}/orgs \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/users/{id}/orgs
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| id | path | integer | true* | User ID |
Example Response Body
200 Response
{
"href": "string",
"username": "string",
"last_login_on": "string",
"last_login_ip_address": "string",
"login_count": 0,
"full_name": "string",
"time_zone": "string",
"locked": true,
"effective_groups": [
"string"
],
"local_profile": {},
"updated_at": "2019-11-01T00:36:33Z",
"created_at": "2019-11-01T00:36:33Z",
"type": "string",
"presence_status": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | users_get |
Get a User's Information
Example Code
curl -X GET /users/{id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/users/{id}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| id | path | integer | true* | User ID |
Example Response Body
200 Response
{
"href": "string",
"username": "string",
"last_login_on": "string",
"last_login_ip_address": "string",
"login_count": 0,
"full_name": "string",
"time_zone": "string",
"locked": true,
"effective_groups": [
"string"
],
"local_profile": {},
"updated_at": "2019-11-01T00:36:33Z",
"created_at": "2019-11-01T00:36:33Z",
"type": "string",
"presence_status": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | users_get |
Create a Local User
Example Code
curl -X POST /users \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/users
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"username": "user@example.com",
"full_name": "string",
"time_zone": "string",
"type": "local"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| body | body | users_post | false | none |
| » username | body | string(email) | true* | username is an email address e.g. user@example.com |
| » full_name | body | string | false | User's full name |
| » time_zone | body | string | false | Time Zone IANA Region Name |
| » type | body | string | true* | User's type, i.e. user authenticated local or remotely via SAML |
Enumerated Values
| Parameter | Value |
|---|---|
| » type | local |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Update a User Password
Example Code
curl -X PUT /users/{id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/users/{id}
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"full_name": "string",
"time_zone": "string",
"locked": true
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| id | path | integer | true* | User ID |
| body | body | users_put | false | none |
| » full_name | body | string | false | User's full name |
| » time_zone | body | string | false | Time Zone IANA Region Name |
| » locked | body | boolean | false | Flag to indicate whether account is locked |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Login & Get Session Token
Example Code
curl -X GET /users/login \
-H 'Authorization: Token token=<auth_token>'
GET /api/v2/users/login
Auditable: Yes
Exposure: Public Stable
Example Response Body
200 Response
{
"href": "string",
"auth_username": "string",
"session_token": "string",
"inactivity_expiration_minutes": 0,
"last_login_on": "2019-11-01T00:36:33Z",
"last_login_ip_address": "string",
"full_name": "string",
"type": "string",
"time_zone": "string",
"product_version": {
"product_version": {
"version": "string",
"build": 0,
"release_info": "string",
"engineering_info": "string",
"long_display": "string",
"short_display": "string"
}
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | users_login_get |
Logout & Destroy Session Token
Example Code
curl -X PUT /users/{id}/logout \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/users/{id}/logout
Auditable: Yes
Exposure: Public Stable
Example Request Body
{}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| id | path | integer | true* | User ID |
| body | body | users_logout_put | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Users Local Profile
Create a Local User
Example Code
curl -X POST /users/{user_id}/local_profile \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/users/{user_id}/local_profile
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"locked": true
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_id | path | integer | true* | User ID |
| body | body | users_local_profile_post | false | none |
| » locked | body | boolean | false | Flag to indicate if account is locked |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Reinvite a User
Example Code
curl -X PUT /users/{user_id}/local_profile/reinvite \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/users/{user_id}/local_profile/reinvite
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_id | path | integer | true* | User ID |
| body | body | users_local_profile_reinvite_put | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Schemas
agents_get
{
"name": "string",
"description": "string",
"online": true,
"mode": "idle",
"uid": "string",
"last_heartbeat_on": null,
"uptime_seconds": null,
"hostname": "string",
"agent_version": "string",
"public_ip": "string",
"ip_tables_saved": null,
"os_id": "string",
"os_detail": "string",
"log_traffic": true,
"target_pce_fqdn": "string",
"active_pce_fqdn": "string",
"labels": [
{
"href": "string"
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | The short friendly name of the agent |
| description | string | false | none | The long description of the agent |
| online | boolean | true* | none | If this agent is online |
| mode | string | true* | none | Agent management mode |
| uid | string | true* | none | The unique ID reported by the server |
| last_heartbeat_on | string,null(date-time) | true* | none | The last time (rfc3339 timestamp) a heartbeat was received from this agent |
| uptime_seconds | integer,null | true* | none | How long since the last reboot of this server. Recorded in DB at the time of the last heartbeat |
| hostname | string | true* | none | The hostname reported from the host itself |
| agent_version | string | false | none | Agent software version string |
| public_ip | string | true* | none | The public IP address of the server |
| ip_tables_saved | boolean,null | true* | none | The agent was able to save IP tables |
| os_id | string | false | none | Our OS identifier |
| os_detail | string | false | none | Additional OS details - just displayed to end user |
| log_traffic | boolean | true* | none | True if we want to log traffic events from this agent |
| target_pce_fqdn | string | false | none | The FQDN of the PCE the agent will use for future connections |
| active_pce_fqdn | string | false | none | The FQDN of the PCE that received the agent's last heartbeat |
| labels | [object] | false | none | Assigned labels |
| » href | string | true* | none | Label URI |
Enumerated Values
| Property | Value |
|---|---|
| mode | idle |
| mode | illuminated |
| mode | enforced |
agents_update_put
{
"target_pce_fqdn": "string"
}
target cluster for a VEN move
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| target_pce_fqdn | string | false | none | cluster FQDN for target PCE |
audit_log_events_get
{
"event_type": "server_added",
"severity": "info",
"timestamp": "2019-11-01T00:36:33Z",
"href": "http://example.com",
"created_by": null,
"data": {}
}
Properties
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | string(date-time) | true* | none | RFC 3339 timestamp |
| » href | string(uri) | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » interfaces | [object] | false | none | Set of interfaces |
| » address | string | true* | none | The IP address to assign to this interface |
| » link_state | string | true* | none | Link state |
| » name | string | true* | none | Interface name |
| » labels | [object] | false | none | Set of workload labels |
| » label_href | string(uri) | true* | none | HREF for label affected |
| » label_key | string | true* | none | Key of label affected |
| » label_value | string | true* | none | Value of label affected |
| » log_traffic | boolean | false | none | Whether we record traffic events for this agent or pairing profile |
| » mode | string | false | none | Mode of agent or pairing profile |
| » pairing_profile | string | false | none | Name of pairing profile |
| » pairing_profile_href | string(uri) | false | none | HREF of pairing profile |
| » service_principal_name | string | false | none | The Kerberos Service Principal Name (SPN) |
| » visibility_level | string | false | none | Visibility level of agent or pairing profile |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » interfaces | audit_log_events_get/oneOf/0/properties/data/properties/interfaces | false | none | Set of interfaces |
| » labels | audit_log_events_get/oneOf/0/properties/data/properties/labels | false | none | Set of workload labels |
| » log_traffic | audit_log_events_get/oneOf/0/properties/data/properties/log_traffic | false | none | Whether we record traffic events for this agent or pairing profile |
| » mode | audit_log_events_get/oneOf/0/properties/data/properties/mode | false | none | Mode of agent or pairing profile |
| » pairing_profile | audit_log_events_get/oneOf/0/properties/data/properties/pairing_profile | false | none | Name of pairing profile |
| » pairing_profile_href | audit_log_events_get/oneOf/0/properties/data/properties/pairing_profile_href | false | none | HREF of pairing profile |
| » service_principal_name | audit_log_events_get/oneOf/0/properties/data/properties/service_principal_name | false | none | The Kerberos Service Principal Name (SPN) |
| » visibility_level | audit_log_events_get/oneOf/0/properties/data/properties/visibility_level | false | none | Visibility level of agent or pairing profile |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » server | string | true* | none | Name of server |
| » workload_href | string(uri) | true* | none | HREF for workload affected |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » agent_href | string(uri) | false | none | HREF for agent affected |
| » server | audit_log_events_get/oneOf/2/properties/data/properties/server | false | none | Name of server |
| » workload_href | audit_log_events_get/oneOf/2/properties/data/properties/workload_href | false | none | HREF for workload affected |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » agent_href | audit_log_events_get/oneOf/3/properties/data/properties/agent_href | false | none | HREF for agent affected |
| » labels | audit_log_events_get/oneOf/0/properties/data/properties/labels | true* | none | Set of workload labels |
| » workload_href | audit_log_events_get/oneOf/2/properties/data/properties/workload_href | true* | none | HREF for workload affected |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Details of workload interfaces reported by ven and set by PCE user |
| » workload_interfaces | audit_log_events_get/oneOf/0/properties/data/properties/interfaces | false | none | Set of interfaces |
| » agent_reported_interfaces | audit_log_events_get/oneOf/0/properties/data/properties/interfaces | false | none | Set of interfaces |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » clone_of | string | true* | none | Name of agent this agent was cloned from |
| » clone_of_agent_href | string(uri) | true* | none | HREF of agent this agent was cloned from |
| » labels | audit_log_events_get/oneOf/0/properties/data/properties/labels | true* | none | Set of workload labels |
| » log_traffic | audit_log_events_get/oneOf/0/properties/data/properties/log_traffic | true* | none | Whether we record traffic events for this agent or pairing profile |
| » mode | audit_log_events_get/oneOf/0/properties/data/properties/mode | true* | none | Mode of agent or pairing profile |
| » visibility_level | audit_log_events_get/oneOf/0/properties/data/properties/visibility_level | true* | none | Visibility level of agent or pairing profile |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » pairing_profile | audit_log_events_get/oneOf/0/properties/data/properties/pairing_profile | false | none | Name of pairing profile |
| » pairing_profile_id | integer | false | none | ID of pairing profile |
| » reason | string | false | none | Reason the attempted action failed |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » policy_generation_id | integer | true* | none | ID of security policy generated |
| » provision_note | string | false | none | policy provision note (also known as policy commit msg) |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » pairing_profile | audit_log_events_get/oneOf/0/properties/data/properties/pairing_profile | true* | none | Name of pairing profile |
| » pairing_profile_href | audit_log_events_get/oneOf/0/properties/data/properties/pairing_profile_href | true* | none | HREF of pairing profile |
| » src_ip | string | false | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » pairing_profile | audit_log_events_get/oneOf/0/properties/data/properties/pairing_profile | true* | none | Name of pairing profile |
| » pairing_profile_id | audit_log_events_get/oneOf/14/properties/data/properties/pairing_profile_id | true* | none | ID of pairing profile |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | false | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » pairing_profile | audit_log_events_get/oneOf/0/properties/data/properties/pairing_profile | true* | none | Name of pairing profile |
| » pairing_profile_href | audit_log_events_get/oneOf/0/properties/data/properties/pairing_profile_href | true* | none | HREF of pairing profile |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | false | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » pairing_profile | audit_log_events_get/oneOf/0/properties/data/properties/pairing_profile | true* | none | Name of pairing profile |
| » pairing_profile_id | audit_log_events_get/oneOf/14/properties/data/properties/pairing_profile_id | true* | none | ID of pairing profile |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | false | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason | audit_log_events_get/oneOf/14/properties/data/properties/reason | true* | none | Reason the attempted action failed |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
| » user_email | string(email) | false | none | Email for the user |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
| » user_email | audit_log_events_get/oneOf/24/properties/data/properties/user_email | true* | none | Email for the user |
| » user_href | string(uri) | true* | none | HREF for the user |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » href | string(uri) | true* | none | HREF for the permission |
| » role | object | true* | none | Details of the role for the permission |
| » href | string(uri) | false | none | HREF for the role |
| » scope | [object] | true* | none | Details of the scope for the permission |
| » href | string(uri) | false | none | HREF for the label in this scope |
| » auth_security_principal | object | true* | none | Details of the auth_security_principal for the permission |
| » href | string(uri) | false | none | HREF for the auth_security_principal |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » href | audit_log_events_get/oneOf/26/properties/data/properties/href | true* | none | HREF for the permission |
| » role | audit_log_events_get/oneOf/26/properties/data/properties/role | true* | none | Details of the role for the permission |
| » scope | audit_log_events_get/oneOf/26/properties/data/properties/scope | true* | none | Details of the scope for the permission |
| » auth_security_principal | audit_log_events_get/oneOf/26/properties/data/properties/auth_security_principal | true* | none | Details of the auth_security_principal for the permission |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » href | audit_log_events_get/oneOf/26/properties/data/properties/href | true* | none | HREF for the permission |
| » role | audit_log_events_get/oneOf/26/properties/data/properties/role | true* | none | Details of the role for the permission |
| » scope | audit_log_events_get/oneOf/26/properties/data/properties/scope | true* | none | Details of the scope for the permission |
| » auth_security_principal | audit_log_events_get/oneOf/26/properties/data/properties/auth_security_principal | true* | none | Details of the auth_security_principal for the permission |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| string | true* | none | Email of affected user | |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | false | none | Source IP that generated the event |
| » user_href | audit_log_events_get/oneOf/25/properties/data/properties/user_href | true* | none | HREF for the user |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| audit_log_events_get/oneOf/29/properties/data/properties/email | true* | none | Email of affected user | |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | false | none | Source IP that generated the event |
| » user_href | audit_log_events_get/oneOf/25/properties/data/properties/user_href | true* | none | HREF for the user |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
| » uri_path | string(uri) | true* | none | URI of path user was attempting to access |
| » username | string | true* | none | Username attempting to authenticate |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
| » uri_path | audit_log_events_get/oneOf/31/properties/data/properties/uri_path | true* | none | URI of path user was attempting to access |
| » username | audit_log_events_get/oneOf/31/properties/data/properties/username | true* | none | Username attempting to authenticate |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
| » uri_path | audit_log_events_get/oneOf/31/properties/data/properties/uri_path | true* | none | URI of path user was attempting to access |
| » uri_origin | string(uri) | false | none | The origin of the URI |
| » username | audit_log_events_get/oneOf/31/properties/data/properties/username | true* | none | Username attempting to authenticate |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » local_ip | string | true* | none | Local IP for SecureConnect |
| » prev_state | string | true* | none | Previous state for SecureConnect |
| » remote_ip | string | true* | none | Remote IP for SecureConnect |
| » role | string | true* | none | SecureConnect role (initiator or sender) |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » local_ip | audit_log_events_get/oneOf/36/properties/data/properties/local_ip | true* | none | Local IP for SecureConnect |
| » prev_state | audit_log_events_get/oneOf/36/properties/data/properties/prev_state | true* | none | Previous state for SecureConnect |
| » remote_ip | audit_log_events_get/oneOf/36/properties/data/properties/remote_ip | true* | none | Remote IP for SecureConnect |
| » role | audit_log_events_get/oneOf/36/properties/data/properties/role | true* | none | SecureConnect role (initiator or sender) |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » error_id | integer | false | none | ID of error associated with event |
| » local_ip | audit_log_events_get/oneOf/36/properties/data/properties/local_ip | true* | none | Local IP for SecureConnect |
| » prev_state | audit_log_events_get/oneOf/36/properties/data/properties/prev_state | true* | none | Previous state for SecureConnect |
| » remote_ip | audit_log_events_get/oneOf/36/properties/data/properties/remote_ip | true* | none | Remote IP for SecureConnect |
| » role | audit_log_events_get/oneOf/36/properties/data/properties/role | true* | none | SecureConnect role (initiator or sender) |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
| » user_email | audit_log_events_get/oneOf/24/properties/data/properties/user_email | true* | none | Email for the user |
| » user_href | audit_log_events_get/oneOf/25/properties/data/properties/user_href | true* | none | HREF for the user |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » hard_limit | integer | true* | none | Hard limit |
| » limit_type | string | true* | none | Type of limit |
| » num_found | integer | true* | none | Number found |
| » object_href | string(uri) | true* | none | URI of object that reached limit |
| » object_name | string | true* | none | Name of the object that reached limit |
| » soft_limit | integer | true* | none | Soft limit |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » hard_limit | audit_log_events_get/oneOf/41/properties/data/properties/hard_limit | true* | none | Hard limit |
| » limit_type | audit_log_events_get/oneOf/41/properties/data/properties/limit_type | true* | none | Type of limit |
| » num_found | audit_log_events_get/oneOf/41/properties/data/properties/num_found | true* | none | Number found |
| » object_href | audit_log_events_get/oneOf/41/properties/data/properties/object_href | true* | none | URI of object that reached limit |
| » object_name | audit_log_events_get/oneOf/41/properties/data/properties/object_name | true* | none | Name of the object that reached limit |
| » soft_limit | audit_log_events_get/oneOf/41/properties/data/properties/soft_limit | true* | none | Soft limit |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » agent_uuid | string | true* | none | UUID |
| » hostname | string | true* | none | The hostname reported from the host itself |
| » ips | [string] | true* | none | IP addresses of lost agent |
| » remote_ip | audit_log_events_get/oneOf/36/properties/data/properties/remote_ip | true* | none | Remote IP for SecureConnect |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » agent_href | audit_log_events_get/oneOf/3/properties/data/properties/agent_href | false | none | HREF for agent affected |
| » label_href | audit_log_events_get/definitions/data/definitions/labels/items/properties/label_href | true* | none | HREF for label affected |
| » label_key | audit_log_events_get/definitions/data/definitions/labels/items/properties/label_key | true* | none | Key of label affected |
| » label_value | audit_log_events_get/definitions/data/definitions/labels/items/properties/label_value | true* | none | Value of label affected |
| » server | audit_log_events_get/oneOf/2/properties/data/properties/server | true* | none | Name of server |
| » workload_href | audit_log_events_get/oneOf/2/properties/data/properties/workload_href | false | none | HREF for workload affected |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » agent_href | audit_log_events_get/oneOf/3/properties/data/properties/agent_href | false | none | HREF for agent affected |
| » label_href | audit_log_events_get/definitions/data/definitions/labels/items/properties/label_href | true* | none | HREF for label affected |
| » label_key | audit_log_events_get/definitions/data/definitions/labels/items/properties/label_key | true* | none | Key of label affected |
| » label_value | audit_log_events_get/definitions/data/definitions/labels/items/properties/label_value | true* | none | Value of label affected |
| » server | audit_log_events_get/oneOf/2/properties/data/properties/server | true* | none | Name of server |
| » workload_href | audit_log_events_get/oneOf/2/properties/data/properties/workload_href | false | none | HREF for workload affected |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » agent_href | audit_log_events_get/oneOf/3/properties/data/properties/agent_href | true* | none | HREF for agent affected |
| » log_traffic | audit_log_events_get/oneOf/0/properties/data/properties/log_traffic | true* | none | Whether we record traffic events for this agent or pairing profile |
| » mode | audit_log_events_get/oneOf/0/properties/data/properties/mode | true* | none | Mode of agent or pairing profile |
| » server | audit_log_events_get/oneOf/2/properties/data/properties/server | true* | none | Name of server |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | false | none | Source IP that generated the event |
| » visibility_level | audit_log_events_get/oneOf/0/properties/data/properties/visibility_level | true* | none | Visibility level of agent or pairing profile |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » server | audit_log_events_get/oneOf/2/properties/data/properties/server | true* | none | Name of server |
| » workload_href | string(uri) | true* | none | HREF for workload affected |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » server | audit_log_events_get/oneOf/2/properties/data/properties/server | true* | none | Name of server |
| » workload_href | string(uri) | true* | none | HREF for workload affected |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » data | object | true* | none | Additional data associated with event |
| » server | audit_log_events_get/oneOf/2/properties/data/properties/server | true* | none | Name of server |
| » workload_href | string(uri) | true* | none | HREF for workload affected |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » required_processes_not_running | [string] | true* | none | List of VEN processes not running |
| » agent_href | string(uri) | true* | none | HREF for agent affected |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » agent_href | string(uri) | true* | none | HREF for agent affected |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » description | string | false | none | Extra information |
| » service_name | string | true* | none | Name of service |
| » service_status | string | true* | none | Type of service outage |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » failed_proc | string | true* | none | Name of process that had the failure |
| » reason_code | integer | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | string | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | integer | true* | none | Process ID of process reporting event |
| » reporter_proc | string | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » failed_proc | audit_log_events_get/oneOf/53/properties/data/properties/failed_proc | true* | none | Name of process that had the failure |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » failed_proc | audit_log_events_get/oneOf/53/properties/data/properties/failed_proc | true* | none | Name of process that had the failure |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » failed_proc | audit_log_events_get/oneOf/53/properties/data/properties/failed_proc | true* | none | Name of process that had the failure |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » failed_proc | audit_log_events_get/oneOf/53/properties/data/properties/failed_proc | true* | none | Name of process that had the failure |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » api_version | string | true* | none | API version supported by the VEN |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
| » started_proc | string | true* | none | Name of process that just started |
| » sw_version | string | true* | none | Software version of the VEN |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
| » stopped_proc | string | true* | none | Name of process that just stopped |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » pce_version | string | true* | none | Software version of the PCE |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » pce_max_version | string | true* | none | Maximum API version supported by the PCE |
| » pce_min_version | string | true* | none | Minimum API version supported by the PCE |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » ike_auth_mode | string | true* | none | Authentication mode being used for SecureConnect IKE |
| » ipv6_fw_mode | string | true* | none | The mode of the VEN ipv6 firewall |
| » mode | audit_log_events_get/oneOf/0/properties/data/properties/mode | false | none | Mode of agent or pairing profile |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
| » rule_count | integer | false | none | Count of firewall rules in use on the VEN |
| » visibility_level | audit_log_events_get/oneOf/0/properties/data/properties/visibility_level | true* | none | Visibility level of agent or pairing profile |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » ipsec_conn_state | string | true* | none | New state of an IPsec connection |
| » ipsec_peer | string | true* | none | IP address in dotted quad format of the remote end of an IPsec connection |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » reason_code | audit_log_events_get/oneOf/53/properties/data/properties/reason_code | true* | none | Identifying code that gives a particular reason for the event |
| » reason_str | audit_log_events_get/oneOf/53/properties/data/properties/reason_str | true* | none | Descriptive string that gives detail to the event |
| » reporter_pid | audit_log_events_get/oneOf/53/properties/data/properties/reporter_pid | true* | none | Process ID of process reporting event |
| » reporter_proc | audit_log_events_get/oneOf/53/properties/data/properties/reporter_proc | true* | none | Name of process reporting event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » alert_str | string | true* | none | Descriptive string describing VEN devalert |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » key_id | integer | true* | none | Key ID of the API Key |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | false | none | none |
| » severity | string | false | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | false | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | false | none | HREF for this event |
| » created_by | any | false | none | none |
| » data | object | false | none | Additional data associated with event |
| » key_id | audit_log_events_get/oneOf/87/properties/data/properties/key_id | true* | none | Key ID of the API Key |
| » src_ip | audit_log_events_get/oneOf/18/properties/data/properties/src_ip | true* | none | Source IP that generated the event |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » signature_algorithm | string | true* | none | Certificate signature algorithm |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » service_principal_name | audit_log_events_get/oneOf/0/properties/data/properties/service_principal_name | true* | none | The Kerberos Service Principal Name (SPN) |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » event_type | string | true* | none | none |
| » severity | string | true* | none | none |
| » timestamp | audit_log_events_get/oneOf/0/properties/timestamp | true* | none | RFC 3339 timestamp |
| » href | audit_log_events_get/oneOf/0/properties/href | true* | none | HREF for this event |
| » created_by | any | true* | none | none |
| » data | object | true* | none | Additional data associated with event |
| » service_principal_name | audit_log_events_get/oneOf/0/properties/data/properties/service_principal_name | false | none | The Kerberos Service Principal Name (SPN) |
| » distinguished_name | string | false | none | The X.509 Distinguished Name (DN) |
Enumerated Values
| Property | Value |
|---|---|
| event_type | server_added |
| severity | info |
| link_state | down |
| link_state | unknown |
| link_state | up |
| label_key | app |
| label_key | env |
| label_key | loc |
| label_key | role |
| mode | enforced |
| mode | illuminated |
| visibility_level | flow_drops |
| visibility_level | flow_full_detail |
| visibility_level | flow_off |
| visibility_level | flow_summary |
| event_type | workload_created |
| severity | info |
| event_type | server_delete_initiated |
| severity | info |
| event_type | server_deleted |
| severity | info |
| event_type | workload_deleted |
| event_type | workload_undeleted |
| severity | info |
| event_type | workload_update_mismatched_interfaces |
| severity | warning |
| event_type | server_cloned |
| severity | info |
| event_type | server_clone_detected |
| severity | warning |
| event_type | server_offline |
| severity | info |
| event_type | server_unreachable |
| severity | info |
| event_type | server_online |
| severity | info |
| event_type | server_ip_change |
| severity | info |
| event_type | server_oob_policy_changes |
| severity | error |
| event_type | server_oob_policy_changes_revert_failed |
| severity | error |
| event_type | server_pairing_failed |
| severity | error |
| event_type | policy_provisioned |
| severity | info |
| event_type | policy_deploy_succeeded |
| severity | info |
| event_type | policy_deploy_failed |
| severity | crit |
| event_type | pairing_profile_created |
| severity | info |
| event_type | pairing_profile_deleted |
| severity | info |
| event_type | pairing_profile_modified |
| severity | info |
| event_type | pairing_key_created |
| severity | info |
| event_type | user_login |
| severity | info |
| event_type | user_logout |
| severity | info |
| event_type | user_login_failed |
| severity | info |
| event_type | user_admin_locked |
| severity | info |
| event_type | user_permission_added |
| severity | info |
| event_type | user_permission_removed |
| severity | info |
| event_type | user_permission_changed |
| severity | info |
| event_type | org_access_granted |
| severity | info |
| event_type | org_access_revoked |
| severity | info |
| event_type | authn_failure |
| severity | warning |
| event_type | authz_failure |
| severity | warning |
| event_type | authz_csrf_validation_failure |
| severity | alert |
| event_type | user_pw_reset_request |
| severity | info |
| event_type | user_pw_reset_complete |
| severity | info |
| event_type | secure_connect_sa_up |
| severity | info |
| event_type | secure_connect_sa_down |
| severity | info |
| event_type | secure_connect_error |
| severity | warning |
| event_type | user_unlocked |
| severity | info |
| event_type | user_login_failure_count_exceeded |
| severity | crit |
| event_type | soft_limit_exceeded |
| severity | warning |
| event_type | hard_limit_exceeded |
| severity | crit |
| event_type | unpaired_server_detected |
| severity | crit |
| event_type | server_label_added |
| severity | info |
| event_type | server_label_removed |
| severity | info |
| event_type | server_state_change |
| severity | info |
| event_type | server_suspended |
| severity | warning |
| event_type | server_unsuspended |
| severity | warning |
| event_type | server_already_unsuspended |
| severity | warning |
| event_type | agent_processes_down |
| severity | error |
| event_type | agent_processes_up |
| severity | info |
| event_type | service_not_available |
| severity | crit |
| service_name | firewall |
| service_name | secure_connect |
| service_status | disabled |
| service_status | not installed |
| service_status | stopped |
| event_type | proc_envsetup_failure |
| severity | crit |
| failed_proc | AgentLogManager |
| failed_proc | AgentManager |
| failed_proc | AgentMonitor |
| failed_proc | AgentSend |
| failed_proc | EventSync |
| failed_proc | PlatformHandler |
| failed_proc | VtapServer |
| reporter_proc | AgentLogManager |
| reporter_proc | AgentManager |
| reporter_proc | AgentMonitor |
| reporter_proc | AgentSend |
| reporter_proc | EventSync |
| reporter_proc | PlatformHandler |
| reporter_proc | VtapServer |
| event_type | proc_init_failure |
| severity | crit |
| event_type | proc_config_failure |
| severity | crit |
| event_type | proc_restart_failure |
| severity | crit |
| event_type | proc_malloc_failure |
| severity | crit |
| event_type | proc_started |
| severity | info |
| started_proc | AgentLogManager |
| started_proc | AgentManager |
| started_proc | AgentMonitor |
| started_proc | AgentSend |
| started_proc | EventSync |
| started_proc | PlatformHandler |
| started_proc | VtapServer |
| event_type | proc_stopped |
| severity | info |
| stopped_proc | AgentLogManager |
| stopped_proc | AgentManager |
| stopped_proc | AgentMonitor |
| stopped_proc | AgentSend |
| stopped_proc | EventSync |
| stopped_proc | PlatformHandler |
| stopped_proc | VtapServer |
| event_type | pce_incompat_version |
| severity | crit |
| event_type | pce_incompat_api_version |
| severity | crit |
| event_type | pce_unreachable |
| severity | crit |
| event_type | pce_reachable |
| severity | notice |
| event_type | activation_failure |
| severity | crit |
| event_type | activation_success |
| severity | notice |
| event_type | deactivation_failure |
| severity | error |
| event_type | deactivation_success |
| severity | notice |
| event_type | refresh_token_failure |
| severity | error |
| event_type | refresh_token_success |
| severity | notice |
| event_type | lost_agent |
| severity | crit |
| event_type | invoke_powershell_failure |
| severity | crit |
| event_type | missing_os_updates |
| severity | crit |
| event_type | fw_config_change |
| severity | notice |
| ike_auth_mode | psk |
| ike_auth_mode | pubkey |
| ipv6_fw_mode | closed |
| ipv6_fw_mode | open |
| event_type | fw_config_failure |
| severity | crit |
| event_type | fw_tampering_subsystem_failure |
| severity | crit |
| event_type | fw_tampering_reverted |
| severity | notice |
| event_type | fw_tampering_revert_failure |
| severity | crit |
| event_type | ipsec_conn_state_change |
| severity | notice |
| ipsec_conn_state | down |
| ipsec_conn_state | up |
| event_type | ipsec_conn_state_failure |
| severity | crit |
| event_type | ipsec_subsystem_started |
| severity | info |
| event_type | ipsec_subsystem_stopped |
| severity | info |
| event_type | ipsec_subsystem_failure |
| severity | crit |
| event_type | ipsec_monitoring_started |
| severity | info |
| event_type | ipsec_monitoring_stopped |
| severity | info |
| event_type | ipsec_monitoring_failure |
| severity | crit |
| event_type | dev_alert |
| severity | debug |
| event_type | api_key_created |
| severity | info |
| event_type | api_key_deleted |
| severity | info |
| event_type | saml_cert_sig_algo_unknown |
| severity | warning |
| event_type | kerberos_credential_reused |
| severity | crit |
| event_type | agent_activation_conflict |
| severity | crit |
authentication_settings_get
{
"authentication_type": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| authentication_type | string | true* | none | Authentication types |
authentication_settings_password_policy_get
{
"require_type_number": true,
"require_type_lowercase": true,
"require_type_uppercase": true,
"require_type_symbol": true,
"min_characters_per_type": 0,
"min_length": 0,
"min_changed_characters": 0,
"history_count": 0,
"expire_time_days": 0,
"session_timeout_minutes": 0,
"updated_at": "2019-11-01T00:36:33Z",
"updated_by": {
"username": "string"
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| require_type_number | boolean | true* | none | Flag to indicate whether password must contain numerical digit |
| require_type_lowercase | boolean | true* | none | Flag to indicate whether password must contain lowercase letter |
| require_type_uppercase | boolean | true* | none | Flag to indicate whether password must contain uppercase letter |
| require_type_symbol | boolean | true* | none | Flag to indicate whether password must contain symbol (i.e. !@#$%^&*<>?) |
| min_characters_per_type | integer | true* | none | Minimum number of characters for each character type |
| min_length | integer | true* | none | Minimum length of password |
| min_changed_characters | integer | true* | none | Minimum number of changed characters for new passwords |
| history_count | integer | true* | none | Number of old passwords to remember |
| expire_time_days | integer | true* | none | Number of days password expires; a value of 0 means it never expires |
| session_timeout_minutes | integer | true* | none | Number of minutes to timeout the user session without activity |
| updated_at | string(date-time) | true* | none | Timestamp when password policy was last updated |
| updated_by | object | true* | none | none |
| » username | string | false | none | The username which last updated this password policy |
authentication_settings_password_policy_put
{
"require_type_number": true,
"require_type_lowercase": true,
"require_type_uppercase": true,
"require_type_symbol": true,
"min_characters_per_type": 0,
"min_length": 0,
"min_changed_characters": 0,
"history_count": 0,
"expire_time_days": 0,
"session_timeout_minutes": 0
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| require_type_number | boolean | false | none | Flag to indicate whether password must contain numerical digit |
| require_type_lowercase | boolean | false | none | Flag to indicate whether password must contain lowercase letter |
| require_type_uppercase | boolean | false | none | Flag to indicate whether password must contain uppercase letter |
| require_type_symbol | boolean | false | none | Flag to indicate whether password must contain symbol (i.e. !@#$%^&*<>?) |
| min_characters_per_type | integer | false | none | Minimum number of characters for each character type |
| min_length | integer | false | none | Minimum length of password |
| min_changed_characters | integer | false | none | Minimum number of changed characters for new passwords |
| history_count | integer | false | none | Number of old passwords to remember |
| expire_time_days | integer | false | none | Number of days password expires; a value of 0 means it never expires |
| session_timeout_minutes | integer | false | none | Number of minutes to timeout the user session without activity |
authentication_settings_put
{
"authentication_type": "Local"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| authentication_type | string | true* | none | Authentication types |
Enumerated Values
| Property | Value |
|---|---|
| authentication_type | Local |
| authentication_type | RADIUS |
| authentication_type | SAML |
| authentication_type | LDAP |
blocked_traffic_delete_put
{
"blocked_traffic": [
{
"href": "string"
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| blocked_traffic | [object] | true* | none | hrefs of the blocked_traffic entities to delete |
| » href | string | true* | none | The resource(URI) representation of the virtual server |
blocked_traffic_get
{
"blocked_traffic": [
{
"flow_status": "string",
"destination": {
"ip_address": "string",
"workloads": [
{
"name": "string",
"href": "string",
"mode": "string",
"agent": {
"href": "string",
"config": {
"mode": "string"
}
}
}
],
"ip_lists": [
{
"name": "string",
"href": "string"
}
],
"virtual_servers": [
{
"name": "string",
"href": "string"
}
]
},
"port": 0,
"protocol": 0,
"service": "string",
"service_name": "string",
"process_name": "string",
"total_flows": 0,
"href": "string",
"last_occurred_at": "string",
"source": {
"ip_address": "string",
"workloads": [
{
"name": "string",
"href": "string",
"mode": "string",
"agent": {
"href": "string",
"config": {
"mode": "string"
}
}
}
],
"ip_lists": [
{
"name": "string",
"href": "string"
}
],
"virtual_servers": [
{
"name": "string",
"href": "string"
}
]
}
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| blocked_traffic | [object] | true* | none | List of blocked (or) potentially blocked traffic entities |
| » flow_status | string | true* | none | The status of the flow in terms of whether it was allowed or blocked |
| » destination | object | true* | none | none |
| » ip_address | string | false | none | The ip address of the endpoint |
| » workloads | [object] | false | none | List of workloads |
| » name | string | false | none | Name of the workload |
| » href | string | true* | none | The resource(URI) representation of the workload |
| » mode | string | true* | none | DEPRECATED AND REPLACED (USE agent.config.mode INSTEAD) |
| » agent | object | true* | none | none |
| » href | string | false | none | The resource(URI) representation of the agent |
| » config | object | true* | none | none |
| » mode | string | true* | none | Is this node in illuminated/enforced mode |
| » ip_lists | [object] | false | none | List of iplist entities |
| » name | string | false | none | Name of the iplist |
| » href | string | true* | none | The resource(URI) representation of the iplist |
| » virtual_servers | [object] | false | none | List of virtual servers matching the IP |
| » name | string | false | none | Name of the virtual server |
| » href | string | true* | none | The resource(URI) representation of the virtual server |
| » port | integer | true* | none | The destination port |
| » protocol | integer | true* | none | The protocol |
| » service | string | false | none | The service name configured for the port/protocol on the destination end point |
| » service_name | string | false | none | The service name identified by VEN |
| » process_name | string | false | none | The process name identified by VEN |
| » total_flows | integer | true* | none | Number of times this flow has been seen with current enforcement |
| » href | string | true* | none | The resource(URI) representation of the entity |
| » last_occurred_at | string | true* | none | The last time this blocked traffic was detected |
| » source | object | true* | none | none |
| » ip_address | string | false | none | The ip address of the endpoint |
| » workloads | [object] | false | none | List of workloads |
| » name | string | false | none | Name of the workload |
| » href | string | true* | none | The resource(URI) representation of the workload |
| » mode | string | true* | none | DEPRECATED AND REPLACED (USE agent.config.mode INSTEAD) |
| » agent | object | true* | none | none |
| » href | string | false | none | The resource(URI) representation of the agent |
| » config | object | true* | none | none |
| » mode | string | true* | none | Is this node in illuminated/enforced mode |
| » ip_lists | [object] | false | none | List of iplist entities |
| » name | string | false | none | Name of the iplist |
| » href | string | true* | none | The resource(URI) representation of the iplist |
| » virtual_servers | [object] | false | none | List of virtual servers matching the IP |
| » name | string | false | none | Name of the virtual server |
| » href | string | true* | none | The resource(URI) representation of the virtual server |
blocked_traffic_queries_post
{
"max_results": 0,
"workload_filters": {
"labels": [
"string"
],
"hrefs": [
"string"
]
},
"flow_status": "blocked"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| max_results | integer | false | none | Maximum number of results to return (matching the criteria) |
| workload_filters | object | false | none | Workload based filters. The response is an intersection of all the filter parameters. |
| » labels | [string] | false | none | List of workload labels to filter on. All the labels should match for the workload |
| » hrefs | [string] | false | none | Workload hrefs to be filtered on |
| flow_status | string | false | none | The flow type filter |
Enumerated Values
| Property | Value |
|---|---|
| flow_status | blocked |
| flow_status | potentially_blocked |
container_clusters_container_workload_profiles_get
{
"href": "string",
"name": null,
"namespace": null,
"description": "string",
"assign_labels": [
{
"href": "string"
}
],
"mode": "string",
"log_traffic": true,
"linked": true,
"created_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"updated_at": "2019-11-01T00:36:33Z"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of the container workload profile |
| name | string,null | false | none | A friendly name given to a profile if the namespace is not user friendly |
| namespace | string,null | false | none | Namespace name |
| description | string | false | none | Description of the profile |
| assign_labels | [object] | false | none | Assigned labels |
| » href | string | true* | none | Label URI |
| mode | string | false | none | none |
| log_traffic | boolean | false | none | True if we want to log traffic events from this workload |
| linked | boolean | false | none | True if the namespace exists in the cluster and is reported by kubelink |
| created_at | string(date-time) | false | none | Time stamp when this profile was created |
| created_by | object | false | none | none |
| » href | string | true* | none | User who originally created this profile |
| updated_by | object | false | none | none |
| » href | string | true* | none | User who last updated this profile |
| updated_at | string(date-time) | false | none | Time stamp when this profile was updated |
container_clusters_container_workload_profiles_post
{
"name": null,
"description": "string",
"assign_labels": [
{
"href": "string"
}
],
"mode": "unmanaged",
"log_traffic": true
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string,null | true* | none | A friendly name given to a profile if the namespace is not user friendly |
| description | string | false | none | Description of the profile |
| assign_labels | container_clusters_container_workload_profiles_get/properties/assign_labels | false | none | Assigned labels |
| mode | string | false | none | none |
| log_traffic | boolean | false | none | True if we want to log traffic events from this workload |
Enumerated Values
| Property | Value |
|---|---|
| mode | unmanaged |
| mode | illuminated |
| mode | enforced |
container_clusters_container_workload_profiles_put
{
"name": null,
"description": null,
"assign_labels": [
{
"href": "string"
}
],
"mode": "unmanaged",
"log_traffic": true
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string,null | false | none | A friendly name given to a profile if the namespace is not user friendly |
| description | string,null | false | none | Description of the profile |
| assign_labels | container_clusters_container_workload_profiles_get/properties/assign_labels | false | none | Assigned labels |
| mode | string | false | none | none |
| log_traffic | boolean | false | none | True if we want to log traffic events from this workload |
Enumerated Values
| Property | Value |
|---|---|
| mode | unmanaged |
| mode | illuminated |
| mode | enforced |
container_clusters_get
{
"href": "string",
"name": "string",
"description": "string",
"nodes": [
{
"pod_subnet": "string"
}
],
"manager_type": "string",
"network_type": "string",
"last_connected": "2019-11-01T00:36:33Z",
"online": true,
"errors": [
{
"audit_event": {
"href": "string"
},
"duplicate_ids": [],
"error_type": "string"
}
],
"kubelink_version": "string",
"pce_fqdn": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of container cluster |
| name | string | false | none | User assigned name of the cluster |
| description | string | false | none | User assigned description of the cluster |
| nodes | [object] | false | none | none |
| » pod_subnet | string | false | none | Pod Subnet |
| manager_type | string | false | none | Manager for this cluster (and version) |
| network_type | string | false | none | none |
| last_connected | string(date-time) | false | none | none |
| online | boolean | false | none | none |
| errors | [object] | false | none | none |
| » audit_event | object | false | none | none |
| » href | string | false | none | none |
| » duplicate_ids | array | false | none | none |
| » error_type | string | true* | none | none |
| kubelink_version | string | false | none | Kubelink software version string |
| pce_fqdn | string | false | none | PCE FQDN for this container cluster. Used in Supercluster only |
container_clusters_post
{
"name": "string",
"description": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | User assigned name of the cluster |
| description | string | false | none | User assigned description of the cluster |
container_clusters_put
{
"name": "string",
"description": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | User assigned name of the cluster |
| description | string | false | none | User assigned description of the cluster |
container_clusters_service_backends_get
[
{
"name": "string",
"kind": "string",
"namespace": "string",
"updated_at": "string",
"created_at": "string",
"virtual_services": {
"href": "string",
"name": "string"
}
}
]
The Backend Services associated with Container Clusters
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | The name of the Container Cluster Backend |
| kind | string | true* | none | The type (or kind) of Container Cluster Backend |
| namespace | string | false | none | The namespace of the Container Cluster Backend |
| updated_at | string | true* | none | The time (rfc339 timestamp) at which the Container Cluster Backend was last updated |
| created_at | string | true* | none | The time (rfc339 timestamp) in which the Container Cluster Backend was created |
| virtual_services | object | true* | none | none |
| » href | string | true* | none | The URI to the associated virtual service |
| » name | string | true* | none | The name of virtual service |
events_get
{
"href": "string",
"org_id": 0,
"version": "string",
"event_id": "string",
"event_type": "string",
"status": "string",
"severity": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"action": {
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"event_type": "string",
"status": "string",
"severity": "string",
"task_name": "string",
"api_endpoint": "string",
"api_method": "string",
"http_status_code": 0,
"src_ip": "string",
"errors": [
{
"token": "string",
"message": "string"
}
],
"info": {}
},
"resource_changes": [
{
"href": "string",
"version": "string",
"org_id": 0,
"uuid": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"resource": null,
"changes": {},
"change_type": "string"
}
],
"notifications": [
{
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:33Z",
"pce_fqdn": "string",
"created_by": null,
"notification_type": "string",
"severity": "err",
"info": {}
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | Unique href for this event, which can be used for event lookup via the events API |
| org_id | integer | false | none | org_id for this event. |
| version | string | false | none | The event version of this event for the category it falls under |
| event_id | string | false | none | Unique request/transaction identifier of the API request / context from which this event was generated |
| event_type | string | true* | none | Event name that clearly describes the event |
| status | string | true* | none | Status of the event; usually a mapping of api_status_code to a generic result string; nil if no action. For presentation purposes only. |
| severity | string | true* | none | This event's level of importance |
| timestamp | string(date-time) | true* | none | RFC 3339 timestamp at which this event was originally created |
| pce_fqdn | string | true* | none | Fully qualified domain name of the PCE, where this event originated |
| created_by | object | true* | none | The entity responsible for the creation of this event |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| action | object | false | none | none |
| » href | string | false | none | Unique href for this action log event, which can be used for event lookup via the events API |
| » event | string | false | none | Correlation href identifying the API request / context from which events originated |
| » timestamp | string(date-time) | false | none | RFC 3339 timestamp at which this event was originally created |
| » pce_fqdn | string | false | none | Fully qualified domain name of the PCE, where this event originated |
| » created_by | object | false | none | The entity responsible for the creation of this event |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » event_type | string | false | none | Event name that clearly describes the action log event |
| » status | string | false | none | Status of the event; usually a mapping of api_status_code to a generic result string. For presentation purposes only. |
| » severity | string | false | none | This event's level of importance |
| » task_name | string | false | none | The name of the timed worker job from which this event originated |
| » api_endpoint | string | false | none | URI of the API invoked |
| » api_method | string | false | none | Name of API method invoked on some target resource(s) |
| » http_status_code | integer | false | none | HTTP status code returned from the API call. |
| » src_ip | string | false | none | Source IP of the request for which the event was generated. If the request is coming from the PCE itself, then we should log the IP of the PCE. |
| » errors | [object] | false | none | Extra information regarding the reason for failure. This property is only for failure events and will not appear in successful events |
| » token | string | false | none | Machine readable error message |
| » message | string | false | none | Human readable error message |
| » info | object | false | none | Extra information about the action log event in json format |
| resource_changes | [object] | false | none | Array of resource log events that were generated during this event |
| » href | string | false | none | Unique href for this resource log event, which can be used for event lookup via the events API |
| » version | string | false | none | The event version of this event for the category it falls under |
| » org_id | integer | false | none | org_id for this event. |
| » uuid | string | false | none | Unique identifier for this event. |
| » event | string | false | none | Correlation href identifying the API request / context from which events originated |
| » timestamp | string(date-time) | false | none | RFC 3339 timestamp at which this event was originally created |
| » pce_fqdn | string | false | none | Fully qualified domain name of the PCE, where this event originated |
| » created_by | object | false | none | The entity responsible for the creation of this event |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » resource | object | true* | none | Canonical representations of a resource |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » changes | object | false | none | Properties of the resource that were changed as a result of the event, with their updated values |
| » change_type | string | true* | none | Type of change, which occurred for this resource(s) |
| notifications | [object] | false | none | Array of notification log events that were generated during this event |
| » href | string | false | none | Unique href for this notification log event, which can be used for event lookup via the events API |
| » event | string | false | none | Correlation href identifying the API request / context from which events originated |
| » timestamp | string(date-time) | false | none | RFC 3339 timestamp at which this event was originally created |
| » pce_fqdn | string | false | none | Fully qualified domain name of the PCE, where this event originated |
| » created_by | object | false | none | The entity responsible for the creation of this event |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » notification_type | string | false | none | Notification name that clearly describes the notification log event |
| » severity | string | false | none | This event's level of importance |
| » info | object | false | none | Extra information about the notification in json format |
Enumerated Values
| Property | Value |
|---|---|
| severity | err |
| severity | warning |
| severity | info |
health_get
{
"status": "string",
"type": "string",
"fqdn": "string",
"available_seconds": 0,
"notifications": [
{
"status": "string",
"token": "string",
"message": "string"
}
],
"listen_only_mode_enabled_at": null,
"nodes": [
{
"hostname": null,
"ip_address": null,
"runlevel": null,
"uptime_seconds": null,
"cpu": {
"status": "normal",
"percent": 0
},
"disk": [
{
"location": "string",
"value": {
"status": "normal",
"percent": 0
}
}
],
"memory": {
"status": "normal",
"percent": 0
},
"services": {
"status": "string",
"running": [
"string"
],
"not_running": [
"string"
],
"partial": [
"string"
],
"optional": [
"string"
],
"unknown": [
"string"
]
},
"generated_at": null
}
],
"network": {
"replication": [
{
"type": "string",
"details": {
"database_name": "string",
"master_fqdn": "string",
"slave_fqdn": "string"
},
"value": {
"status": "string",
"lag_seconds": 0
}
}
]
},
"generated_at": null
}
Health information of PCE Cluster and its nodes
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| status | string | false | none | Overall health status of the PCE |
| type | string | false | none | Type of the PCE |
| fqdn | string | false | none | FQDN of the PCE |
| available_seconds | number | false | none | Seconds since this PCE has been available |
| notifications | [object] | false | none | Notifications for the PCE |
| » status | string | true* | none | Severity status of this notification |
| » token | string | true* | none | Description token of this notification |
| » message | string | false | none | Description string of this notification |
| listen_only_mode_enabled_at | string,null(date-time) | false | none | Timestamp at which PCE Listen Only Mode was enabled |
| nodes | [object] | false | none | Nodes in the PCE |
| » hostname | string,null | true* | none | Hostname of the node |
| » ip_address | string,null | true* | none | IP address of the node |
| » runlevel | number,null | false | none | Runlevel of the node |
| » uptime_seconds | number,null | false | none | Seconds since this node cluster has been rebooted |
| » cpu | object | false | none | none |
| » status | string | true* | none | none |
| » percent | number | true* | none | none |
| » disk | [object] | false | none | Disk usage of this node per individual location |
| » location | string | true* | none | none |
| » value | health_get/properties/nodes/items/properties/cpu | true* | none | none |
| » memory | health_get/properties/nodes/items/properties/cpu | false | none | none |
| » services | object | true* | none | Status of all the PCE Services of this node |
| » status | string | false | none | Overall Service status of the PCE |
| » running | [string] | false | none | none |
| » not_running | [string] | false | none | none |
| » partial | [string] | false | none | none |
| » optional | [string] | false | none | none |
| » unknown | [string] | false | none | none |
| » generated_at | string,null(date-time) | true* | none | Timestamp of when this node information was generated |
| network | object | false | none | Network information of the PCE |
| » replication | [object] | true* | none | Replication information for databases |
| » type | string | true* | none | Type of replication |
| » details | object | true* | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » database_name | string | true* | none | Name of the Database being replicated |
| » master_fqdn | string | true* | none | FQDN of the master database node |
| » slave_fqdn | string | true* | none | FQDN of the slave database node |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » fqdn | string | true* | none | FQDN of the PCE for replication |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » value | object | true* | none | none |
| » status | string | true* | none | Lag status |
| » lag_seconds | number | true* | none | The number of lag seconds |
| » generated_at | string,null(date-time) | false | none | Timestamp of when this PCE information was generated |
Enumerated Values
| Property | Value |
|---|---|
| status | normal |
| status | warning |
| status | critical |
jobs_get
{
"href": "string",
"job_type": "string",
"description": "string",
"status": "string",
"requested_at": "2019-11-01T00:36:33Z",
"requested_by": {
"href": "string"
},
"terminated_at": "2019-11-01T00:36:33Z",
"result": {
"href": "string"
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | The job URI. |
| job_type | string | false | none | An arbitrary designator for the job type or kind, typically supplied by the job requestor. |
| description | string | false | none | An arbitrary free-form description of the job, as supplied by the job requestor. |
| status | string | true* | none | The current state of the job, to the effect of its success, failure, etc. |
| requested_at | string(date-time) | false | none | The time (rfc3339 timestamp) at which this job was requested or submitted. |
| requested_by | object | false | none | none |
| » href | string | true* | none | The URI of the user who requested this job. |
| terminated_at | string(date-time) | false | none | The time (rfc3339 timestamp) at which this job terminated, either successfully or failingly. |
| result | object | false | none | The result produced by the job, typically a URI (with 'href' sub-property), or an error in case of failure. |
| » href | string | false | none | The href to collect the response body |
[
{
"href": "string",
"deleted": true,
"key": "string",
"value": "string",
"external_data_set": null,
"external_data_reference": null,
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
}
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of this label |
| deleted | boolean | false | none | This label has been deleted |
| key | string | true* | none | Key in key-value pair |
| value | string | true* | none | Value in key-value pair |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| created_at | string(date-time) | true* | none | Timestamp when this label was first created |
| updated_at | string(date-time) | true* | none | Timestamp when this label was last updated |
| created_by | object | false | none | none |
| » href | string | true* | none | User who originally created this label |
| updated_by | object | false | none | none |
| » href | string | true* | none | User who last updated this label |
{
"key": "role",
"value": "string",
"external_data_set": null,
"external_data_reference": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| key | string | true* | none | Key in key-value pair |
| value | string | true* | none | Value in key-value pair |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
Enumerated Values
| Property | Value |
|---|---|
| key | role |
| key | loc |
| key | env |
| key | app |
{
"value": "string",
"external_data_set": null,
"external_data_reference": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| value | string | false | none | Value in key-value pair |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
login_users_authenticate_post
{}
Properties
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | null | false | none | none |
login_users_password_put
{
"password": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| password | string | true* | none | New password |
network_devices_enforcement_instructions_applied_post
{}
Properties
None
network_devices_enforcement_instructions_request_post
{}
Properties
None
network_devices_get
[
{
"href": "string",
"config": {
"name": "string",
"description": "string",
"device_type": "switch",
"manufacturer": "string",
"model": "string",
"ip_address": "string",
"credentials": {
"type": "cli",
"port": 0,
"username": "string",
"password": "string"
}
},
"configure": true,
"enforcement_instructions_generation_in_progress": true,
"enforcement_instructions_data_href": "string",
"enforcement_instructions_data_timestamp": "2019-11-01T00:36:33Z",
"enforcement_instructions_ack_href": "string",
"enforcement_instructions_ack_timestamp": "2019-11-01T00:36:33Z",
"supported_endpoint_type": "string",
"endpoints": [
{
"href": "string"
}
],
"network_enforcement_node": {
"href": "string"
},
"status": "string"
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | URI of network device |
| config | network_devices_put | true* | none | none |
| configure | boolean | false | none | Enable configuration of the device by the network enforcement platform |
| enforcement_instructions_generation_in_progress | boolean | false | none | Flag to indicate if an enforceement instructions generation is in progress for this network_device |
| enforcement_instructions_data_href | string | false | none | href to download the enforcement instructions data (this expires 7 days after data uploaded from network enforcement node) |
| enforcement_instructions_data_timestamp | string(date-time) | false | none | Timestamp indicating when enforcement instructions data were received from network enforcement node |
| enforcement_instructions_ack_href | string | false | none | href to download the enforcement instructions ack log (this expires 7 days after data uploaded from network enforcement node) |
| enforcement_instructions_ack_timestamp | string(date-time) | false | none | Timestamp indicating when enforcement instructions ack log was received from network enforcement node |
| supported_endpoint_type | string | true* | none | Type of endpoint supported by this device |
| endpoints | [object] | false | none | none |
| » href | string | false | none | URI of endpoint |
| network_enforcement_node | object | true* | none | none |
| » href | string | false | none | URI of owning network_enforcement_agent |
| status | string | false | none | Status of device |
network_devices_multi_enforcement_instructions_applied_post
{}
Supply one of the following properties
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| all_devices | boolean | false | none | Flag to indicate that enforcement instructions are required for all network devices |
| network_devices | [object] | false | none | none |
| » href | string | false | none | href of network device |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
Enumerated Values
| Property | Value |
|---|---|
| all_devices | true* |
network_devices_multi_enforcement_instructions_request_post
{}
Supply one of the following properties
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| all_devices | boolean | false | none | Flag to indicate that enforcement instructions are required for all network devices |
| network_devices | [object] | false | none | none |
| » href | string | false | none | href of network device |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
Enumerated Values
| Property | Value |
|---|---|
| all_devices | true* |
network_devices_network_endpoints_get
[
{
"href": "string",
"config": {
"endpoint_type": "switch_port",
"name": "string",
"traffic_flow_id": "string",
"workload_discovery": true
},
"workload_discovery": true,
"network_device": {
"href": "string"
},
"workloads": [
{
"href": "string"
}
],
"status": "string"
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URL of device endpoint |
| config | network_devices_network_endpoints_post/properties/config | false | none | none |
| workload_discovery | boolean | false | none | Flag to indicate if workload discovery is enabled |
| network_device | object | false | none | Associated network device |
| » href | string | false | none | URI of network device |
| workloads | [object] | false | none | List of managed workloads |
| » href | string | false | none | URI of workload |
| status | string | false | none | Endpoint status |
network_devices_network_endpoints_post
{
"config": {
"endpoint_type": "switch_port",
"name": "string",
"traffic_flow_id": "string",
"workload_discovery": true
},
"workloads": [
{
"href": "string"
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| config | object | true* | none | none |
| » endpoint_type | string | false | none | The type of endpoint |
| » name | string | false | none | The name of the endpoint e.g. interface name |
| » traffic_flow_id | string | false | none | A traffic flow identifier for this endpoint e.g. switch port IfIndex |
| » workload_discovery | boolean | false | none | Flag to indicate if workload discovery is enabled |
| workloads | [object] | false | none | List of managed workloads |
| » href | string | true* | none | URI of workload |
Enumerated Values
| Property | Value |
|---|---|
| endpoint_type | switch_port |
network_devices_network_endpoints_put
{
"config": {
"endpoint_type": "switch_port",
"name": "string",
"traffic_flow_id": "string",
"workload_discovery": true
},
"workloads": [
{
"href": "string"
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| config | network_devices_network_endpoints_post/properties/config | false | none | none |
| workloads | [object] | false | none | List of managed workloads |
| » href | string | true* | none | URI of workload |
network_devices_put
{
"name": "string",
"description": "string",
"device_type": "switch",
"manufacturer": "string",
"model": "string",
"ip_address": "string",
"credentials": {
"type": "cli",
"port": 0,
"username": "string",
"password": "string"
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | The name of the device |
| description | string | false | none | Description of the device |
| device_type | string | false | none | Type of device |
| manufacturer | string | false | none | The manufacturer of the device |
| model | string | false | none | The model of the device |
| ip_address | string | false | none | The IP address of the device |
| credentials | object | false | none | none |
| » type | string | false | none | The type of credential used to access the device |
| » port | integer | false | none | The device port, if non-standard for credential type |
| » username | string | false | none | The username used to access the device |
| » password | string | false | none | The password used to access the device |
Enumerated Values
| Property | Value |
|---|---|
| device_type | switch |
| device_type | slb |
| type | cli |
| type | api |
network_enforcement_nodes_get
[
{
"uuid": "string",
"org_id": 0,
"hostname": "string",
"name": "string",
"public_ip": "string",
"software_version": "string",
"last_status_at": null,
"uptime_seconds": null,
"network_devices": [],
"supported_devices": [
{
"device_type": "string",
"manufacturers": [
{
"manufacturer": "string",
"models": [
{
"model": "string",
"endpoint_type": "string"
}
]
}
]
}
]
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| uuid | string | false | none | The uuid for this network enforcement node |
| org_id | integer | false | none | The org id for this network enforcement node |
| hostname | string | false | none | The hostname for this network enforcement node |
| name | string | false | none | User friendly name for this network enforcement node |
| public_ip | string | false | none | Public ip of this network enforcement node |
| software_version | string | false | none | Network enforcement node software version string |
| last_status_at | string,null(date-time) | false | none | The last time (rfc3339 timestamp) a status was received from this node |
| uptime_seconds | integer,null | false | none | How long since the last restart of this service. |
| network_devices | array | false | none | Managed network devices |
| supported_devices | [object] | false | none | none |
| » device_type | string | false | none | Type of network device |
| » manufacturers | [object] | false | none | none |
| » manufacturer | string | false | none | Device manufacturer |
| » models | [object] | false | none | none |
| » model | string | true* | none | Device model |
| » endpoint_type | string | false | none | Type of supported endpoint |
network_enforcement_nodes_network_devices_post
{
"name": "string",
"description": "string",
"device_type": "switch",
"manufacturer": "string",
"model": "string",
"ip_address": "string",
"credentials": {
"type": "cli",
"port": 0,
"username": "string",
"password": "string"
}
}
Properties
None
noop_get
{}
Properties
None
orgs_auth_security_principals_get
[
{
"type": "user",
"name": "string",
"display_name": "string",
"href": "string"
}
]
The list of the auth_security_principals in this org
Properties
allOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | orgs_auth_security_principals_post/allOf/0 | false | none | none |
and
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | orgs_permissions_put/properties/auth_security_principal | false | none | none |
orgs_auth_security_principals_post
{
"type": "user",
"name": "string",
"display_name": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| type | string | true* | none | type of the auth_security_principal |
| name | string | true* | none | name of auth_security_principal |
| display_name | string | false | none | name of auth_security_principal |
Enumerated Values
| Property | Value |
|---|---|
| type | user |
| type | group |
orgs_auth_security_principals_put
{}
The details of security principal to edit
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| type | string | false | none | type of the auth_security_principal |
| name | string | false | none | name of the auth_security_principal |
| display_name | string | false | none | display name of the auth_security_principal |
anyOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
Enumerated Values
| Property | Value |
|---|---|
| type | user |
| type | group |
orgs_permissions_get
[
{
"role": {
"href": "string"
},
"scope": [
{
"href": "string"
}
],
"auth_security_principal": {
"href": "string"
},
"href": "string"
}
]
The list of the auth_security_principals in this org
Properties
allOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | orgs_permissions_post/allOf/0 | false | none | Permission granted |
and
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
| » href | string | true* | none | URI of permission |
orgs_permissions_post
{
"role": {
"href": "string"
},
"scope": [
{
"href": "string"
}
],
"auth_security_principal": {
"href": "string"
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| role | orgs_permissions_put/properties/role | true* | none | none |
| scope | agents_get/properties/labels | true* | none | Assigned labels |
| auth_security_principal | orgs_permissions_put/properties/auth_security_principal | true* | none | none |
orgs_permissions_put
{}
The details of the permission to edit
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| role | object | false | none | none |
| » href | string | true* | none | URI of Role |
| scope | agents_get/properties/labels | false | none | Assigned labels |
| auth_security_principal | object | false | none | none |
| » href | string | true* | none | URI of auth_security_principal |
anyOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
pairing_profiles_get
{
"href": "string",
"name": "string",
"description": "string",
"mode": "idle",
"enabled": true,
"total_use_count": 0,
"allowed_uses_per_key": 1,
"key_lifespan": 1,
"last_pairing_at": "string",
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"is_default": true,
"labels": [
{
"href": "string"
}
],
"env_label_lock": true,
"loc_label_lock": true,
"role_label_lock": true,
"app_label_lock": true,
"mode_lock": true,
"log_traffic": true,
"log_traffic_lock": true,
"visibility_level": "string",
"visibility_level_lock": true,
"external_data_set": null,
"external_data_reference": null,
"agent_software_release": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of the pairing profile |
| name | string | true* | none | The short friendly name of the pairing profile |
| description | string | true* | none | The long description of the pairing profile |
| mode | agents_get/properties/mode | true* | none | Agent management mode |
| enabled | boolean | true* | none | The enabled flag of the pairing profile |
| total_use_count | integer | true* | none | The number of times the pairing profile has been used |
| allowed_uses_per_key | any | true* | none | The number of times the pairing profile can be used |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | integer | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | string | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| key_lifespan | any | true* | none | Number of seconds pairing profile keys will be valid for |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | integer | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | string | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| last_pairing_at | string | true* | none | Timestamp when this pairing profile was last used for pairing a workload |
| created_at | string(date-time) | true* | none | Timestamp when this pairing profile was first created |
| updated_at | string(date-time) | true* | none | Timestamp when this pairing profile was last updated |
| created_by | object | false | none | none |
| » href | string | true* | none | User who originally created this pairing profile |
| updated_by | object | false | none | none |
| » href | string | true* | none | User who last updated this pairing_profile |
| is_default | boolean | true* | none | Flag indicating this is default auto-created pairing profile |
| labels | agents_get/properties/labels | true* | none | Assigned labels |
| env_label_lock | boolean | true* | none | Flag that controls whether env label can be overridden from pairing script |
| loc_label_lock | boolean | true* | none | Flag that controls whether loc label can be overridden from pairing script |
| role_label_lock | boolean | true* | none | Flag that controls whether role label can be overridden from pairing script |
| app_label_lock | boolean | true* | none | Flag that controls whether app label can be overridden from pairing script |
| mode_lock | boolean | true* | none | Flag that controls whether mode can be overridden from pairing script |
| log_traffic | boolean | true* | none | Alerting status |
| log_traffic_lock | boolean | true* | none | Flag that controls whether log_traffic can be overridden from pairing script |
| visibility_level | string | true* | none | Visibility level of the agent |
| visibility_level_lock | boolean | true* | none | Flag that controls whether visibility_level can be overridden from pairing script |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| agent_software_release | string,null | false | none | Agent software release associated with this paring profile |
pairing_profiles_pairing_key_post
{}
Properties
None
pairing_profiles_post
{
"name": "string",
"description": "string",
"mode": "idle",
"enabled": true,
"allowed_uses_per_key": 1,
"key_lifespan": 1,
"labels": [
{
"href": "string"
}
],
"env_label_lock": true,
"loc_label_lock": true,
"role_label_lock": true,
"app_label_lock": true,
"mode_lock": true,
"log_traffic": true,
"log_traffic_lock": true,
"visibility_level": "flow_full_detail",
"visibility_level_lock": true,
"external_data_set": null,
"external_data_reference": null,
"agent_software_release": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | The short friendly name of the pairing profile |
| description | string | false | none | The long description of the pairing profile |
| mode | agents_get/properties/mode | false | none | Agent management mode |
| enabled | boolean | true* | none | The enabled flag of the pairing profile |
| allowed_uses_per_key | any | false | none | The number of times pairing profile keys can be used |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | integer | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | string | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| key_lifespan | any | false | none | Number of seconds pairing profile keys will be valid for |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | integer | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | string | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| labels | agents_get/properties/labels | false | none | Assigned labels |
| env_label_lock | boolean | false | none | Flag that controls whether env label can be overridden from pairing script |
| loc_label_lock | boolean | false | none | Flag that controls whether loc label can be overridden from pairing script |
| role_label_lock | boolean | false | none | Flag that controls whether role label can be overridden from pairing script |
| app_label_lock | boolean | false | none | Flag that controls whether app label can be overridden from pairing script |
| mode_lock | boolean | false | none | Flag that controls whether mode can be overridden from pairing script |
| log_traffic | boolean | false | none | Alerting status |
| log_traffic_lock | boolean | false | none | Flag that controls whether log_traffic can be overridden from pairing script |
| visibility_level | string | false | none | Visibility level of the agent |
| visibility_level_lock | boolean | false | none | Flag that controls whether visibility_level can be overridden from pairing script |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| agent_software_release | string,null | false | none | Agent software release associated with this paring profile |
Enumerated Values
| Property | Value |
|---|---|
| anonymous | unlimited |
| anonymous | unlimited |
| visibility_level | flow_full_detail |
| visibility_level | flow_summary |
| visibility_level | flow_drops |
| visibility_level | flow_off |
pairing_profiles_put
{
"name": "string",
"description": "string",
"mode": "idle",
"enabled": true,
"allowed_uses_per_key": 1,
"key_lifespan": 1,
"labels": [
{
"href": "string"
}
],
"env_label_lock": true,
"loc_label_lock": true,
"role_label_lock": true,
"app_label_lock": true,
"mode_lock": true,
"log_traffic": true,
"log_traffic_lock": true,
"visibility_level": "flow_full_detail",
"visibility_level_lock": true,
"external_data_set": null,
"external_data_reference": null,
"agent_software_release": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | The short friendly name of the pairing profile |
| description | string | false | none | The long description of the pairing profile |
| mode | agents_get/properties/mode | false | none | Agent management mode |
| enabled | boolean | false | none | The enabled flag of the pairing profile |
| allowed_uses_per_key | any | false | none | The number of times pairing profile keys can be used |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | integer | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | string | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| key_lifespan | any | false | none | Number of seconds pairing profile keys will be valid for |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | integer | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | string | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| labels | agents_get/properties/labels | false | none | Assigned labels |
| env_label_lock | boolean | false | none | Flag that controls whether env label can be overridden from pairing script |
| loc_label_lock | boolean | false | none | Flag that controls whether loc label can be overridden from pairing script |
| role_label_lock | boolean | false | none | Flag that controls whether role label can be overridden from pairing script |
| app_label_lock | boolean | false | none | Flag that controls whether app label can be overridden from pairing script |
| mode_lock | boolean | false | none | Flag that controls whether mode can be overridden from pairing script |
| log_traffic | boolean | false | none | Alerting status |
| log_traffic_lock | boolean | false | none | Flag that controls whether log_traffic can be overridden from pairing script |
| visibility_level | string | false | none | Visibility level of the agent |
| visibility_level_lock | boolean | false | none | Flag that controls whether visibility_level can be overridden from pairing script |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| agent_software_release | string,null | false | none | Agent software release associated with this paring profile |
Enumerated Values
| Property | Value |
|---|---|
| anonymous | unlimited |
| anonymous | unlimited |
| visibility_level | flow_full_detail |
| visibility_level | flow_summary |
| visibility_level | flow_drops |
| visibility_level | flow_off |
product_version_get
{
"product_version": {
"version": "string",
"build": 0,
"release_info": "string",
"engineering_info": "string",
"long_display": "string",
"short_display": "string"
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| product_version | object | true* | none | The product version object |
| » version | string | true* | none | The product version major.minor.patch |
| » build | integer | true* | none | The build number |
| » release_info | string | false | none | A extra string designator for the release |
| » engineering_info | string | false | none | A extra string designator used for engineering only |
| » long_display | string | false | none | A version string for human consumption |
| » short_display | string | false | none | A version string for human consumption |
sec_policy_allow_get
[
{
"href": "string",
"enabled": true,
"description": "string",
"service": {
"href": "string"
},
"ub_service": null,
"sec_connect": true,
"providers": [
{
"actors": "string",
"label": {
"href": "string"
},
"agent": {
"href": "string"
},
"workload": {
"href": "string"
},
"bound_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "string",
"label": {
"href": "string"
},
"agent": {
"href": "string"
},
"workload": {
"href": "string"
},
"bound_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
]
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of object |
| enabled | boolean | true* | none | Enabled flag |
| description | string | false | none | Description |
| service | object | false | none | URI of associated service |
| » href | string | true* | none | Service URI |
| ub_service | object,null | true* | none | URI of UB side service |
| sec_connect | boolean | false | none | Whether a secure connection is established |
| providers | [object] | true* | none | Providers |
| » actors | string | false | none | Rule actors are all workloads ('ams') |
| » label | object | false | none | none |
| » href | string | true* | none | Label URI |
| » agent | object | false | none | none |
| » href | string | true* | none | Agent URI |
| » workload | object | false | none | none |
| » href | string | true* | none | Workload URI |
| » bound_service | object | false | none | none |
| » href | string | true* | none | Bound service URI |
| » virtual_server | object | false | none | none |
| » href | string | true* | none | Virtual server URI |
| » ip_list | object | false | none | URI of associated IP List |
| » href | string | true* | none | IP List URI |
| » consumers | [object] | true* | none | Users |
| » actors | string | false | none | Rule actors are all workloads ('ams') |
| » label | object | false | none | none |
| » href | string | true* | none | Label URI |
| » agent | object | false | none | none |
| » href | string | true* | none | Agent URI |
| » workload | object | false | none | none |
| » href | string | true* | none | Workload URI |
| » bound_service | object | false | none | none |
| » href | string | true* | none | Bound service URI |
| » ip_list | object | false | none | URI of associated IP List |
| » href | string | true* | none | IP List URI |
sec_policy_delete_put
{
"change_subset": {
"label_groups": [
{
"href": "string"
}
],
"services": [
{
"href": "string"
}
],
"rule_sets": [
{
"href": "string"
}
],
"ip_lists": [
{
"href": "string"
}
],
"virtual_services": [
{
"href": "string"
}
],
"firewall_settings": [
{
"href": "string"
}
],
"secure_connect_gateways": [
{
"href": "string"
}
],
"virtual_servers": [
{
"href": "string"
}
]
}
}
Properties
sec_policy_dependencies_post
{
"operation": "commit",
"change_subset": {
"label_groups": [
{
"href": "string"
}
],
"services": [
{
"href": "string"
}
],
"rule_sets": [
{
"href": "string"
}
],
"ip_lists": [
{
"href": "string"
}
],
"virtual_services": [
{
"href": "string"
}
],
"firewall_settings": [
{
"href": "string"
}
],
"secure_connect_gateways": [
{
"href": "string"
}
],
"virtual_servers": [
{
"href": "string"
}
]
}
}
Properties
Enumerated Values
| Property | Value |
|---|---|
| operation | commit |
| operation | revert |
sec_policy_firewall_settings_get
{
"static_policy_scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"firewall_coexistence": null,
"containers_inherit_host_policy_scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"update_type": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| static_policy_scopes | [array] | false | none | Rule set scopes |
| » label | object | false | none | none |
| » href | string | true* | none | Label URI |
| » label_group | object | false | none | none |
| » href | string | true* | none | Label group URI |
| » firewall_coexistence | array,null | false | none | none |
| » scope | agents_get/properties/labels | true* | none | Assigned labels |
| » workload_mode | string | false | none | Additional match criteria to select workload(s) |
| » illumio_primary | boolean | true* | none | Configure Illumio to be the primary firewall |
| » containers_inherit_host_policy_scopes | sec_policy_firewall_settings_get/properties/static_policy_scopes | false | none | Rule set scopes |
| » created_at | string(date-time) | false | none | Time stamp when these firewall settings were first created |
| » updated_at | string(date-time) | false | none | Time stamp when these firewall settings were last updated |
| » deleted_at | string(date-time) | false | none | Time stamp when these firewall settings were deleted |
| » created_by | object | false | none | none |
| » href | string | true* | none | User who originally created these firewall settings |
| » updated_by | object | false | none | none |
| » href | string | true* | none | User who last updated these firewall settings |
| » deleted_by | object | false | none | none |
| » href | string | true* | none | User who deleted these firewall settings |
| » update_type | string | true* | none | Type of update |
sec_policy_firewall_settings_put
{
"update_type": "create",
"static_policy_scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"firewall_coexistence": null,
"containers_inherit_host_policy_scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| update_type | string | false | none | Type of update |
| static_policy_scopes | sec_policy_firewall_settings_get/properties/static_policy_scopes | false | none | Rule set scopes |
| firewall_coexistence | array,null | false | none | none |
| » scope | agents_get/properties/labels | true* | none | Assigned labels |
| » workload_mode | string | false | none | Additional match criteria to select workload(s) |
| » illumio_primary | boolean | true* | none | Configure Illumio to be the primary firewall |
| containers_inherit_host_policy_scopes | sec_policy_firewall_settings_get/properties/static_policy_scopes | false | none | Rule set scopes |
Enumerated Values
| Property | Value |
|---|---|
| update_type | create |
| update_type | update |
| update_type | delete |
| workload_mode | enforced |
| workload_mode | illuminated |
sec_policy_get
{
"href": "string",
"version": "string",
"workloads_affected": 0,
"commit_message": "string",
"object_counts": {
"rule_sets": 0,
"ip_lists": 0,
"services": 0,
"virtual_services": 0,
"label_groups": 0,
"virtual_servers": 0,
"firewall_settings": 0,
"secure_connect_gateways": 0
},
"created_at": "string",
"created_by": {
"href": "string"
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | URI of the policy |
| version | string | true* | none | Policy version |
| workloads_affected | integer | true* | none | Number of workloads affected by the policy |
| commit_message | string | true* | none | Commit message for the policy |
| object_counts | object | false | none | Number of objects present in the given version of policy |
| » rule_sets | integer | false | none | none |
| » ip_lists | integer | false | none | none |
| » services | integer | false | none | none |
| » virtual_services | integer | false | none | none |
| » label_groups | integer | false | none | none |
| » virtual_servers | integer | false | none | none |
| » firewall_settings | integer | false | none | none |
| » secure_connect_gateways | integer | false | none | none |
| created_at | string | true* | none | Timestamp when this label was first created |
| created_by | object | false | none | none |
| » href | string | true* | none | User who originally created this label |
sec_policy_ip_lists_get
{
"href": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ip_ranges": [
{
"description": "string",
"from_ip": "string",
"to_ip": "string",
"exclusion": true
}
],
"fqdns": [
{
"fqdn": "string",
"description": "string"
}
],
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of the ip list |
| name | string | true* | none | Name (must be unique) |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| ip_ranges | [object] | false | none | IP addresses or ranges |
| » description | string | false | none | Description |
| » from_ip | string | true* | none | IP address or a low end of IP range. Might be specified with CIDR notation |
| » to_ip | string | false | none | High end of an IP range |
| » exclusion | boolean | false | none | Whether this IP address is an exclusion. Exclusions must be a strict subset of inclusive IP addresses. |
| fqdns | [object] | false | none | Collection of FQDN |
| » fqdn | string | true* | none | none |
| » description | string | false | none | none |
| created_at | string(date-time) | false | none | Time stamp when this IP List was first created |
| updated_at | string(date-time) | false | none | Time stamp when this IP List was last updated |
| deleted_at | string(date-time) | false | none | Time stamp when this IP List was deleted |
| created_by | object | false | none | none |
| » href | string | true* | none | User who originally created this IP List |
| updated_by | object | false | none | none |
| » href | string | true* | none | User who last updated this IP List |
| deleted_by | object | false | none | none |
| » href | string | true* | none | User who deleted this IP List |
sec_policy_ip_lists_post
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ip_ranges": [
{
"description": "string",
"from_ip": "string",
"to_ip": "string",
"exclusion": true
}
],
"fqdns": [
{
"fqdn": "string",
"description": "string"
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | Name (must be unique) |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| ip_ranges | sec_policy_ip_lists_get/properties/ip_ranges | false | none | IP addresses or ranges |
| fqdns | [object] | false | none | Collection of FQDN |
| » fqdn | string | true* | none | none |
| » description | string | false | none | none |
sec_policy_ip_lists_put
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ip_ranges": [
{
"description": "string",
"from_ip": "string",
"to_ip": "string",
"exclusion": true
}
],
"fqdns": [
{
"fqdn": "string",
"description": "string"
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | Name (must be unique) |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| ip_ranges | sec_policy_ip_lists_get/properties/ip_ranges | false | none | IP addresses or ranges |
| fqdns | [object] | false | none | Collection of FQDN |
| » fqdn | string | true* | none | none |
| » description | string | false | none | none |
sec_policy_label_groups_get
{
"name": "string",
"description": "string",
"key": "string",
"labels": [
{
"href": "string",
"value": "string"
}
],
"sub_groups": [
{
"href": "string",
"name": "string"
}
],
"usage": {
"label_group": true,
"ruleset": true,
"rule": true,
"static_policy_scopes": true,
"containers_inherit_host_policy_scopes": true
},
"external_data_set": null,
"external_data_reference": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | Name of the label group |
| description | string | false | none | The long description of the label group |
| key | string | false | none | Key in key-value pair of contained labels or label groups |
| labels | [object] | false | none | Contained labels |
| » href | string | true* | none | Label URI |
| » value | string | false | none | Label value in key-value pair |
| sub_groups | [object] | false | none | Contained label groups |
| » href | string | true* | none | Contained label group URI |
| » name | string | false | none | Name of sub label group |
| usage | object | false | none | none |
| » label_group | boolean | true* | none | Label group is referenced by another label group |
| » ruleset | boolean | true* | none | Label is referenced by at least one ruleset |
| » rule | boolean | true* | none | Label is referenced by at least one rule |
| » static_policy_scopes | boolean | false | none | Label is referenced by static policy scopes |
| » containers_inherit_host_policy_scopes | boolean | false | none | Label is referenced by containers inherit host policy scopes |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
sec_policy_label_groups_member_of_get
[
{
"href": "string",
"name": "string"
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | Parent label group URI |
| name | string | false | none | Name of parent label group |
sec_policy_label_groups_post
{
"name": "string",
"description": "string",
"key": "string",
"labels": [
{
"href": "string"
}
],
"sub_groups": [
{
"href": "string"
}
],
"external_data_set": null,
"external_data_reference": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | Name of the label group |
| description | string | false | none | The long description of the label group |
| key | string | true* | none | Key in key-value pair of contained labels or label groups |
| labels | [object] | false | none | Contained labels |
| » href | string | true* | none | Label URI |
| sub_groups | [object] | false | none | Contained label groups |
| » href | string | true* | none | Sub label group URI |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
sec_policy_label_groups_put
{
"name": "string",
"description": "string",
"labels": [
{
"href": "string"
}
],
"sub_groups": [
{
"href": "string"
}
],
"external_data_set": null,
"external_data_reference": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | Name of the label group |
| description | string | false | none | The long description of the label group |
| labels | [object] | false | none | Contained labels |
| » href | string | true* | none | Label URI |
| sub_groups | [object] | false | none | Contained label groups |
| » href | string | true* | none | Sub label group URI |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
sec_policy_modified_objects_get
{
"update_type": null,
"object_type": null,
"href": null,
"name": "string",
"modified_at": "string",
"modified_by": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| update_type | any | true* | none | Type of update |
| object_type | any | true* | none | Object Type |
| href | any | true* | none | Href of modified object |
| name | string | true* | none | Name |
| modified_at | string | true* | none | Time stamp of when this object was last modified |
| modified_by | string | true* | none | User who modified the object (href) |
sec_policy_pending_get
{
"rule_sets": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "string",
"related_ip_lists": [
{
"href": "string"
}
],
"related_services": [
{
"href": "string"
}
]
}
],
"firewall_settings": {
"href": "string",
"update_type": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z"
},
"ip_lists": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"services": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"virtual_servers": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"label_groups": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"secure_connect_gateways": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
],
"virtual_services": [
{
"name": "string",
"href": "string",
"updated_by": null,
"updated_at": "2019-11-01T00:36:33Z",
"update_type": "create",
"caps": [
"write"
]
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| rule_sets | [object] | false | none | Array of modified rulesets in the current policy draft |
| » name | string | true* | none | Ruleset name |
| » href | string | false | none | URI of the Ruleset |
| » updated_by | any | true* | none | none |
| » updated_at | string(date-time) | true* | none | Time stamp when this resource was last updated |
| » update_type | string | true* | none | Type of update |
| » related_ip_lists | [any] | false | none | Related IP Lists |
| » href | string | true* | none | URI of IP List |
| » related_services | [any] | false | none | Related Services |
| » href | string | true* | none | URI of Service |
| » firewall_settings | object | false | none | Firewall settings updated by the current policy draft |
| » href | string | false | none | URI of the resource |
| » update_type | string | false | none | Type of update |
| » updated_by | any | true* | none | none |
| » updated_at | string(date-time) | true* | none | Time stamp when this resource was last updated |
| » ip_lists | [object] | false | none | Array of modified resources for a given type in the current policy draft |
| » name | string | true* | none | Resource name |
| » href | string | false | none | URI of the resource |
| » updated_by | any | true* | none | none |
| » updated_at | string(date-time) | true* | none | Time stamp when this resource was last updated |
| » update_type | string | true* | none | Type of update |
| » caps | [string] | false | none | Array of permissions for the entity for the current user - an empty array implies read only access |
| » services | sec_policy_pending_get/properties/ip_lists | false | none | Array of modified resources for a given type in the current policy draft |
| » virtual_servers | sec_policy_pending_get/properties/ip_lists | false | none | Array of modified resources for a given type in the current policy draft |
| » label_groups | sec_policy_pending_get/properties/ip_lists | false | none | Array of modified resources for a given type in the current policy draft |
| » secure_connect_gateways | sec_policy_pending_get/properties/ip_lists | false | none | Array of modified resources for a given type in the current policy draft |
| » virtual_services | sec_policy_pending_get/properties/ip_lists | false | none | Array of modified resources for a given type in the current policy draft |
Enumerated Values
| Property | Value |
|---|---|
| update_type | create |
| update_type | update |
| update_type | delete |
sec_policy_post
{
"update_description": "string",
"change_subset": {
"label_groups": [
{
"href": "string"
}
],
"services": [
{
"href": "string"
}
],
"rule_sets": [
{
"href": "string"
}
],
"ip_lists": [
{
"href": "string"
}
],
"virtual_services": [
{
"href": "string"
}
],
"firewall_settings": [
{
"href": "string"
}
],
"secure_connect_gateways": [
{
"href": "string"
}
],
"virtual_servers": [
{
"href": "string"
}
]
}
}
Properties
sec_policy_restore_post
{}
Properties
None
sec_policy_rule_search_post
{
"enabled": true,
"description": "string",
"ingress_services": [
{
"href": "string"
}
],
"sec_connect": true,
"machine_auth": true,
"stateless": true,
"providers": [
{
"actors": "string",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "string",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true,
"update_type": "create"
}
Filters for Rule Search
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| enabled | boolean | false | none | Enabled flag of the Rule |
| description | string | false | none | Description of the Rule |
| ingress_services | [oneOf] | false | none | Services and ports used in the Rule |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » href | string | true* | none | URI of the service |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » service_name | string | false | none | Name of Windows Service |
| » process_name | string | false | none | Name of running process |
| » port | integer | false | none | Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range. |
| » to_port | integer | false | none | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | workloads_get/properties/services/properties/open_service_ports/items/properties/protocol | false | none | Transport protocol |
| » icmp_type | integer | false | none | ICMP Type (integer 0-255 for icmp protocol) |
| » icmp_code | integer | false | none | ICMP Code (integer 0-15 for icmp protocol) |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » sec_connect | boolean | false | none | Whether a secure connection is established in the Rule |
| » machine_auth | boolean | false | none | Whether machine authentication is enabled in the Rule |
| » stateless | boolean | false | none | Whether stateless is enabled in the Rule |
| » providers | [object] | false | none | Providers for Rule Search |
| » actors | string | false | none | Rule actors are all workloads ('ams') |
| » label | object | false | none | none |
| » href | string | true* | none | Label URI |
| » label_group | object | false | none | none |
| » href | string | true* | none | Label group URI |
| » workload | object | false | none | none |
| » href | string | true* | none | Workload URI |
| » virtual_service | object | false | none | none |
| » href | string | true* | none | Virtual service URI |
| » virtual_server | object | false | none | none |
| » href | string | true* | none | Virtual server URI |
| » ip_list | object | false | none | URI of associated IP List |
| » href | string | true* | none | IP List URI |
| » consumers | [object] | false | none | Providers for Rule Search |
| » actors | string | false | none | Rule actors are all workloads ('ams') |
| » label | object | false | none | none |
| » href | string | true* | none | Label URI |
| » label_group | object | false | none | none |
| » href | string | true* | none | Label group URI |
| » workload | object | false | none | none |
| » href | string | true* | none | Workload URI |
| » virtual_service | object | false | none | none |
| » href | string | true* | none | Virtual service URI |
| » ip_list | object | false | none | URI of associated IP List |
| » href | string | true* | none | IP List URI |
| » consuming_security_principals | [object] | false | none | Hrefs of consuming security principals |
| » href | string | false | none | none |
| » unscoped_consumers | boolean | false | none | UB scope set to All in the Rule |
| » update_type | string | false | none | Type of update for the Rule |
Enumerated Values
| Property | Value |
|---|---|
| update_type | create |
| update_type | update |
| update_type | delete |
sec_policy_rule_sets_get
{
"href": "string",
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"update_type": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"enabled": true,
"scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"rules": [
{
"href": "string",
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true,
"update_type": "string"
}
],
"ip_tables_rules": [
{
"href": "string",
"enabled": true,
"description": "string",
"statements": [
{
"table_name": "nat",
"chain_name": "PREROUTING",
"parameters": "string"
}
],
"actors": [
{
"actors": "string",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
}
}
],
"ip_version": "4"
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of the rule set |
| created_at | string(date-time) | true* | none | Timestamp when this rule set was first created |
| updated_at | string(date-time) | true* | none | Timestamp when this rule set was last updated |
| deleted_at | string(date-time) | true* | none | Timestamp when this rule set was deleted |
| created_by | object | false | none | none |
| » href | string | true* | none | User who originally created this rule set |
| updated_by | object | false | none | none |
| » href | string | true* | none | User who last updated this rule set |
| deleted_by | object | false | none | none |
| » href | string | true* | none | User who deleted this rule set |
| update_type | string | false | none | Type of update |
| name | string | true* | none | Name (must be unique) |
| description | string | true* | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| enabled | boolean | true* | none | Enabled flag |
| scopes | sec_policy_firewall_settings_get/properties/static_policy_scopes | true* | none | Rule set scopes |
| rules | [object] | true* | none | Array of rules in this rule set |
| » href | string | false | none | URI of object |
| » enabled | boolean | true* | none | Enabled flag |
| » description | string | false | none | Description |
| » external_data_set | string,null | false | none | External data set identifier |
| » external_data_reference | string,null | false | none | External data reference identifier |
| » ingress_services | sec_policy_rule_sets_put/properties/rules/items/properties/ingress_services | true* | none | Array of service URI and port/protocol combinations |
| » resolve_labels_as | sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as | true* | none | none |
| » sec_connect | boolean | false | none | Whether a secure connection is established |
| » stateless | boolean | false | none | Whether packet filtering is stateless for the rule |
| » machine_auth | boolean | false | none | Whether machine authentication is enabled |
| » providers | sec_policy_rule_sets_put/properties/rules/items/properties/providers | true* | none | Providers |
| » consumers | sec_policy_rule_sets_put/properties/rules/items/properties/consumers | true* | none | Consumers |
| » consuming_security_principals | sec_policy_rule_search_post/properties/consuming_security_principals | false | none | Hrefs of consuming security principals |
| » unscoped_consumers | boolean | false | none | Set the scope for rule consumers to All |
| » update_type | string | false | none | Type of update |
| ip_tables_rules | [object] | false | none | Array of iptables rules in this rule set |
| » href | string | true* | none | URI of object |
| » enabled | boolean | true* | none | Enabled flag |
| » description | string | false | none | Description |
| » statements | [sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/statements/items] | true* | none | list of the iptables statements in this rule |
| » actors | sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/actors | true* | none | none |
| » ip_version | string | true* | none | IP version for the rules to be applied to |
Enumerated Values
| Property | Value |
|---|---|
| ip_version | 4 |
| ip_version | 6 |
sec_policy_rule_sets_post
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"enabled": true,
"scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"rules": [
{
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true
}
],
"ip_tables_rules": [
{
"enabled": true,
"description": "string",
"statements": [
{
"table_name": "nat",
"chain_name": "PREROUTING",
"parameters": "string"
}
],
"actors": [
{
"actors": "string",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
}
}
],
"ip_version": "4"
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | Name (must be unique) |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| enabled | boolean | false | none | Enabled flag |
| scopes | sec_policy_firewall_settings_get/properties/static_policy_scopes | true* | none | Rule set scopes |
| rules | [object] | false | none | Array of sec rules (access rules) in this rule set |
| » enabled | boolean | true* | none | Enabled flag |
| » description | string | false | none | Description |
| » external_data_set | string,null | false | none | External data set identifier |
| » external_data_reference | string,null | false | none | External data reference identifier |
| » ingress_services | sec_policy_rule_sets_put/properties/rules/items/properties/ingress_services | true* | none | Array of service URI and port/protocol combinations |
| » resolve_labels_as | sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as | true* | none | none |
| » sec_connect | boolean | false | none | Whether a secure connection is established |
| » stateless | boolean | false | none | Whether packet filtering is stateless for the rule |
| » machine_auth | boolean | false | none | Whether machine authentication is enabled |
| » providers | sec_policy_rule_sets_put/properties/rules/items/properties/providers | true* | none | Providers |
| » consumers | sec_policy_rule_sets_put/properties/rules/items/properties/consumers | true* | none | Consumers |
| » consuming_security_principals | sec_policy_rule_search_post/properties/consuming_security_principals | false | none | Hrefs of consuming security principals |
| » unscoped_consumers | boolean | false | none | Set the scope for rule consumers to All |
| ip_tables_rules | [object] | false | none | Array of custom iptables rules in this rule set |
| » enabled | boolean | true* | none | Enabled flag |
| » description | string | false | none | Description |
| » statements | [sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/statements/items] | true* | none | list of the iptables statements in this rule |
| » actors | sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/actors | true* | none | none |
| » ip_version | string | true* | none | IP version for the rules to be applied to |
Enumerated Values
| Property | Value |
|---|---|
| ip_version | 4 |
| ip_version | 6 |
sec_policy_rule_sets_put
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"enabled": true,
"update_type": "create",
"scopes": [
[
{
"label": {
"href": "string"
},
"label_group": {
"href": "string"
}
}
]
],
"rules": [
{}
],
"ip_tables_rules": [
{}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | Name (must be unique) |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| enabled | boolean | false | none | Enabled flag |
| update_type | string | false | none | Type of update |
| scopes | sec_policy_firewall_settings_get/properties/static_policy_scopes | false | none | Rule set scopes |
| rules | [anyOf] | false | none | Array of rules in this rule set |
| » href | string | false | none | URI of Rule |
| » enabled | boolean | false | none | Enabled flag |
| » description | string | false | none | Description |
| » external_data_set | string,null | false | none | External data set identifier |
| » external_data_reference | string | false | none | External data reference identifier |
| » ingress_services | [oneOf] | false | none | Array of service URI and port/protocol combinations |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | sec_policy_dependencies_post/properties/change_subset/properties/virtual_services/items | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » port | integer | false | none | Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol. |
| » to_port | integer | false | none | Upper end of port range; this field should not be included if specifying an individual port. |
| » proto | integer | true* | none | Transport protocol (numeric) |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » resolve_labels_as | object | false | none | none |
| » providers | [string] | true* | none | none |
| » consumers | [string] | true* | none | none |
| » sec_connect | boolean | false | none | Whether a secure connection is established |
| » stateless | boolean | false | none | Whether packet filtering is stateless for the rule |
| » machine_auth | boolean | false | none | Whether machine authentication is enabled |
| » providers | [object] | false | none | Providers |
| » actors | string | false | none | Rule actors are all workloads ('ams') |
| » label | object | false | none | none |
| » href | string | true* | none | Label URI |
| » label_group | object | false | none | none |
| » href | string | true* | none | Label group URI |
| » workload | object | false | none | none |
| » href | string | true* | none | Workload URI |
| » virtual_service | object | false | none | none |
| » href | string | true* | none | Virtual service URI |
| » virtual_server | object | false | none | none |
| » href | string | true* | none | Virtual server URI |
| » ip_list | object | false | none | URI of associated IP List |
| » href | string | true* | none | IP List URI |
| » consumers | [object] | false | none | Consumers |
| » actors | string | false | none | Rule actors are all workloads or container host |
| » label | object | false | none | none |
| » href | string | true* | none | Label URI |
| » label_group | object | false | none | none |
| » href | string | true* | none | Label group URI |
| » workload | object | false | none | none |
| » href | string | true* | none | Workload URI |
| » virtual_service | object | false | none | none |
| » href | string | true* | none | Virtual service URI |
| » ip_list | object | false | none | URI of associated IP List |
| » href | string | true* | none | IP List URI |
| » consuming_security_principals | sec_policy_rule_search_post/properties/consuming_security_principals | false | none | Hrefs of consuming security principals |
| » update_type | string | false | none | Type of update |
| » unscoped_consumers | boolean | false | none | Set the scope for rule consumers to All |
anyOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » ip_tables_rules | [anyOf] | false | none | Array of iptables rules in this ruleset |
| » href | string | false | none | URI of Rule |
| » enabled | boolean | false | none | Enabled flag |
| » description | string | false | none | Description |
| » statements | [object] | false | none | list of the iptables statements in this rule |
| » table_name | string | true* | none | name of the iptables table for this rule |
| » chain_name | string | true* | none | name of the iptables chain for this rule |
| » parameters | string | true* | none | the remainder of the iptables rules (excluding table/chain) |
| » actors | [object] | false | none | none |
| » actors | string | false | none | Rule Actors are all workloads ('ams') |
| » label | object | false | none | none |
| » href | string | true* | none | Label URI |
| » label_group | object | false | none | none |
| » href | string | true* | none | Label group URI |
| » workload | object | false | none | none |
| » href | string | true* | none | Workload URI |
| » ip_version | string | false | none | IP version for the rules to be applied to |
| » update_type | string | false | none | Type of update |
anyOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
Enumerated Values
| Property | Value |
|---|---|
| update_type | create |
| update_type | update |
| update_type | delete |
| proto | 6 |
| proto | 17 |
| actors | ams |
| actors | ams |
| actors | container_host |
| update_type | create |
| update_type | update |
| update_type | delete |
| table_name | nat |
| table_name | mangle |
| table_name | filter |
| chain_name | PREROUTING |
| chain_name | INPUT |
| chain_name | OUTPUT |
| chain_name | FORWARD |
| chain_name | POSTROUTING |
| ip_version | 4 |
| ip_version | 6 |
| update_type | create |
| update_type | update |
| update_type | delete |
sec_policy_rule_sets_sec_rules_get
{
"href": "string",
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true,
"update_type": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of object |
| enabled | boolean | true* | none | Enabled flag |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| ingress_services | sec_policy_rule_sets_put/properties/rules/items/properties/ingress_services | true* | none | Array of service URI and port/protocol combinations |
| resolve_labels_as | sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as | true* | none | none |
| sec_connect | boolean | false | none | Whether a secure connection is established |
| stateless | boolean | false | none | Whether packet filtering is stateless for the rule |
| machine_auth | boolean | false | none | Whether machine authentication is enabled |
| providers | sec_policy_rule_sets_put/properties/rules/items/properties/providers | true* | none | Providers |
| consumers | sec_policy_rule_sets_put/properties/rules/items/properties/consumers | true* | none | Consumers |
| consuming_security_principals | sec_policy_rule_search_post/properties/consuming_security_principals | false | none | Hrefs of consuming security principals |
| unscoped_consumers | boolean | false | none | Set the scope for rule consumers to All |
| update_type | string | false | none | Type of update |
sec_policy_rule_sets_sec_rules_post
{
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"unscoped_consumers": true
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| enabled | boolean | true* | none | Enabled flag |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| ingress_services | sec_policy_rule_sets_put/properties/rules/items/properties/ingress_services | true* | none | Array of service URI and port/protocol combinations |
| resolve_labels_as | sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as | true* | none | none |
| sec_connect | boolean | false | none | Whether a secure connection is established |
| stateless | boolean | false | none | Whether packet filtering is stateless for the rule |
| machine_auth | boolean | false | none | Whether machine authentication is enabled |
| providers | sec_policy_rule_sets_put/properties/rules/items/properties/providers | true* | none | Providers |
| consumers | sec_policy_rule_sets_put/properties/rules/items/properties/consumers | true* | none | Consumers |
| consuming_security_principals | sec_policy_rule_search_post/properties/consuming_security_principals | false | none | Hrefs of consuming security principals |
| unscoped_consumers | boolean | false | none | Set the scope for rule consumers to All |
sec_policy_rule_sets_sec_rules_put
{
"enabled": true,
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"ingress_services": [
{
"href": "string"
}
],
"resolve_labels_as": {
"providers": [
"workloads"
],
"consumers": [
"workloads"
]
},
"sec_connect": true,
"stateless": true,
"machine_auth": true,
"providers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"virtual_server": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consumers": [
{
"actors": "ams",
"label": {
"href": "string"
},
"label_group": {
"href": "string"
},
"workload": {
"href": "string"
},
"virtual_service": {
"href": "string"
},
"ip_list": {
"href": "string"
}
}
],
"consuming_security_principals": [
{
"href": "string"
}
],
"update_type": "create",
"unscoped_consumers": true
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| enabled | boolean | false | none | Enabled flag |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| ingress_services | sec_policy_rule_sets_put/properties/rules/items/properties/ingress_services | false | none | Array of service URI and port/protocol combinations |
| resolve_labels_as | sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as | false | none | none |
| sec_connect | boolean | false | none | Whether a secure connection is established |
| stateless | boolean | false | none | Whether packet filtering is stateless for the rule |
| machine_auth | boolean | false | none | Whether machine authentication is enabled |
| providers | sec_policy_rule_sets_put/properties/rules/items/properties/providers | false | none | Providers |
| consumers | sec_policy_rule_sets_put/properties/rules/items/properties/consumers | false | none | Consumers |
| consuming_security_principals | sec_policy_rule_search_post/properties/consuming_security_principals | false | none | Hrefs of consuming security principals |
| update_type | string | false | none | Type of update |
| unscoped_consumers | boolean | false | none | Set the scope for rule consumers to All |
Enumerated Values
| Property | Value |
|---|---|
| update_type | create |
| update_type | update |
| update_type | delete |
sec_policy_services_get
{
"href": "string",
"name": "string",
"description": "string",
"description_url": "string",
"process_name": "string",
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"windows_services": [
{
"service_name": "string",
"process_name": "string",
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"external_data_set": null,
"external_data_reference": null,
"created_at": "2019-11-01T00:36:34Z",
"updated_at": "2019-11-01T00:36:34Z",
"deleted_at": "2019-11-01T00:36:34Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"update_type": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of the service |
| name | string | true* | none | Name (does not need to be unique) |
| description | string | false | none | Description |
| description_url | string | false | none | Description URL Read-only to prevent XSS attacks |
| process_name | string | false | none | The process name |
| service_ports | [object] | false | none | Service ports |
| » port | integer | false | none | Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range. |
| » to_port | integer | false | none | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | workloads_get/properties/services/properties/open_service_ports/items/properties/protocol | true* | none | Transport protocol |
| » icmp_type | integer | false | none | ICMP Type (integer 0-255 for icmp protocol) |
| » icmp_code | integer | false | none | ICMP Code (integer 0-15 for icmp protocol) |
| windows_services | [sec_policy_rule_search_post/properties/ingress_services/items/oneOf/1] | false | none | Windows services |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| created_at | string(date-time) | false | none | Time stamp when this Service was first created |
| updated_at | string(date-time) | false | none | Time stamp when this Service was last updated |
| deleted_at | string(date-time) | false | none | Time stamp when this Service was deleted |
| created_by | object | false | none | none |
| » href | string | true* | none | User who originally created this Service |
| updated_by | object | false | none | none |
| » href | string | true* | none | User who last updated this Service |
| deleted_by | object | false | none | none |
| » href | string | true* | none | User who deleted this Service |
| update_type | string | true* | none | Type of update |
sec_policy_services_post
{
"name": "string",
"description": "string",
"process_name": "string",
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"windows_services": [
{
"service_name": "string",
"process_name": "string",
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"external_data_set": null,
"external_data_reference": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | Name (does not need to be unique) |
| description | string | false | none | Description |
| process_name | string | false | none | The process name |
| service_ports | sec_policy_services_get/properties/service_ports | false | none | Service ports |
| windows_services | sec_policy_services_get/properties/windows_services | false | none | Windows services |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
sec_policy_services_put
{
"name": "string",
"description": "string",
"process_name": "string",
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"windows_services": [
{
"service_name": "string",
"process_name": "string",
"port": 0,
"to_port": 0,
"proto": 0,
"icmp_type": 0,
"icmp_code": 0
}
],
"external_data_set": null,
"external_data_reference": null
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | Name (does not need to be unique) |
| description | string | false | none | Description |
| process_name | string | false | none | The process name |
| service_ports | sec_policy_services_get/properties/service_ports | false | none | Service ports |
| windows_services | sec_policy_services_get/properties/windows_services | false | none | Windows services |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
sec_policy_virtual_services_bulk_create_put
[
{}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | Name |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| labels | container_clusters_container_workload_profiles_get/properties/assign_labels | false | none | Assigned labels |
| service_ports | sec_policy_virtual_services_bulk_update_put/items/properties/service_ports | false | none | Service ports |
| service | object | false | none | URI of associated service |
| apply_to | string | false | none | Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network |
| ip_overrides | [string] | false | none | Array of IPs or CIDRs as IP overrides |
| service_addresses | sec_policy_virtual_services_bulk_update_put/items/properties/service_addresses | false | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
Enumerated Values
| Property | Value |
|---|---|
| apply_to | host_only |
| apply_to | internal_bridge_network |
sec_policy_virtual_services_bulk_update_put
[
{
"href": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"labels": [
{
"href": "string"
}
],
"service": {},
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0
}
],
"apply_to": "host_only",
"ip_overrides": [
"string"
],
"service_addresses": [
{}
]
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | Virtual Service URI |
| name | string | false | none | Name |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| labels | container_clusters_container_workload_profiles_get/properties/assign_labels | false | none | Assigned labels |
| service | object | false | none | URI of associated service |
| service_ports | [object] | false | none | Service ports |
| » port | integer | false | none | Port Number (integer 0-65535 or -1 for any port). Also the startng port when specifying a range. |
| » to_port | integer | false | none | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | workloads_get/properties/services/properties/open_service_ports/items/properties/protocol | true* | none | Transport protocol |
| apply_to | string | false | none | Firewall rule target for workloads bound to this bound service: host_only or internal_bridge_network |
| ip_overrides | [string] | false | none | Array of IPs or CIDRs as IP overrides |
| service_addresses | [oneOf] | false | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » ip | string | true* | none | IP address to assign to the virtual service |
| » network | object | false | none | none |
| » href | string | true* | none | Network URI for this IP address |
| » port | integer | false | none | Port associated with the IP address for the service (1-65535 integer) |
anyOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
| » fqdn | string | true* | none | FQDN to assign to the virtual service |
| » description | string | false | none | none |
| » port | integer | false | none | Port associated with the FQDN for the service |
Enumerated Values
| Property | Value |
|---|---|
| apply_to | host_only |
| apply_to | internal_bridge_network |
sec_policy_virtual_services_get
{}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | URI of the virtual service |
| created_at | string(date-time) | true* | none | Timestamp when this virtual service was first created |
| updated_at | string(date-time) | true* | none | Timestamp when this virtual service was last updated |
| deleted_at | string,null(date-time) | true* | none | Timestamp when this virtual service was deleted |
| created_by | object | false | none | none |
| » href | string | true* | none | User who originally created this virtual service |
| updated_by | object | false | none | none |
| » href | string | true* | none | User who last updated this virtual service |
| deleted_by | object,null | false | none | none |
| » href | string | true* | none | User who deleted this virtual service |
| update_type | string | false | none | Type of update |
| name | string | true* | none | Name |
| description | string,null | true* | none | Description |
| pce_fqdn | string | false | none | PCE FQDN for this container cluster. Used in Supercluster only |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| labels | container_clusters_container_workload_profiles_get/properties/assign_labels | true* | none | Assigned labels |
| service_ports | sec_policy_virtual_services_bulk_update_put/items/properties/service_ports | false | none | Service ports |
| service | object | false | none | URI of associated service |
| apply_to | string | false | none | Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network |
| ip_overrides | [string] | false | none | Array of IPs or CIDRs as IP overrides |
| service_addresses | sec_policy_virtual_services_bulk_update_put/items/properties/service_addresses | false | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
sec_policy_virtual_services_post
{}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | Name |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| labels | container_clusters_container_workload_profiles_get/properties/assign_labels | false | none | Assigned labels |
| service_ports | sec_policy_virtual_services_bulk_update_put/items/properties/service_ports | false | none | Service ports |
| service | object | false | none | URI of associated service |
| apply_to | string | false | none | Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network |
| ip_overrides | [string] | false | none | Array of IPs or CIDRs as IP overrides |
| service_addresses | sec_policy_virtual_services_bulk_update_put/items/properties/service_addresses | false | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
Enumerated Values
| Property | Value |
|---|---|
| apply_to | host_only |
| apply_to | internal_bridge_network |
sec_policy_virtual_services_put
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"labels": [
{
"href": "string"
}
],
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0
}
],
"service": {},
"apply_to": "host_only",
"ip_overrides": [
"string"
],
"service_addresses": [
{}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | Name |
| description | string | false | none | Description |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| labels | container_clusters_container_workload_profiles_get/properties/assign_labels | false | none | Assigned labels |
| service_ports | sec_policy_virtual_services_bulk_update_put/items/properties/service_ports | false | none | Service ports |
| service | object | false | none | URI of associated service |
| apply_to | string | false | none | Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network |
| ip_overrides | [string] | false | none | Array of IPs or CIDRs as IP overrides |
| service_addresses | sec_policy_virtual_services_bulk_update_put/items/properties/service_addresses | false | none | none |
Enumerated Values
| Property | Value |
|---|---|
| apply_to | host_only |
| apply_to | internal_bridge_network |
security_principals_bulk_create_put
[
{
"sid": "string",
"name": "string",
"description": "string"
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| sid | string | true* | none | Active Directory SID (or any other unique identifier) |
| name | string | true* | none | Name of the security principal |
| description | string | false | none | A longer description of the security principal |
security_principals_get
{
"sid": "string",
"name": "string",
"description": "string"
}
Properties
None
security_principals_post
{
"sid": "string",
"name": "string",
"description": "string"
}
Properties
None
security_principals_put
{
"name": "string",
"description": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | Name of the security principal |
| description | string | false | none | A longer description of the security principal |
settings_events_get
{
"audit_event_retention_seconds": 0,
"audit_event_min_severity": "error",
"format": "string"
}
Org-based event setting
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| audit_event_retention_seconds | integer | true* | none | The time in seconds an audit event is stored in the database |
| audit_event_min_severity | string | true* | none | Minimum severity level of audit event messages. |
| format | string | true* | none | The log format (JSON, CEF, LEEF), which applies to all remote syslog destinations |
Enumerated Values
| Property | Value |
|---|---|
| audit_event_min_severity | error |
| audit_event_min_severity | warning |
| audit_event_min_severity | informational |
settings_events_put
{
"audit_event_retention_seconds": 86400,
"audit_event_min_severity": "error",
"format": "JSON"
}
Org-based event setting
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| audit_event_retention_seconds | integer | false | none | The time in seconds an audit event is stored in the database |
| audit_event_min_severity | settings_events_get/properties/audit_event_min_severity | false | none | Minimum severity level of audit event messages. |
| format | string | false | none | The log format (JSON, CEF, LEEF), which applies to all syslog destinations |
Enumerated Values
| Property | Value |
|---|---|
| format | JSON |
| format | CEF |
| format | LEEF |
settings_syslog_destinations_get
[
{
"href": "string",
"pce_scope": [
"string"
],
"type": "string",
"description": "string",
"audit_event_logger": {
"configuration_event_included": true,
"system_event_included": true,
"min_severity": "error"
},
"traffic_event_logger": {
"traffic_flow_allowed_event_included": true,
"traffic_flow_potentially_blocked_event_included": true,
"traffic_flow_blocked_event_included": true
},
"node_status_logger": {
"node_status_included": true
},
"remote_syslog": {
"address": "string",
"port": 0,
"protocol": 0,
"tls_enabled": true,
"tls_ca_bundle": "string",
"tls_verify_cert": true
}
}
]
List of destinations
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | URI of the destination |
| pce_scope | [string] | true* | none | none |
| type | string | true* | none | Destination type |
| description | string | true* | none | Description of the destination |
| audit_event_logger | object | true* | none | none |
| » configuration_event_included | boolean | true* | none | Configuration (Northbound) auditable events |
| » system_event_included | boolean | true* | none | System (PCE) auditable events |
| » min_severity | settings_events_get/properties/audit_event_min_severity | true* | none | Minimum severity level of audit event messages. |
| traffic_event_logger | object | true* | none | none |
| » traffic_flow_allowed_event_included | boolean | true* | none | Set to enable traffic flow events |
| » traffic_flow_potentially_blocked_event_included | boolean | true* | none | Set to enable traffic flow events |
| » traffic_flow_blocked_event_included | boolean | true* | none | Set to enable traffic flow events |
| node_status_logger | object | true* | none | none |
| » node_status_included | boolean | true* | none | Syslog messages regarding status of the nodes |
| remote_syslog | object | false | none | none |
| » address | string | true* | none | The remote syslog IP or DNS address |
| » port | integer | true* | none | The remote syslog port |
| » protocol | integer | true* | none | The protocol for streaming syslog messages |
| » tls_enabled | boolean | true* | none | To enable TLS |
| » tls_ca_bundle | string | false | none | Trustee CA bundle |
| » tls_verify_cert | boolean | true* | none | Perform TLS verification |
settings_syslog_destinations_post
{
"pce_scope": [
"string"
],
"type": "local_syslog",
"description": "string",
"audit_event_logger": {
"configuration_event_included": true,
"system_event_included": true,
"min_severity": "error"
},
"traffic_event_logger": {
"traffic_flow_allowed_event_included": true,
"traffic_flow_potentially_blocked_event_included": true,
"traffic_flow_blocked_event_included": true
},
"node_status_logger": {
"node_status_included": true
},
"remote_syslog": {
"address": "string",
"port": 0,
"protocol": 0,
"tls_enabled": true,
"tls_ca_bundle": "string",
"tls_verify_cert": true
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| pce_scope | [string] | true* | none | none |
| type | string | true* | none | Destination type |
| description | string | true* | none | Description of the destination |
| audit_event_logger | object | true* | none | none |
| » configuration_event_included | boolean | true* | none | Configuration (Northbound) auditable events |
| » system_event_included | boolean | true* | none | System (PCE) auditable events |
| » min_severity | settings_events_get/properties/audit_event_min_severity | true* | none | Minimum severity level of audit event messages. |
| traffic_event_logger | object | true* | none | none |
| » traffic_flow_allowed_event_included | boolean | true* | none | Set to enable traffic flow events |
| » traffic_flow_potentially_blocked_event_included | boolean | true* | none | Set to enable traffic flow events |
| » traffic_flow_blocked_event_included | boolean | true* | none | Set to enable traffic flow events |
| node_status_logger | object | true* | none | none |
| » node_status_included | boolean | true* | none | Syslog messages regarding status of the nodes |
| remote_syslog | object | false | none | none |
| » address | string | true* | none | The remote syslog IP or DNS address |
| » port | integer | true* | none | The remote syslog port |
| » protocol | integer | true* | none | The protocol for streaming syslog messages |
| » tls_enabled | boolean | true* | none | To enable TLS |
| » tls_ca_bundle | string | false | none | Trustee CA bundle |
| » tls_verify_cert | boolean | true* | none | Perform TLS verification |
Enumerated Values
| Property | Value |
|---|---|
| type | local_syslog |
| type | remote_syslog |
settings_syslog_destinations_put
{
"href": "string",
"pce_scope": [
"string"
],
"type": "local_syslog",
"description": "string",
"audit_event_logger": {
"configuration_event_included": true,
"system_event_included": true,
"min_severity": "error"
},
"traffic_event_logger": {
"traffic_flow_allowed_event_included": true,
"traffic_flow_potentially_blocked_event_included": true,
"traffic_flow_blocked_event_included": true
},
"node_status_logger": {
"node_status_included": true
},
"remote_syslog": {
"address": "string",
"port": 0,
"protocol": 0,
"tls_enabled": true,
"tls_ca_bundle": "string",
"tls_verify_cert": true
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of the destination |
| pce_scope | [string] | false | none | none |
| type | string | false | none | Destination type |
| description | string | false | none | Description of the destination |
| audit_event_logger | object | false | none | none |
| » configuration_event_included | boolean | false | none | Configuration (Northbound) auditable events |
| » system_event_included | boolean | false | none | System (PCE) auditable events |
| » min_severity | settings_events_get/properties/audit_event_min_severity | false | none | Minimum severity level of audit event messages. |
| traffic_event_logger | object | false | none | none |
| » traffic_flow_allowed_event_included | boolean | false | none | Set to enable traffic flow events |
| » traffic_flow_potentially_blocked_event_included | boolean | false | none | Set to enable traffic flow events |
| » traffic_flow_blocked_event_included | boolean | false | none | Set to enable traffic flow events |
| node_status_logger | object | false | none | none |
| » node_status_included | boolean | false | none | Syslog messages regarding status of the nodes |
| remote_syslog | object | false | none | none |
| » address | string | false | none | The remote syslog IP or DNS address |
| » port | integer | false | none | The remote syslog port |
| » protocol | integer | false | none | The protocol for streaming syslog messages |
| » tls_enabled | boolean | false | none | To enable TLS |
| » tls_ca_bundle | string | false | none | Trustee CA bundle |
| » tls_verify_cert | boolean | false | none | Perform TLS verification |
Enumerated Values
| Property | Value |
|---|---|
| type | local_syslog |
| type | remote_syslog |
settings_traffic_collector_get
{
"href": "string",
"transmission": "string",
"target": {
"dst_port": 0,
"proto": 0,
"dst_ip": "string"
},
"action": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | URI of the destination |
| transmission | string | true* | none | transmission type: broadcast/multicast |
| target | object | false | none | none |
| » dst_port | integer | false | none | none |
| » proto | integer | true* | none | none |
| » dst_ip | string | false | none | single ip address or CIDR |
| action | string | true* | none | drop or aggregate the target traffic |
settings_traffic_collector_post
{
"transmission": "broadcast",
"target": {
"dst_port": 0,
"proto": 0,
"dst_ip": "string"
},
"action": "drop"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| transmission | string | true* | none | transmission type: broadcast/multicast |
| target | object | false | none | none |
| » dst_port | integer | false | none | none |
| » proto | integer | true* | none | none |
| » dst_ip | string | false | none | single ip address or CIDR |
| action | string | true* | none | drop or aggregate the target traffic |
Enumerated Values
| Property | Value |
|---|---|
| transmission | broadcast |
| transmission | multicast |
| action | drop |
| action | aggregate |
settings_traffic_collector_put
{
"transmission": "broadcast",
"target": {
"dst_port": 0,
"proto": 0,
"dst_ip": "string"
},
"action": "drop"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| transmission | string | false | none | transmission type: broadcast/multicast |
| target | object | false | none | none |
| » dst_port | integer | false | none | none |
| » proto | integer | true* | none | none |
| » dst_ip | string | false | none | single ip address or CIDR |
| action | string | false | none | drop or aggregate the target traffic |
Enumerated Values
| Property | Value |
|---|---|
| transmission | broadcast |
| transmission | multicast |
| action | drop |
| action | aggregate |
settings_workloads_get
{
"workload_disconnected_timeout_seconds": [
{
"scope": [
{
"href": "string"
}
],
"value": -1
}
],
"workload_goodbye_timeout_seconds": [
{
"scope": [
{
"href": "string"
}
],
"value": -1
}
]
}
Workload setting properties
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| workload_disconnected_timeout_seconds | [object] | true* | none | none |
| » scope | agents_get/properties/labels | true* | none | Assigned labels |
| » value | integer | true* | none | Property value associated with the scope |
| workload_goodbye_timeout_seconds | settings_workloads_get/properties/workload_disconnected_timeout_seconds | true* | none | none |
settings_workloads_put
{
"workload_disconnected_timeout_seconds": [
{
"scope": [
{
"href": "string"
}
],
"value": -1
}
],
"workload_goodbye_timeout_seconds": [
{
"scope": [
{
"href": "string"
}
],
"value": -1
}
]
}
Workload setting properties
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| workload_disconnected_timeout_seconds | settings_workloads_get/properties/workload_disconnected_timeout_seconds | false | none | none |
| workload_goodbye_timeout_seconds | settings_workloads_get/properties/workload_disconnected_timeout_seconds | false | none | none |
system_events_get
{
"href": "string",
"org_id": 0,
"version": "string",
"event_id": "string",
"event_type": "string",
"status": "string",
"severity": "string",
"timestamp": "2019-11-01T00:36:34Z",
"pce_fqdn": "string",
"created_by": null,
"action": {
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:34Z",
"pce_fqdn": "string",
"created_by": null,
"event_type": "string",
"status": "string",
"severity": "string",
"task_name": "string",
"api_endpoint": "string",
"api_method": "string",
"http_status_code": 0,
"src_ip": "string",
"errors": [
{
"token": "string",
"message": "string"
}
],
"info": {}
},
"resource_changes": [
{
"href": "string",
"version": "string",
"org_id": 0,
"uuid": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:34Z",
"pce_fqdn": "string",
"created_by": null,
"resource": null,
"changes": {},
"change_type": "string"
}
],
"notifications": [
{
"href": "string",
"event": "string",
"timestamp": "2019-11-01T00:36:34Z",
"pce_fqdn": "string",
"created_by": null,
"notification_type": "string",
"severity": "err",
"info": {}
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | Unique href for this event, which can be used for event lookup via the events API |
| org_id | integer | false | none | org_id for this event. |
| version | string | false | none | The event version of this event for the category it falls under |
| event_id | string | false | none | Unique request/transaction identifier of the API request / context from which this event was generated |
| event_type | string | true* | none | Event name that clearly describes the event |
| status | string | true* | none | Status of the event; usually a mapping of api_status_code to a generic result string; nil if no action. For presentation purposes only. |
| severity | string | true* | none | This event's level of importance |
| timestamp | string(date-time) | true* | none | RFC 3339 timestamp at which this event was originally created |
| pce_fqdn | string | true* | none | Fully qualified domain name of the PCE, where this event originated |
| created_by | object | true* | none | The entity responsible for the creation of this event |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | any | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| action | events_get/properties/action | false | none | none |
| resource_changes | [events_get/properties/resource_changes/items] | false | none | Array of resource log events that were generated during this event |
| notifications | [events_get/properties/notifications/items] | false | none | Array of notification log events that were generated during this event |
traffic_flows_traffic_analysis_queries_post
{
"start_date": "2019-11-01",
"end_date": "2019-11-01",
"sources_destinations_query_op": "and",
"sources": {
"include": [
[
{
"label": {
"href": "string"
}
}
]
],
"exclude": [
{
"label": {
"href": "string"
}
}
]
},
"destinations": {
"include": [
[
{
"label": {
"href": "string"
}
}
]
],
"exclude": [
{
"label": {
"href": "string"
}
}
]
},
"services": {
"include": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"process_name": "string",
"windows_service_name": "string"
}
],
"exclude": [
{
"port": 0,
"to_port": 0,
"proto": 0,
"process_name": "string",
"windows_service_name": "string"
}
]
},
"policy_decisions": [
"allowed"
],
"max_results": 0
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| start_date | string(date) | false | none | Starting date for query |
| end_date | string(date) | false | none | Ending date for query |
| sources_destinations_query_op | string | false | none | Query logical operator between sources and destinations |
| sources | object | true* | none | Source labels, workloads, IP addresses to include or exclude |
| » include | [array] | true* | none | List of included sources or targets |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | A label parameter for a traffic query |
| » label | object | true* | none | none |
| » href | string | true* | none | Label URI |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | A workload parameter for a traffic query |
| » workload | object | true* | none | none |
| » href | string | true* | none | Workload URI |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | An IP address parameter for a traffic query |
| » ip_address | string | true* | none | IP address value |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » exclude | [anyOf] | true* | none | List of excluded sources or targets |
anyOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/0 | false | none | A label parameter for a traffic query |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/1 | false | none | A workload parameter for a traffic query |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/2 | false | none | An IP address parameter for a traffic query |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » destinations | object | true* | none | Target labels, workloads, IP addresses, domain names, transmission to include or exclude |
| » include | [array] | true* | none | List of included sources or targets |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/0 | false | none | A label parameter for a traffic query |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/1 | false | none | A workload parameter for a traffic query |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/2 | false | none | An IP address parameter for a traffic query |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | An DNS parameter for a traffic query |
| » fqdn | string | true* | none | parameter for querying the matched fqdn |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » exclude | [anyOf] | true* | none | List of excluded sources or targets |
anyOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/0 | false | none | A label parameter for a traffic query |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/1 | false | none | A workload parameter for a traffic query |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/sources/properties/include/items/items/oneOf/2 | false | none | An IP address parameter for a traffic query |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | traffic_flows_traffic_analysis_queries_post/properties/destinations/properties/include/items/items/oneOf/3 | false | none | An DNS parameter for a traffic query |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | Parameter representing broadcast/multiccast |
| » transmission | string | true* | none | transmission type |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » services | object | true* | none | Services (5-tuple of port/to_port/proto/process/service) to include or exclude |
| » include | [object] | true* | none | List of included services (5-tuple of port/to_port/proto/process/service) |
| » port | integer | false | none | Port Number (integer 0-65535). Also the starting port when specifying a range. |
| » to_port | integer | false | none | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | integer | false | none | protocol number |
| » process_name | string | false | none | Process Name |
| » windows_service_name | string | false | none | Windows Service Name |
| » exclude | [object] | true* | none | List of excluded services (5-tuple of port/to_port/proto/process/service) |
| » port | integer | false | none | Port Number (integer 0-65535). Also the starting port when specifying a range. |
| » to_port | integer | false | none | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | integer | false | none | protocol number |
| » process_name | string | false | none | Process Name |
| » windows_service_name | string | false | none | Windows Service Name |
| » policy_decisions | [string] | true* | none | List of policy decisions |
| » max_results | integer | false | none | maximum number of flows to return |
Enumerated Values
| Property | Value |
|---|---|
| sources_destinations_query_op | and |
| sources_destinations_query_op | or |
| transmission | broadcast |
| transmission | multicast |
| transmission | unicast |
users_api_keys_get
{
"key_id": "string",
"auth_username": "string",
"created_at": "2019-11-01T00:36:34Z",
"name": "string",
"description": "string",
"href": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| key_id | string | true* | none | The key ID |
| auth_username | string | true* | none | Username required for authentication |
| created_at | string(date-time) | true* | none | Timestamp when this key was first created (RFC 3339) |
| name | string | true* | none | The key name - just a label to be used |
| description | string | false | none | The description of the key |
| href | string | true* | none | URI of the key |
users_api_keys_post
{
"name": "string",
"description": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | The key name - just a label to be used |
| description | string | false | none | The description of the key |
users_api_keys_put
{
"name": "string",
"description": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | The key name - just a label to be used |
| description | string | false | none | The description of the key |
users_get
{
"href": "string",
"username": "string",
"last_login_on": "string",
"last_login_ip_address": "string",
"login_count": 0,
"full_name": "string",
"time_zone": "string",
"locked": true,
"effective_groups": [
"string"
],
"local_profile": {},
"updated_at": "2019-11-01T00:36:34Z",
"created_at": "2019-11-01T00:36:34Z",
"type": "string",
"presence_status": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | URI of the user |
| username | string | true* | none | The User name as an email address |
| last_login_on | string | true* | none | This is populated automatically after a login |
| last_login_ip_address | string | true* | none | This is populated automatically after a login |
| login_count | integer | true* | none | Number of times this user logged in |
| full_name | string | true* | none | User's full name |
| time_zone | string | true* | none | Time Zone IANA Region Name |
| locked | boolean | false | none | Flag to indicate whether account is locked |
| effective_groups | [string] | false | none | List of group names the user is a member of |
| local_profile | object | false | none | Local user profile |
| updated_at | string(date-time) | true* | none | Timestamp when this user was last updated |
| created_at | string(date-time) | true* | none | Timestamp when this user was first created |
| type | string | true* | none | User's type, i.e. user authenticated local or remotely via SAML |
| presence_status | string | false | none | Status of the user |
users_local_profile_password_put
{
"current_password": "string",
"new_password": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| current_password | string | true* | none | current password |
| new_password | string | true* | none | new password |
users_local_profile_post
{
"locked": true
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| locked | boolean | false | none | Flag to indicate if account is locked |
users_local_profile_reinvite_put
{}
Reinvite a local user
Properties
None
users_login_get
{
"href": "string",
"auth_username": "string",
"session_token": "string",
"inactivity_expiration_minutes": 0,
"last_login_on": "2019-11-01T00:36:34Z",
"last_login_ip_address": "string",
"full_name": "string",
"type": "string",
"time_zone": "string",
"product_version": {
"product_version": {
"version": "string",
"build": 0,
"release_info": "string",
"engineering_info": "string",
"long_display": "string",
"short_display": "string"
}
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | User URI |
| auth_username | string | true* | none | Username required for authentication |
| session_token | string | true* | none | A token used in place of a password for all REST API calls for this user - it is only valid for the IP the login was called from |
| inactivity_expiration_minutes | integer | true* | none | How long this token will remain active if not used. It will last for at least this long. |
| last_login_on | string(date-time) | false | none | Last time the user logged in |
| last_login_ip_address | string | false | none | Last IP the user logged in from |
| full_name | string | true* | none | User's full name |
| type | string | true* | none | User's type, i.e. user authenticated local or remotely via SAML |
| time_zone | string | false | none | The time zone setting for this user |
| product_version | product_version_get | true* | none | none |
users_logout_put
{}
Properties
None
users_post
{
"username": "user@example.com",
"full_name": "string",
"time_zone": "string",
"type": "local"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| username | string(email) | true* | none | username is an email address e.g. user@example.com |
| full_name | string | false | none | User's full name |
| time_zone | string | false | none | Time Zone IANA Region Name |
| type | string | true* | none | User's type, i.e. user authenticated local or remotely via SAML |
Enumerated Values
| Property | Value |
|---|---|
| type | local |
users_put
{
"full_name": "string",
"time_zone": "string",
"locked": true
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| full_name | string | false | none | User's full name |
| time_zone | string | false | none | Time Zone IANA Region Name |
| locked | boolean | false | none | Flag to indicate whether account is locked |
vulnerabilities_get
[
{
"href": "string",
"score": 0,
"cve_ids": [
"string"
],
"description": "string",
"name": "string",
"created_at": "2019-11-01T00:36:34Z",
"updated_at": "2019-11-01T00:36:34Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
}
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | The href of the vulnerability |
| score | integer | true* | none | The normalized score of the vulnerability within the range of 0 to 100. CVSS Score can be used here with a 10x multiplier. |
| cve_ids | [string] | false | none | The cve_ids for the vulnerability |
| description | string | false | none | An arbitrary field to store some details of the vulnerability class |
| name | string | true* | none | The title/name of the vulnerability |
| created_at | string(date-time) | false | none | The time (rfc3339 timestamp) at which this report was created |
| updated_at | string(date-time) | false | none | The time (rfc3339 timestamp) at which this report was last updated |
| created_by | object | false | none | none |
| » href | string | true* | none | The URI of the user who created this report |
| updated_by | object | false | none | none |
| » href | string | true* | none | The URI of the user who last updated this report |
vulnerabilities_post
[
{
"reference_id": "string",
"score": 0,
"cve_ids": [
"string"
],
"description": "string",
"name": "string"
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| reference_id | string | true* | none | The reference id of the vulnerability |
| score | integer | true* | none | The normalized score of the vulnerability within the range of 0 to 100. CVSS Score can be used here with a 10x multiplier. |
| cve_ids | [string] | false | none | The cve_ids for the vulnerability |
| description | string | false | none | An arbitrary field to store some details of the vulnerability class |
| name | string | true* | none | The title/name of the vulnerability |
vulnerabilities_put
{
"score": 0,
"cve_ids": [
"string"
],
"description": "string",
"name": "string"
}
Vulnerability
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| score | integer | true* | none | The normalized score of the vulnerability within the range of 0 to 100. CVSS Score can be used here with a 10x multiplier. |
| cve_ids | [string] | false | none | The cve_ids for the vulnerability |
| description | string | false | none | An arbitrary field to store some details of the vulnerability class |
| name | string | true* | none | The title/name of the vulnerability |
vulnerability_reports_get
{
"href": "string",
"name": "string",
"report_type": "string",
"num_vulnerabilities": 0,
"authoritative": true,
"scanned_ips": [
"string"
],
"created_at": "2019-11-01T00:36:34Z",
"updated_at": "2019-11-01T00:36:34Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
}
}
Vulnerability report
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | The resource(URI) representation of the vulnerability report |
| name | string | true* | none | User generated name of the vulnerability report |
| report_type | string | true* | none | A string representing the type of the report |
| num_vulnerabilities | integer | true* | none | Number of vulnerabilities that belong to this report |
| authoritative | boolean | false | none | Boolean value specifies whether a report is authoritative (or) not |
| scanned_ips | [string] | false | none | The ips on which the scan was performed |
| created_at | string(date-time) | true* | none | The time (rfc3339 timestamp) at which this report was created |
| updated_at | string(date-time) | true* | none | The time (rfc3339 timestamp) at which this report was last updated |
| created_by | object | true* | none | none |
| » href | string | true* | none | The URI of the user who created this report |
| updated_by | object | true* | none | none |
| » href | string | true* | none | The URI of the user who last updated this report |
vulnerability_reports_put
{
"name": "string",
"report_type": "string",
"authoritative": true,
"scanned_ips": [
"string"
],
"detected_vulnerabilities": [
{
"ip_address": "string",
"port": 0,
"proto": 0,
"workload": {
"href": "string"
},
"vulnerability": {
"href": "string"
}
}
]
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | User generated name of the vulnerability report |
| report_type | string | true* | none | A string representing the type of the report |
| authoritative | boolean | false | none | Boolean value specifies whether a report is authoritative (or) not |
| scanned_ips | [string] | false | none | The ips on which the scan was performed |
| detected_vulnerabilities | [object] | false | none | none |
| » ip_address | string | true* | none | The ip address of the host where the vulnerability is found |
| » port | integer | false | none | The port which is associated with the vulnerability |
| » proto | integer | false | none | The protocol which is associated with the vulnerability |
| » workload | object | true* | none | none |
| » href | string | true* | none | The URI of the workload to which this vulnerability belongs |
| » vulnerability | object | true* | none | none |
| » href | string | true* | none | The URI of the vulnerability class to which this vulnerability belongs |
[
{}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | The short friendly name of the workload |
| description | string | false | none | The long description of the workload |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| hostname | string | false | none | The hostname reported from the host itself |
| service_principal_name | string,null | false | none | The Kerberos Service Principal Name (SPN) |
| agent_to_pce_certificate_authentication_id | string,null | false | none | PKI Certificate identifier to be used by the PCE for authenticating the VEN |
| distinguished_name | string | false | none | X.509 Subject distinguished name |
| public_ip | string | false | none | The public IP address of the server |
| interfaces | workloads_post/properties/interfaces | false | none | Workload network interfaces |
| service_provider | string | false | none | Service provider |
| data_center | string | false | none | Data center |
| data_center_zone | string | false | none | Data center zone |
| os_id | string | false | none | Our OS identifier |
| os_detail | string | false | none | Additional OS details - just displayed to end user |
| online | boolean | false | none | If this workload is online |
| labels | agents_get/properties/labels | false | none | Assigned labels |
| agent | object | false | none | Agent info |
| » config | workloads_post/properties/agent/properties/config | false | none | none |
anyOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| anonymous | object | false | none | none |
[
{
"href": "string"
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | true* | none | URI of a specific workload or workload collection URI with query parameters external_data_set and external_data_reference |
[
{
"href": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"hostname": "string",
"service_principal_name": null,
"agent_to_pce_certificate_authentication_id": null,
"distinguished_name": "string",
"public_ip": "string",
"interfaces": [
{
"name": "string",
"link_state": "up",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"friendly_name": "string"
}
],
"service_provider": "string",
"data_center": "string",
"data_center_zone": "string",
"os_id": "string",
"os_detail": "string",
"online": true,
"labels": [
{
"href": "string"
}
],
"agent": {
"href": "string",
"config": {
"mode": "idle",
"log_traffic": true
}
}
}
]
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | Workload URI (bulk_update only) |
| name | string | false | none | The short friendly name of the workload |
| description | string | false | none | The long description of the workload |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| hostname | string | false | none | The hostname reported from the host itself |
| service_principal_name | string,null | false | none | The Kerberos Service Principal Name (SPN) |
| agent_to_pce_certificate_authentication_id | string,null | false | none | PKI Certificate identifier to be used by the PCE for authenticating the VEN |
| distinguished_name | string | false | none | X.509 Subject distinguished name |
| public_ip | string | false | none | The public IP address of the server |
| interfaces | workloads_post/properties/interfaces | false | none | Workload network interfaces |
| service_provider | string | false | none | Service provider |
| data_center | string | false | none | Data center |
| data_center_zone | string | false | none | Data center zone |
| os_id | string | false | none | Our OS identifier |
| os_detail | string | false | none | Additional OS details - just displayed to end user |
| online | boolean | false | none | If this workload is online |
| labels | agents_get/properties/labels | false | none | Assigned labels |
| agent | object | false | none | Agent info |
| » href | string | false | none | URI of agent; will be ignored by the server |
| » config | workloads_post/properties/agent/properties/config | false | none | none |
{
"href": "string",
"deleted": true,
"delete_type": "string",
"name": "string",
"description": "string",
"hostname": "string",
"service_principal_name": "string",
"distinguished_name": "string",
"public_ip": "string",
"external_data_set": null,
"external_data_reference": null,
"interfaces": {
"name": "string",
"link_state": "string",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"network": {
"href": "string"
},
"network_detection_mode": "string",
"friendly_name": "string"
},
"service_provider": "string",
"data_center": "string",
"data_center_zone": "string",
"os_id": "string",
"os_detail": "string",
"online": true,
"firewall_coexistence": null,
"containers_inherit_host_policy": true,
"labels": [
{
"href": "string"
}
],
"services": {
"uptime_seconds": 0,
"created_at": "2019-11-01T00:36:34Z",
"open_service_ports": [
{
"protocol": 0,
"address": "string",
"port": 0,
"process_name": "string",
"user": "string",
"package": "string",
"win_service_name": "string"
}
]
},
"vulnerabilities_summary": {
"num_vulnerabilities": 0,
"vulnerable_port_exposure": null,
"vulnerable_port_wide_exposure": {
"any": null,
"ip_list": null
},
"vulnerability_exposure_score": null,
"vulnerability_score": 0,
"max_vulnerability_score": 0
},
"detected_vulnerabilities": [
{
"ip_address": "string",
"port": 0,
"proto": 0,
"port_exposure": null,
"port_wide_exposure": {
"any": null,
"ip_list": null
},
"workload": {
"href": "string"
},
"vulnerability": {
"href": "string",
"score": 0,
"name": "string"
},
"vulnerability_report": {
"href": "string"
}
}
],
"agent": {
"config": {
"mode": "idle",
"log_traffic": true,
"security_policy_update_mode": "string"
},
"href": "string",
"secure_connect": {
"matching_issuer_name": "string"
},
"status": {
"uid": "string",
"last_heartbeat_on": null,
"uptime_seconds": null,
"agent_version": "string",
"managed_since": "2019-11-01T00:36:34Z",
"fw_config_current": true,
"firewall_rule_count": 0,
"security_policy_refresh_at": "2019-11-01T00:36:34Z",
"security_policy_applied_at": "2019-11-01T00:36:34Z",
"security_policy_received_at": "2019-11-01T00:36:34Z",
"agent_health_errors": {
"errors": [
"string"
],
"warnings": [
"string"
]
},
"agent_health": [
{
"type": "string",
"severity": "string",
"audit_event": "string"
}
],
"security_policy_sync_state": "string"
},
"active_pce_fqdn": "string",
"target_pce_fqdn": "string",
"type": "string"
},
"created_at": "2019-11-01T00:36:34Z",
"updated_at": "2019-11-01T00:36:34Z",
"deleted_at": "2019-11-01T00:36:34Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"container_cluster": {
"href": "string",
"name": "string"
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | URI of workload |
| deleted | boolean | true* | none | This workload has been deleted |
| delete_type | string | false | none | DEPRECATED WITH NO REPLACEMENT: Workload deletion type |
| name | string | true* | none | Interface name |
| description | string | true* | none | The description of this workload |
| hostname | string | true* | none | The hostname of this workload |
| service_principal_name | string | true* | none | The Kerberos Service Principal Name (SPN) |
| distinguished_name | string | false | none | X.509 Subject distinguished name |
| public_ip | string | true* | none | The public IP address of the server |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| interfaces | object | true* | none | Workload network interfaces |
| » name | string | true* | none | Interface name |
| » link_state | string | true* | none | Link State |
| » address | string | true* | none | The IP Address to assign to this interface |
| » cidr_block | integer | true* | none | The number of bits in the subnet /24 is 255.255.255.0 |
| » default_gateway_address | string | true* | none | The IP Address of the default gateway |
| » network | workloads_interfaces_get/properties/network | false | none | Network that the interface belongs to |
| » network_detection_mode | string | true* | none | Network Detection Mode |
| » friendly_name | string | true* | none | User-friendly name for interface |
| service_provider | string | true* | none | Service provider |
| data_center | string | true* | none | Data center |
| data_center_zone | string | true* | none | Data center zone |
| os_id | string | true* | none | Our OS identifier |
| os_detail | string | true* | none | Additional OS details - just displayed to end user |
| online | boolean | true* | none | If this workload is online |
| firewall_coexistence | object,null | false | none | Firewall coexistence mode |
| » illumio_primary | boolean | false | none | Illumio is the primary firewall if set to true |
| containers_inherit_host_policy | boolean | false | none | This workload will apply the policy it receives both to itself and the containers hosted by it |
| labels | agents_get/properties/labels | true* | none | Assigned labels |
| services | object | true* | none | Service report |
| » uptime_seconds | integer | false | none | How long since the last reboot of this box - used as a timestamp for this |
| » created_at | string(date-time) | false | none | Timestamp when this service was first created |
| » open_service_ports | [object] | false | none | A list of open ports |
| » protocol | integer | true* | none | Transport protocol |
| » address | string | true* | none | The local address this service is bound to |
| » port | integer | true* | none | The local port this service is bound to |
| » process_name | string | true* | none | The process name (including the full path) |
| » user | string | true* | none | The user account that the process is running under |
| » package | string | false | none | The RPM/DEB pacakge that the program is part of |
| » win_service_name | string | false | none | Name of the Windows service |
| » vulnerabilities_summary | object | false | none | Vulnerabilities summary associated with the workload |
| » num_vulnerabilities | integer | true* | none | Number of vulnerabilities associated with the workload |
| » vulnerable_port_exposure | integer,null | false | none | The aggregated vulnerability port exposure score of the workload across all the vulnerable ports |
| » vulnerable_port_wide_exposure | object | false | none | none |
| » any | boolean,null | false | none | The boolean value representing if at least one port is exposed to internet (any rule) on the workload |
| » ip_list | boolean,null | false | none | The boolean value representing if at least one port is exposed to ip_list(s) on the workload |
| » vulnerability_exposure_score | integer,null | false | none | The aggregated vulnerability exposure score of the workload across all the vulnerable ports. |
| » vulnerability_score | integer | false | none | The aggregated vulnerability score of the workload across all the vulnerable ports. |
| » max_vulnerability_score | integer | true* | none | The maximum of all the vulnerability scores associated with the detected_vulnerabilities on the workload. |
| » detected_vulnerabilities | [object] | false | none | none |
| » ip_address | string | true* | none | The ip address of the host where the vulnerability is found |
| » port | integer | false | none | The port which is associated with the vulnerability |
| » proto | integer | false | none | The protocol which is associated with the vulnerability |
| » port_exposure | integer,null | false | none | The exposure of the port based on the current policy |
| » port_wide_exposure | object | false | none | none |
| » any | boolean,null | false | none | The boolean value representing if the port is exposed to internet (any rule). |
| » ip_list | boolean,null | false | none | The boolean value representing if the port is exposed to ip_list(s) |
| » workload | object | false | none | none |
| » href | string | true* | none | The URI of the workload to which this vulnerability belongs to |
| » vulnerability | object | true* | none | none |
| » href | string | true* | none | The URI of the vulnerability class to which this vulnerability belongs to |
| » score | integer | false | none | The normalized score of the vulnerability within the range of 0 to 100 |
| » name | string | false | none | The title/name of the vulnerability |
| » vulnerability_report | object | false | none | none |
| » href | string | true* | none | The URI of the report to which this vulnerability belongs to |
| » agent | object | true* | none | Agent info |
| » config | object | false | none | none |
| » mode | agents_get/properties/mode | false | none | Agent management mode |
| » log_traffic | boolean | false | none | True if we want to log traffic events from this workload |
| » security_policy_update_mode | string | false | none | Defines the current policy update mode which can be either adaptive or static based on static policy scopes |
| » href | string | false | none | URI of agent |
| » secure_connect | object | false | none | none |
| » matching_issuer_name | string | false | none | Issuer name match criteria for certificate used during establishing secure connections. |
| » status | object | false | none | none |
| » uid | string | true* | none | The unique ID reported by the server |
| » last_heartbeat_on | string,null(date-time) | true* | none | The last time (rfc3339 timestamp) a heartbeat was received from this workload |
| » uptime_seconds | integer,null | true* | none | How long since the last reboot of this server. Recorded in DB at the time of the last heartbeat |
| » agent_version | string | false | none | Agent software version string |
| » managed_since | string(date-time) | true* | none | The time (rfc3339 timestamp) at which this workload became managed by a VEN |
| » fw_config_current | boolean | true* | none | If this workload's firewall config is up to date' |
| » firewall_rule_count | integer | true* | none | DEPRECATED WITH NO REPLACEMENT: Number of firewall rules currently installed |
| » security_policy_refresh_at | string(date-time) | true* | none | DEPRECATED AND REPLACED (USE security_policy_applied_at and security_policy_received_at INSTEAD) |
| » security_policy_applied_at | string(date-time) | false | none | Last reported time when policy was applied (UTC) |
| » security_policy_received_at | string(date-time) | false | none | Last reported time when policy was received (UTC) |
| » agent_health_errors | object | true* | none | DEPRECATED AND REPLACED (USE agent_health property INSTEAD) |
| » errors | [string] | false | none | Errors associated with the security policy |
| » warnings | [string] | false | none | Warnings associated with the security policy |
| » agent_health | [object] | true* | none | VEN Health. If there are no errors or warnings, then the array value will be empty. |
| » type | string | true* | none | This field describes the error or the warning type |
| » severity | string | true* | none | severity of the error type |
| » audit_event | string | false | none | The URI of the audit event that was generated for the corresponding error or warning |
| » security_policy_sync_state | string | false | none | Current state of security policy |
| » active_pce_fqdn | string | false | none | The FQDN of the PCE that received the agent's last heartbeat |
| » target_pce_fqdn | string | false | none | The FQDN of the PCE the agent will use for future connections |
| » type | string | false | none | Agent type |
| » created_at | string(date-time) | true* | none | The time (rfc3339 timestamp) at which this workload was created |
| » updated_at | string(date-time) | true* | none | The time (rfc3339 timestamp) at which this workload was last updated |
| » deleted_at | string(date-time) | false | none | The time (rfc3339 timestamp) at which this workload was deleted |
| » created_by | object | false | none | none |
| » href | string | true* | none | The URI of the user who created this workload |
| » updated_by | object | false | none | none |
| » href | string | true* | none | The URI of the user who last updated this workload |
| » deleted_by | object | false | none | none |
| » href | string | true* | none | The URI of the user who deleted this workload |
| » container_cluster | object | false | none | Container Cluster |
| » href | string | true* | none | URI |
| » name | string | true* | none | Name |
workloads_interfaces_get
{
"name": "string",
"link_state": "string",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"network": {
"href": "string"
},
"network_detection_mode": "string",
"friendly_name": "string"
}
Workload network interfaces
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | Interface name |
| link_state | string | true* | none | Link State |
| address | string | true* | none | The IP Address to assign to this interface |
| cidr_block | integer | true* | none | The number of bits in the subnet /24 is 255.255.255.0 |
| default_gateway_address | string | true* | none | The IP Address of the default gateway |
| network | object | false | none | Network object used in workloads and workload interfaces |
| » href | string | true* | none | URI of the network |
| network_detection_mode | string | true* | none | Network Detection Mode |
| friendly_name | string | true* | none | User-friendly name for interface |
workloads_interfaces_post
{
"name": "string",
"link_state": "up",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"friendly_name": "string"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | true* | none | Interface name |
| link_state | string | true* | none | Link State |
| address | any | false | none | none |
oneOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | number | false | none | none |
xor
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | number | false | none | none |
continued
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| cidr_block | integer | false | none | The number of bits in the subnet /24 is 255.255.255.0 |
| default_gateway_address | workloads_interfaces_post/properties/address | false | none | none |
| friendly_name | string | false | none | User-friendly name for interface |
Enumerated Values
| Property | Value |
|---|---|
| link_state | up |
| link_state | down |
| link_state | unknown |
{}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| name | string | false | none | The short friendly name of the workload |
| description | string | false | none | The long description of the workload |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| hostname | string | false | none | The hostname reported from the host itself |
| service_principal_name | string,null | false | none | The Kerberos Service Principal Name (SPN) |
| agent_to_pce_certificate_authentication_id | string,null | false | none | PKI Certificate identifier to be used by the PCE for authenticating the VEN |
| distinguished_name | string | false | none | X.509 Subject distinguished name |
| public_ip | string | false | none | The public IP address of the server |
| interfaces | [object] | false | none | Workload network interfaces |
| » name | string | true* | none | Interface name |
| » link_state | string | false | none | Link State |
| » address | workloads_interfaces_post/properties/address | true* | none | The IP Address to assign to this interface |
| » cidr_block | integer | false | none | The number of bits in the subnet /24 is 255.255.255.0 |
| » default_gateway_address | workloads_interfaces_post/properties/address | false | none | The IP Address of the default gateway |
| » friendly_name | string | false | none | User-friendly name for interface |
| service_provider | string | false | none | Service provider |
| data_center | string | false | none | Data center |
| data_center_zone | string | false | none | Data center zone |
| os_id | string | false | none | Our OS identifier |
| os_detail | string | false | none | Additional OS details - just displayed to end user |
| online | boolean | false | none | If this workload is online |
| labels | agents_get/properties/labels | false | none | Assigned labels |
| agent | object | false | none | Agent info |
| » config | object | false | none | none |
| » mode | agents_get/properties/mode | false | none | Agent management mode |
| » log_traffic | boolean | false | none | True if we want to log traffic events from this workload |
anyOf
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
or
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| » anonymous | object | false | none | none |
Enumerated Values
| Property | Value |
|---|---|
| link_state | up |
| link_state | down |
| link_state | unknown |
{
"href": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"hostname": "string",
"service_principal_name": null,
"agent_to_pce_certificate_authentication_id": null,
"distinguished_name": "string",
"public_ip": "string",
"interfaces": [
{
"name": "string",
"link_state": "up",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"friendly_name": "string"
}
],
"service_provider": "string",
"data_center": "string",
"data_center_zone": "string",
"os_id": "string",
"os_detail": "string",
"online": true,
"labels": [
{
"href": "string"
}
],
"agent": {
"href": "string",
"config": {
"mode": "idle",
"log_traffic": true
}
}
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| href | string | false | none | Workload URI (bulk_update only) |
| name | string | false | none | The short friendly name of the workload |
| description | string | false | none | The long description of the workload |
| external_data_set | string,null | false | none | External data set identifier |
| external_data_reference | string,null | false | none | External data reference identifier |
| hostname | string | false | none | The hostname reported from the host itself |
| service_principal_name | string,null | false | none | The Kerberos Service Principal Name (SPN) |
| agent_to_pce_certificate_authentication_id | string,null | false | none | PKI Certificate identifier to be used by the PCE for authenticating the VEN |
| distinguished_name | string | false | none | X.509 Subject distinguished name |
| public_ip | string | false | none | The public IP address of the server |
| interfaces | workloads_post/properties/interfaces | false | none | Workload network interfaces |
| service_provider | string | false | none | Service provider |
| data_center | string | false | none | Data center |
| data_center_zone | string | false | none | Data center zone |
| os_id | string | false | none | Our OS identifier |
| os_detail | string | false | none | Additional OS details - just displayed to end user |
| online | boolean | false | none | If this workload is online |
| labels | agents_get/properties/labels | false | none | Assigned labels |
| agent | object | false | none | Agent info |
| » href | string | false | none | URI of agent; will be ignored by the server |
| » config | workloads_post/properties/agent/properties/config | false | none | none |
{
"workloads": [
{
"href": "string"
}
],
"ip_table_restore": "default"
}
Properties
| Name | Type | Required | Restrictions | Description |
|---|---|---|---|---|
| workloads | [object] | true* | none | Workloads to update |
| » href | string | true* | none | URI of workload to update |
| ip_table_restore | string | false | none | The desired state of IP tables after the agent is uninstalled. |
Enumerated Values
| Property | Value |
|---|---|
| ip_table_restore | saved |
| ip_table_restore | default |
| ip_table_restore | disable |
Change a User Password
Example Code
curl -X PUT /users/{user_id}/local_profile/password \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/users/{user_id}/local_profile/password
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"current_password": "string",
"new_password": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_id | path | integer | true* | User ID |
| body | body | users_local_profile_password_put | false | none |
| » current_password | body | string | true* | current password |
| » new_password | body | string | true* | new password |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Local User
Example Code
curl -X DELETE /users/{user_id}/local_profile
\ -u $KEY:$TOKEN
DELETE /api/v2/users/{user_id}/local_profile
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| user_id | path | integer | true* | User ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Virtual Services
Get Virtual Services
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/virtual_services \
-H 'Authorization: Token token=<auth_token>'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| description | query | string | false | Description on which to filter. Supports partial matches |
| external_data_reference | query | string | false | A unique identifier within the external data source |
| external_data_set | query | string | false | The data source from which a resource originates |
| labels | query | string | false | List of lists of label URIs, encoded as a JSON string |
| max_results | query | integer | false | Maximum number of Virtual Services to return. |
| name | query | string | false | Name on which to filter. Supports partial matches |
| service | query | string | false | Service URI |
| service_address.fqdn | query | string | false | FQDN configured under service_address property, supports partial matches |
| service_address.ip | query | string | false | IP address configured under service_address property, supports partial matches |
| service_ports.port | query | string | false | Specify port or port range to filter results. The range is from -1 to 65535. |
| service_ports.proto | query | integer | false | Protocol to filter on |
| usage | query | boolean | false | Include Virtual Service usage flags |
Example Response Body
200 Response
{}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_virtual_services_get |
Get a Virtual Service
Example Code
curl -X GET /orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| virtual_service_id | path | string | true* | Virtual Service ID |
| usage | query | boolean | false | Include Virtual Service usage flags |
Example Response Body
200 Response
{}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | sec_policy_virtual_services_get |
Create a Virtual Service
Example Code
curl -X POST /orgs/{org_id}/sec_policy/{pversion}/virtual_services \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| body | body | sec_policy_virtual_services_post | false | none |
| » name | body | string | true* | Name |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » labels | body | [object] | false | Assigned labels |
| » href | body | string | true* | Label URI |
| » service_ports | body | [object] | false | Service ports |
| » port | body | integer | false | Port Number (integer 0-65535 or -1 for any port). Also the startng port when specifying a range. |
| » to_port | body | integer | false | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | body | workloads_get/properties/services/properties/open_service_ports/items/properties/protocol | true* | Transport protocol |
| » service | body | object | false | URI of associated service |
| » apply_to | body | string | false | Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network |
| » ip_overrides | body | [string] | false | Array of IPs or CIDRs as IP overrides |
| » service_addresses | body | [oneOf] | false | none |
| » anonymous | body | object | false | none |
| » ip | body | string | true* | IP address to assign to the virtual service |
| » network | body | object | false | none |
| » href | body | string | true* | Network URI for this IP address |
| » port | body | integer | false | Port associated with the IP address for the service (1-65535 integer) |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
| » fqdn | body | string | true* | FQDN to assign to the virtual service |
| » description | body | string | false | none |
| » port | body | integer | false | Port associated with the FQDN for the service |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
Enumerated Values
| Parameter | Value |
|---|---|
| » apply_to | host_only |
| » apply_to | internal_bridge_network |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Bulk Create Virtual Services
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/virtual_services/bulk_create \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/bulk_create
Auditable: Yes
Exposure: Public Experimental
Example Request Body
[
{}
]
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| body | body | sec_policy_virtual_services_bulk_create_put | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Update a Virtual Service
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"labels": [
{
"href": "string"
}
],
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0
}
],
"service": {},
"apply_to": "host_only",
"ip_overrides": [
"string"
],
"service_addresses": [
{}
]
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| virtual_service_id | path | string | true* | Virtual Service ID |
| body | body | sec_policy_virtual_services_put | false | none |
| » name | body | string | false | Name |
| » description | body | string | false | Description |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » labels | body | [object] | false | Assigned labels |
| » href | body | string | true* | Label URI |
| » service_ports | body | [object] | false | Service ports |
| » port | body | integer | false | Port Number (integer 0-65535 or -1 for any port). Also the startng port when specifying a range. |
| » to_port | body | integer | false | High end of port range inclusive if specifying a range. If not specifying a range then don't send this. |
| » proto | body | workloads_get/properties/services/properties/open_service_ports/items/properties/protocol | true* | Transport protocol |
| » service | body | object | false | URI of associated service |
| » apply_to | body | string | false | Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network |
| » ip_overrides | body | [string] | false | Array of IPs or CIDRs as IP overrides |
| » service_addresses | body | [oneOf] | false | none |
| » anonymous | body | object | false | none |
| » ip | body | string | true* | IP address to assign to the virtual service |
| » network | body | object | false | none |
| » href | body | string | true* | Network URI for this IP address |
| » port | body | integer | false | Port associated with the IP address for the service (1-65535 integer) |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
| » fqdn | body | string | true* | FQDN to assign to the virtual service |
| » description | body | string | false | none |
| » port | body | integer | false | Port associated with the FQDN for the service |
Enumerated Values
| Parameter | Value |
|---|---|
| » apply_to | host_only |
| » apply_to | internal_bridge_network |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Bulk Update Virtual Servcies
Example Code
curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/virtual_services/bulk_update \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/bulk_update
Auditable: Yes
Exposure: Public Experimental
Example Request Body
[
{
"href": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"labels": [
{
"href": "string"
}
],
"service": {},
"service_ports": [
{
"port": 0,
"to_port": 0,
"proto": 0
}
],
"apply_to": "host_only",
"ip_overrides": [
"string"
],
"service_addresses": [
{}
]
}
]
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| body | body | sec_policy_virtual_services_bulk_update_put | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Virtual Service
Example Code
curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| pversion | path | string | true* | Security Policy Version |
| virtual_service_id | path | string | true* | Virtual Service ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Vulnerabilities
Get Vulnerabilities
Example Code
curl -X GET /orgs/{org_id}/vulnerabilities \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/vulnerabilities
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| max_results | query | integer | false | Maximum number of vulnerabilities to return. |
Example Response Body
200 Response
[
{
"href": "string",
"score": 0,
"cve_ids": [
"string"
],
"description": "string",
"name": "string",
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
}
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | vulnerabilities_get |
Get a Vulnerability
Example Code
curl -X GET /orgs/{org_id}/vulnerabilities/{reference_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/vulnerabilities/{reference_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| reference_id | path | string | true* | Vulnerability Reference ID |
Example Response Body
200 Response
[
{
"href": "string",
"score": 0,
"cve_ids": [
"string"
],
"description": "string",
"name": "string",
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
}
}
]
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | vulnerabilities_get |
Create or Modify a Vulnerability
Example Code
curl -X PUT /orgs/{org_id}/vulnerabilities/{reference_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/vulnerabilities/{reference_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"score": 0,
"cve_ids": [
"string"
],
"description": "string",
"name": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| reference_id | path | string | true* | Vulnerability Reference ID |
| body | body | vulnerabilities_put | false | none |
| » score | body | integer | true* | The normalized score of the vulnerability within the range of 0 to 100. CVSS Score can be used here with a 10x multiplier. |
| » cve_ids | body | [string] | false | The cve_ids for the vulnerability |
| » description | body | string | false | An arbitrary field to store some details of the vulnerability class |
| » name | body | string | true* | The title/name of the vulnerability |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Vulnerability
Example Code
curl -X DELETE /orgs/{org_id}/vulnerabilities/{reference_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/vulnerabilities/{reference_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| reference_id | path | string | true* | Vulnerability Reference ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Vulnerability Reports
Get Vulerability Reports
Example Code
curl -X GET /orgs/{org_id}/vulnerability_reports \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/vulnerability_reports
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| max_results | query | integer | false | Maximum number of vulnerability_reports to return. |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"report_type": "string",
"num_vulnerabilities": 0,
"authoritative": true,
"scanned_ips": [
"string"
],
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | vulnerability_reports_get |
Get a Vulerability Report
Example Code
curl -X GET /orgs/{org_id}/vulnerability_reports/{reference_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/vulnerability_reports/{reference_id}
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| reference_id | path | string | true* | Vulnerability Report Reference ID |
Example Response Body
200 Response
{
"href": "string",
"name": "string",
"report_type": "string",
"num_vulnerabilities": 0,
"authoritative": true,
"scanned_ips": [
"string"
],
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | vulnerability_reports_get |
Update a Vulerability Report
Example Code
curl -X PUT /orgs/{org_id}/vulnerability_reports/{reference_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/vulnerability_reports/{reference_id}
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"name": "string",
"report_type": "string",
"authoritative": true,
"scanned_ips": [
"string"
],
"detected_vulnerabilities": [
{
"ip_address": "string",
"port": 0,
"proto": 0,
"workload": {
"href": "string"
},
"vulnerability": {
"href": "string"
}
}
]
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| reference_id | path | string | true* | Vulnerability Report Reference ID |
| body | body | vulnerability_reports_put | false | none |
| » name | body | string | true* | User generated name of the vulnerability report |
| » report_type | body | string | true* | A string representing the type of the report |
| » authoritative | body | boolean | false | Boolean value specifies whether a report is authoritative (or) not |
| » scanned_ips | body | [string] | false | The ips on which the scan was performed |
| » detected_vulnerabilities | body | [object] | false | none |
| » ip_address | body | string | true* | The ip address of the host where the vulnerability is found |
| » port | body | integer | false | The port which is associated with the vulnerability |
| » proto | body | integer | false | The protocol which is associated with the vulnerability |
| » workload | body | object | true* | none |
| » href | body | string | true* | The URI of the workload to which this vulnerability belongs |
| » vulnerability | body | object | true* | none |
| » href | body | string | true* | The URI of the vulnerability class to which this vulnerability belongs |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Vulerability Report
Example Code
curl -X DELETE /orgs/{org_id}/vulnerability_reports/{reference_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/vulnerability_reports/{reference_id}
Auditable: Yes
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| reference_id | path | string | true* | Vulnerability Report Reference ID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Workload Interfaces
Get All Workload Interface Statuses
Example Code
curl -X GET /orgs/{org_id}/workloads/{workload_id}/interfaces \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/workloads/{workload_id}/interfaces
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| workload_id | path | string | true* | Workload UUID |
Example Response Body
200 Response
{
"name": "string",
"link_state": "string",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"network": {
"href": "string"
},
"network_detection_mode": "string",
"friendly_name": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | workloads_interfaces_get |
Get Workload Interface Status
Example Code
curl -X GET /orgs/{org_id}/workloads/{workload_id}/interfaces/{name} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/workloads/{workload_id}/interfaces/{name}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| workload_id | path | string | true* | Workload UUID |
| name | path | string | true* | Interface Name |
Example Response Body
200 Response
{
"name": "string",
"link_state": "string",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"network": {
"href": "string"
},
"network_detection_mode": "string",
"friendly_name": "string"
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | workloads_interfaces_get |
Create a Workload Interface
Example Code
curl -X POST /orgs/{org_id}/workloads/{workload_id}/interfaces \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/workloads/{workload_id}/interfaces
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"name": "string",
"link_state": "up",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"friendly_name": "string"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| workload_id | path | string | true* | Workload UUID |
| body | body | workloads_interfaces_post | false | none |
| » name | body | string | true* | Interface name |
| » link_state | body | string | true* | Link State |
| » address | body | any | false | none |
| » anonymous | body | number | false | none |
| » anonymous | body | number | false | none |
| » cidr_block | body | integer | false | The number of bits in the subnet /24 is 255.255.255.0 |
| » default_gateway_address | body | any | false | none |
| » friendly_name | body | string | false | User-friendly name for interface |
Enumerated Values
| Parameter | Value |
|---|---|
| » link_state | up |
| » link_state | down |
| » link_state | unknown |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Delete a Workload Interface
Example Code
curl -X DELETE /orgs/{org_id}/workloads/{workload_id}/interfaces/{name}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/workloads/{workload_id}/interfaces/{name}
Auditable: Yes
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| workload_id | path | string | true* | Workload UUID |
| name | path | string | true* | Interface Name |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Workload Settings
Get Workloads Settings
Example Code
curl -X GET /orgs/{org_id}/settings/workloads \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/settings/workloads
Auditable: No
Exposure: Public Experimental
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
Example Response Body
200 Response
{
"workload_disconnected_timeout_seconds": [
{
"scope": [
{
"href": "string"
}
],
"value": -1
}
],
"workload_goodbye_timeout_seconds": [
{
"scope": [
{
"href": "string"
}
],
"value": -1
}
]
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | settings_workloads_get |
Update Workloads Settings
Example Code
curl -X PUT /orgs/{org_id}/settings/workloads \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/settings/workloads
Auditable: Yes
Exposure: Public Experimental
Example Request Body
{
"workload_disconnected_timeout_seconds": [
{
"scope": [
{
"href": "string"
}
],
"value": -1
}
],
"workload_goodbye_timeout_seconds": [
{
"scope": [
{
"href": "string"
}
],
"value": -1
}
]
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Org ID |
| body | body | settings_workloads_put | false | none |
| » workload_disconnected_timeout_seconds | body | [object] | false | none |
| » scope | body | [object] | true* | Assigned labels |
| » href | body | string | true* | Label URI |
| » value | body | integer | true* | Property value associated with the scope |
| » workload_goodbye_timeout_seconds | body | [object] | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Workloads
Get Workloads
Example Code
curl -X GET /orgs/{org_id}/workloads \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/workloads
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| agent.active_pce_fqdn | query | string | false | FQDN of the PCE |
| container_clusters | query | string | false | List of container cluster URIs, encoded as a JSON string |
| description | query | string | false | Description of workload(s) to return. Supports partial matches |
| external_data_reference | query | string | false | A unique identifier within the external data source |
| external_data_set | query | string | false | The data source from which a resource originates |
| hostname | query | string | false | Hostname of workload(s) to return. Supports partial matches |
| include_deleted | query | boolean | false | Include deleted workloads |
| ip_address | query | string | false | IP address of workload(s) to return. Supports partial matches |
| labels | query | string | false | List of lists of label URIs, encoded as a JSON string |
| last_heartbeat_on[gte] | query | integer | false | Greater than or equal to value for last heartbeat on timestamp |
| last_heartbeat_on[lte] | query | integer | false | Less than or equal to value for last heartbeat on timestamp |
| log_traffic | query | boolean | false | Whether we want to log traffic events from this workload |
| managed | query | boolean | false | Return managed or unmanaged workloads using this filter |
| max_results | query | integer | false | Maximum number of workloads to return. |
| mode | query | string | false | Management mode of workload(s) to return |
| name | query | string | false | Name of workload(s) to return. Supports partial matches |
| online | query | boolean | false | Return online/offline workloads using this filter |
| os_id | query | string | false | Operating System of workload(s) to return. Supports partial matches |
| policy_health | query | string | false | Policy of health of workload(s) to return. Valid values: active, warning, error, suspended |
| security_policy_sync_state | query | string | false | Advanced search option for workload based on policy sync state |
| security_policy_update_mode | query | string | false | Advanced search option for workload based on security policy update mode |
| soft_deleted | query | boolean | false | DEPRECATED WITH NO REPLACEMENT: Only soft-deleted workloads |
| vulnerability_summary.vulnerability_exposure_score[gte] | query | integer | false | Greater than or equal to value for vulnerability_exposure_score |
| vulnerability_summary.vulnerability_exposure_score[lte] | query | integer | false | Less than or equal to value for vulnerability_exposure_score |
Enumerated Values
| Parameter | Value |
|---|---|
| security_policy_sync_state | staged |
| security_policy_update_mode | static |
| security_policy_update_mode | adaptive |
Example Response Body
200 Response
{
"href": "string",
"deleted": true,
"delete_type": "string",
"name": "string",
"description": "string",
"hostname": "string",
"service_principal_name": "string",
"distinguished_name": "string",
"public_ip": "string",
"external_data_set": null,
"external_data_reference": null,
"interfaces": {
"name": "string",
"link_state": "string",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"network": {
"href": "string"
},
"network_detection_mode": "string",
"friendly_name": "string"
},
"service_provider": "string",
"data_center": "string",
"data_center_zone": "string",
"os_id": "string",
"os_detail": "string",
"online": true,
"firewall_coexistence": null,
"containers_inherit_host_policy": true,
"labels": [
{
"href": "string"
}
],
"services": {
"uptime_seconds": 0,
"created_at": "2019-11-01T00:36:33Z",
"open_service_ports": [
{
"protocol": 0,
"address": "string",
"port": 0,
"process_name": "string",
"user": "string",
"package": "string",
"win_service_name": "string"
}
]
},
"vulnerabilities_summary": {
"num_vulnerabilities": 0,
"vulnerable_port_exposure": null,
"vulnerable_port_wide_exposure": {
"any": null,
"ip_list": null
},
"vulnerability_exposure_score": null,
"vulnerability_score": 0,
"max_vulnerability_score": 0
},
"detected_vulnerabilities": [
{
"ip_address": "string",
"port": 0,
"proto": 0,
"port_exposure": null,
"port_wide_exposure": {
"any": null,
"ip_list": null
},
"workload": {
"href": "string"
},
"vulnerability": {
"href": "string",
"score": 0,
"name": "string"
},
"vulnerability_report": {
"href": "string"
}
}
],
"agent": {
"config": {
"mode": "idle",
"log_traffic": true,
"security_policy_update_mode": "string"
},
"href": "string",
"secure_connect": {
"matching_issuer_name": "string"
},
"status": {
"uid": "string",
"last_heartbeat_on": null,
"uptime_seconds": null,
"agent_version": "string",
"managed_since": "2019-11-01T00:36:33Z",
"fw_config_current": true,
"firewall_rule_count": 0,
"security_policy_refresh_at": "2019-11-01T00:36:33Z",
"security_policy_applied_at": "2019-11-01T00:36:33Z",
"security_policy_received_at": "2019-11-01T00:36:33Z",
"agent_health_errors": {
"errors": [
"string"
],
"warnings": [
"string"
]
},
"agent_health": [
{
"type": "string",
"severity": "string",
"audit_event": "string"
}
],
"security_policy_sync_state": "string"
},
"active_pce_fqdn": "string",
"target_pce_fqdn": "string",
"type": "string"
},
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"container_cluster": {
"href": "string",
"name": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | workloads_get |
Get a Workload
Example Code
curl -X GET /orgs/{org_id}/workloads/{workload_id} \
-u $KEY:$TOKEN -H 'Accept: application/json'
GET /api/v2/orgs/{org_id}/workloads/{workload_id}
Auditable: No
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| workload_id | path | string | true* | Workload UUID |
Example Response Body
200 Response
{
"href": "string",
"deleted": true,
"delete_type": "string",
"name": "string",
"description": "string",
"hostname": "string",
"service_principal_name": "string",
"distinguished_name": "string",
"public_ip": "string",
"external_data_set": null,
"external_data_reference": null,
"interfaces": {
"name": "string",
"link_state": "string",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"network": {
"href": "string"
},
"network_detection_mode": "string",
"friendly_name": "string"
},
"service_provider": "string",
"data_center": "string",
"data_center_zone": "string",
"os_id": "string",
"os_detail": "string",
"online": true,
"firewall_coexistence": null,
"containers_inherit_host_policy": true,
"labels": [
{
"href": "string"
}
],
"services": {
"uptime_seconds": 0,
"created_at": "2019-11-01T00:36:33Z",
"open_service_ports": [
{
"protocol": 0,
"address": "string",
"port": 0,
"process_name": "string",
"user": "string",
"package": "string",
"win_service_name": "string"
}
]
},
"vulnerabilities_summary": {
"num_vulnerabilities": 0,
"vulnerable_port_exposure": null,
"vulnerable_port_wide_exposure": {
"any": null,
"ip_list": null
},
"vulnerability_exposure_score": null,
"vulnerability_score": 0,
"max_vulnerability_score": 0
},
"detected_vulnerabilities": [
{
"ip_address": "string",
"port": 0,
"proto": 0,
"port_exposure": null,
"port_wide_exposure": {
"any": null,
"ip_list": null
},
"workload": {
"href": "string"
},
"vulnerability": {
"href": "string",
"score": 0,
"name": "string"
},
"vulnerability_report": {
"href": "string"
}
}
],
"agent": {
"config": {
"mode": "idle",
"log_traffic": true,
"security_policy_update_mode": "string"
},
"href": "string",
"secure_connect": {
"matching_issuer_name": "string"
},
"status": {
"uid": "string",
"last_heartbeat_on": null,
"uptime_seconds": null,
"agent_version": "string",
"managed_since": "2019-11-01T00:36:33Z",
"fw_config_current": true,
"firewall_rule_count": 0,
"security_policy_refresh_at": "2019-11-01T00:36:33Z",
"security_policy_applied_at": "2019-11-01T00:36:33Z",
"security_policy_received_at": "2019-11-01T00:36:33Z",
"agent_health_errors": {
"errors": [
"string"
],
"warnings": [
"string"
]
},
"agent_health": [
{
"type": "string",
"severity": "string",
"audit_event": "string"
}
],
"security_policy_sync_state": "string"
},
"active_pce_fqdn": "string",
"target_pce_fqdn": "string",
"type": "string"
},
"created_at": "2019-11-01T00:36:33Z",
"updated_at": "2019-11-01T00:36:33Z",
"deleted_at": "2019-11-01T00:36:33Z",
"created_by": {
"href": "string"
},
"updated_by": {
"href": "string"
},
"deleted_by": {
"href": "string"
},
"container_cluster": {
"href": "string",
"name": "string"
}
}
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 200 | OK | Success | workloads_get |
Create a Workload
Example Code
curl -X POST /orgs/{org_id}/workloads \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
POST /api/v2/orgs/{org_id}/workloads
Auditable: Yes
Exposure: Public Stable
Example Request Body
{}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | workloads_post | false | none |
| » name | body | string | false | The short friendly name of the workload |
| » description | body | string | false | The long description of the workload |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » hostname | body | string | false | The hostname reported from the host itself |
| » service_principal_name | body | string,null | false | The Kerberos Service Principal Name (SPN) |
| » agent_to_pce_certificate_authentication_id | body | string,null | false | PKI Certificate identifier to be used by the PCE for authenticating the VEN |
| » distinguished_name | body | string | false | X.509 Subject distinguished name |
| » public_ip | body | string | false | The public IP address of the server |
| » interfaces | body | [object] | false | Workload network interfaces |
| » name | body | string | true* | Interface name |
| » link_state | body | string | false | Link State |
| » address | body | any | true* | none |
| » anonymous | body | number | false | none |
| » anonymous | body | number | false | none |
| » cidr_block | body | integer | false | The number of bits in the subnet /24 is 255.255.255.0 |
| » default_gateway_address | body | any | false | none |
| » friendly_name | body | string | false | User-friendly name for interface |
| » service_provider | body | string | false | Service provider |
| » data_center | body | string | false | Data center |
| » data_center_zone | body | string | false | Data center zone |
| » os_id | body | string | false | Our OS identifier |
| » os_detail | body | string | false | Additional OS details - just displayed to end user |
| » online | body | boolean | false | If this workload is online |
| » labels | body | [object] | false | Assigned labels |
| » href | body | string | true* | Label URI |
| » agent | body | object | false | Agent info |
| » config | body | workloads_post/properties/agent/properties/config | false | none |
| » mode | body | agents_get/properties/mode | false | Agent management mode |
| » log_traffic | body | boolean | false | True if we want to log traffic events from this workload |
| » anonymous | body | object | false | none |
| » anonymous | body | object | false | none |
Enumerated Values
| Parameter | Value |
|---|---|
| » link_state | up |
| » link_state | down |
| » link_state | unknown |
| » mode | idle |
| » mode | illuminated |
| » mode | enforced |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 201 | Created | Success | None |
Bulk Create Workloads
Example Code
curl -X PUT /orgs/{org_id}/workloads/bulk_create \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/workloads/bulk_create
Auditable: Yes
Exposure: Public Experimental
Example Request Body
[
{}
]
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | workloads_bulk_create_put | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Unpair a Workload
Example Code
curl -X PUT /orgs/{org_id}/workloads/unpair \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/workloads/unpair
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"workloads": [
{
"href": "string"
}
],
"ip_table_restore": "default"
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | workloads_unpair_put | false | none |
| » workloads | body | [object] | true* | Workloads to update |
| » href | body | string | true* | URI of workload to update |
| » ip_table_restore | body | string | false | The desired state of IP tables after the agent is uninstalled. |
Enumerated Values
| Parameter | Value |
|---|---|
| » ip_table_restore | saved |
| » ip_table_restore | default |
| » ip_table_restore | disable |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Update a Workload
Example Code
curl -X PUT /orgs/{org_id}/workloads/{workload_id} \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/workloads/{workload_id}
Auditable: Yes
Exposure: Public Stable
Example Request Body
{
"href": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"hostname": "string",
"service_principal_name": null,
"agent_to_pce_certificate_authentication_id": null,
"distinguished_name": "string",
"public_ip": "string",
"interfaces": [
{
"name": "string",
"link_state": "up",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"friendly_name": "string"
}
],
"service_provider": "string",
"data_center": "string",
"data_center_zone": "string",
"os_id": "string",
"os_detail": "string",
"online": true,
"labels": [
{
"href": "string"
}
],
"agent": {
"href": "string",
"config": {
"mode": "idle",
"log_traffic": true
}
}
}
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| workload_id | path | string | true* | Workload UUID |
| body | body | workloads_put | false | none |
| » href | body | string | false | Workload URI (bulk_update only) |
| » name | body | string | false | The short friendly name of the workload |
| » description | body | string | false | The long description of the workload |
| » external_data_set | body | string,null | false | External data set identifier |
| » external_data_reference | body | string,null | false | External data reference identifier |
| » hostname | body | string | false | The hostname reported from the host itself |
| » service_principal_name | body | string,null | false | The Kerberos Service Principal Name (SPN) |
| » agent_to_pce_certificate_authentication_id | body | string,null | false | PKI Certificate identifier to be used by the PCE for authenticating the VEN |
| » distinguished_name | body | string | false | X.509 Subject distinguished name |
| » public_ip | body | string | false | The public IP address of the server |
| » interfaces | body | [object] | false | Workload network interfaces |
| » name | body | string | true* | Interface name |
| » link_state | body | string | false | Link State |
| » address | body | any | true* | none |
| » anonymous | body | number | false | none |
| » anonymous | body | number | false | none |
| » cidr_block | body | integer | false | The number of bits in the subnet /24 is 255.255.255.0 |
| » default_gateway_address | body | any | false | none |
| » friendly_name | body | string | false | User-friendly name for interface |
| » service_provider | body | string | false | Service provider |
| » data_center | body | string | false | Data center |
| » data_center_zone | body | string | false | Data center zone |
| » os_id | body | string | false | Our OS identifier |
| » os_detail | body | string | false | Additional OS details - just displayed to end user |
| » online | body | boolean | false | If this workload is online |
| » labels | body | [object] | false | Assigned labels |
| » href | body | string | true* | Label URI |
| » agent | body | object | false | Agent info |
| » href | body | string | false | URI of agent; will be ignored by the server |
| » config | body | workloads_post/properties/agent/properties/config | false | none |
| » mode | body | agents_get/properties/mode | false | Agent management mode |
| » log_traffic | body | boolean | false | True if we want to log traffic events from this workload |
Enumerated Values
| Parameter | Value |
|---|---|
| » link_state | up |
| » link_state | down |
| » link_state | unknown |
| » mode | idle |
| » mode | illuminated |
| » mode | enforced |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Bulk Update Workloads
Example Code
curl -X PUT /orgs/{org_id}/workloads/bulk_update \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/workloads/bulk_update
Auditable: Yes
Exposure: Public Experimental
Example Request Body
[
{
"href": "string",
"name": "string",
"description": "string",
"external_data_set": null,
"external_data_reference": null,
"hostname": "string",
"service_principal_name": null,
"agent_to_pce_certificate_authentication_id": null,
"distinguished_name": "string",
"public_ip": "string",
"interfaces": [
{
"name": "string",
"link_state": "up",
"address": "string",
"cidr_block": 0,
"default_gateway_address": "string",
"friendly_name": "string"
}
],
"service_provider": "string",
"data_center": "string",
"data_center_zone": "string",
"os_id": "string",
"os_detail": "string",
"online": true,
"labels": [
{
"href": "string"
}
],
"agent": {
"href": "string",
"config": {
"mode": "idle",
"log_traffic": true
}
}
}
]
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | workloads_bulk_update_put | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Delete a Workload
Example Code
curl -X DELETE /orgs/{org_id}/workloads/{workload_id}
\ -u $KEY:$TOKEN
DELETE /api/v2/orgs/{org_id}/workloads/{workload_id}
Auditable: Yes
Exposure: Public Stable
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| workload_id | path | string | true* | Workload UUID |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
Bulk Delete Workloads
Example Code
curl -X PUT /orgs/{org_id}/workloads/bulk_delete \
-u $KEY:$TOKEN -H 'Content-Type: application/json'
PUT /api/v2/orgs/{org_id}/workloads/bulk_delete
Auditable: Yes
Exposure: Public Experimental
Example Request Body
[
{
"href": "string"
}
]
Parameters
| Name | In | Type | Required | Description |
|---|---|---|---|---|
| org_id | path | integer | true* | Organization |
| body | body | workloads_bulk_delete_put | false | none |
Responses
| Status | Meaning | Description | Schema |
|---|---|---|---|
| 204 | No Content | Success | None |
--
Copyright 2018-2019 Illumio, Inc. All rights reserved.