NAV Navbar
Shell

Illumio Core 25.2.10 REST API

25.2.10

Known Issues: Some parameter tables, JSON request bodies, and JSON response bodies are currently not included.

This Illumio Core 25.2.10 v2 REST API Reference Preview includes all Public Stable and Public Experimental APIs in this release. It contains curl code examples, parameter definitions, and JSON request and response bodies.

For detailed curl code examples and in-depth information about methods, parameters, and API calls, see the Illumio Core 25.2.10 REST API Developer Guide.

README

API Properties

Code Examples

The $KEY and $TOKEN constants in the code examples represent authentication credentials (session and token, API key and token, or username and password as appropriate).

Required Parameters

Required parameters in the parameter tables have a Required field of true with an orange asterisk. However, the requirements are based on nesting, so if you're not using any parameters in an indented nested block then none of the parameters in the nested block are required, even if they have an asterisk.

If at least one of multiple parameters is required, their Required fields are false with two orange asterisks, indicating that at least one of the parameters with two asterisks must be defined. For example, when creating a workload, a name and/or a hostname for the workload must be defined.

Search

Use the search field at the top of the left column for whole words like IP Lists.

Use Ctrl-F to search for whole words or words joined by underscores and/or slashes like ip_lists or workloads/bulk_create.

Access Restrictions

Get all Access Restrictions

Example Code


curl -X GET /orgs/{org_id}/access_restrictions \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/access_restrictions

Exposure: Public Stable

Auditable: No

Get all Access Restrictions

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "devices": [
    {
      "href": "string",
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      },
      "status": {
        "connection_state": "pending",
        "software_version": "string",
        "sync_state": "in_sync"
      }
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success slbs_get

Create a new Access Restriction

Example Code


curl -X POST /orgs/{org_id}/access_restrictions \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/access_restrictions

Auditable: Yes

Exposure: Public Stable

Create a new Access Restriction

Example Request Body

{
  "name": "string",
  "description": "string",
  "ips": [
    null
  ],
  "enforcement_exclusions": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body orgs_access_restrictions_post false none
» name body string true* User assigned name of the access restriction
» description body string false User assigned description of the access restriction
» ips body [oneOf] true* Array of ip addresses or CIDR blocks
»» anonymous body any false none
»» anonymous body any false none
» enforcement_exclusions body array,null false The types of API access methods that are excluded from access restriction enforcement

Enumerated Values

Parameter Value
» enforcement_exclusions user_sessions
» enforcement_exclusions api_keys

Responses

Status Meaning Description Schema
201 Created Success None

Read the Specified Access Restriction Info

Example Code


curl -X GET /orgs/{org_id}/access_restrictions/{id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/access_restrictions/{id}

Exposure: Public Stable

Auditable: No

Read Access Restriction Info

Parameters

Name In Type Required Description
org_id path integer true* Organization
id path string true* access restriction id

Example Response Body

200 Response

{
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "devices": [
    {
      "href": "string",
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      },
      "status": {
        "connection_state": "pending",
        "software_version": "string",
        "sync_state": "in_sync"
      }
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success slbs_get

Delete the Specified Access Restriction

Example Code


curl -X DELETE /orgs/{org_id}/access_restrictions/{id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/access_restrictions/{id}

Exposure: Public Stable

Auditable: Yes

Delete Access Restriction

Parameters

Name In Type Required Description
org_id path integer true* Organization
id path string true* access restriction id

Responses

Status Meaning Description Schema
204 No Content Success None

Update the Access Restriction Info

Example Code


curl -X PUT /orgs/{org_id}/access_restrictions/{id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/access_restrictions/{id}

Auditable: Yes

Exposure: Public Stable

Update Access Restriction Info

Example Request Body

{
  "name": "string",
  "description": "string",
  "ips": [
    null
  ],
  "enforcement_exclusions": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
id path string true* access restriction id
body body orgs_access_restrictions_put false none
» name body string false User assigned name of the access restriction
» description body string false User assigned description of the access restriction
» ips body [oneOf] false Array of ip addresses or CIDR blocks
»» anonymous body any false none
»» anonymous body any false none
» enforcement_exclusions body array,null false The types of API access methods that are excluded from access restriction enforcement

Enumerated Values

Parameter Value
» enforcement_exclusions user_sessions
» enforcement_exclusions api_keys

Responses

Status Meaning Description Schema
204 No Content Success None

Agents (deprecated, see VEN Operations)

Get an Agent

Example Code


curl -X GET /orgs/{org_id}/agents/{agent_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/agents/{agent_id}

Exposure: Public Experimental

Auditable: No

DEPRECATED AND REPLACED (USE /orgs/:org_id/vens/:ven_uuid INSTEAD)

Parameters

Name In Type Required Description
org_id path integer true* Organization
agent_id path integer true* Agent ID

Example Response Body

200 Response

{
  "name": null,
  "description": null,
  "online": null,
  "mode": null,
  "uid": "string",
  "last_heartbeat_on": null,
  "uptime_seconds": null,
  "hostname": "string",
  "agent_version": null,
  "public_ip": null,
  "ip_tables_saved": null,
  "os_id": null,
  "os_detail": null,
  "log_traffic": null,
  "target_pce_fqdn": null,
  "active_pce_fqdn": null,
  "labels": null,
  "visibility_level": null,
  "ven": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success agents_get

Update an Agent

Example Code


curl -X PUT /orgs/{org_id}/agents/{agent_id}/update \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/agents/{agent_id}/update

Auditable: Yes

Exposure: Public Experimental

DEPRECATED AND REPLACED (USE PUT /orgs/:org_id/vens/:ven_uuid INSTEAD)

Example Request Body

{
  "target_pce_fqdn": "string"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
agent_id path integer true* Agent ID
body body agents_update_put false none
» target_pce_fqdn body string false cluster FQDN for target PCE

Responses

Status Meaning Description Schema
204 No Content Success None

Create an Agent Traffic Flow

Example Code


curl -X POST /orgs/{org_id}/agents/bulk_traffic_flows

POST /api/v2/orgs/{org_id}/agents/bulk_traffic_flows

Exposure: Public Experimental

Auditable: Yes

Bulk load traffic flows from unmanaged workloads

Parameters

Name In Type Required Description
org_id path integer true* Organization

Responses

Status Meaning Description Schema
201 Created Success None

API Keys, Service Account-based

Get service accounts

Example Code


curl -X GET /orgs/{org_id}/service_accounts \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/service_accounts

Exposure: Public Experimental

Auditable: No

Get service accounts

Parameters

Name In Type Required Description
org_id path integer true* Org ID
managing query string false Name of the entity managing the service account (such as "cs")
max_results query integer false Maximum number of service accounts to return.
name query string false Name of service account to filter by
role query string false Role URI (JSON-encoded string) to filter on

Example Response Body

200 Response

{
  "name": "string",
  "description": "string",
  "access_restriction": null,
  "permissions": [
    {
      "href": "string",
      "role": {
        "href": "string"
      },
      "scope": [
        {
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          }
        }
      ]
    }
  ],
  "href": "string",
  "api_keys": [
    {
      "key_id": "string",
      "auth_username": "string",
      "name": null,
      "description": "string",
      "state": "string",
      "expires_in_seconds": 0,
      "created_at": "2025-04-01T00:21:27Z",
      "created_by": {
        "href": "string"
      },
      "last_login_on": "2025-04-01T00:21:27Z",
      "account": {
        "href": "string",
        "type": "string",
        "name": "string",
        "access_restriction": null,
        "permissions": [
          {
            "href": "string",
            "role": {
              "href": "string"
            },
            "scope": [
              {
                "label": {
                  "href": "string",
                  "key": "string",
                  "value": "string"
                },
                "label_group": {
                  "href": "string",
                  "key": "string",
                  "name": "string"
                }
              }
            ]
          }
        ]
      },
      "href": "string"
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success service_accounts_get

Create a new service account

Example Code


curl -X POST /orgs/{org_id}/service_accounts \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/service_accounts

Auditable: Yes

Exposure: Public Experimental

Create a new service account

Example Request Body

{
  "name": "string",
  "description": "string",
  "access_restriction": null,
  "permissions": [
    {
      "role": {
        "href": "string"
      },
      "scope": [
        {
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          }
        }
      ]
    }
  ],
  "api_key": {
    "expires_in_seconds": "default"
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
body body service_accounts_post false none
» name body string true* Name of the service_account
» description body string false The description of the service_account
» access_restriction body object,null false Access restriction assigned to the keys created under this service_account
»» href body string true* Access restriction URI
» permissions body [object] true* The list of permissions
»» role body orgs_permissions_put/properties/role true* none
»»» href body string true* URI of Role
»» scope body [object] true* none
»»» label body object false none
»»»» href body string true* Label URI
»»»» key body string false Label type
»»»» value body string false Label name
»»» label_group body object false none
»»»» href body string true* Label group URI
»»»» key body string false Label group type
»»»» name body string false Label group name
»»» api_key body object true* none
»»»» expires_in_seconds body any true* Validity of the api_key, in seconds
»»»»» anonymous body string false none
»»»»» anonymous body integer false none

Enumerated Values

Parameter Value
»»»»» anonymous default

Responses

Status Meaning Description Schema
201 Created Success None

Read service account info

Example Code


curl -X GET /orgs/{org_id}/service_accounts/{service_account_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/service_accounts/{service_account_id}

Exposure: Public Experimental

Auditable: No

Read Service Account Info

Parameters

Name In Type Required Description
org_id path integer true* Org ID
service_account_id path string true* Service account UUID

Example Response Body

200 Response

{
  "name": "string",
  "description": "string",
  "access_restriction": null,
  "permissions": [
    {
      "href": "string",
      "role": {
        "href": "string"
      },
      "scope": [
        {
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          }
        }
      ]
    }
  ],
  "href": "string",
  "api_keys": [
    {
      "key_id": "string",
      "auth_username": "string",
      "name": null,
      "description": "string",
      "state": "string",
      "expires_in_seconds": 0,
      "created_at": "2025-04-01T00:21:27Z",
      "created_by": {
        "href": "string"
      },
      "last_login_on": "2025-04-01T00:21:27Z",
      "account": {
        "href": "string",
        "type": "string",
        "name": "string",
        "access_restriction": null,
        "permissions": [
          {
            "href": "string",
            "role": {
              "href": "string"
            },
            "scope": [
              {
                "label": {
                  "href": "string",
                  "key": "string",
                  "value": "string"
                },
                "label_group": {
                  "href": "string",
                  "key": "string",
                  "name": "string"
                }
              }
            ]
          }
        ]
      },
      "href": "string"
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success service_accounts_get

Delete service account

Example Code


curl -X DELETE /orgs/{org_id}/service_accounts/{service_account_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/service_accounts/{service_account_id}

Exposure: Public Experimental

Auditable: Yes

Delete service account

Parameters

Name In Type Required Description
org_id path integer true* Org ID
service_account_id path string true* Service account UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Update service account info

Example Code


curl -X PUT /orgs/{org_id}/service_accounts/{service_account_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/service_accounts/{service_account_id}

Auditable: Yes

Exposure: Public Experimental

Update service account info

Example Request Body

{
  "name": "string",
  "description": "string",
  "access_restriction": null,
  "permissions": [
    {
      "href": "string",
      "role": {
        "href": "string"
      },
      "scope": [
        {
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          }
        }
      ]
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
service_account_id path string true* Service account UUID
body body service_accounts_put false none
» name body string false Service account name
» description body string false Description of the service_account
» access_restriction body object,null false Access restriction assigned to the keys created under this service_account
»» href body string true* Access restriction URI
» permissions body [object] false List of permissions
»» href body string false URI of the permission entity
»» role body orgs_permissions_put/properties/role true* none
»»» href body string true* URI of Role
»» scope body [object] true* none
»»» label body object false none
»»»» href body string true* Label URI
»»»» key body string false Label type
»»»» value body string false Label name
»»» label_group body object false none
»»»» href body string true* Label group URI
»»»» key body string false Label group type
»»»» name body string false Label group name

Responses

Status Meaning Description Schema
204 No Content Success None

Create a new API key for this service account

Example Code


curl -X POST /orgs/{org_id}/service_accounts/{service_account_id}/api_keys \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/service_accounts/{service_account_id}/api_keys

Auditable: Yes

Exposure: Public Experimental

Create a new API key for this service account

Example Request Body

{
  "expires_in_seconds": "default"
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
service_account_id path string true* Service account UUID
body body service_accounts_api_keys_post false none
» expires_in_seconds body any true* Validity of the api_key, in seconds
»» anonymous body string false none
»» anonymous body integer false none

Enumerated Values

Parameter Value
»» anonymous default

Responses

Status Meaning Description Schema
201 Created Success None

Delete service account API Key

Example Code


curl -X DELETE /orgs/{org_id}/service_accounts/{service_account_id}/api_keys/{api_key_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/service_accounts/{service_account_id}/api_keys/{api_key_id}

Exposure: Public Experimental

Auditable: Yes

Delete Service Account API Key

Parameters

Name In Type Required Description
org_id path integer true* Org ID
service_account_id path string true* Service account UUID
api_key_id path string true* API Key ID

Responses

Status Meaning Description Schema
204 No Content Success None

API Keys, User-based

Get API Keys

Example Code


curl -X GET /users/{user_id}/api_keys \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/users/{user_id}/api_keys

Exposure: Public Stable

Auditable: No

Get API Key

Parameters

Name In Type Required Description
user_id path integer true* User ID

Example Response Body

200 Response

{
  "key_id": "string",
  "auth_username": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "name": "string",
  "description": "string",
  "href": "string"
}

Responses

Status Meaning Description Schema
200 OK Success users_api_keys_get

Get an API Key

Example Code


curl -X GET /users/{user_id}/api_keys/{key_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/users/{user_id}/api_keys/{key_id}

Exposure: Public Stable

Auditable: No

Read API Key Info

Parameters

Name In Type Required Description
user_id path integer true* User ID
key_id path string true* key_id

Example Response Body

200 Response

{
  "key_id": "string",
  "auth_username": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "name": "string",
  "description": "string",
  "href": "string"
}

Responses

Status Meaning Description Schema
200 OK Success users_api_keys_get

Create an API Key

Example Code


curl -X POST /users/{user_id}/api_keys \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/users/{user_id}/api_keys

Auditable: Yes

Exposure: Public Stable

Create a new API Key

Example Request Body

{
  "name": "string",
  "description": "string"
}

Parameters

Name In Type Required Description
user_id path integer true* User ID
body body users_api_keys_post false none
» name body string true* The key name - just a label to be used
» description body string false The description of the key

Responses

Status Meaning Description Schema
201 Created Success None

Update an API Key

Example Code


curl -X PUT /users/{user_id}/api_keys/{key_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/users/{user_id}/api_keys/{key_id}

Auditable: Yes

Exposure: Public Stable

Update API Key Info

Example Request Body

{
  "name": "string",
  "description": "string"
}

Parameters

Name In Type Required Description
user_id path integer true* User ID
key_id path string true* key_id
body body users_api_keys_put false none
» name body string false The key name - just a label to be used
» description body string false The description of the key

Responses

Status Meaning Description Schema
204 No Content Success None

Delete an API Key

Example Code


curl -X DELETE /users/{user_id}/api_keys/{key_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/users/{user_id}/api_keys/{key_id}

Exposure: Public Stable

Auditable: Yes

Delete API Key

Parameters

Name In Type Required Description
user_id path integer true* User ID
key_id path string true* key_id

Responses

Status Meaning Description Schema
204 No Content Success None

Get API Keys

Example Code


curl -X GET /orgs/{org_id}/api_keys?type=user \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/api_keys

Exposure: Public Experimental

Auditable: No

Get api keys

Parameters

Name In Type Required Description
org_id path integer true* Org ID
max_results query integer false Maximum number of api keys to return.
name query string false Name of the service account to filter by
role query string false Role URI (JSON-encoded string) to filter on
state query string false State of api keys - active or expired
type query string true* Type of principal - User or Service Account
username query string false Username of the user to filter by

Enumerated Values

Parameter Value
state active
state expired
type user
type service_account

Example Response Body

200 Response

{
  "key_id": "string",
  "auth_username": "string",
  "name": null,
  "description": "string",
  "state": "string",
  "expires_in_seconds": 0,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "last_login_on": "2025-04-01T00:21:27Z",
  "account": {
    "href": "string",
    "type": "string",
    "name": "string",
    "access_restriction": null,
    "permissions": [
      {
        "href": "string",
        "role": {
          "href": "string"
        },
        "scope": [
          {
            "label": {
              "href": "string",
              "key": "string",
              "value": "string"
            },
            "label_group": {
              "href": "string",
              "key": "string",
              "name": "string"
            }
          }
        ]
      }
    ]
  },
  "href": "string"
}

Responses

Status Meaning Description Schema
200 OK Success api_keys_get

Delete API Key

Example Code


curl -X DELETE /orgs/{org_id}/api_keys/{api_key_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/api_keys/{api_key_id}

Exposure: Public Experimental

Auditable: Yes

Delete API Key

Parameters

Name In Type Required Description
org_id path integer true* Org ID
api_key_id path string true* API Key ID

Responses

Status Meaning Description Schema
204 No Content Success None

Application Groups

Get Risk Summary for Application Groups

Example Code


curl -X GET /orgs/{org_id}/app_groups/risk_summary \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/app_groups/risk_summary

Exposure: Public Experimental

Auditable: No

Get the risk summary for all application groups

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

[
  {
    "app_group": {
      "href": "string"
    },
    "labels": [
      {
        "href": "string"
      }
    ],
    "risk_summary": {
      "ransomware": null
    }
  }
]

Responses

Status Meaning Description Schema
200 OK Success app_groups_risk_summary_get

Get Risk Details for a Specific Application Group

Example Code


curl -X GET /orgs/{org_id}/app_groups/{app_group_id}/risk_details \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/app_groups/{app_group_id}/risk_details

Exposure: Public Experimental

Auditable: No

Get the risk_details for a specific application group

Parameters

Name In Type Required Description
org_id path integer true* Organization
app_group_id path string true* app group resource id

Example Response Body

200 Response

{
  "risk_details": {}
}

Responses

Status Meaning Description Schema
200 OK Success app_groups_risk_details_get

Async Queries for Traffic Flows

Get collection of async queries

Example Code


curl -X GET /orgs/{org_id}/traffic_flows/async_queries \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/traffic_flows/async_queries

Exposure: Public Experimental

Auditable: No

Get collection of asynchronous traffic flow query status

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "href": "http://example.com",
  "result": "http://example.com",
  "status": "string",
  "created_at": "2025-04-01T00:21:26Z",
  "created_by": {
    "href": "http://example.com"
  },
  "query_parameters": {
    "query_name": "string",
    "start_date": "2025-04-01",
    "end_date": "2025-04-01",
    "sources_destinations_query_op": "and",
    "sources": {
      "include": [
        [
          {
            "label": {
              "href": "string"
            }
          }
        ]
      ],
      "exclude": [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    },
    "destinations": {
      "include": [
        [
          {
            "label": {
              "href": "string"
            }
          }
        ]
      ],
      "exclude": [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    },
    "data_sources": {
      "include": [
        "server"
      ],
      "exclude": [
        "server"
      ]
    },
    "services": {
      "include": [
        {
          "port": 0,
          "to_port": 0,
          "proto": 0,
          "process_name": "string",
          "windows_service_name": "string"
        }
      ],
      "exclude": [
        {
          "port": 0,
          "to_port": 0,
          "proto": 0,
          "process_name": "string",
          "windows_service_name": "string"
        }
      ]
    },
    "policy_decisions": [
      "allowed"
    ],
    "boundary_decisions": [
      "blocked"
    ],
    "max_results": 0,
    "exclude_workloads_from_ip_list_query": true
  },
  "updated_at": "2025-04-01T00:21:26Z",
  "matches_count": 0,
  "flows_count": 0,
  "regions": [
    {
      "pce_fqdn": "string",
      "responded": true,
      "matches_count": 0,
      "flows_count": 0
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success traffic_flows_async_queries_get

Create a new async traffic flow query

Example Code


curl -X POST /orgs/{org_id}/traffic_flows/async_queries \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/traffic_flows/async_queries

Auditable: No

Exposure: Public Experimental

Create asynchronous traffic flow query for traffic analysis

Example Request Body

{
  "query_name": "string",
  "start_date": "2025-04-01",
  "end_date": "2025-04-01",
  "sources_destinations_query_op": "and",
  "sources": {
    "include": [
      [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    ],
    "exclude": [
      {
        "label": {
          "href": "string"
        }
      }
    ]
  },
  "destinations": {
    "include": [
      [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    ],
    "exclude": [
      {
        "label": {
          "href": "string"
        }
      }
    ]
  },
  "data_sources": {
    "include": [
      "server"
    ],
    "exclude": [
      "server"
    ]
  },
  "services": {
    "include": [
      {
        "port": 0,
        "to_port": 0,
        "proto": 0,
        "process_name": "string",
        "windows_service_name": "string"
      }
    ],
    "exclude": [
      {
        "port": 0,
        "to_port": 0,
        "proto": 0,
        "process_name": "string",
        "windows_service_name": "string"
      }
    ]
  },
  "policy_decisions": [
    "allowed"
  ],
  "boundary_decisions": [
    "blocked"
  ],
  "max_results": 0,
  "exclude_workloads_from_ip_list_query": true
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body traffic_flows_async_queries_post false none
» query_name body string true* Query Name
» start_date body string(date) false Starting date for query
» end_date body string(date) false Ending date for query
» sources_destinations_query_op body string false Query logical operator between sources and destinations
» sources body object true* Source labels, workloads, IP addresses to include or exclude
»» include body [array] true* List of included sources or targets
»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»» label body object true* none
»»»»» href body string true* Label URI
»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»» label_group body object true* none
»»»»»» href body string true* Label group URI
»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»» workload body object true* none
»»»»»»» href body string true* Workload URI
»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»» ip_address body string true* IP address value
»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»» ip_list body object true* none
»»»»»»»» href body string true* IP List draft URI
»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/5 false Explorer filter for all managed services (workloads, virtual_services etc)
»»»»»»»» actors body string false All managed workloads ('ams')
»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»» cloud_resource body object true* none
»»»»»»»»» resource_uuid body string true* UUID of cloud resource
»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»» data_center body object true* none
»»»»»»»»»» type body string true* Type of the datacenter, such as core/cloud/aws/azure/gcp
»»»»»»»»» exclude body [anyOf] true* List of excluded sources or targets
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»» destinations body object true* Target labels, workloads, IP addresses, domain names, transmission to include or exclude
»»»»»»»»»» include body [array] true* List of included sources or targets
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/destinations/properties/include/items/items/oneOf/4 false An DNS parameter for a traffic query
»»»»»»»»»»»» fqdn body string true* parameter for querying the matched fqdn
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/5 false Explorer filter for all managed services (workloads, virtual_services etc)
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»» exclude body [anyOf] true* List of excluded sources or targets
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/destinations/properties/include/items/items/oneOf/4 false An DNS parameter for a traffic query
»»»»»»»»»»» anonymous body object false Parameter representing broadcast/multiccast
»»»»»»»»»»»» transmission body string true* transmission type
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»» data_sources body object false Data sources of the flows to include or exclude
»»»»»»»»»»» include body [string] false List of included services
»»»»»»»»»»» exclude body [string] false List of excluded data sources
»»»»»»»»»» services body object true* Services (5-tuple of port/to_port/proto/process/service) to include or exclude
»»»»»»»»»»» include body [object] true* List of included services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»»» proto body integer false protocol number
»»»»»»»»»»»» process_name body string false Process Name
»»»»»»»»»»»» windows_service_name body string false Windows Service Name
»»»»»»»»»»» exclude body [object] true* List of excluded services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»»» proto body integer false protocol number
»»»»»»»»»»»» process_name body string false Process Name
»»»»»»»»»»»» windows_service_name body string false Windows Service Name
»»»»»»»»»»» policy_decisions body [string] true* List of policy decisions
»»»»»»»»»»» boundary_decisions body [string] false List of boundary decisions
»»»»»»»»»»» max_results body integer true* maximum number of flows to return
»»»»»»»»»»» exclude_workloads_from_ip_list_query body boolean false exclude workload traffic when IP List is provided either in consumer or provider part of traffic query

Enumerated Values

Parameter Value
» sources_destinations_query_op and
» sources_destinations_query_op or
»»»»»»»» actors ams
»»»»»»»»»» type core
»»»»»»»»»» type cloud
»»»»»»»»»» type aws
»»»»»»»»»» type azure
»»»»»»»»»» type gcp
»»»»»»»»»»»» transmission broadcast
»»»»»»»»»»»» transmission multicast
»»»»»»»»»»»» transmission unicast
»»»»»»»»»»» include server
»»»»»»»»»»» include endpoint
»»»»»»»»»»» include flowlink
»»»»»»»»»»» include scanner
»»»»»»»»»»» exclude server
»»»»»»»»»»» exclude endpoint
»»»»»»»»»»» exclude flowlink
»»»»»»»»»»» exclude scanner
»»»»»»»»»»» policy_decisions allowed
»»»»»»»»»»» policy_decisions potentially_blocked
»»»»»»»»»»» policy_decisions blocked
»»»»»»»»»»» policy_decisions unknown
»»»»»»»»»»» boundary_decisions blocked
»»»»»»»»»»» boundary_decisions blocked_by_override_deny
»»»»»»»»»»» boundary_decisions blocked_non_illumio_rule

Responses

Status Meaning Description Schema
201 Created Success None

Get asynchronous traffic flow query status

Example Code


curl -X GET /orgs/{org_id}/traffic_flows/async_queries/{uuid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/traffic_flows/async_queries/{uuid}

Exposure: Public Experimental

Auditable: No

Get asynchronous traffic flow query status

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* async query uuid

Example Response Body

200 Response

{
  "href": "http://example.com",
  "result": "http://example.com",
  "status": "string",
  "created_at": "2025-04-01T00:21:26Z",
  "created_by": {
    "href": "http://example.com"
  },
  "query_parameters": {
    "query_name": "string",
    "start_date": "2025-04-01",
    "end_date": "2025-04-01",
    "sources_destinations_query_op": "and",
    "sources": {
      "include": [
        [
          {
            "label": {
              "href": "string"
            }
          }
        ]
      ],
      "exclude": [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    },
    "destinations": {
      "include": [
        [
          {
            "label": {
              "href": "string"
            }
          }
        ]
      ],
      "exclude": [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    },
    "data_sources": {
      "include": [
        "server"
      ],
      "exclude": [
        "server"
      ]
    },
    "services": {
      "include": [
        {
          "port": 0,
          "to_port": 0,
          "proto": 0,
          "process_name": "string",
          "windows_service_name": "string"
        }
      ],
      "exclude": [
        {
          "port": 0,
          "to_port": 0,
          "proto": 0,
          "process_name": "string",
          "windows_service_name": "string"
        }
      ]
    },
    "policy_decisions": [
      "allowed"
    ],
    "boundary_decisions": [
      "blocked"
    ],
    "max_results": 0,
    "exclude_workloads_from_ip_list_query": true
  },
  "updated_at": "2025-04-01T00:21:26Z",
  "matches_count": 0,
  "flows_count": 0,
  "regions": [
    {
      "pce_fqdn": "string",
      "responded": true,
      "matches_count": 0,
      "flows_count": 0
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success traffic_flows_async_queries_get

Request cancellation of an executing asynchronous traffic flow query

Example Code


curl -X PUT /orgs/{org_id}/traffic_flows/async_queries/{uuid} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/traffic_flows/async_queries/{uuid}

Auditable: No

Exposure: Public Experimental

Request cancellation of an executing asynchronous traffic flow query

Example Request Body

{
  "status": "cancel_requested"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* async query uuid
body body traffic_flows_async_queries_put false none
» status body string true* Query status

Enumerated Values

Parameter Value
» status cancel_requested

Responses

Status Meaning Description Schema
204 No Content Success None

Delete status and results for an asynchronous traffic flow query

Example Code


curl -X DELETE /orgs/{org_id}/traffic_flows/async_queries/{uuid}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/traffic_flows/async_queries/{uuid}

Exposure: Public Experimental

Auditable: No

Delete status and results for an asynchronous traffic flow query

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* async query uuid

Responses

Status Meaning Description Schema
204 No Content Success None

Download results of a completed asynchronous traffic flow query

Example Code


curl -X GET /orgs/{org_id}/traffic_flows/async_queries/{uuid}/download \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/traffic_flows/async_queries/{uuid}/download

Exposure: Public Experimental

Auditable: No

Download results of a completed asynchronous traffic flow query

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* async query uuid

Example Response Body

200 Response

[
  {
    "src": {
      "ip": "string",
      "workload": {
        "href": "string",
        "hostname": "string",
        "name": "string",
        "os_type": "windows",
        "enforcement_mode": "idle",
        "labels": [
          {
            "href": "string"
          }
        ],
        "managed": true
      },
      "cloud_resource": {
        "resource_uuid": "string",
        "labels": [
          {
            "href": "string"
          }
        ],
        "type": "aws"
      },
      "data_center": {
        "data_center": {
          "type": "core"
        }
      },
      "ip_lists": [
        {
          "name": "string",
          "href": "string",
          "size": 0,
          "rules": [
            {
              "href": "string"
            }
          ],
          "enforcement_boundaries": [
            {
              "href": "string"
            }
          ],
          "override_deny_rules": [
            {
              "href": "string"
            }
          ]
        }
      ],
      "virtual_server": {
        "name": "string",
        "href": "string",
        "enforcement_mode": "unmanaged",
        "labels": [
          {
            "href": "string"
          }
        ]
      },
      "virtual_service": {
        "name": "string",
        "href": "string",
        "labels": [
          {
            "href": "string"
          }
        ],
        "workload_enforcement_mode": "idle"
      },
      "fqdn_name": "string"
    },
    "dst": {
      "ip": "string",
      "workload": {
        "href": "string",
        "hostname": "string",
        "name": "string",
        "os_type": "windows",
        "enforcement_mode": "idle",
        "labels": [
          {
            "href": "string"
          }
        ],
        "managed": true
      },
      "cloud_resource": {
        "resource_uuid": "string",
        "labels": [
          {
            "href": "string"
          }
        ],
        "type": "aws"
      },
      "data_center": {
        "data_center": {
          "type": "core"
        }
      },
      "ip_lists": [
        {
          "name": "string",
          "href": "string",
          "size": 0,
          "rules": [
            {
              "href": "string"
            }
          ],
          "enforcement_boundaries": [
            {
              "href": "string"
            }
          ],
          "override_deny_rules": [
            {
              "href": "string"
            }
          ]
        }
      ],
      "virtual_server": {
        "name": "string",
        "href": "string",
        "enforcement_mode": "unmanaged",
        "labels": [
          {
            "href": "string"
          }
        ]
      },
      "virtual_service": {
        "name": "string",
        "href": "string",
        "labels": [
          {
            "href": "string"
          }
        ],
        "workload_enforcement_mode": "idle"
      },
      "fqdn_name": "string"
    },
    "service": {
      "port": 0,
      "proto": 0,
      "process_name": "string",
      "windows_service_name": "string",
      "user_name": "string"
    },
    "num_connections": 0,
    "policy_decision": "string",
    "boundary_decision": "string",
    "draft_policy_decision": "string",
    "flow_direction": "string",
    "transmission": "string",
    "timestamp_range": {
      "first_detected": "2025-04-01T00:21:26Z",
      "last_detected": "2025-04-01T00:21:26Z"
    },
    "state": "string",
    "dst_bo": 0,
    "dst_bi": 0,
    "icmp_type": 0,
    "icmp_code": 0,
    "network": {
      "name": "string",
      "href": "string"
    },
    "rules": [
      {
        "href": "string"
      }
    ],
    "enforcement_boundaries": [
      {
        "href": "string"
      }
    ],
    "override_deny_rules": [
      {
        "href": "string"
      }
    ],
    "caps": [
      "write"
    ],
    "client_type": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success traffic_flows_async_queries_download_get

Update rule coverage for a completed asynchronous traffic flow query

Example Code


curl -X PUT /orgs/{org_id}/traffic_flows/async_queries/{uuid}/update_rules \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/traffic_flows/async_queries/{uuid}/update_rules

Auditable: No

Exposure: Public Experimental

Update rule coverage for a completed asynchronous traffic flow query

Example Request Body

null

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* async query uuid
body body traffic_flows_async_queries_update_rules_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Auth Security Principals

Get Auth Security Principals

Example Code


curl -X GET /orgs/{org_id}/auth_security_principals \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/auth_security_principals

Exposure: Public Stable

Auditable: No

Get all auth_security_principals for this org

Parameters

Name In Type Required Description
org_id path integer true* Org ID
name query string false Name of the auth_security_principal to filter by. Supports partial matches
type query string false Type (user or group) to filter by

Example Response Body

200 Response

[
  {
    "type": "user",
    "name": "string",
    "display_name": "string",
    "access_restriction": null,
    "href": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success orgs_auth_security_principals_get

Get an Auth Security Principal

Example Code


curl -X GET /orgs/{org_id}/auth_security_principals/{auth_security_principal_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/auth_security_principals/{auth_security_principal_id}

Exposure: Public Stable

Auditable: No

Get details of this auth_security_principal in this org

Parameters

Name In Type Required Description
org_id path integer true* Org ID
auth_security_principal_id path string true* UUID of the auth_security_principal

Example Response Body

200 Response

[
  {
    "type": "user",
    "name": "string",
    "display_name": "string",
    "access_restriction": null,
    "href": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success orgs_auth_security_principals_get

Create an Auth Security Principal

Example Code


curl -X POST /orgs/{org_id}/auth_security_principals \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/auth_security_principals

Auditable: Yes

Exposure: Public Stable

Create an auth_security_principal in this org

Example Request Body

{
  "type": "user",
  "name": "string",
  "display_name": "string",
  "access_restriction": null
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
body body orgs_auth_security_principals_post false none
» type body string true* type of the auth_security_principal
» name body string true* name of auth_security_principal
» display_name body string false name of auth_security_principal
» access_restriction body object,null false Access restriction assigned to this user
»» href body string true* Access restriction URI

Enumerated Values

Parameter Value
» type user
» type group

Responses

Status Meaning Description Schema
201 Created Success None

Update an Auth Security Principal

Example Code


curl -X PUT /orgs/{org_id}/auth_security_principals/{auth_security_principal_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/auth_security_principals/{auth_security_principal_id}

Auditable: Yes

Exposure: Public Stable

Edit this auth_security_principal in this org

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
auth_security_principal_id path string true* UUID of the auth_security_principal
body body orgs_auth_security_principals_put false none
» type body string false type of the auth_security_principal
» name body string false name of the auth_security_principal
» display_name body string false display name of the auth_security_principal
» access_restriction body object,null false Access restriction assigned to this user
»» href body string true* Access restriction URI
» anonymous body object false none
» anonymous body object false none
» anonymous body object false none
» anonymous body object false none

Enumerated Values

Parameter Value
» type user
» type group

Responses

Status Meaning Description Schema
204 No Content Success None

Delete an Auth Security Principal

Example Code


curl -X DELETE /orgs/{org_id}/auth_security_principals/{auth_security_principal_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/auth_security_principals/{auth_security_principal_id}

Exposure: Public Stable

Auditable: Yes

Delete this auth_security_principal in this org

Parameters

Name In Type Required Description
org_id path integer true* Org ID
auth_security_principal_id path string true* UUID of the auth_security_principal

Responses

Status Meaning Description Schema
204 No Content Success None

Authentication Settings

Get Password Policy

Example Code


curl -X GET /authentication_settings/password_policy \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/authentication_settings/password_policy

Exposure: Public Stable

Auditable: No

Get password policy for local user

Example Response Body

200 Response

{
  "require_type_number": true,
  "require_type_lowercase": true,
  "require_type_uppercase": true,
  "require_type_symbol": true,
  "min_characters_per_type": 0,
  "min_length": 0,
  "min_changed_characters": 0,
  "history_count": 0,
  "expire_time_days": 0,
  "session_timeout_minutes": 0,
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "username": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success authentication_settings_password_policy_get

Update Password Policy

Example Code


curl -X PUT /authentication_settings/password_policy \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/authentication_settings/password_policy

Auditable: Yes

Exposure: Public Stable

Update password policy for local user

Example Request Body

{
  "require_type_number": true,
  "require_type_lowercase": true,
  "require_type_uppercase": true,
  "require_type_symbol": true,
  "min_characters_per_type": 0,
  "min_length": 0,
  "min_changed_characters": 0,
  "history_count": 0,
  "expire_time_days": 0,
  "session_timeout_minutes": 0
}

Parameters

Name In Type Required Description
body body authentication_settings_password_policy_put false none
» require_type_number body boolean false Flag to indicate whether password must contain numerical digit
» require_type_lowercase body boolean false Flag to indicate whether password must contain lowercase letter
» require_type_uppercase body boolean false Flag to indicate whether password must contain uppercase letter
» require_type_symbol body boolean false Flag to indicate whether password must contain symbol (i.e. !@#$%^&*<>?)
» min_characters_per_type body integer false Minimum number of characters for each character type
» min_length body integer false Minimum length of password
» min_changed_characters body integer false Minimum number of changed characters for new passwords
» history_count body integer false Number of old passwords to remember
» expire_time_days body integer false Number of days password expires; a value of 0 means it never expires
» session_timeout_minutes body integer false Number of minutes to timeout the user session without activity

Responses

Status Meaning Description Schema
204 No Content Success None

Get Authentication Setting

Example Code


curl -X GET /authentication_settings \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/authentication_settings

Exposure: Public Stable

Auditable: No

Get authentication settings

Example Response Body

200 Response

{
  "authentication_type": "string"
}

Responses

Status Meaning Description Schema
200 OK Success authentication_settings_get

Update Authentication Setting

Example Code


curl -X PUT /authentication_settings \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/authentication_settings

Auditable: Yes

Exposure: Public Stable

Update authentication settings

Example Request Body

{
  "authentication_type": "Local"
}

Parameters

Name In Type Required Description
body body authentication_settings_put false none
» authentication_type body string true* Authentication types

Enumerated Values

Parameter Value
» authentication_type Local
» authentication_type RADIUS
» authentication_type SAML
» authentication_type LDAP

Responses

Status Meaning Description Schema
204 No Content Success None

Containers

Get Container Clusters Workload Profiles

Example Code


curl -X GET /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles

Exposure: Public Experimental

Auditable: No

Get collection of container workload profiles

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID
assign_labels query string false List of lists of label URIs, encoded as a JSON string
enforcement_mode query string false Filter by enforcement mode.
linked query boolean false Filter by linked container workload profiles.
managed query boolean false Filter by managed state
max_results query integer false Maximum number of container workloads to return.
name query string false Name string to match.Supports partial matches.
namespace query string false Namespace string to match.Supports partial matches.
visibility_level query string false Filter by visibility level

Enumerated Values

Parameter Value
enforcement_mode visibility_only
enforcement_mode full
enforcement_mode idle
enforcement_mode selective
visibility_level flow_full_detail
visibility_level flow_summary
visibility_level flow_drops
visibility_level flow_off
visibility_level enhanced_data_collection

Example Response Body

200 Response

{
  "href": "string",
  "name": null,
  "namespace": null,
  "description": "string",
  "assign_labels": [
    {
      "href": "string"
    }
  ],
  "labels": [
    {
      "key": "string",
      "assignment": {
        "href": "string",
        "value": "string"
      }
    }
  ],
  "enforcement_mode": "idle",
  "managed": true,
  "linked": true,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "updated_at": "2025-04-01T00:21:27Z"
}

Responses

Status Meaning Description Schema
200 OK Success container_clusters_container_workload_profiles_get

Create a Container Cluster Workload Profile

Example Code


curl -X POST /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles

Auditable: Yes

Exposure: Public Experimental

Create a container workload profile

Example Request Body

{
  "name": null,
  "description": "string",
  "assign_labels": [
    {
      "href": "string"
    }
  ],
  "labels": [
    {
      "key": "string",
      "assignment": {
        "href": "string"
      }
    }
  ],
  "enforcement_mode": "idle",
  "managed": true
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID
body body container_clusters_container_workload_profiles_post false none
» name body string,null true* A friendly name given to a profile if the namespace is not user friendly
» description body string false Description of the profile
» assign_labels body [object] false Assigned labels
»» href body string true* Label URI
» labels body [oneOf] false Labels to assign to the workload that matches the namespace
»» anonymous body object false none
»»» key body string true* The label key
»»» assignment body object true* The label href to set
»»»» href body string true* Label URI
»»» anonymous body object false none
»»»» key body string true* The label key
»»»» restriction body [object] true* The list of allowed label hrefs
»»»»» href body string true* Label URI
»»»» enforcement_mode body container_clusters_container_workload_profiles_get/properties/enforcement_mode false Workload enforcement mode
»»»» managed body boolean false If the namespace is managed or not

Enumerated Values

Parameter Value
»»»» enforcement_mode idle
»»»» enforcement_mode visibility_only
»»»» enforcement_mode full
»»»» enforcement_mode selective

Responses

Status Meaning Description Schema
201 Created Success None

Update the Container Cluster Workload Profile

Example Code


curl -X PUT /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/{container_workload_profile_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/{container_workload_profile_id}

Auditable: Yes

Exposure: Public Experimental

Update a container workload profile by id

Example Request Body

{
  "name": null,
  "description": null,
  "assign_labels": [
    {
      "href": "string"
    }
  ],
  "labels": [
    {
      "key": "string",
      "assignment": {
        "href": "string"
      }
    }
  ],
  "enforcement_mode": "idle",
  "managed": true
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID
container_workload_profile_id path string true* Container workload profile UUID
body body container_clusters_container_workload_profiles_put false none
» name body string,null false A friendly name given to a profile if the namespace is not user friendly
» description body string,null false Description of the profile
» assign_labels body [object] false Assigned labels
»» href body string true* Label URI
» labels body [oneOf] false Labels to assign to the workload that matches the namespace
»» anonymous body object false none
»»» key body string true* The label key
»»» assignment body object true* The label href to set
»»»» href body string true* Label URI
»»» anonymous body object false none
»»»» key body string true* The label key
»»»» restriction body [object] true* The list of allowed label hrefs
»»»»» href body string true* Label URI
»»»» enforcement_mode body container_clusters_container_workload_profiles_get/properties/enforcement_mode false Workload enforcement mode
»»»» managed body boolean false If the namespace is managed or not

Enumerated Values

Parameter Value
»»»» enforcement_mode idle
»»»» enforcement_mode visibility_only
»»»» enforcement_mode full
»»»» enforcement_mode selective

Responses

Status Meaning Description Schema
204 No Content Success None

Bulk Update Container Workload Profiles

Example Code


curl -X PUT /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/update \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/update

Auditable: Yes

Exposure: Public Experimental

Bulk update container workload profiles

Example Request Body

{
  "container_workload_profiles": [
    {
      "href": "string"
    }
  ],
  "labels": [
    {
      "key": "string",
      "assignment": {
        "href": "string"
      }
    }
  ],
  "enforcement_mode": "idle",
  "managed": true
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID
body body container_clusters_container_workload_profiles_update_put false none
» container_workload_profiles body [object] false List of Container Workload Profile hrefs
»» href body string true* Container Workload Profile URI
» labels body [oneOf] false Labels to assign to the workload that matches the namespace
»» anonymous body object false none
»»» key body string true* The label key
»»» assignment body object true* The label href to set
»»»» href body string true* Label URI
»»» anonymous body object false none
»»»» key body string true* The label key
»»»» restriction body [object] true* The list of allowed label hrefs
»»»»» href body string true* Label URI
»»»» enforcement_mode body container_clusters_container_workload_profiles_get/properties/enforcement_mode false Workload enforcement mode
»»»» managed body boolean false If the namespace is managed or not

Enumerated Values

Parameter Value
»»»» enforcement_mode idle
»»»» enforcement_mode visibility_only
»»»» enforcement_mode full
»»»» enforcement_mode selective

Responses

Status Meaning Description Schema
204 No Content Success None

Get Container Clusters

Example Code


curl -X GET /orgs/{org_id}/container_clusters \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/container_clusters

Exposure: Public Experimental

Auditable: No

Return the set of container_clusters

Parameters

Name In Type Required Description
org_id path integer true* Organization
clas_mode query boolean false CLAS Mode of container cluster(s) to return
max_results query integer false Maximum number of container clusters to return
name query string false Name of the container cluster(s) to return. Supports partial matches

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": "string",
  "nodes": [
    {
      "pod_subnet": "string"
    }
  ],
  "container_runtime": "string",
  "manager_type": "string",
  "last_connected": "2025-04-01T00:21:27Z",
  "online": true,
  "errors": [
    {
      "audit_event": {
        "href": "string"
      },
      "duplicate_ids": [],
      "error_type": "string"
    }
  ],
  "kubelink_version": "string",
  "pce_fqdn": "string",
  "cluster_mode": "legacy",
  "datacenter_nat_1to1": true
}

Responses

Status Meaning Description Schema
200 OK Success container_clusters_get

Create a Container Cluster

Example Code


curl -X POST /orgs/{org_id}/container_clusters \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/container_clusters

Auditable: Yes

Exposure: Public Experimental

Create a new container cluster

Example Request Body

{
  "name": "string",
  "description": "string",
  "datacenter_nat_1to1": true
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body container_clusters_post false none
» name body string false User assigned name of the cluster
» description body string false User assigned description of the cluster
» datacenter_nat_1to1 body boolean false Datacenter NAT 1to1 mode ON. Used for enforcing creation of pseudo public interfaces on nodes

Responses

Status Meaning Description Schema
201 Created Success None

Update a Container Cluster

Example Code


curl -X PUT /orgs/{org_id}/container_clusters/{container_cluster_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}

Auditable: Yes

Exposure: Public Experimental

Update a cluster

Example Request Body

{
  "name": "string",
  "description": "string",
  "datacenter_nat_1to1": true
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID
body body container_clusters_put false none
» name body string false User assigned name of the cluster
» description body string false User assigned description of the cluster
» datacenter_nat_1to1 body boolean false Datacenter NAT 1to1 mode ON. Used for enforcing creation of pseudo public interfaces on nodes

Responses

Status Meaning Description Schema
204 No Content Success None

Get Container Clusters Service Backend

Example Code


curl -X GET /orgs/{org_id}/container_clusters/{container_cluster_id}/service_backends \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/service_backends

Exposure: Public Experimental

Auditable: No

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID

Example Response Body

200 Response

[
  {
    "name": "string",
    "kind": "string",
    "namespace": "string",
    "updated_at": "string",
    "created_at": "string",
    "virtual_services": {
      "href": "string",
      "name": "string"
    }
  }
]

Responses

Status Meaning Description Schema
200 OK Success container_clusters_service_backends_get

Get Container Clusters Workload Profiles

Example Code


curl -X GET /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/{container_workload_profile_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/{container_workload_profile_id}

Exposure: Public Experimental

Auditable: No

Get a container workload profile by id

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID
container_workload_profile_id path string true* Container workload profile UUID

Example Response Body

200 Response

{
  "href": "string",
  "name": null,
  "namespace": null,
  "description": "string",
  "assign_labels": [
    {
      "href": "string"
    }
  ],
  "labels": [
    {
      "key": "string",
      "assignment": {
        "href": "string",
        "value": "string"
      }
    }
  ],
  "enforcement_mode": "idle",
  "managed": true,
  "linked": true,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "updated_at": "2025-04-01T00:21:27Z"
}

Responses

Status Meaning Description Schema
200 OK Success container_clusters_container_workload_profiles_get

Delete Container Clusters Container Workload Profiles

Example Code


curl -X DELETE /orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/{container_workload_profile_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}/container_workload_profiles/{container_workload_profile_id}

Exposure: Public Experimental

Auditable: Yes

Delete a container workload profile by id

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID
container_workload_profile_id path string true* Container workload profile UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Get a Container Cluster

Example Code


curl -X GET /orgs/{org_id}/container_clusters/{container_cluster_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}

Exposure: Public Experimental

Auditable: No

Return the container_cluster instance

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": "string",
  "nodes": [
    {
      "pod_subnet": "string"
    }
  ],
  "container_runtime": "string",
  "manager_type": "string",
  "last_connected": "2025-04-01T00:21:27Z",
  "online": true,
  "errors": [
    {
      "audit_event": {
        "href": "string"
      },
      "duplicate_ids": [],
      "error_type": "string"
    }
  ],
  "kubelink_version": "string",
  "pce_fqdn": "string",
  "cluster_mode": "legacy",
  "datacenter_nat_1to1": true
}

Responses

Status Meaning Description Schema
200 OK Success container_clusters_get

Delete a Container Cluster

Example Code


curl -X DELETE /orgs/{org_id}/container_clusters/{container_cluster_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/container_clusters/{container_cluster_id}

Exposure: Public Experimental

Auditable: Yes

Delete a cluster

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_cluster_id path string true* Cluster UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Core Service Types

Fetch all core service types for this org

Example Code


curl -X GET /orgs/{org_id}/core_service_types \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/core_service_types

Exposure: Public Experimental

Auditable: No

Fetches all core service types for this org

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "href": "http://example.com",
  "name": "string",
  "required_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "optional_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "labels": [
    {}
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "priority": 0,
  "num_optional_ports_required": 0
}

Responses

Status Meaning Description Schema
200 OK Success core_service_types_get

Fetch core service type by UUID

Example Code


curl -X GET /orgs/{org_id}/core_service_types/{core_service_type_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/core_service_types/{core_service_type_id}

Exposure: Public Experimental

Auditable: No

Fetches core service type by UUID

Parameters

Name In Type Required Description
org_id path integer true* Organization
core_service_type_id path string true* UUID of the core service type

Example Response Body

200 Response

{
  "href": "http://example.com",
  "name": "string",
  "required_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "optional_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "labels": [
    {}
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "priority": 0,
  "num_optional_ports_required": 0
}

Responses

Status Meaning Description Schema
200 OK Success core_service_types_get

Update core service type by UUID

Example Code


curl -X PUT /orgs/{org_id}/core_service_types/{core_service_type_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/core_service_types/{core_service_type_id}

Auditable: Yes

Exposure: Public Experimental

Example Request Body

{
  "labels": [
    {}
  ],
  "required_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "optional_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "num_optional_ports_required": 0,
  "provider": true,
  "priority": 1
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
core_service_type_id path string true* UUID of the core service type
body body core_service_types_put false none
» labels body [oneOf] false Suggested labels
»» value body string false Label name
»» key body string false Label type
»» href body string(uri) false Label URI
»» anonymous body object false none
»» anonymous body object false none
» required_ports body [object] false Core Service Ports
»» port body integer true* Port number, or the starting port of a range.
»» to_port body integer false Upper end of port range; this field should not be included if specifying an individual port.
» optional_ports body [object] false Core Service Ports
» num_optional_ports_required body integer false Number of optional ports required
» provider body boolean false To indicate whether the provider is a core service. Default value is true which means provider is a core service
» priority body integer false Each IP/workload is identified for 1 core service type and they are ordered by priority

Responses

Status Meaning Description Schema
204 No Content Success None

Database Metrics for Traffic Flows

Get organization database usage metrics

Example Code


curl -X GET /orgs/{org_id}/traffic_flows/database_metrics \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/traffic_flows/database_metrics

Exposure: Public Experimental

Auditable: No

return organization database usage metrics

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "flows_days": 0,
  "flows_days_limit": 0,
  "flows_oldest_day": "2025-04-01",
  "flows_size_gb": 0,
  "flows_size_gb_limit": 0,
  "server": {
    "num_flows_days": 0,
    "num_flows_days_limit": 0,
    "flows_oldest_day": "2025-04-01",
    "flows_size_gb": 0,
    "flows_size_gb_limit": 0,
    "num_daily_tables": 0,
    "num_weekly_tables": 0
  },
  "endpoint": {
    "num_flows_days": 0,
    "num_flows_days_limit": 0,
    "flows_oldest_day": "2025-04-01",
    "flows_size_gb": 0,
    "flows_size_gb_limit": 0,
    "num_daily_tables": 0,
    "num_weekly_tables": 0
  },
  "backlog": {
    "total_disk_used_gb": 0,
    "total_file_count": 0
  },
  "updated_at": "2025-04-01T00:21:26Z"
}

Responses

Status Meaning Description Schema
200 OK Success traffic_flows_database_metrics_get

Datafiles

Retrieve the specified datafile from the system

Example Code


curl -X GET /orgs/{org_id}/datafiles/{uuid}
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/datafiles/{uuid}

Exposure: Public Stable

Auditable: No

Retrieve the specified datafile from the system.

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* uuid of file resource
filename query string false Filename to save as

Responses

Status Meaning Description Schema
200 OK Success None

Detected Core Services

Fetch all detected core services for this org

Example Code


curl -X GET /orgs/{org_id}/detected_core_services \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/detected_core_services

Exposure: Public Experimental

Auditable: No

Fetches all detected core services for this org

Parameters

Name In Type Required Description
org_id path integer true* Organization
action query string false the action taken on the detected core services
core_service_type query string false get all detected core services for a particular core service type
max_results query integer false the maximum results to be returned

Enumerated Values

Parameter Value
action skip
action reject
action accept
action recommended

Example Response Body

200 Response

{
  "ip_address": "string",
  "workload": {
    "href": "string",
    "hostname": "string",
    "name": "string",
    "os_type": "windows",
    "enforcement_mode": "idle",
    "labels": [
      {
        "href": "string"
      }
    ],
    "managed": true
  },
  "href": "string",
  "core_service_type": null,
  "confidence": 50,
  "feedback": "string",
  "action": "string",
  "method_name": "string",
  "labels_applied": true,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "last_detected_at": "2025-04-01T00:21:27Z"
}

Responses

Status Meaning Description Schema
200 OK Success detected_core_services_get

Get a detected core service by UUID

Example Code


curl -X GET /orgs/{org_id}/detected_core_services/{detected_core_service_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/detected_core_services/{detected_core_service_id}

Exposure: Public Experimental

Auditable: No

Get a detected core service by UUID

Parameters

Name In Type Required Description
org_id path integer true* Organization
detected_core_service_id path string true* UUID of the detected core service

Example Response Body

200 Response

{
  "ip_address": "string",
  "workload": {
    "href": "string",
    "hostname": "string",
    "name": "string",
    "os_type": "windows",
    "enforcement_mode": "idle",
    "labels": [
      {
        "href": "string"
      }
    ],
    "managed": true
  },
  "href": "string",
  "core_service_type": null,
  "confidence": 50,
  "feedback": "string",
  "action": "string",
  "method_name": "string",
  "labels_applied": true,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "last_detected_at": "2025-04-01T00:21:27Z"
}

Responses

Status Meaning Description Schema
200 OK Success detected_core_services_get

Update a detected core service by UUID

Example Code


curl -X PUT /orgs/{org_id}/detected_core_services/{detected_core_service_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/detected_core_services/{detected_core_service_id}

Auditable: Yes

Exposure: Public Experimental

Example Request Body

{
  "action": "accept",
  "feedback": "string",
  "labels_applied": true,
  "workload": {
    "href": "http://example.com"
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
detected_core_service_id path string true* UUID of the detected core service
body body detected_core_services_put false none
» action body string false Accept, skip or reject the core service detection
» feedback body string false Feedback from user about the detected core service
» labels_applied body boolean false Indicates if the end user applied the suggested labels for this detected core service
» workload body object false none
»» href body string(uri) true* The workload URI to be associated with this core service recommendation

Enumerated Values

Parameter Value
» action accept
» action skip
» action reject
» action recommended

Responses

Status Meaning Description Schema
204 No Content Success None

Get detected core service summary details

Example Code


curl -X GET /orgs/{org_id}/detected_core_services_summary \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/detected_core_services_summary

Exposure: Public Experimental

Auditable: No

Get detected core service summary details

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

[
  {
    "href": "http://example.com",
    "core_service_type": null,
    "recommended": 0,
    "accepted": 0,
    "rejected": 0
  }
]

Responses

Status Meaning Description Schema
200 OK Success detected_core_services_summary_get

Discovered Virtual Servers

Get Discovered Virtual Servers Info

Example Code


curl -X GET /orgs/{org_id}/discovered_virtual_servers \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/discovered_virtual_servers

Exposure: Public Experimental

Auditable: No

Get the discovered virtual servers

Parameters

Name In Type Required Description
org_id path integer true* Organization
active_pce_fqdn query string false FQDN of the PCE
has_virtual_server query boolean false Filter discovered virtual server(s) by whether they are managed by a virtual server object
max_results query integer false Maximum number of discovered virtual servers to return
name query string false Name of discovered virtual server(s) to return. Supports partial matches
network_enforcement_node.hostname query string false Hostname of NEN object to filter discovered virtual server(s)
slb query string false URI of SLB object to filter discovered virtual server(s)
vip query string false Frontend (VIP) address of the discovered virtual server(s). Supports suffix-wildcard matches
vip_port query integer false Port of frontend VIP of the discovered virtual server(s)
vip_proto query integer false Protocol of frontend VIP of the discovered virtual server(s)
virtual_server query string false URI of virtual server to filter discovered virtual server(s)
virtual_server_labels query string false 2D array of label URIs, encoded as a JSON string. Filter by virtual server labels. Requires usage of has_virtual_server: true
virtual_server_mode query string false Filter discovered virtual server(s) by virtual server mode. Requires usage of has_virtual_server: true

Enumerated Values

Parameter Value
virtual_server_mode unmanaged
virtual_server_mode enforced

Example Response Body

200 Response

{
  "href": "string",
  "dvs_identifier": "string",
  "name": "string",
  "vip_port": {
    "vip": "192.168.0.1",
    "protocol": 0,
    "port": "string"
  },
  "local_ips": [
    "192.168.0.1"
  ],
  "mode": "string",
  "slb": {
    "href": "string"
  },
  "snat_type": "string",
  "snat_pool_ips": [
    "192.168.0.1"
  ],
  "service_checks": [
    {
      "protocol": 0,
      "port": 0
    }
  ],
  "nfc": {
    "href": "string"
  },
  "network_enforcement_node": {
    "href": "string"
  },
  "virtual_server": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success discovered_virtual_servers_get

Get the Specified Discovered Virtual Servers Info

Example Code


curl -X GET /orgs/{org_id}/discovered_virtual_servers/{discovered_virtual_server_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/discovered_virtual_servers/{discovered_virtual_server_id}

Exposure: Public Experimental

Auditable: No

Get the discovered virtual servers

Parameters

Name In Type Required Description
org_id path integer true* Organization
discovered_virtual_server_id path string true* Discovered virtual servers UUID

Example Response Body

200 Response

{
  "href": "string",
  "dvs_identifier": "string",
  "name": "string",
  "vip_port": {
    "vip": "192.168.0.1",
    "protocol": 0,
    "port": "string"
  },
  "local_ips": [
    "192.168.0.1"
  ],
  "mode": "string",
  "slb": {
    "href": "string"
  },
  "snat_type": "string",
  "snat_pool_ips": [
    "192.168.0.1"
  ],
  "service_checks": [
    {
      "protocol": 0,
      "port": 0
    }
  ],
  "nfc": {
    "href": "string"
  },
  "network_enforcement_node": {
    "href": "string"
  },
  "virtual_server": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success discovered_virtual_servers_get

Check the status of the submitted virtual server discovery job

Example Code


curl -X GET /orgs/{org_id}/network_enforcement_nodes/virtual_server_discovery_jobs/{job_uuid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/network_enforcement_nodes/virtual_server_discovery_jobs/{job_uuid}

Exposure: Public Experimental

Auditable: No

get a virtual server discovery request

Parameters

Name In Type Required Description
org_id path integer true* Organization
job_uuid path string true* uuid of virtual server discovery job

Example Response Body

200 Response

{
  "href": "string",
  "status": "string",
  "created_at": "2025-04-01T00:21:26Z",
  "completed_at": "2025-04-01T00:21:26Z",
  "created_by": {
    "href": "string"
  },
  "connection_state": "string",
  "virtual_server_infos": [
    {
      "ip_address": "string",
      "port": 0,
      "discovered_virtual_server": {
        "href": "string"
      }
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success network_enforcement_nodes_virtual_server_discovery_jobs_get

Events

Get a list of the various organizational events

Example Code


curl -X GET /orgs/{org_id}/events \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/events

Exposure: Public Stable

Auditable: No

Get a list of the various organizational events.

Parameters

Name In Type Required Description
org_id path integer true* Organization
created_by query string false User, agent, or system that created the event
event_type query string false Type of event
max_results query integer false Maximum number of results to return
severity query string false Severity of event
status query string false Status of event
timestamp[gte] query string false Earliest event date to return (RFC 3339 format)
timestamp[lte] query string false Latest event date to return (RFC 3339 format)

Enumerated Values

Parameter Value
severity emerg
severity alert
severity crit
severity warning
severity err
severity notice
severity info
severity debug
status success
status failure
status nil
timestamp[gte] success
timestamp[gte] failure
timestamp[gte] nil
timestamp[lte] success
timestamp[lte] failure
timestamp[lte] nil

Example Response Body

200 Response

{
  "href": "string",
  "org_id": 0,
  "version": "string",
  "event_id": "string",
  "event_type": "string",
  "status": "string",
  "severity": "string",
  "timestamp": "2025-04-01T00:21:27Z",
  "pce_fqdn": "string",
  "created_by": {},
  "action": null,
  "resource_changes": [
    {
      "href": "string",
      "version": "string",
      "org_id": 0,
      "uuid": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "resource": null,
      "changes": {},
      "change_type": "string"
    }
  ],
  "notifications": [
    {
      "href": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "notification_type": "string",
      "severity": "err",
      "info": null
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success events_get

Get an Event

Example Code


curl -X GET /orgs/{org_id}/events/{composite_log_event_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/events/{composite_log_event_id}

Exposure: Public Stable

Auditable: No

Get an organizational event by id

Parameters

Name In Type Required Description
org_id path integer true* Organization
composite_log_event_id path string true* UUID of event to return

Example Response Body

200 Response

{
  "href": "string",
  "org_id": 0,
  "version": "string",
  "event_id": "string",
  "event_type": "string",
  "status": "string",
  "severity": "string",
  "timestamp": "2025-04-01T00:21:27Z",
  "pce_fqdn": "string",
  "created_by": {},
  "action": null,
  "resource_changes": [
    {
      "href": "string",
      "version": "string",
      "org_id": 0,
      "uuid": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "resource": null,
      "changes": {},
      "change_type": "string"
    }
  ],
  "notifications": [
    {
      "href": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "notification_type": "string",
      "severity": "err",
      "info": null
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success events_get

Firewall Settings

Get Firewall Policies

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/firewall_settings \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/firewall_settings

Exposure: Public Stable

Auditable: No

Get the firewall settings object

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version

Example Response Body

200 Response

{
  "static_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "ike_authentication_type": "string",
  "firewall_coexistence": null,
  "allow_captive_portal_outbound": true,
  "containers_inherit_host_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "blocked_connection_reject_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "loopback_interfaces_in_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "ip_forwarding_enabled_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "rule_hit_count_enabled_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": {
    "href": "string"
  },
  "update_type": "string"
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_firewall_settings_get

Update Firewall Policies

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/firewall_settings \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/firewall_settings

Auditable: Yes

Exposure: Public Stable

Modify firewall settings object

Example Request Body

{
  "update_type": "create",
  "static_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "ike_authentication_type": "psk",
  "firewall_coexistence": null,
  "allow_captive_portal_outbound": true,
  "containers_inherit_host_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "blocked_connection_reject_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "loopback_interfaces_in_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "ip_forwarding_enabled_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "rule_hit_count_enabled_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_firewall_settings_put false none
» update_type body string false Type of update
» static_policy_scopes body [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] false Rule set scopes
»» exclusion body boolean false Boolean to specify whether or not the scope is an exclusion
»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»» href body string true* none
»» label_group body sec_policy_virtual_servers_get/properties/created_by false none
» ike_authentication_type body string false IKE authentication type to use for IPsec (SecureConnect and Machine Authentication)
» firewall_coexistence body array,null false none
»» scope body [object] true* Assigned labels
»»» href body string true* Label URI
»» workload_mode body string false Additional match criteria to select workload(s)
»» illumio_primary body boolean true* Configure Illumio to be the primary firewall
» allow_captive_portal_outbound body boolean false Defines whether or not to open the endpoint firewall to all outbound traffic when a captive portal scenario is discovered by the VEN
» containers_inherit_host_policy_scopes body [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] false Rule set scopes
» blocked_connection_reject_scopes body [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] false Scopes whose blocked connection action will be reject
» loopback_interfaces_in_policy_scopes body [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] false Workloads that match the scope will apply policy on loopback interfaces and the loopback interface's IPs will be distributed to peers.
» ip_forwarding_enabled_scopes body [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] false Rule set scopes
» rule_hit_count_enabled_scopes body [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] false Rule set scopes

Enumerated Values

Parameter Value
» update_type create
» update_type update
» update_type delete
» ike_authentication_type psk
» ike_authentication_type certificate
»» workload_mode enforced
»» workload_mode illuminated

Responses

Status Meaning Description Schema
204 No Content Success None

Health

Get Health

Example Code


curl -X GET /health \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/health

Exposure: Public Stable

Auditable: No

Get the PCE Health

Example Response Body

200 Response

[
  {
    "status": "normal",
    "type": "string",
    "fqdn": "string",
    "available_seconds": 0,
    "notifications": [
      {
        "status": "normal",
        "token": "string",
        "message": "string"
      }
    ],
    "listen_only_mode_enabled_at": null,
    "nodes": [
      {
        "hostname": null,
        "ip_address": null,
        "runlevel": null,
        "uptime_seconds": null,
        "cpu": {
          "status": "normal",
          "percent": 0
        },
        "disk": [
          {
            "location": "string",
            "value": {
              "status": "normal",
              "percent": 0
            }
          }
        ],
        "memory": {
          "status": "normal",
          "percent": 0
        },
        "metrics": [
          {
            "metric": "string",
            "entries": [
              {
                "values": [
                  {
                    "status": "normal",
                    "name": "string",
                    "value": 0,
                    "unit": "millisecond",
                    "frequency": "second",
                    "display": "enclosed"
                  }
                ]
              }
            ],
            "last_updated_at": "2025-04-01T00:21:27Z",
            "display": "table"
          }
        ],
        "services": {
          "status": "string",
          "running": [
            "string"
          ],
          "not_running": [
            "string"
          ],
          "partial": [
            "string"
          ],
          "optional": [
            "string"
          ],
          "unknown": [
            "string"
          ]
        },
        "generated_at": null
      }
    ],
    "network": {
      "replication": [
        {
          "type": "string",
          "details": {
            "database_name": "string",
            "primary_fqdn": "string",
            "replica_fqdn": "string"
          },
          "value": {
            "status": "string",
            "lag_seconds": 0
          }
        }
      ]
    },
    "groups": [
      {
        "group": "string",
        "status": "normal",
        "components": [
          {
            "section": "string",
            "contents": [
              {
                "metric": "string",
                "entries": [
                  {
                    "values": []
                  }
                ],
                "last_updated_at": "2025-04-01T00:21:27Z",
                "display": "table"
              }
            ]
          }
        ]
      }
    ],
    "generated_at": null
  }
]

Responses

Status Meaning Description Schema
200 OK Success health_get

IP Lists

Get IP Lists

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/ip_lists \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists

Exposure: Public Stable

Auditable: No

Get the collection of IP lists

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
description query string false Description of IP list(s) to return. Supports partial matches
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
fqdn query string false IP lists matching FQDN. Supports partial matches
ip_address query string false IP address matching IP list(s) to return. Supports partial matches
max_results query integer false Maximum number of IP Lists to return.
name query string false Name of IP list(s) to return. Supports partial matches

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ip_ranges": [
    {
      "description": "string",
      "from_ip": "string",
      "to_ip": "string",
      "exclusion": true
    }
  ],
  "fqdns": [
    {
      "fqdn": "string",
      "description": "string"
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_ip_lists_get

Get an IP List

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id}

Exposure: Public Stable

Auditable: No

Get IP list by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
ip_list_id path string true* IP list ID

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ip_ranges": [
    {
      "description": "string",
      "from_ip": "string",
      "to_ip": "string",
      "exclusion": true
    }
  ],
  "fqdns": [
    {
      "fqdn": "string",
      "description": "string"
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_ip_lists_get

Create an IP List

Example Code


curl -X POST /orgs/{org_id}/sec_policy/{pversion}/ip_lists \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists

Auditable: Yes

Exposure: Public Stable

Create new IP List

Example Request Body

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ip_ranges": [
    {
      "description": "string",
      "from_ip": "string",
      "to_ip": "string",
      "exclusion": true
    }
  ],
  "fqdns": [
    {
      "fqdn": "string",
      "description": "string"
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_ip_lists_post false none
» name body string true* Name (must be unique)
» description body string false Description
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» ip_ranges body [object] false IP addresses or ranges
»» description body string false Description
»» from_ip body string true* IP address or a low end of IP range. Might be specified with CIDR notation
»» to_ip body string false High end of an IP range
»» exclusion body boolean false Whether this IP address is an exclusion. Exclusions must be a strict subset of inclusive IP addresses.
» fqdns body [object] false Collection of FQDN
»» fqdn body string true* none
»» description body string false none

Responses

Status Meaning Description Schema
201 Created Success None

Update an IP List

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id}

Auditable: Yes

Exposure: Public Stable

Modify IP list

Example Request Body

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ip_ranges": [
    {
      "description": "string",
      "from_ip": "string",
      "to_ip": "string",
      "exclusion": true
    }
  ],
  "fqdns": [
    {
      "fqdn": "string",
      "description": "string"
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
ip_list_id path string true* IP list ID
body body sec_policy_ip_lists_put false none
» name body string false Name (must be unique)
» description body string false Description
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» ip_ranges body [object] false IP addresses or ranges
»» description body string false Description
»» from_ip body string true* IP address or a low end of IP range. Might be specified with CIDR notation
»» to_ip body string false High end of an IP range
»» exclusion body boolean false Whether this IP address is an exclusion. Exclusions must be a strict subset of inclusive IP addresses.
» fqdns body [object] false Collection of FQDN
»» fqdn body string true* none
»» description body string false none

Responses

Status Meaning Description Schema
204 No Content Success None

Delete an IP List

Example Code


curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/ip_lists/{ip_list_id}

Exposure: Public Stable

Auditable: Yes

Delete IP list

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
ip_list_id path string true* IP list ID

Responses

Status Meaning Description Schema
204 No Content Success None

Jobs

Get Jobs

Example Code


curl -X GET /orgs/{org_id}/jobs \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/jobs

Exposure: Public Stable

Auditable: No

Gets the job list.

Parameters

Name In Type Required Description
org_id path integer true* Organization
job_type query string false The job-type value to use for filtering the results.
max_results query integer false Maximum number of jobs to return.

Example Response Body

200 Response

{
  "href": "string",
  "job_type": "string",
  "description": null,
  "status": "string",
  "requested_at": "2025-04-01T00:21:27Z",
  "requested_by": {
    "href": "string"
  },
  "terminated_at": "2025-04-01T00:21:27Z",
  "result": null
}

Responses

Status Meaning Description Schema
200 OK Success jobs_get

Get a Job

Example Code


curl -X GET /orgs/{org_id}/jobs/{job_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/jobs/{job_id}

Exposure: Public Stable

Auditable: No

Gets information about the specified job.

Parameters

Name In Type Required Description
org_id path integer true* Organization
job_id path string true* ID of a job.

Example Response Body

200 Response

{
  "href": "string",
  "job_type": "string",
  "description": null,
  "status": "string",
  "requested_at": "2025-04-01T00:21:27Z",
  "requested_by": {
    "href": "string"
  },
  "terminated_at": "2025-04-01T00:21:27Z",
  "result": null
}

Responses

Status Meaning Description Schema
200 OK Success jobs_get

Delete a Job

Example Code


curl -X DELETE /orgs/{org_id}/jobs/{job_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/jobs/{job_id}

Exposure: Public Stable

Auditable: Yes

Deletes the specified job record

Parameters

Name In Type Required Description
org_id path integer true* Organization
job_id path string true* ID of a job.

Responses

Status Meaning Description Schema
204 No Content Success None

Kubernetes

Get all kubernetes workloads

Example Code


curl -X GET /orgs/{org_id}/kubernetes_workloads \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/kubernetes_workloads

Exposure: Public Experimental

Auditable: No

Get all kubernetes workloads

Parameters

Name In Type Required Description
org_id path integer true* Organization
container_clusters query string false List of container cluster URIs, encoded as a JSON string
enforcement_mode query string false Enforcement mode of kubernetes workload(s) to return
kind query string false k8s resource kind (Deployment, ReplicaSet, etc.)
labels query string false List of label URIs to include, encoded as a JSON string
max_results query integer false Maximum number of kubernetes workloads to return
name query string false Name of kubernetes workload(s) to return. Supports partial matches
namespace query string false Namespace of kubernetes workload(s) to return. Supports partial matches
no_labels query string false List of label URIs to NOT include, encoded as a JSON string
security_policy_applied_at[gte] query string false Greater than or equal to value for security policy applied at timestamp
security_policy_applied_at[lte] query string false Less than or equal to value for security policy applied at timestamp
security_policy_sync_state query string false Search option based on policy sync state
visibility_level query string false Filter by visibility level

Enumerated Values

Parameter Value
enforcement_mode visibility_only
enforcement_mode full
enforcement_mode idle
enforcement_mode selective
security_policy_applied_at[gte] syncing
security_policy_applied_at[gte] applied
security_policy_applied_at[lte] syncing
security_policy_applied_at[lte] applied
security_policy_sync_state syncing
security_policy_sync_state applied
visibility_level flow_full_detail
visibility_level flow_summary
visibility_level flow_drops
visibility_level flow_off
visibility_level enhanced_data_collection

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "namespace": "string",
  "kind": "string",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "enforcement_mode": "idle",
  "visibility_level": "flow_summary",
  "container_workload_profile": {
    "href": "string",
    "name": null,
    "namespace": null,
    "description": "string",
    "assign_labels": [
      {
        "href": "string"
      }
    ],
    "labels": [
      {
        "key": "string",
        "assignment": {
          "href": "string",
          "value": "string"
        }
      }
    ],
    "enforcement_mode": "idle",
    "managed": true,
    "linked": true,
    "created_at": "2025-04-01T00:21:27Z",
    "created_by": {
      "href": "string"
    },
    "updated_by": {
      "href": "string"
    },
    "updated_at": "2025-04-01T00:21:27Z"
  },
  "container_cluster": {
    "href": "string",
    "name": "string",
    "description": "string",
    "nodes": [
      {
        "pod_subnet": "string"
      }
    ],
    "container_runtime": "string",
    "manager_type": "string",
    "last_connected": "2025-04-01T00:21:27Z",
    "online": true,
    "errors": [
      {
        "audit_event": {
          "href": "string"
        },
        "duplicate_ids": [],
        "error_type": "string"
      }
    ],
    "kubelink_version": "string",
    "pce_fqdn": "string",
    "cluster_mode": "legacy",
    "datacenter_nat_1to1": true
  },
  "security_policy_applied_at": null,
  "security_policy_sync_state": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "metadata": {
    "labels": {},
    "annotations": {},
    "external_service_uid": "string"
  },
  "private_ip_addresses": [
    "2001:0db8:85a3:0000:0000:8a2e:0370:7334"
  ],
  "container_cluster_service": {}
}

Responses

Status Meaning Description Schema
200 OK Success kubernetes_workloads_get

Get the info for one kubernetes workload

Example Code


curl -X GET /orgs/{org_id}/kubernetes_workloads/{kubernetes_workload_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/kubernetes_workloads/{kubernetes_workload_id}

Exposure: Public Experimental

Auditable: No

Get the info for one kubernetes workload

Parameters

Name In Type Required Description
org_id path integer true* Organization
kubernetes_workload_id path string true* KubernetesWorkload uuid

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "namespace": "string",
  "kind": "string",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "enforcement_mode": "idle",
  "visibility_level": "flow_summary",
  "container_workload_profile": {
    "href": "string",
    "name": null,
    "namespace": null,
    "description": "string",
    "assign_labels": [
      {
        "href": "string"
      }
    ],
    "labels": [
      {
        "key": "string",
        "assignment": {
          "href": "string",
          "value": "string"
        }
      }
    ],
    "enforcement_mode": "idle",
    "managed": true,
    "linked": true,
    "created_at": "2025-04-01T00:21:27Z",
    "created_by": {
      "href": "string"
    },
    "updated_by": {
      "href": "string"
    },
    "updated_at": "2025-04-01T00:21:27Z"
  },
  "container_cluster": {
    "href": "string",
    "name": "string",
    "description": "string",
    "nodes": [
      {
        "pod_subnet": "string"
      }
    ],
    "container_runtime": "string",
    "manager_type": "string",
    "last_connected": "2025-04-01T00:21:27Z",
    "online": true,
    "errors": [
      {
        "audit_event": {
          "href": "string"
        },
        "duplicate_ids": [],
        "error_type": "string"
      }
    ],
    "kubelink_version": "string",
    "pce_fqdn": "string",
    "cluster_mode": "legacy",
    "datacenter_nat_1to1": true
  },
  "security_policy_applied_at": null,
  "security_policy_sync_state": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "metadata": {
    "labels": {},
    "annotations": {},
    "external_service_uid": "string"
  },
  "private_ip_addresses": [
    "2001:0db8:85a3:0000:0000:8a2e:0370:7334"
  ],
  "container_cluster_service": {}
}

Responses

Status Meaning Description Schema
200 OK Success kubernetes_workloads_get

Labels

Return the set of labels used for categorization

Example Code


curl -X GET /orgs/{org_id}/labels \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/labels

Exposure: Public Stable

Auditable: No

Return the set of labels used for categorization.

Parameters

Name In Type Required Description
org_id path integer true* Organization
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
include_deleted query boolean false Include deleted labels
key query string false Key by which to filter
max_results query integer false Maximum number of Labels to return.
usage query boolean false Include label usage flags as well
value query string false Value on which to filter. Supports partial matches

Example Response Body

200 Response

{
  "href": "string",
  "deleted": true,
  "key": "string",
  "value": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success labels_get

Get a Label

Example Code


curl -X GET /orgs/{org_id}/labels/{label_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/labels/{label_id}

Exposure: Public Stable

Auditable: No

Get label by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
label_id path integer true* Label ID
usage query boolean false Include label usage flags as well

Example Response Body

200 Response

{
  "href": "string",
  "deleted": true,
  "key": "string",
  "value": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success labels_get

Create a label to categorize workloads

Example Code


curl -X POST /orgs/{org_id}/labels \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/labels

Auditable: Yes

Exposure: Public Stable

Create a label to categorize workloads.

Example Request Body

{
  "key": "string",
  "value": "string",
  "external_data_set": null,
  "external_data_reference": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body labels_post false none
» key body string true* Key in key-value pair
» value body string true* Value in key-value pair
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier

Responses

Status Meaning Description Schema
201 Created Success None

Update a Label

Example Code


curl -X PUT /orgs/{org_id}/labels/{label_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/labels/{label_id}

Auditable: Yes

Exposure: Public Stable

Modify a label by ID

Example Request Body

{
  "value": "string",
  "external_data_set": null,
  "external_data_reference": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
label_id path integer true* Label ID
body body labels_put false none
» value body string false Value in key-value pair
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Label

Example Code


curl -X DELETE /orgs/{org_id}/labels/{label_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/labels/{label_id}

Exposure: Public Stable

Auditable: Yes

Delete a label by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
label_id path integer true* Label ID

Responses

Status Meaning Description Schema
204 No Content Success None

Label Groups

Get Label Groups

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/label_groups \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups

Exposure: Public Stable

Auditable: No

Get the label groups

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
description query string false Description of Label Group(s) to return. Supports partial matches
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
key query string false Key by which to filter
max_results query integer false Maximum number of Labels to return.
name query string false Name of Label Group(s) to return. Supports partial matches
usage query boolean false Include label usage flags as well

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": null,
  "key": "string",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "sub_groups": [
    {
      "href": "string",
      "name": "string"
    }
  ],
  "usage": {
    "label_group": true,
    "ruleset": true,
    "rule": true,
    "static_policy_scopes": true,
    "containers_inherit_host_policy_scopes": true,
    "blocked_connection_reject_scopes": true,
    "enforcement_boundary": true,
    "loopback_interfaces_in_policy_scopes": true,
    "ip_forwarding_enabled_scopes": true,
    "rule_hit_count_enabled_scopes": true,
    "protection_schema": true
  },
  "external_data_set": null,
  "external_data_reference": null,
  "update_type": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_label_groups_get

Get a Label Group

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}

Exposure: Public Stable

Auditable: No

Get label group

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
label_group_id path string true* Label Group UUID
usage query boolean false Include label usage flags as well

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": null,
  "key": "string",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "sub_groups": [
    {
      "href": "string",
      "name": "string"
    }
  ],
  "usage": {
    "label_group": true,
    "ruleset": true,
    "rule": true,
    "static_policy_scopes": true,
    "containers_inherit_host_policy_scopes": true,
    "blocked_connection_reject_scopes": true,
    "enforcement_boundary": true,
    "loopback_interfaces_in_policy_scopes": true,
    "ip_forwarding_enabled_scopes": true,
    "rule_hit_count_enabled_scopes": true,
    "protection_schema": true
  },
  "external_data_set": null,
  "external_data_reference": null,
  "update_type": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_label_groups_get

Is Group Member of Other Groups?

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}/member_of \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}/member_of

Exposure: Public Experimental

Auditable: No

Get the parents of this label group

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
label_group_id path string true* Label Group UUID

Example Response Body

200 Response

[
  {
    "href": "string",
    "name": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success sec_policy_label_groups_member_of_get

Create a new Label Group

Example Code


curl -X POST /orgs/{org_id}/sec_policy/{pversion}/label_groups \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups

Auditable: Yes

Exposure: Public Stable

Create a new label group.

Example Request Body

{
  "name": "string",
  "description": null,
  "key": "string",
  "labels": [
    {
      "href": "string"
    }
  ],
  "sub_groups": [
    {
      "href": "string"
    }
  ],
  "external_data_set": null,
  "external_data_reference": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_label_groups_post false none
» name body string true* Name of the label group
» description body string,null false The long description of the label group
» key body string true* Key in key-value pair of contained labels or label groups
» labels body [sec_policy_virtual_servers_get/properties/created_by] false Contained labels
»» href body string true* none
» sub_groups body [sec_policy_virtual_servers_get/properties/created_by] false Contained label groups
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier

Responses

Status Meaning Description Schema
201 Created Success None

Update a Label Group

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}

Auditable: Yes

Exposure: Public Stable

Update the label group

Example Request Body

{
  "name": "string",
  "description": null,
  "labels": [
    {
      "href": "string"
    }
  ],
  "sub_groups": [
    {
      "href": "string"
    }
  ],
  "external_data_set": null,
  "external_data_reference": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
label_group_id path string true* Label Group UUID
body body sec_policy_label_groups_put false none
» name body string false Name of the label group
» description body string,null false The long description of the label group
» labels body [sec_policy_virtual_servers_get/properties/created_by] false Contained labels
»» href body string true* none
» sub_groups body [sec_policy_virtual_servers_get/properties/created_by] false Contained label groups
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Label Group

Example Code


curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}

Exposure: Public Stable

Auditable: Yes

Delete label group

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
label_group_id path string true* Label Group UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Get all labels in this label group

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}/all_labels \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/label_groups/{label_group_id}/all_labels

Exposure: Public Experimental

Auditable: No

Get all labels in this label group, including it's and sub-groups

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
label_group_id path string true* Label Group UUID

Example Response Body

200 Response

[
  {
    "href": "string",
    "key": "string",
    "value": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success labels_summary

Label Mapping Rules

Return the collection of label mapping rules

Example Code


curl -X GET /orgs/{org_id}/label_mapping_rules \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/label_mapping_rules

Exposure: Public Experimental

Auditable: No

Return the collection of label mapping rules

Parameters

Name In Type Required Description
org_id path integer true* Organization
max_results query integer false Maximum number of label mapping rules to return.

Example Response Body

200 Response

{
  "href": "string",
  "enabled": true,
  "expression": {
    "property": "hostname",
    "operator": "starts_with",
    "values": [
      "string"
    ]
  },
  "label_assignments": [
    {
      "label": {
        "key": "string",
        "value": "string"
      }
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": null,
  "updated_by": null
}

Responses

Status Meaning Description Schema
200 OK Success label_mapping_rules_get

Create a new label mapping rule

Example Code


curl -X POST /orgs/{org_id}/label_mapping_rules \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/label_mapping_rules

Auditable: Yes

Exposure: Public Experimental

Create a new label mapping rule

Example Request Body

{
  "expression": {
    "property": "hostname",
    "operator": "starts_with",
    "values": [
      "string"
    ]
  },
  "label_assignments": [
    {
      "label": {
        "key": "string",
        "value": "string"
      }
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body label_mapping_rules_post false none
» expression body label_mapping_rules_get/properties/expression true* none
»» anonymous body object false none
»»» property body string true* The workload property to compare. (hostname, ip_address etc.)
»»» operator body string true* operator for the condition (starts_with, contains, equals, ends_with, is_in)
»»» values body [anyOf] true* Value to use in comparison
»»»» anonymous body string false none
»»»» anonymous body object false none
»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't include this.
»»»»» proto body integer false protocol number
»»»» anonymous body object false none
»»»»» logical_operator body string true* logical operator for the child expressions
»»»»» child_expressions body [anyOf] true* none
»»»»»» anonymous body object false none
»»»»»»» property body string true* The workload property to compare. (hostname, ip_address etc.)
»»»»»»» operator body string true* operator for the condition (starts_with, contains, equals, ends_with, is_in)
»»»»»»» values body [anyOf] true* Value to use in comparison
»»»»»»»» anonymous body string false none
»»»»»»»» anonymous body object false none
»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't include this.
»»»»»»»»» proto body integer false protocol number
»»»»»»»» anonymous body object false none
»»»»»»»»» logical_operator body string true* logical operator for the child expressions
»»»»»»»»» child_expressions body [anyOf] true* none
»»»»»»»» label_assignments body [anyOf] true* List of label assignments for a rule
»»»»»»»»» anonymous body object false none
»»»»»»»»»» label body object true* none
»»»»»»»»»»» key body string false none
»»»»»»»»»»» value body string false none
»»»»»»»»»» anonymous body object false none
»»»»»»»»»»» label body object true* none
»»»»»»»»»»»» href body string false HREF of the pre-existing label

Enumerated Values

Parameter Value
»»» property hostname
»»» property ip_address
»»» property os
»»» property process
»»» property port
»»» operator starts_with
»»» operator ends_with
»»» operator contains
»»» operator equals
»»» operator is_in
»»»»» logical_operator and
»»»»» logical_operator or
»»»»» logical_operator not
»»»»»»» property hostname
»»»»»»» property ip_address
»»»»»»» property os
»»»»»»» property process
»»»»»»» property port
»»»»»»» operator starts_with
»»»»»»» operator ends_with
»»»»»»» operator contains
»»»»»»» operator equals
»»»»»»» operator is_in
»»»»»»»»» logical_operator and
»»»»»»»»» logical_operator or
»»»»»»»»» logical_operator not

Responses

Status Meaning Description Schema
201 Created Success None

Delete multiple label mapping rules

Example Code


curl -X PUT /orgs/{org_id}/label_mapping_rules/delete \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/label_mapping_rules/delete

Auditable: Yes

Exposure: Public Experimental

Delete multiple label mapping rules

Example Request Body

{
  "rules": [
    {
      "href": "string"
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body label_mapping_rules_delete_put false none
» rules body [object] true* Rules to delete
»» href body string true* URI of label mapping rule to delete

Responses

Status Meaning Description Schema
204 No Content Success None

Update multiple label mapping rules

Example Code


curl -X PUT /orgs/{org_id}/label_mapping_rules/update \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/label_mapping_rules/update

Auditable: Yes

Exposure: Public Experimental

Update multiple label mapping rules

Example Request Body

[
  {
    "href": "string",
    "enabled": true,
    "expression": {
      "property": "hostname",
      "operator": "starts_with",
      "values": [
        "string"
      ]
    },
    "label_assignments": [
      {
        "label": {
          "key": "string",
          "value": "string"
        }
      }
    ]
  }
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body label_mapping_rules_update_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Reorder a label mapping rule

Example Code


curl -X PUT /orgs/{org_id}/label_mapping_rules/{label_mapping_rule_id}/reorder \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/label_mapping_rules/{label_mapping_rule_id}/reorder

Auditable: Yes

Exposure: Public Experimental

Reorder a label mapping rule

Example Request Body

{
  "position": 0
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
label_mapping_rule_id path string true* Label Mapping Rule UUID
body body label_mapping_rules_reorder_put false none
» position body integer true* Index of the new position for this rule

Responses

Status Meaning Description Schema
204 No Content Success None

Get a label mapping rule

Example Code


curl -X GET /orgs/{org_id}/label_mapping_rules/{label_mapping_rule_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/label_mapping_rules/{label_mapping_rule_id}

Exposure: Public Experimental

Auditable: No

Get a label mapping rule

Parameters

Name In Type Required Description
org_id path integer true* Organization
label_mapping_rule_id path string true* Label Mapping Rule UUID

Example Response Body

200 Response

{
  "href": "string",
  "enabled": true,
  "expression": {
    "property": "hostname",
    "operator": "starts_with",
    "values": [
      "string"
    ]
  },
  "label_assignments": [
    {
      "label": {
        "key": "string",
        "value": "string"
      }
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": null,
  "updated_by": null
}

Responses

Status Meaning Description Schema
200 OK Success label_mapping_rules_get

Run rules on workloads

Example Code


curl -X POST /orgs/{org_id}/label_mapping_rules/run \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/label_mapping_rules/run

Auditable: Yes

Exposure: Public Experimental

Run rules on workloads

Example Request Body

{
  "workloads": [
    {
      "href": "string"
    }
  ],
  "rules": [
    {
      "href": "string"
    }
  ],
  "assign_labels": true
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body label_mapping_rules_run_post false none
» workloads body [sec_policy_virtual_servers_get/properties/created_by] false HREFs of the workloads to which the rules need to be applied
»» href body string true* none
» rules body [sec_policy_virtual_servers_get/properties/created_by] false HREFs of the label_mapping_rules which need to be applied
» assign_labels body boolean false Determines whether the labels should be assigned automatically as a part of the run

Responses

Status Meaning Description Schema
201 Created Success None

Modify a label mapping rule

Example Code


curl -X PUT /orgs/{org_id}/label_mapping_rules/{label_mapping_rule_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/label_mapping_rules/{label_mapping_rule_id}

Auditable: Yes

Exposure: Public Experimental

Modify a label mapping rule

Example Request Body

{
  "enabled": true,
  "expression": {
    "property": "hostname",
    "operator": "starts_with",
    "values": [
      "string"
    ]
  },
  "label_assignments": [
    {
      "label": {
        "key": "string",
        "value": "string"
      }
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
label_mapping_rule_id path string true* Label Mapping Rule UUID
body body label_mapping_rules_put false none
» enabled body boolean false Enabled flag
» expression body label_mapping_rules_get/properties/expression false none
»» anonymous body object false none
»»» property body string true* The workload property to compare. (hostname, ip_address etc.)
»»» operator body string true* operator for the condition (starts_with, contains, equals, ends_with, is_in)
»»» values body [anyOf] true* Value to use in comparison
»»»» anonymous body string false none
»»»» anonymous body object false none
»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't include this.
»»»»» proto body integer false protocol number
»»»» anonymous body object false none
»»»»» logical_operator body string true* logical operator for the child expressions
»»»»» child_expressions body [anyOf] true* none
»»»»»» anonymous body object false none
»»»»»»» property body string true* The workload property to compare. (hostname, ip_address etc.)
»»»»»»» operator body string true* operator for the condition (starts_with, contains, equals, ends_with, is_in)
»»»»»»» values body [anyOf] true* Value to use in comparison
»»»»»»»» anonymous body string false none
»»»»»»»» anonymous body object false none
»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't include this.
»»»»»»»»» proto body integer false protocol number
»»»»»»»» anonymous body object false none
»»»»»»»»» logical_operator body string true* logical operator for the child expressions
»»»»»»»»» child_expressions body [anyOf] true* none
»»»»»»»» label_assignments body [anyOf] false List of label assignments for a rule
»»»»»»»»» anonymous body object false none
»»»»»»»»»» label body object true* none
»»»»»»»»»»» key body string false none
»»»»»»»»»»» value body string false none
»»»»»»»»»» anonymous body object false none
»»»»»»»»»»» label body object true* none
»»»»»»»»»»»» href body string false HREF of the pre-existing label

Enumerated Values

Parameter Value
»»» property hostname
»»» property ip_address
»»» property os
»»» property process
»»» property port
»»» operator starts_with
»»» operator ends_with
»»» operator contains
»»» operator equals
»»» operator is_in
»»»»» logical_operator and
»»»»» logical_operator or
»»»»» logical_operator not
»»»»»»» property hostname
»»»»»»» property ip_address
»»»»»»» property os
»»»»»»» property process
»»»»»»» property port
»»»»»»» operator starts_with
»»»»»»» operator ends_with
»»»»»»» operator contains
»»»»»»» operator equals
»»»»»»» operator is_in
»»»»»»»»» logical_operator and
»»»»»»»»» logical_operator or
»»»»»»»»» logical_operator not

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a label mapping rule

Example Code


curl -X DELETE /orgs/{org_id}/label_mapping_rules/{label_mapping_rule_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/label_mapping_rules/{label_mapping_rule_id}

Exposure: Public Experimental

Auditable: Yes

Delete a label mapping rule

Parameters

Name In Type Required Description
org_id path integer true* Organization
label_mapping_rule_id path string true* Label Mapping Rule UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Get the status of the job

Example Code


curl -X GET /orgs/{org_id}/label_mapping_rules/run/{job_uuid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/label_mapping_rules/run/{job_uuid}

Exposure: Public Experimental

Auditable: No

Get the staus of the job

Parameters

Name In Type Required Description
org_id path integer true* Organization
job_uuid path string true* job UUID

Example Response Body

200 Response

{
  "href": "http://example.com",
  "result": "http://example.com",
  "status": "string",
  "progress_percent": 0,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "http://example.com"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "label_mapping_params": {
    "workloads": [
      {
        "href": "string"
      }
    ],
    "rules": [
      {
        "href": "string"
      }
    ],
    "assign_labels": true
  }
}

Responses

Status Meaning Description Schema
200 OK Success label_mapping_rules_run_get

Download the results

Example Code


curl -X GET /orgs/{org_id}/label_mapping_rules/run/{job_uuid}/download \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/label_mapping_rules/run/{job_uuid}/download

Exposure: Public Experimental

Auditable: No

Download the results

Parameters

Name In Type Required Description
org_id path integer true* Organization
job_uuid path string true* job UUID

Example Response Body

200 Response

{
  "results": [
    {
      "href": "string",
      "hostname": null,
      "existing_labels": [
        {
          "href": "string",
          "key": "string",
          "value": "string"
        }
      ],
      "labels_to_assign": [
        {
          "href": "string",
          "key": "string",
          "value": "string",
          "label_mapping_rule": {
            "href": "string"
          }
        }
      ]
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success label_mapping_rules_run_download_get

Assign labels from the previous run

Example Code


curl -X PUT /orgs/{org_id}/label_mapping_rules/run/{job_uuid}/assign_labels \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/label_mapping_rules/run/{job_uuid}/assign_labels

Auditable: Yes

Exposure: Public Experimental

Assign labels from the previous run

Example Request Body

null

Parameters

Name In Type Required Description
org_id path integer true* Organization
job_uuid path string true* job UUID
body body label_mapping_rules_run_assign_labels_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

LDAP Configs

Get all LDAP configurations

Example Code


curl -X GET /authentication_settings/ldap_configs \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/authentication_settings/ldap_configs

Exposure: Public Experimental

Auditable: No

Get all LDAP configurations

Example Response Body

200 Response

{
  "href": "string",
  "pce_fqdn": "string",
  "name": "string",
  "address": "string",
  "port": 0,
  "authentication_method": "string",
  "request_timeout_seconds": 1,
  "bind_distinguished_name": "string",
  "is_bind_password_set": true,
  "user_base_distinguished_name": "string",
  "user_distinguished_name_pattern": "string",
  "user_base_filter": "string",
  "username_attribute": "string",
  "full_name_attribute": "string",
  "user_memberof_attribute": "string",
  "tls_ca_bundle": "string",
  "insecure_disable_tls_certificate_verification": true,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "username": "string"
  },
  "updated_by": {
    "username": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success authentication_settings_ldap_configs_get

Create a LDAP configuration

Example Code


curl -X POST /authentication_settings/ldap_configs \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/authentication_settings/ldap_configs

Auditable: Yes

Exposure: Public Experimental

Create LDAP configuration

Example Request Body

{
  "pce_fqdn": "string",
  "name": null,
  "address": "string",
  "port": 0,
  "authentication_method": "LDAP",
  "request_timeout_seconds": 1,
  "bind_distinguished_name": null,
  "bind_password": null,
  "user_base_distinguished_name": "string",
  "user_distinguished_name_pattern": null,
  "user_base_filter": null,
  "username_attribute": "string",
  "full_name_attribute": null,
  "user_memberof_attribute": null,
  "tls_ca_bundle": null,
  "insecure_disable_tls_certificate_verification": true
}

Parameters

Name In Type Required Description
body body authentication_settings_ldap_configs_post false none
» pce_fqdn body string false The FQDN of the PCE cluster
» name body string,null false Friendly name of the LDAP server
» address body string true* IP address or host name of the LDAP server
» port body integer true* Port number of the LDAP server
» authentication_method body string true* Authentication types
» request_timeout_seconds body integer false Number of seconds to wait for response
» bind_distinguished_name body string,null false Distinguished name (DN) used to bind to the LDAP server
» bind_password body string,null false Bind DN password
» user_base_distinguished_name body string true* Base distinguished name to be used for login
» user_distinguished_name_pattern body string,null false Pattern used to create a DN string for a user during login, e.g. uid=*,ou=people, where * will be replaced with the username
» user_base_filter body string,null false Search filter used to query the LDAP tree for users
» username_attribute body string true* Attribute on a user object which contains the username, e.g. uid, sAMAccountName
» full_name_attribute body string,null false Attribute on a user object which contains the full name, e.g. cn, commonName, displayName
» user_memberof_attribute body string,null false Attribute on a user object containing group membership information, e.g. memberOf, isMemberOf
» tls_ca_bundle body string,null false Trustee CA bundle
» insecure_disable_tls_certificate_verification body boolean false Specifies whether to verify the server certificate when establishing an SSL connection to the LDAP server. WARNING: The use of this feature decreases the security of the system, and should only be used with full understanding of the ramifications.

Enumerated Values

Parameter Value
» authentication_method LDAP
» authentication_method LDAPS
» authentication_method STARTTLS

Responses

Status Meaning Description Schema
201 Created Success None

Get the specified LDAP configuration

Example Code


curl -X GET /authentication_settings/ldap_configs/{uuid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/authentication_settings/ldap_configs/{uuid}

Exposure: Public Experimental

Auditable: No

Get LDAP configuration

Parameters

Name In Type Required Description
uuid path string true* LDAPConfig UUID

Example Response Body

200 Response

{
  "href": "string",
  "pce_fqdn": "string",
  "name": "string",
  "address": "string",
  "port": 0,
  "authentication_method": "string",
  "request_timeout_seconds": 1,
  "bind_distinguished_name": "string",
  "is_bind_password_set": true,
  "user_base_distinguished_name": "string",
  "user_distinguished_name_pattern": "string",
  "user_base_filter": "string",
  "username_attribute": "string",
  "full_name_attribute": "string",
  "user_memberof_attribute": "string",
  "tls_ca_bundle": "string",
  "insecure_disable_tls_certificate_verification": true,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "username": "string"
  },
  "updated_by": {
    "username": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success authentication_settings_ldap_configs_get

Delete the specified LDAP configuration

Example Code


curl -X DELETE /authentication_settings/ldap_configs/{uuid}
  \ -u $KEY:$TOKEN

DELETE /api/v2/authentication_settings/ldap_configs/{uuid}

Exposure: Public Experimental

Auditable: Yes

Delete LDAP configuration

Parameters

Name In Type Required Description
uuid path string true* LDAPConfig UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Update the specified LDAP configuration

Example Code


curl -X PUT /authentication_settings/ldap_configs/{uuid} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/authentication_settings/ldap_configs/{uuid}

Auditable: Yes

Exposure: Public Experimental

Update LDAP configuration

Example Request Body

{
  "name": null,
  "address": "string",
  "port": 0,
  "authentication_method": "LDAP",
  "request_timeout_seconds": 1,
  "bind_distinguished_name": null,
  "bind_password": null,
  "user_base_distinguished_name": "string",
  "user_distinguished_name_pattern": null,
  "user_base_filter": null,
  "username_attribute": "string",
  "full_name_attribute": null,
  "user_memberof_attribute": null,
  "tls_ca_bundle": null,
  "insecure_disable_tls_certificate_verification": true
}

Parameters

Name In Type Required Description
uuid path string true* LDAPConfig UUID
body body authentication_settings_ldap_configs_put false none
» name body string,null false Friendly name of the LDAP server
» address body string false IP address or host name of the LDAP server
» port body integer false Port number of the LDAP server
» authentication_method body string false Authentication types
» request_timeout_seconds body integer false Number of seconds to wait for response
» bind_distinguished_name body string,null false Distinguished name (DN) used to bind to the LDAP server
» bind_password body string,null false Bind DN password
» user_base_distinguished_name body string false Base distinguished name to be used for login
» user_distinguished_name_pattern body string,null false Pattern used to create a DN string for a user during login, e.g. uid=*,ou=people, where * will be replaced with the username
» user_base_filter body string,null false Search filter used to query the LDAP tree for users
» username_attribute body string false Attribute on a user object which contains the username, e.g. uid, sAMAccountName
» full_name_attribute body string,null false Attribute on a user object which contains the full name, e.g. cn, commonName, displayName
» user_memberof_attribute body string,null false Attribute on a user object containing group membership information, e.g. memberOf, isMemberOf
» tls_ca_bundle body string,null false Trustee CA bundle
» insecure_disable_tls_certificate_verification body boolean false Specifies whether to verify the server certificate when establishing an SSL connection to the LDAP server. WARNING: The use of this feature decreases the security of the system, and should only be used with full understanding of the ramifications.

Enumerated Values

Parameter Value
» authentication_method LDAP
» authentication_method LDAPS
» authentication_method STARTTLS

Responses

Status Meaning Description Schema
204 No Content Success None

Verify the specified LDAP server connection

Example Code


curl -X POST /authentication_settings/ldap_configs/{uuid}/verify_connection \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/authentication_settings/ldap_configs/{uuid}/verify_connection

Auditable: Yes

Exposure: Public Experimental

Verify LDAP server connection

Example Request Body

{}

Parameters

Name In Type Required Description
uuid path string true* LDAPConfig UUID
body body authentication_settings_ldap_configs_verify_connection_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Login Users

Create a User Auth Token

Example Code


curl -X POST /login_users/authenticate?pce_fqdn=string \
  -u [email protected]:'password' -H 'Content-Type: application/json'

POST /api/v2/login_users/authenticate

Auditable: Yes

Exposure: Public Stable

Sign in a local user and return auth_token for specified PCE

Example Request Body

{
  "one_time_password": "string"
}

Parameters

Name In Type Required Description
one_time_password query string false The time-based one-time password for two-factor authentication.
pce_fqdn query string true* Fully qualified name of PCE
body body login_users_authenticate_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Update User Password

Example Code


curl -X PUT /login_users/{user_uuid}/password \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/login_users/{user_uuid}/password

Auditable: Yes

Exposure: Public Stable

Change password for a local user

Example Request Body

{
  "password": "string"
}

Parameters

Name In Type Required Description
user_uuid path string true* User UUID; use 'me' for the currently authenticated user
one_time_password query string false The time-based one-time password for two-factor authentication.
body body login_users_password_put false none
» password body string true* New password

Responses

Status Meaning Description Schema
204 No Content Success None

Manage api-key settings for an organization

View api-key settings for an organization

Example Code


curl -X GET /orgs/{org_id}/settings \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/settings

Exposure: Public Experimental

Auditable: No

Get settings for this org

Parameters

Name In Type Required Description
org_id path integer true* Org ID

Example Response Body

200 Response

{
  "href": "http://example.com",
  "num_assets_requiring_ransomware_protection": null,
  "automatic_label_application_on_ven_activation": true,
  "rule_based_label_maker_schedule_enabled": true,
  "rule_based_label_maker_schedule": null,
  "max_explorer_query_timespan_days": 97,
  "max_api_key_expiration_in_seconds": 7776000,
  "expired_api_keys_retention_in_seconds": 7776000,
  "advanced_ruleset_display": true,
  "ven_maintenance_token_required": false,
  "cloud_secure_tenant_id": "string",
  "use_census_permissions": true
}

Responses

Status Meaning Description Schema
200 OK Success settings_get

Update api-key settings for an organization

Example Code


curl -X PUT /orgs/{org_id}/settings \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/settings

Auditable: Yes

Exposure: Public Experimental

Update settings for this org

Example Request Body

{
  "num_assets_requiring_ransomware_protection": 1,
  "automatic_label_application_on_ven_activation": true,
  "rule_based_label_maker_schedule_enabled": true,
  "rule_based_label_maker_schedule": null,
  "max_api_key_expiration_in_seconds": 7776000,
  "expired_api_keys_retention_in_seconds": 7776000,
  "advanced_ruleset_display": true,
  "ven_maintenance_token_required": false,
  "cloud_secure_tenant_id": "string",
  "use_census_permissions": true
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
body body settings_put false none
» num_assets_requiring_ransomware_protection body integer false number of assets that need ransomware protection for this org
» automatic_label_application_on_ven_activation body boolean false Automatically apply labels rules when VEN is activated
» rule_based_label_maker_schedule_enabled body boolean false True or false based on whether the rule based label maker schedule is enabled.
» rule_based_label_maker_schedule body settings_get/properties/rule_based_label_maker_schedule false Schedule used for application of label rules
»» schedule_time body string(date-time) false The time at which the label rules should be run
»» frequency body string false The frequency at which the schedule is to be executed
»» day_of_week body [string] false Applies only in case of weekly schedule and indicates the days on which the schedule will be run.
»» day_of_month body integer false Applies only in case of monthly schedule and indicates the day on which the schedule will be run.
» max_api_key_expiration_in_seconds body integer false Validity of api_key in seconds; -1 specifies api_keys never expire
» expired_api_keys_retention_in_seconds body integer false Retention of expired api_keys in the database
» advanced_ruleset_display body boolean false When true, the UI will display rulesets in advanced mode. This means that scopes will be displayed for any unscoped rulesets, including newly added rulesets.
» ven_maintenance_token_required body boolean false Identifies if the tampering protection for the VEN and endpoints is enabled or not.
» cloud_secure_tenant_id body string false Cloud Secure tenant id corresponding to this organization
» use_census_permissions body boolean false Flag to indicate whether the PCE org will obtain permissions from census or from local database

Enumerated Values

Parameter Value
»» frequency daily
»» frequency weekly
»» frequency monthly
»» day_of_week sunday
»» day_of_week monday
»» day_of_week tuesday
»» day_of_week wednesday
»» day_of_week thursday
»» day_of_week friday
»» day_of_week saturday

Responses

Status Meaning Description Schema
204 No Content Success None

Network Devices

Get Network Device List

Example Code


curl -X GET /orgs/{org_id}/network_devices \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/network_devices

Exposure: Public Stable

Auditable: No

get network device list

Parameters

Name In Type Required Description
org_id path integer true* Organization
device_type query string false Type of supported device
manufacturer query string false Device manufacturer
model query string false Device model
name query string false device name

Example Response Body

200 Response

[
  {
    "href": "string",
    "config": {
      "name": "string",
      "description": "string",
      "device_type": "string",
      "manufacturer": "string",
      "model": "string",
      "ip_address": "string",
      "credentials": {
        "type": "cli",
        "port": 0,
        "username": "string",
        "password": "string"
      }
    },
    "configure": true,
    "enforcement_instructions_generation_in_progress": true,
    "enforcement_instructions_data_href": "string",
    "enforcement_instructions_data_timestamp": "2025-04-01T00:21:26Z",
    "enforcement_instructions_ack_href": "string",
    "enforcement_instructions_ack_timestamp": "2025-04-01T00:21:26Z",
    "supported_endpoint_type": "string",
    "endpoints": [
      {
        "href": "string"
      }
    ],
    "network_enforcement_node": {
      "href": "string"
    },
    "status": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success network_devices_get

Get a Device

Example Code


curl -X GET /orgs/{org_id}/network_devices/{nd_uuid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/network_devices/{nd_uuid}

Exposure: Public Stable

Auditable: No

get a device

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource

Example Response Body

200 Response

[
  {
    "href": "string",
    "config": {
      "name": "string",
      "description": "string",
      "device_type": "string",
      "manufacturer": "string",
      "model": "string",
      "ip_address": "string",
      "credentials": {
        "type": "cli",
        "port": 0,
        "username": "string",
        "password": "string"
      }
    },
    "configure": true,
    "enforcement_instructions_generation_in_progress": true,
    "enforcement_instructions_data_href": "string",
    "enforcement_instructions_data_timestamp": "2025-04-01T00:21:26Z",
    "enforcement_instructions_ack_href": "string",
    "enforcement_instructions_ack_timestamp": "2025-04-01T00:21:26Z",
    "supported_endpoint_type": "string",
    "endpoints": [
      {
        "href": "string"
      }
    ],
    "network_enforcement_node": {
      "href": "string"
    },
    "status": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success network_devices_get

Add a Device

Example Code


curl -X POST /orgs/{org_id}/network_enforcement_nodes/{uuid}/network_devices \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/network_enforcement_nodes/{uuid}/network_devices

Auditable: Yes

Exposure: Public Stable

add a network device

Example Request Body

{
  "name": "string",
  "description": "string",
  "device_type": "string",
  "manufacturer": "string",
  "model": "string",
  "ip_address": "string",
  "credentials": {
    "type": "cli",
    "port": 0,
    "username": "string",
    "password": "string"
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* Network enforcement node uuid
body body network_enforcement_nodes_network_devices_post false none
» name body string false The name of the device
» description body string false Description of the device
» device_type body string false Type of device
» manufacturer body string false The manufacturer of the device
» model body string false The model of the device
» ip_address body string false The IP address of the device
» credentials body object false none
»» type body string false The type of credential used to access the device
»» port body integer false The device port, if non-standard for credential type
»» username body string false The username used to access the device
»» password body string false The password used to access the device

Enumerated Values

Parameter Value
»» type cli
»» type api

Responses

Status Meaning Description Schema
201 Created Success None

Delete a Device

Example Code


curl -X DELETE /orgs/{org_id}/network_devices/{nd_uuid}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/network_devices/{nd_uuid}

Exposure: Public Stable

Auditable: Yes

delete a device

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource

Responses

Status Meaning Description Schema
204 No Content Success None

Update a Device

Example Code


curl -X PUT /orgs/{org_id}/network_devices/{nd_uuid} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/network_devices/{nd_uuid}

Auditable: Yes

Exposure: Public Stable

update a device

Example Request Body

{
  "name": "string",
  "description": "string",
  "device_type": "string",
  "manufacturer": "string",
  "model": "string",
  "ip_address": "string",
  "credentials": {
    "type": "cli",
    "port": 0,
    "username": "string",
    "password": "string"
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource
body body network_enforcement_nodes_network_devices_post false none
» name body string false The name of the device
» description body string false Description of the device
» device_type body string false Type of device
» manufacturer body string false The manufacturer of the device
» model body string false The model of the device
» ip_address body string false The IP address of the device
» credentials body object false none
»» type body string false The type of credential used to access the device
»» port body integer false The device port, if non-standard for credential type
»» username body string false The username used to access the device
»» password body string false The password used to access the device

Enumerated Values

Parameter Value
»» type cli
»» type api

Responses

Status Meaning Description Schema
204 No Content Success None

Acknowledge Enforcement Instructions Applied for Multiple Network Devices

Example Code


curl -X POST /orgs/{org_id}/network_devices/multi_enforcement_instructions_applied \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/network_devices/multi_enforcement_instructions_applied

Auditable: Yes

Exposure: Public Stable

acknowledge enforcement instructions applied for multiple network devices

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body network_devices_multi_enforcement_instructions_applied_post false none
» all_devices body boolean false Flag to indicate that enforcement instructions are required for all network devices
» network_devices body [object] false none
»» href body string false href of network device
» anonymous body object false none
» anonymous body object false none

Enumerated Values

Parameter Value
» all_devices true*

Responses

Status Meaning Description Schema
201 Created Success None

Generate Enforcement Instructions for Multiple Network Devices

Example Code


curl -X POST /orgs/{org_id}/network_devices/multi_enforcement_instructions_request \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/network_devices/multi_enforcement_instructions_request

Auditable: No

Exposure: Public Stable

generate enforcement instructions for multiple network devices

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body network_devices_multi_enforcement_instructions_request_post false none
» all_devices body boolean false Flag to indicate that enforcement instructions are required for all network devices
» network_devices body [object] false none
»» href body string false href of network device
» anonymous body object false none
» anonymous body object false none

Enumerated Values

Parameter Value
» all_devices true*

Responses

Status Meaning Description Schema
201 Created Success None

Acknowledge Enforcement Instructions Applied

Example Code


curl -X POST /orgs/{org_id}/network_devices/{nd_uuid}/enforcement_instructions_applied \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/network_devices/{nd_uuid}/enforcement_instructions_applied

Auditable: Yes

Exposure: Public Stable

acknowledge enforcement instructions applied

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource
body body network_devices_enforcement_instructions_applied_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Request Enforcement Instructions

Example Code


curl -X POST /orgs/{org_id}/network_devices/{nd_uuid}/enforcement_instructions_request \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/network_devices/{nd_uuid}/enforcement_instructions_request

Auditable: No

Exposure: Public Stable

request enforcement instructions

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource
body body network_devices_enforcement_instructions_request_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Get network endpoints for a network device

Example Code


curl -X GET /orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints

Exposure: Public Stable

Auditable: No

Get network endpoints for a network device.

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource

Example Response Body

200 Response

[
  {
    "href": "string",
    "config": {
      "endpoint_type": "string",
      "name": "string",
      "traffic_flow_id": "string",
      "workload_discovery": true
    },
    "workload_discovery": true,
    "network_device": {
      "href": "string"
    },
    "workloads": [
      {
        "href": "string"
      }
    ],
    "status": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success network_devices_network_endpoints_get

Add a network endpoint to a specific network device

Example Code


curl -X POST /orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints

Auditable: Yes

Exposure: Public Stable

Add a network endpoint to a specific network device.

Example Request Body

{
  "config": {
    "endpoint_type": "string",
    "name": "string",
    "traffic_flow_id": "string",
    "workload_discovery": true
  },
  "workloads": [
    {
      "href": "string"
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource
body body network_devices_network_endpoints_post false none
» config body network_devices_network_endpoints_post/properties/config true* none
»» endpoint_type body string false The type of endpoint
»» name body string false The name of the endpoint e.g. interface name
»» traffic_flow_id body string false A traffic flow identifier for this endpoint e.g. switch port IfIndex
»» workload_discovery body boolean false Flag to indicate if workload discovery is enabled
» workloads body [object] false List of managed workloads
»» href body string true* URI of workload

Responses

Status Meaning Description Schema
201 Created Success None

Get a Network Endpoint

Example Code


curl -X GET /orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints/{ep_uuid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints/{ep_uuid}

Exposure: Public Stable

Auditable: No

get a network_endpoint

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource
ep_uuid path string true* uuid of network_endpoint resource

Example Response Body

200 Response

[
  {
    "href": "string",
    "config": {
      "endpoint_type": "string",
      "name": "string",
      "traffic_flow_id": "string",
      "workload_discovery": true
    },
    "workload_discovery": true,
    "network_device": {
      "href": "string"
    },
    "workloads": [
      {
        "href": "string"
      }
    ],
    "status": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success network_devices_network_endpoints_get

Delete a Network Endpoint

Example Code


curl -X DELETE /orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints/{ep_uuid}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints/{ep_uuid}

Exposure: Public Stable

Auditable: Yes

delete a network_endpoint

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource
ep_uuid path string true* uuid of network_endpoint resource

Responses

Status Meaning Description Schema
204 No Content Success None

Update a Network Endpoint

Example Code


curl -X PUT /orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints/{ep_uuid} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/network_devices/{nd_uuid}/network_endpoints/{ep_uuid}

Auditable: Yes

Exposure: Public Stable

update a network_endpoint

Example Request Body

{
  "config": {
    "endpoint_type": "string",
    "name": "string",
    "traffic_flow_id": "string",
    "workload_discovery": true
  },
  "workloads": [
    {
      "href": "string"
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
nd_uuid path string true* uuid of device resource
ep_uuid path string true* uuid of network_endpoint resource
body body network_devices_network_endpoints_put false none
» config body network_devices_network_endpoints_post/properties/config false none
»» endpoint_type body string false The type of endpoint
»» name body string false The name of the endpoint e.g. interface name
»» traffic_flow_id body string false A traffic flow identifier for this endpoint e.g. switch port IfIndex
»» workload_discovery body boolean false Flag to indicate if workload discovery is enabled
» workloads body [object] false List of managed workloads
»» href body string true* URI of workload

Responses

Status Meaning Description Schema
204 No Content Success None

Network Enforcement Nodes

Get list of network enforcement nodes

Example Code


curl -X GET /orgs/{org_id}/network_enforcement_nodes \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/network_enforcement_nodes

Exposure: Public Stable

Auditable: No

Get list of network enforcement nodes

Parameters

Name In Type Required Description
org_id path integer true* Organization
condition query string false A specific error condition to filter by
device_type query string false Type of supported device
health query string false The overall health (condition) of the Network Enforcement Node
manufacturer query string false Device manufacturer
model query string false Device model

Enumerated Values

Parameter Value
condition network_enforcement_node.missed_heartbeats
condition network_enforcement_node.degraded
health healthy
health unhealthy
health error
health warning

Example Response Body

200 Response

[
  {
    "uuid": "string",
    "org_id": 0,
    "hostname": "string",
    "name": "string",
    "public_ip": "string",
    "software_version": "string",
    "last_status_at": null,
    "uptime_seconds": null,
    "network_devices": [],
    "supported_devices": [
      {
        "device_type": "string",
        "manufacturers": [
          {
            "manufacturer": "string",
            "models": [
              {
                "model": "string",
                "endpoint_type": "string"
              }
            ]
          }
        ]
      }
    ],
    "conditions": [
      {
        "first_reported_timestamp": "2025-04-01T00:21:26Z",
        "latest_event": {
          "notification_type": "string",
          "severity": "err",
          "href": "string",
          "info": {},
          "timestamp": "2025-04-01T00:21:26Z"
        }
      }
    ],
    "target_pce_fqdn": null,
    "active_pce_fqdn": null
  }
]

Responses

Status Meaning Description Schema
200 OK Success network_enforcement_nodes_get

Get a network enforcement node

Example Code


curl -X GET /orgs/{org_id}/network_enforcement_nodes/{uuid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/network_enforcement_nodes/{uuid}

Exposure: Public Stable

Auditable: No

get a network enforcement node

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* Network enforcement node uuid

Example Response Body

200 Response

[
  {
    "uuid": "string",
    "org_id": 0,
    "hostname": "string",
    "name": "string",
    "public_ip": "string",
    "software_version": "string",
    "last_status_at": null,
    "uptime_seconds": null,
    "network_devices": [],
    "supported_devices": [
      {
        "device_type": "string",
        "manufacturers": [
          {
            "manufacturer": "string",
            "models": [
              {
                "model": "string",
                "endpoint_type": "string"
              }
            ]
          }
        ]
      }
    ],
    "conditions": [
      {
        "first_reported_timestamp": "2025-04-01T00:21:26Z",
        "latest_event": {
          "notification_type": "string",
          "severity": "err",
          "href": "string",
          "info": {},
          "timestamp": "2025-04-01T00:21:26Z"
        }
      }
    ],
    "target_pce_fqdn": null,
    "active_pce_fqdn": null
  }
]

Responses

Status Meaning Description Schema
200 OK Success network_enforcement_nodes_get

Update the target PCE of the Network Enforcement Node

Example Code


curl -X PUT /orgs/{org_id}/network_enforcement_nodes/{uuid} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/network_enforcement_nodes/{uuid}

Auditable: Yes

Exposure: Public Stable

Update the target PCE of the Network Enforcement Node

Example Request Body

{
  "target_pce_fqdn": "string"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* Network enforcement node uuid
body body network_enforcement_nodes_put false none
» target_pce_fqdn body string false cluster FQDN for target PCE

Responses

Status Meaning Description Schema
204 No Content Success None

Optional Features

Get the optional features collection

Example Code


curl -X GET /orgs/{org_id}/optional_features \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/optional_features

Exposure: Public Experimental

Auditable: No

Get the optional features collection

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

[
  {
    "name": "string",
    "preview": true,
    "enabled": true
  }
]

Responses

Status Meaning Description Schema
200 OK Success optional_features_get

Set the optional features for an org

Example Code


curl -X PUT /orgs/{org_id}/optional_features \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/optional_features

Auditable: Yes

Exposure: Public Experimental

Set the optional features for an org

Example Request Body

[
  {
    "name": "ip_forwarding_firewall_setting",
    "enabled": true
  }
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body optional_features_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Organization Settings

Get Events Settings

Example Code


curl -X GET /orgs/{org_id}/settings/events \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/settings/events

Exposure: Public Stable

Auditable: No

Get org-settings

Parameters

Name In Type Required Description
org_id path integer true* Org ID

Example Response Body

200 Response

{
  "audit_event_retention_seconds": 0,
  "audit_event_min_severity": "error",
  "format": "string"
}

Responses

Status Meaning Description Schema
200 OK Success settings_events_get

Update Events Settings

Example Code


curl -X PUT /orgs/{org_id}/settings/events \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/settings/events

Auditable: Yes

Exposure: Public Stable

Create or Update org-settings

Example Request Body

{
  "audit_event_retention_seconds": 86400,
  "audit_event_min_severity": "error",
  "format": "JSON"
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
body body settings_events_put false none
» audit_event_retention_seconds body integer false The time in seconds an audit event is stored in the database
» audit_event_min_severity body settings_syslog_destinations_post/properties/audit_event_logger/properties/min_severity false Minimum severity level of audit event messages.
» format body string false The log format (JSON, CEF, LEEF), which applies to all syslog destinations

Enumerated Values

Parameter Value
» audit_event_min_severity error
» audit_event_min_severity warning
» audit_event_min_severity informational
» format JSON
» format CEF
» format LEEF

Responses

Status Meaning Description Schema
204 No Content Success None

Pairing Profiles

Get Pairing Profiles

Example Code


curl -X GET /orgs/{org_id}/pairing_profiles \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/pairing_profiles

Exposure: Public Stable

Auditable: No

Return the set of pairing profiles

Parameters

Name In Type Required Description
org_id path integer true* Organization
agent_software_release query string false The agent software release for pairing profiles
description query string false Description of Pairing Profile(s) to return. Supports partial matches
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
labels query string false List of lists of label URIs, encoded as a JSON string
max_results query integer false Maximum number of Pairing Profiles to return.
name query string false Name of Pairing Profile(s) to return. Supports partial matches
ven_type query string false Specifies the pairing profile by the VEN type: server, endpoint, or specified_during_activation

Enumerated Values

Parameter Value
ven_type specified_during_activation
ven_type server
ven_type endpoint

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": "string",
  "mode": "idle",
  "enforcement_mode": "idle",
  "status": "string",
  "enabled": true,
  "total_use_count": 0,
  "allowed_uses_per_key": 1,
  "key_lifespan": 1,
  "last_pairing_at": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "last_pairing_key_generated_at": null,
  "last_pairing_key_generated_by": null,
  "is_default": true,
  "labels": [
    {
      "href": "string"
    }
  ],
  "env_label_lock": true,
  "loc_label_lock": true,
  "role_label_lock": true,
  "app_label_lock": true,
  "mode_lock": true,
  "enforcement_mode_lock": true,
  "log_traffic": true,
  "log_traffic_lock": true,
  "visibility_level": "flow_summary",
  "visibility_level_lock": true,
  "status_lock": true,
  "external_data_set": null,
  "external_data_reference": null,
  "agent_software_release": null,
  "ven_type": "specified_during_activation"
}

Responses

Status Meaning Description Schema
200 OK Success pairing_profiles_get

Get a Pairing Profile

Example Code


curl -X GET /orgs/{org_id}/pairing_profiles/{pairing_profile_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/pairing_profiles/{pairing_profile_id}

Exposure: Public Stable

Auditable: No

Get pairing profile by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
pairing_profile_id path integer true* Pairing Profile ID

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": "string",
  "mode": "idle",
  "enforcement_mode": "idle",
  "status": "string",
  "enabled": true,
  "total_use_count": 0,
  "allowed_uses_per_key": 1,
  "key_lifespan": 1,
  "last_pairing_at": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "last_pairing_key_generated_at": null,
  "last_pairing_key_generated_by": null,
  "is_default": true,
  "labels": [
    {
      "href": "string"
    }
  ],
  "env_label_lock": true,
  "loc_label_lock": true,
  "role_label_lock": true,
  "app_label_lock": true,
  "mode_lock": true,
  "enforcement_mode_lock": true,
  "log_traffic": true,
  "log_traffic_lock": true,
  "visibility_level": "flow_summary",
  "visibility_level_lock": true,
  "status_lock": true,
  "external_data_set": null,
  "external_data_reference": null,
  "agent_software_release": null,
  "ven_type": "specified_during_activation"
}

Responses

Status Meaning Description Schema
200 OK Success pairing_profiles_get

Create a Workload Pairing Profile

Example Code


curl -X POST /orgs/{org_id}/pairing_profiles \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/pairing_profiles

Auditable: Yes

Exposure: Public Stable

Create a workload pairing profile.

Example Request Body

{
  "name": "string",
  "description": "string",
  "mode": "idle",
  "mode_lock": true,
  "enforcement_mode": "idle",
  "enforcement_mode_lock": true,
  "enabled": true,
  "allowed_uses_per_key": 1,
  "key_lifespan": 1,
  "labels": [
    {
      "href": "string"
    }
  ],
  "env_label_lock": true,
  "loc_label_lock": true,
  "role_label_lock": true,
  "app_label_lock": true,
  "log_traffic": true,
  "log_traffic_lock": true,
  "visibility_level": "flow_full_detail",
  "visibility_level_lock": true,
  "external_data_set": null,
  "external_data_reference": null,
  "agent_software_release": null,
  "ven_type": "specified_during_activation"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body pairing_profiles_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Create a Pairing Key

Example Code


curl -X POST /orgs/{org_id}/pairing_profiles/{pairing_profile_id}/pairing_key \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/pairing_profiles/{pairing_profile_id}/pairing_key

Auditable: Yes

Exposure: Public Stable

Generate a pairing key for a pairing profile by ID

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pairing_profile_id path integer true* Pairing Profile ID
body body pairing_profiles_pairing_key_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Update a Pairing Profile

Example Code


curl -X PUT /orgs/{org_id}/pairing_profiles/{pairing_profile_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/pairing_profiles/{pairing_profile_id}

Auditable: Yes

Exposure: Public Stable

Modify a pairing profile by ID

Example Request Body

{
  "name": "string",
  "description": "string",
  "mode": "idle",
  "mode_lock": true,
  "enforcement_mode": "idle",
  "enforcement_mode_lock": true,
  "enabled": true,
  "allowed_uses_per_key": 1,
  "key_lifespan": 1,
  "labels": [
    {
      "href": "string"
    }
  ],
  "env_label_lock": true,
  "loc_label_lock": true,
  "role_label_lock": true,
  "app_label_lock": true,
  "log_traffic": true,
  "log_traffic_lock": true,
  "visibility_level": "flow_full_detail",
  "visibility_level_lock": true,
  "external_data_set": null,
  "external_data_reference": null,
  "agent_software_release": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pairing_profile_id path integer true* Pairing Profile ID
body body pairing_profiles_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Pairing Profile

Example Code


curl -X DELETE /orgs/{org_id}/pairing_profiles/{pairing_profile_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/pairing_profiles/{pairing_profile_id}

Exposure: Public Stable

Auditable: Yes

Delete a pairing profile by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
pairing_profile_id path integer true* Pairing Profile ID

Responses

Status Meaning Description Schema
204 No Content Success None

Permissions

Get All Permissions

Example Code


curl -X GET /orgs/{org_id}/permissions \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/permissions

Exposure: Public Stable

Auditable: No

Get all permissions for this org

Parameters

Name In Type Required Description
org_id path integer true* Org ID
auth_security_principal query string false Auth_security_principal URI (JSON-encoded string) to filter on
role query string false Role URI (JSON-encoded string) to filter on
scope query string false Scope to filter on, where scope is in the format defined in org_scope.schema.json

Example Response Body

200 Response

[
  {
    "role": {
      "href": "string"
    },
    "scope": [
      {
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ],
    "auth_security_principal": {
      "href": "string"
    },
    "href": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success orgs_permissions_get

Get a Permission

Example Code


curl -X GET /orgs/{org_id}/permissions/{permission_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/permissions/{permission_id}

Exposure: Public Stable

Auditable: No

Get details of this permission in this org

Parameters

Name In Type Required Description
org_id path integer true* Org ID
permission_id path string true* UUID of the permission

Example Response Body

200 Response

[
  {
    "role": {
      "href": "string"
    },
    "scope": [
      {
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ],
    "auth_security_principal": {
      "href": "string"
    },
    "href": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success orgs_permissions_get

Create a Permission

Example Code


curl -X POST /orgs/{org_id}/permissions \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/permissions

Auditable: Yes

Exposure: Public Stable

Create a permission in this org

Example Request Body

{
  "role": {
    "href": "string"
  },
  "scope": [
    {
      "label": {
        "href": "string",
        "key": "string",
        "value": "string"
      },
      "label_group": {
        "href": "string",
        "key": "string",
        "name": "string"
      }
    }
  ],
  "auth_security_principal": {
    "href": "string"
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
body body orgs_permissions_post false none
» role body orgs_permissions_put/properties/role true* none
»» href body string true* URI of Role
» scope body [object] true* none
»» label body object false none
»»» href body string true* Label URI
»»» key body string false Label type
»»» value body string false Label name
»» label_group body object false none
»»» href body string true* Label group URI
»»» key body string false Label group type
»»» name body string false Label group name
»» auth_security_principal body orgs_permissions_put/properties/auth_security_principal true* none
»»» href body string true* URI of auth_security_principal

Responses

Status Meaning Description Schema
201 Created Success None

Update a Permission

Example Code


curl -X PUT /orgs/{org_id}/permissions/{permission_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/permissions/{permission_id}

Auditable: Yes

Exposure: Public Stable

Update this permission in this org

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
permission_id path string true* UUID of the permission
body body orgs_permissions_put false none
» role body orgs_permissions_put/properties/role false none
»» href body string true* URI of Role
» scope body [object] false none
»» label body object false none
»»» href body string true* Label URI
»»» key body string false Label type
»»» value body string false Label name
»» label_group body object false none
»»» href body string true* Label group URI
»»» key body string false Label group type
»»» name body string false Label group name
»» auth_security_principal body orgs_permissions_put/properties/auth_security_principal false none
»»» href body string true* URI of auth_security_principal
»» anonymous body object false none
»» anonymous body object false none
»» anonymous body object false none

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Permission

Example Code


curl -X DELETE /orgs/{org_id}/permissions/{permission_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/permissions/{permission_id}

Exposure: Public Stable

Auditable: Yes

Delete this permission in this org

Parameters

Name In Type Required Description
org_id path integer true* Org ID
permission_id path string true* UUID of the permission

Responses

Status Meaning Description Schema
204 No Content Success None

Reports

Get all reports for this org and user

Example Code


curl -X GET /orgs/{org_id}/reports \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/reports

Exposure: Public Experimental

Auditable: No

Fetches a collection of all reports for this org and user

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "href": "http://example.com",
  "report_template": {
    "href": "http://example.com",
    "name": "string"
  },
  "description": "string",
  "send_by_email": true,
  "progress_percentage": 0,
  "generated_at": null,
  "status": "string",
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  },
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "http://example.com"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "http://example.com"
  }
}

Responses

Status Meaning Description Schema
200 OK Success reports_get

Create a new on-demand report

Example Code


curl -X POST /orgs/{org_id}/reports \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/reports

Auditable: Yes

Exposure: Public Experimental

Create a new on-demand report

Example Request Body

{
  "report_template": {
    "href": "http://example.com"
  },
  "send_by_email": true,
  "description": "string",
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body reports_post false none
» report_template body object true* Template for the report
»» href body string(uri) true* Report Template URI
» send_by_email body boolean false Flag for whether to send user report by email
» description body string false Description for the report
» report_parameters body object true* Any specific parameters required for this report template
»» anonymous body report_templates_get/properties/report_parameters/anyOf/0 false Report parameters for executive summary report
»»» report_time_range body object true* Time range the report is built across
»»»» anonymous body object false none
»»»»» start_date body string(date-time) true* Start date for the range
»»»»» end_date body string(date-time) true* End date for the range
»»»» anonymous body object false none
»»»»» last_num_days body integer true* Last x number of days the report is built across
»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/1 false Report parameters for traffic flow query report
»»»»» report_time_range body object true* Time range the report is built across
»»»»»» anonymous body object false none
»»»»»» anonymous body object false none
»»»»» app_groups body [array] true* App Group Schema for reports
»»»»»» label body object true* none
»»»»»»» href body string true* Label URI
»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/2 false Report parameters for explorer report
»»»»»»» report_time_range body object true* none
»»»»»»» filters body object true* none
»»»»»»»» query_name body string true* Query Name
»»»»»»»» start_date body string(date) false Starting date for query
»»»»»»»» end_date body string(date) false Ending date for query
»»»»»»»» sources_destinations_query_op body string false Query logical operator between sources and destinations
»»»»»»»» sources body object true* Source labels, workloads, IP addresses to include or exclude
»»»»»»»»» include body [array] true* List of included sources or targets
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»» label body object true* none
»»»»»»»»»»»» href body string true* Label URI
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»» label_group body object true* none
»»»»»»»»»»»»» href body string true* Label group URI
»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»» workload body object true* none
»»»»»»»»»»»»»» href body string true* Workload URI
»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»» ip_address body string true* IP address value
»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»» ip_list body object true* none
»»»»»»»»»»»»»»» href body string true* IP List draft URI
»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/5 false Explorer filter for all managed services (workloads, virtual_services etc)
»»»»»»»»»»»»»»» actors body string false All managed workloads ('ams')
»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»» cloud_resource body object true* none
»»»»»»»»»»»»»»»» resource_uuid body string true* UUID of cloud resource
»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»» data_center body object true* none
»»»»»»»»»»»»»»»»» type body string true* Type of the datacenter, such as core/cloud/aws/azure/gcp
»»»»»»»»»»»»»»»» exclude body [anyOf] true* List of excluded sources or targets
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»» destinations body object true* Target labels, workloads, IP addresses, domain names, transmission to include or exclude
»»»»»»»»»»»»»»»»» include body [array] true* List of included sources or targets
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/destinations/properties/include/items/items/oneOf/4 false An DNS parameter for a traffic query
»»»»»»»»»»»»»»»»»»» fqdn body string true* parameter for querying the matched fqdn
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/5 false Explorer filter for all managed services (workloads, virtual_services etc)
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»»» exclude body [anyOf] true* List of excluded sources or targets
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/destinations/properties/include/items/items/oneOf/4 false An DNS parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body object false Parameter representing broadcast/multiccast
»»»»»»»»»»»»»»»»»»» transmission body string true* transmission type
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»»» data_sources body object false Data sources of the flows to include or exclude
»»»»»»»»»»»»»»»»»» include body [string] false List of included services
»»»»»»»»»»»»»»»»»» exclude body [string] false List of excluded data sources
»»»»»»»»»»»»»»»»» services body object true* Services (5-tuple of port/to_port/proto/process/service) to include or exclude
»»»»»»»»»»»»»»»»»» include body [object] true* List of included services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»»»»»»»»»» proto body integer false protocol number
»»»»»»»»»»»»»»»»»»» process_name body string false Process Name
»»»»»»»»»»»»»»»»»»» windows_service_name body string false Windows Service Name
»»»»»»»»»»»»»»»»»» exclude body [object] true* List of excluded services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»»»»»»»»»» proto body integer false protocol number
»»»»»»»»»»»»»»»»»»» process_name body string false Process Name
»»»»»»»»»»»»»»»»»»» windows_service_name body string false Windows Service Name
»»»»»»»»»»»»»»»»»» policy_decisions body [string] true* List of policy decisions
»»»»»»»»»»»»»»»»»» boundary_decisions body [string] false List of boundary decisions
»»»»»»»»»»»»»»»»»» max_results body integer true* maximum number of flows to return
»»»»»»»»»»»»»»»»»» exclude_workloads_from_ip_list_query body boolean false exclude workload traffic when IP List is provided either in consumer or provider part of traffic query
»»»»»»»»»»»»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/3 false Report parameters for VES report
»»»»»»»»»»»»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/4 false Returns the rule hit count stats for all the rules in a ruleset during the specified time-range
»»»»»»»»»»»»»»»»»» report_time_range body object true* Time range the report is built across
»»»»»»»»»»»»»»»»»»» anonymous body object false none
»»»»»»»»»»»»»»»»»»» anonymous body object false none
»»»»»»»»»»»»»»»»»» rule_sets body [object] true* Returns the rule hit count stats for all the rules in a ruleset during the specified time-range
»»»»»»»»»»»»»»»»»»» href body string true* HREF of the ruleset
»»»»»»»»»»»»»»»»»» max_results body integer false maximum number of rules to return in the specified time-range in descending order of rule creation time

Enumerated Values

Parameter Value
»»»»»»»» sources_destinations_query_op and
»»»»»»»» sources_destinations_query_op or
»»»»»»»»»»»»»»» actors ams
»»»»»»»»»»»»»»»»» type core
»»»»»»»»»»»»»»»»» type cloud
»»»»»»»»»»»»»»»»» type aws
»»»»»»»»»»»»»»»»» type azure
»»»»»»»»»»»»»»»»» type gcp
»»»»»»»»»»»»»»»»»»» transmission broadcast
»»»»»»»»»»»»»»»»»»» transmission multicast
»»»»»»»»»»»»»»»»»»» transmission unicast
»»»»»»»»»»»»»»»»»» include server
»»»»»»»»»»»»»»»»»» include endpoint
»»»»»»»»»»»»»»»»»» include flowlink
»»»»»»»»»»»»»»»»»» include scanner
»»»»»»»»»»»»»»»»»» exclude server
»»»»»»»»»»»»»»»»»» exclude endpoint
»»»»»»»»»»»»»»»»»» exclude flowlink
»»»»»»»»»»»»»»»»»» exclude scanner
»»»»»»»»»»»»»»»»»» policy_decisions allowed
»»»»»»»»»»»»»»»»»» policy_decisions potentially_blocked
»»»»»»»»»»»»»»»»»» policy_decisions blocked
»»»»»»»»»»»»»»»»»» policy_decisions unknown
»»»»»»»»»»»»»»»»»» boundary_decisions blocked
»»»»»»»»»»»»»»»»»» boundary_decisions blocked_by_override_deny
»»»»»»»»»»»»»»»»»» boundary_decisions blocked_non_illumio_rule

Responses

Status Meaning Description Schema
201 Created Success None

Get a report by UUID

Example Code


curl -X GET /orgs/{org_id}/reports/{report_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/reports/{report_id}

Exposure: Public Experimental

Auditable: No

Get a report by UUID

Parameters

Name In Type Required Description
org_id path integer true* Organization
report_id path string true* UUID of the report

Example Response Body

200 Response

{
  "href": "http://example.com",
  "report_template": {
    "href": "http://example.com",
    "name": "string"
  },
  "description": "string",
  "send_by_email": true,
  "progress_percentage": 0,
  "generated_at": null,
  "status": "string",
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  },
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "http://example.com"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "http://example.com"
  }
}

Responses

Status Meaning Description Schema
200 OK Success reports_get

Updates a report by UUID

Example Code


curl -X PUT /orgs/{org_id}/reports/{report_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/reports/{report_id}

Auditable: No

Exposure: Public Experimental

Updates a report by UUID

Example Request Body

{
  "status": "cancel_requested"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
report_id path string true* UUID of the report
body body reports_put false none
» status body string false State of the report

Enumerated Values

Parameter Value
» status cancel_requested

Responses

Status Meaning Description Schema
204 No Content Success None

Download a report

Example Code


curl -X GET /orgs/{org_id}/reports/{report_id}/download

GET /api/v2/orgs/{org_id}/reports/{report_id}/download

Exposure: Public Experimental

Auditable: No

Download a report

Parameters

Name In Type Required Description
org_id path integer true* Organization
report_id path string true* UUID of the report

Responses

Status Meaning Description Schema
200 OK Success None

Get the risk summary for org

Example Code


curl -X GET /orgs/{org_id}/reports/risk_summary \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/reports/risk_summary

Exposure: Public Experimental

Auditable: No

Get the org risk_summary

Parameters

Name In Type Required Description
org_id path integer true* Org ID

Example Response Body

200 Response

{
  "ransomware": null
}

Responses

Status Meaning Description Schema
200 OK Success reports_risk_summary_get

Get the risk summary time series statistics

Example Code


curl -X POST /orgs/{org_id}/reports/risk_summary/ransomware_timeseries_statistics \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/reports/risk_summary/ransomware_timeseries_statistics

Auditable: No

Exposure: Public Experimental

Get the risk summary time series statistics

Example Request Body

[
  {
    "property": "num_managed_workloads",
    "resolution": "day",
    "max_results": 5
  }
]

Parameters

Name In Type Required Description
org_id path integer true* Org ID
body body reports_risk_summary_ransomware_timeseries_statistics_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Get time series data

Example Code


curl -X POST /orgs/{org_id}/reports/time_series_statistics \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/reports/time_series_statistics

Auditable: No

Exposure: Public Experimental

Get time series data

Example Request Body

[
  {
    "property": "num_managed_workloads",
    "resolution": "day",
    "max_results": 5
  }
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body reports_time_series_statistics_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Report Schedules

Get report schedules for this user and org

Example Code


curl -X GET /orgs/{org_id}/report_schedules \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/report_schedules

Exposure: Public Experimental

Auditable: No

Fetches collection of all report schedules for this user and org

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "href": "http://example.com",
  "report_template": {
    "href": "http://example.com",
    "name": "string"
  },
  "name": "string",
  "report_generation_frequency": "string",
  "scheduled_at": "2025-04-01T00:21:27Z",
  "send_by_email": true,
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  },
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "http://example.com"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "http://example.com"
  }
}

Responses

Status Meaning Description Schema
200 OK Success report_schedules_get

Create a new report schedule

Example Code


curl -X POST /orgs/{org_id}/report_schedules \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/report_schedules

Auditable: No

Exposure: Public Experimental

Creates a new report schedule

Example Request Body

{
  "report_template": {
    "href": "http://example.com"
  },
  "name": "string",
  "send_by_email": true,
  "report_generation_frequency": "daily",
  "scheduled_at": "2025-04-01T00:21:27Z",
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body report_schedules_post false none
» report_template body object true* Template for the report
»» href body string(uri) true* Report Template URI
» name body string true* Name of the report schedule
» send_by_email body boolean false Flag for whether to send user report by email
» report_generation_frequency body string true* Report generation frequency
» scheduled_at body string(date-time) false Timestamp in UTC for report generation
» report_parameters body object true* Any specific parameters required for this report template
»» anonymous body report_templates_get/properties/report_parameters/anyOf/0 false Report parameters for executive summary report
»»» report_time_range body object true* Time range the report is built across
»»»» anonymous body object false none
»»»»» start_date body string(date-time) true* Start date for the range
»»»»» end_date body string(date-time) true* End date for the range
»»»» anonymous body object false none
»»»»» last_num_days body integer true* Last x number of days the report is built across
»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/1 false Report parameters for traffic flow query report
»»»»» report_time_range body object true* Time range the report is built across
»»»»»» anonymous body object false none
»»»»»» anonymous body object false none
»»»»» app_groups body [array] true* App Group Schema for reports
»»»»»» label body object true* none
»»»»»»» href body string true* Label URI
»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/2 false Report parameters for explorer report
»»»»»»» report_time_range body object true* none
»»»»»»» filters body object true* none
»»»»»»»» query_name body string true* Query Name
»»»»»»»» start_date body string(date) false Starting date for query
»»»»»»»» end_date body string(date) false Ending date for query
»»»»»»»» sources_destinations_query_op body string false Query logical operator between sources and destinations
»»»»»»»» sources body object true* Source labels, workloads, IP addresses to include or exclude
»»»»»»»»» include body [array] true* List of included sources or targets
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»» label body object true* none
»»»»»»»»»»»» href body string true* Label URI
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»» label_group body object true* none
»»»»»»»»»»»»» href body string true* Label group URI
»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»» workload body object true* none
»»»»»»»»»»»»»» href body string true* Workload URI
»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»» ip_address body string true* IP address value
»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»» ip_list body object true* none
»»»»»»»»»»»»»»» href body string true* IP List draft URI
»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/5 false Explorer filter for all managed services (workloads, virtual_services etc)
»»»»»»»»»»»»»»» actors body string false All managed workloads ('ams')
»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»» cloud_resource body object true* none
»»»»»»»»»»»»»»»» resource_uuid body string true* UUID of cloud resource
»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»» data_center body object true* none
»»»»»»»»»»»»»»»»» type body string true* Type of the datacenter, such as core/cloud/aws/azure/gcp
»»»»»»»»»»»»»»»» exclude body [anyOf] true* List of excluded sources or targets
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»» destinations body object true* Target labels, workloads, IP addresses, domain names, transmission to include or exclude
»»»»»»»»»»»»»»»»» include body [array] true* List of included sources or targets
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/destinations/properties/include/items/items/oneOf/4 false An DNS parameter for a traffic query
»»»»»»»»»»»»»»»»»»» fqdn body string true* parameter for querying the matched fqdn
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/5 false Explorer filter for all managed services (workloads, virtual_services etc)
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»»» exclude body [anyOf] true* List of excluded sources or targets
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/destinations/properties/include/items/items/oneOf/4 false An DNS parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body object false Parameter representing broadcast/multiccast
»»»»»»»»»»»»»»»»»»» transmission body string true* transmission type
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»»» data_sources body object false Data sources of the flows to include or exclude
»»»»»»»»»»»»»»»»»» include body [string] false List of included services
»»»»»»»»»»»»»»»»»» exclude body [string] false List of excluded data sources
»»»»»»»»»»»»»»»»» services body object true* Services (5-tuple of port/to_port/proto/process/service) to include or exclude
»»»»»»»»»»»»»»»»»» include body [object] true* List of included services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»»»»»»»»»» proto body integer false protocol number
»»»»»»»»»»»»»»»»»»» process_name body string false Process Name
»»»»»»»»»»»»»»»»»»» windows_service_name body string false Windows Service Name
»»»»»»»»»»»»»»»»»» exclude body [object] true* List of excluded services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»»»»»»»»»» proto body integer false protocol number
»»»»»»»»»»»»»»»»»»» process_name body string false Process Name
»»»»»»»»»»»»»»»»»»» windows_service_name body string false Windows Service Name
»»»»»»»»»»»»»»»»»» policy_decisions body [string] true* List of policy decisions
»»»»»»»»»»»»»»»»»» boundary_decisions body [string] false List of boundary decisions
»»»»»»»»»»»»»»»»»» max_results body integer true* maximum number of flows to return
»»»»»»»»»»»»»»»»»» exclude_workloads_from_ip_list_query body boolean false exclude workload traffic when IP List is provided either in consumer or provider part of traffic query
»»»»»»»»»»»»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/3 false Report parameters for VES report
»»»»»»»»»»»»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/4 false Returns the rule hit count stats for all the rules in a ruleset during the specified time-range
»»»»»»»»»»»»»»»»»» report_time_range body object true* Time range the report is built across
»»»»»»»»»»»»»»»»»»» anonymous body object false none
»»»»»»»»»»»»»»»»»»» anonymous body object false none
»»»»»»»»»»»»»»»»»» rule_sets body [object] true* Returns the rule hit count stats for all the rules in a ruleset during the specified time-range
»»»»»»»»»»»»»»»»»»» href body string true* HREF of the ruleset
»»»»»»»»»»»»»»»»»» max_results body integer false maximum number of rules to return in the specified time-range in descending order of rule creation time
»»»»»»»»»»»»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/5 false Report parameters for ransomware risk report
»»»»»»»»»»»»»»»»»» report_time_range body object true* none

Enumerated Values

Parameter Value
» report_generation_frequency daily
» report_generation_frequency weekly
» report_generation_frequency monthly
» report_generation_frequency quarterly
» report_generation_frequency once
»»»»»»»» sources_destinations_query_op and
»»»»»»»» sources_destinations_query_op or
»»»»»»»»»»»»»»» actors ams
»»»»»»»»»»»»»»»»» type core
»»»»»»»»»»»»»»»»» type cloud
»»»»»»»»»»»»»»»»» type aws
»»»»»»»»»»»»»»»»» type azure
»»»»»»»»»»»»»»»»» type gcp
»»»»»»»»»»»»»»»»»»» transmission broadcast
»»»»»»»»»»»»»»»»»»» transmission multicast
»»»»»»»»»»»»»»»»»»» transmission unicast
»»»»»»»»»»»»»»»»»» include server
»»»»»»»»»»»»»»»»»» include endpoint
»»»»»»»»»»»»»»»»»» include flowlink
»»»»»»»»»»»»»»»»»» include scanner
»»»»»»»»»»»»»»»»»» exclude server
»»»»»»»»»»»»»»»»»» exclude endpoint
»»»»»»»»»»»»»»»»»» exclude flowlink
»»»»»»»»»»»»»»»»»» exclude scanner
»»»»»»»»»»»»»»»»»» policy_decisions allowed
»»»»»»»»»»»»»»»»»» policy_decisions potentially_blocked
»»»»»»»»»»»»»»»»»» policy_decisions blocked
»»»»»»»»»»»»»»»»»» policy_decisions unknown
»»»»»»»»»»»»»»»»»» boundary_decisions blocked
»»»»»»»»»»»»»»»»»» boundary_decisions blocked_by_override_deny
»»»»»»»»»»»»»»»»»» boundary_decisions blocked_non_illumio_rule

Responses

Status Meaning Description Schema
201 Created Success None

Delete a report schedule by UUID

Example Code


curl -X DELETE /orgs/{org_id}/report_schedules/{report_schedule_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/report_schedules/{report_schedule_id}

Exposure: Public Experimental

Auditable: No

Delete a report schedule by UUID

Parameters

Name In Type Required Description
org_id path integer true* Organization
report_schedule_id path string true* UUID of the report schedule

Responses

Status Meaning Description Schema
204 No Content Success None

Get a report schedule by UUID

Example Code


curl -X GET /orgs/{org_id}/report_schedules/{report_schedule_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/report_schedules/{report_schedule_id}

Exposure: Public Experimental

Auditable: No

Get a report schedule by UUID

Parameters

Name In Type Required Description
org_id path integer true* Organization
report_schedule_id path string true* UUID of the report schedule

Example Response Body

200 Response

{
  "href": "http://example.com",
  "report_template": {
    "href": "http://example.com",
    "name": "string"
  },
  "name": "string",
  "report_generation_frequency": "string",
  "scheduled_at": "2025-04-01T00:21:27Z",
  "send_by_email": true,
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  },
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "http://example.com"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "http://example.com"
  }
}

Responses

Status Meaning Description Schema
200 OK Success report_schedules_get

Update a report schedule by UUID

Example Code


curl -X PUT /orgs/{org_id}/report_schedules/{report_schedule_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/report_schedules/{report_schedule_id}

Auditable: No

Exposure: Public Experimental

Update a report schedule by UUID

Example Request Body

{
  "report_template": {
    "href": "http://example.com"
  },
  "name": "string",
  "report_format": "pdf",
  "report_generation_frequency": "once",
  "send_by_email": true,
  "scheduled_at": "2025-04-01T00:21:27Z",
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
report_schedule_id path string true* UUID of the report schedule
body body report_schedules_put false none
» report_template body object false Template for the report
»» href body string(uri) true* Report Template URI
» name body string false Name of the report schedule
» report_format body string false Format in which the report should be generated
» report_generation_frequency body string false Report generation frequency
» send_by_email body boolean false Flag for whether to send user report by email
» scheduled_at body string(date-time) false Time stamp in UTC for report generation
» report_parameters body object false Any specific parameters required for this report template
»» anonymous body report_templates_get/properties/report_parameters/anyOf/0 false Report parameters for executive summary report
»»» report_time_range body object true* Time range the report is built across
»»»» anonymous body object false none
»»»»» start_date body string(date-time) true* Start date for the range
»»»»» end_date body string(date-time) true* End date for the range
»»»» anonymous body object false none
»»»»» last_num_days body integer true* Last x number of days the report is built across
»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/1 false Report parameters for traffic flow query report
»»»»» report_time_range body object true* Time range the report is built across
»»»»»» anonymous body object false none
»»»»»» anonymous body object false none
»»»»» app_groups body [array] true* App Group Schema for reports
»»»»»» label body object true* none
»»»»»»» href body string true* Label URI
»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/2 false Report parameters for explorer report
»»»»»»» report_time_range body object true* none
»»»»»»» filters body object true* none
»»»»»»»» query_name body string true* Query Name
»»»»»»»» start_date body string(date) false Starting date for query
»»»»»»»» end_date body string(date) false Ending date for query
»»»»»»»» sources_destinations_query_op body string false Query logical operator between sources and destinations
»»»»»»»» sources body object true* Source labels, workloads, IP addresses to include or exclude
»»»»»»»»» include body [array] true* List of included sources or targets
»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»» label body object true* none
»»»»»»»»»»»» href body string true* Label URI
»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»» label_group body object true* none
»»»»»»»»»»»»» href body string true* Label group URI
»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»» workload body object true* none
»»»»»»»»»»»»»» href body string true* Workload URI
»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»» ip_address body string true* IP address value
»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»» ip_list body object true* none
»»»»»»»»»»»»»»» href body string true* IP List draft URI
»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/5 false Explorer filter for all managed services (workloads, virtual_services etc)
»»»»»»»»»»»»»»» actors body string false All managed workloads ('ams')
»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»» cloud_resource body object true* none
»»»»»»»»»»»»»»»» resource_uuid body string true* UUID of cloud resource
»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»» data_center body object true* none
»»»»»»»»»»»»»»»»» type body string true* Type of the datacenter, such as core/cloud/aws/azure/gcp
»»»»»»»»»»»»»»»» exclude body [anyOf] true* List of excluded sources or targets
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»» destinations body object true* Target labels, workloads, IP addresses, domain names, transmission to include or exclude
»»»»»»»»»»»»»»»»» include body [array] true* List of included sources or targets
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/destinations/properties/include/items/items/oneOf/4 false An DNS parameter for a traffic query
»»»»»»»»»»»»»»»»»»» fqdn body string true* parameter for querying the matched fqdn
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/5 false Explorer filter for all managed services (workloads, virtual_services etc)
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»»» exclude body [anyOf] true* List of excluded sources or targets
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false A label parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false A label group parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false A workload parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false An IP address parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/destinations/properties/include/items/items/oneOf/4 false An DNS parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body object false Parameter representing broadcast/multiccast
»»»»»»»»»»»»»»»»»»» transmission body string true* transmission type
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false An IP List parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false Cloud resource Id parameter for a traffic query
»»»»»»»»»»»»»»»»»» anonymous body traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false Data-center parameter for a traffic query
»»»»»»»»»»»»»»»»» data_sources body object false Data sources of the flows to include or exclude
»»»»»»»»»»»»»»»»»» include body [string] false List of included services
»»»»»»»»»»»»»»»»»» exclude body [string] false List of excluded data sources
»»»»»»»»»»»»»»»»» services body object true* Services (5-tuple of port/to_port/proto/process/service) to include or exclude
»»»»»»»»»»»»»»»»»» include body [object] true* List of included services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»»»»»»»»»» proto body integer false protocol number
»»»»»»»»»»»»»»»»»»» process_name body string false Process Name
»»»»»»»»»»»»»»»»»»» windows_service_name body string false Windows Service Name
»»»»»»»»»»»»»»»»»» exclude body [object] true* List of excluded services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»»»»»»»»»» port body integer false Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»»»»»»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»»»»»»»»»» proto body integer false protocol number
»»»»»»»»»»»»»»»»»»» process_name body string false Process Name
»»»»»»»»»»»»»»»»»»» windows_service_name body string false Windows Service Name
»»»»»»»»»»»»»»»»»» policy_decisions body [string] true* List of policy decisions
»»»»»»»»»»»»»»»»»» boundary_decisions body [string] false List of boundary decisions
»»»»»»»»»»»»»»»»»» max_results body integer true* maximum number of flows to return
»»»»»»»»»»»»»»»»»» exclude_workloads_from_ip_list_query body boolean false exclude workload traffic when IP List is provided either in consumer or provider part of traffic query
»»»»»»»»»»»»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/3 false Report parameters for VES report
»»»»»»»»»»»»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/4 false Returns the rule hit count stats for all the rules in a ruleset during the specified time-range
»»»»»»»»»»»»»»»»»» report_time_range body object true* Time range the report is built across
»»»»»»»»»»»»»»»»»»» anonymous body object false none
»»»»»»»»»»»»»»»»»»» anonymous body object false none
»»»»»»»»»»»»»»»»»» rule_sets body [object] true* Returns the rule hit count stats for all the rules in a ruleset during the specified time-range
»»»»»»»»»»»»»»»»»»» href body string true* HREF of the ruleset
»»»»»»»»»»»»»»»»»» max_results body integer false maximum number of rules to return in the specified time-range in descending order of rule creation time
»»»»»»»»»»»»»»»»» anonymous body report_templates_get/properties/report_parameters/anyOf/5 false Report parameters for ransomware risk report
»»»»»»»»»»»»»»»»»» report_time_range body object true* none

Enumerated Values

Parameter Value
» report_format pdf
» report_format json
» report_generation_frequency once
» report_generation_frequency daily
» report_generation_frequency weekly
» report_generation_frequency monthly
» report_generation_frequency quarterly
»»»»»»»» sources_destinations_query_op and
»»»»»»»» sources_destinations_query_op or
»»»»»»»»»»»»»»» actors ams
»»»»»»»»»»»»»»»»» type core
»»»»»»»»»»»»»»»»» type cloud
»»»»»»»»»»»»»»»»» type aws
»»»»»»»»»»»»»»»»» type azure
»»»»»»»»»»»»»»»»» type gcp
»»»»»»»»»»»»»»»»»»» transmission broadcast
»»»»»»»»»»»»»»»»»»» transmission multicast
»»»»»»»»»»»»»»»»»»» transmission unicast
»»»»»»»»»»»»»»»»»» include server
»»»»»»»»»»»»»»»»»» include endpoint
»»»»»»»»»»»»»»»»»» include flowlink
»»»»»»»»»»»»»»»»»» include scanner
»»»»»»»»»»»»»»»»»» exclude server
»»»»»»»»»»»»»»»»»» exclude endpoint
»»»»»»»»»»»»»»»»»» exclude flowlink
»»»»»»»»»»»»»»»»»» exclude scanner
»»»»»»»»»»»»»»»»»» policy_decisions allowed
»»»»»»»»»»»»»»»»»» policy_decisions potentially_blocked
»»»»»»»»»»»»»»»»»» policy_decisions blocked
»»»»»»»»»»»»»»»»»» policy_decisions unknown
»»»»»»»»»»»»»»»»»» boundary_decisions blocked
»»»»»»»»»»»»»»»»»» boundary_decisions blocked_by_override_deny
»»»»»»»»»»»»»»»»»» boundary_decisions blocked_non_illumio_rule

Responses

Status Meaning Description Schema
204 No Content Success None

Report Settings

Get report settings for an org

Example Code


curl -X GET /orgs/{org_id}/settings/reports \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/settings/reports

Exposure: Public Experimental

Auditable: No

Get report settings for an org

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "href": "http://example.com",
  "max_queued_reports": 0,
  "report_retention_days": 1
}

Responses

Status Meaning Description Schema
200 OK Success settings_reports_get

Update report settings for an org

Example Code


curl -X PUT /orgs/{org_id}/settings/reports \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/settings/reports

Auditable: Yes

Exposure: Public Experimental

Update report settings for an org

Example Request Body

{
  "max_queued_reports": 1,
  "report_retention_days": 1
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body settings_reports_put false none
» max_queued_reports body integer false maximum number of queued reports at anytime per org
» report_retention_days body integer false Number of days a report would be retained for

Responses

Status Meaning Description Schema
204 No Content Success None

Report Templates

Get report templates for this user and org

Example Code


curl -X GET /orgs/{org_id}/report_templates \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/report_templates

Exposure: Public Experimental

Auditable: No

Fetches collection of all available report templates for this user and org

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "href": "http://example.com",
  "name": "string",
  "enabled": true,
  "show_in_ui": true,
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  }
}

Responses

Status Meaning Description Schema
200 OK Success report_templates_get

Get a report template by template type

Example Code


curl -X GET /orgs/{org_id}/report_templates/{template_type} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/report_templates/{template_type}

Exposure: Public Experimental

Auditable: No

Get a report template by template type

Parameters

Name In Type Required Description
org_id path integer true* Organization
template_type path string true* Template type of the report

Example Response Body

200 Response

{
  "href": "http://example.com",
  "name": "string",
  "enabled": true,
  "show_in_ui": true,
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  }
}

Responses

Status Meaning Description Schema
200 OK Success report_templates_get

Update report template for an org by template type

Example Code


curl -X PUT /orgs/{org_id}/report_templates/{template_type} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/report_templates/{template_type}

Auditable: Yes

Exposure: Public Experimental

Update report template for an org by template type

Example Request Body

{
  "enabled": true
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
template_type path string true* Template type of the report
body body report_templates_put false none
» enabled body boolean false Determines whether this report template is enabled for this org

Responses

Status Meaning Description Schema
204 No Content Success None

Roles

Get the roles in the org

Example Code


curl -X GET /orgs/{org_id}/roles \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/roles

Exposure: Public Experimental

Auditable: No

Get the roles in the org

Parameters

Name In Type Required Description
org_id path integer true* Org ID

Example Response Body

200 Response

[
  {
    "href": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success orgs_roles_get

Get information for this role name

Example Code


curl -X GET /orgs/{org_id}/roles/{role_name} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/roles/{role_name}

Exposure: Public Experimental

Auditable: No

Get information for this role name

Parameters

Name In Type Required Description
org_id path integer true* Org ID
role_name path string true* Role Name

Example Response Body

200 Response

[
  {
    "href": "string"
  }
]

Responses

Status Meaning Description Schema
200 OK Success orgs_roles_get

Root Level Methods

Get Supercluster Leader

Example Code


curl -X GET /supercluster/leader

GET /api/v2/supercluster/leader

Authorization: Anyone

Exposure: Public Experimental

Auditable: No

Determine if node is supercluster leader

Responses

Status Meaning Description Schema
200 OK Success None

Get Available Node

Example Code


curl -X GET /node_available

GET /api/v2/node_available

Authorization: Anyone

Exposure: Public Stable

Auditable: No

Get node health status

Responses

Status Meaning Description Schema
200 OK Success None

Get Illumio Core Version

Example Code


curl -X GET /product_version \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/product_version

Exposure: Public Stable

Auditable: No

Product Version Details

Example Response Body

200 Response

{
  "product_version": {
    "version": "string",
    "build": 0,
    "release_info": "string",
    "engineering_info": "string",
    "long_display": "string",
    "short_display": "string",
    "product_name": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success users_login_get/properties/product_version

Get No Op

Example Code


curl -X GET /noop \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/noop

Exposure: Public Stable

Auditable: No

Noop API. Useful for things like resetting the session expiration timer, session validation and API key validation

Example Response Body

200 Response

{}

Responses

Status Meaning Description Schema
200 OK Success noop_get

Rulesets and Rules

Get Rulesets

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/rule_sets \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets

Exposure: Public Stable

Auditable: No

Get the collection of Rule Sets

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
description query string false Description of Rule Set(s) to return. Supports partial matches
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
labels query string false List of lists of label URIs, encoded as a JSON string
max_results query integer false Maximum number of Rule Sets to return.
name query string false Name of Rule Set(s) to return. Supports partial matches

Example Response Body

200 Response

{
  "href": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null,
  "update_type": "create",
  "name": "string",
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "enabled": true,
  "scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "rules": [
    {
      "href": "string",
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": {
        "href": "string"
      },
      "updated_by": {
        "href": "string"
      },
      "deleted_by": null,
      "enabled": true,
      "description": null,
      "external_data_set": null,
      "external_data_reference": null,
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "resolve_labels_as": {
        "providers": [
          "workloads"
        ],
        "consumers": [
          "workloads"
        ]
      },
      "sec_connect": true,
      "stateless": true,
      "machine_auth": true,
      "providers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string"
          },
          "virtual_service": {
            "href": "string",
            "name": null
          },
          "virtual_server": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string",
            "name": null,
            "hostname": null,
            "deleted": null
          },
          "virtual_service": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consuming_security_principals": [
        {
          "href": "string",
          "sid": "string",
          "name": "string",
          "description": "string",
          "deleted": true,
          "used_by_ruleset": true
        }
      ],
      "unscoped_consumers": true,
      "update_type": "create",
      "network_type": "brn",
      "use_workload_subnets": [
        "providers"
      ]
    }
  ],
  "ip_tables_rules": [
    {
      "href": "string",
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": {
        "href": "string"
      },
      "updated_by": {
        "href": "string"
      },
      "deleted_by": null,
      "update_type": "create",
      "enabled": true,
      "description": null,
      "statements": [
        {
          "table_name": "nat",
          "chain_name": "PREROUTING",
          "parameters": "string"
        }
      ],
      "actors": [
        {
          "actors": "string",
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "ip_version": "4"
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_rule_sets_get

Get a Ruleset

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}

Exposure: Public Stable

Auditable: No

Get Rule Set by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
rule_set_id path integer true* Rule Set ID

Example Response Body

200 Response

{
  "href": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null,
  "update_type": "create",
  "name": "string",
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "enabled": true,
  "scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "rules": [
    {
      "href": "string",
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": {
        "href": "string"
      },
      "updated_by": {
        "href": "string"
      },
      "deleted_by": null,
      "enabled": true,
      "description": null,
      "external_data_set": null,
      "external_data_reference": null,
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "resolve_labels_as": {
        "providers": [
          "workloads"
        ],
        "consumers": [
          "workloads"
        ]
      },
      "sec_connect": true,
      "stateless": true,
      "machine_auth": true,
      "providers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string"
          },
          "virtual_service": {
            "href": "string",
            "name": null
          },
          "virtual_server": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string",
            "name": null,
            "hostname": null,
            "deleted": null
          },
          "virtual_service": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consuming_security_principals": [
        {
          "href": "string",
          "sid": "string",
          "name": "string",
          "description": "string",
          "deleted": true,
          "used_by_ruleset": true
        }
      ],
      "unscoped_consumers": true,
      "update_type": "create",
      "network_type": "brn",
      "use_workload_subnets": [
        "providers"
      ]
    }
  ],
  "ip_tables_rules": [
    {
      "href": "string",
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": {
        "href": "string"
      },
      "updated_by": {
        "href": "string"
      },
      "deleted_by": null,
      "update_type": "create",
      "enabled": true,
      "description": null,
      "statements": [
        {
          "table_name": "nat",
          "chain_name": "PREROUTING",
          "parameters": "string"
        }
      ],
      "actors": [
        {
          "actors": "string",
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "ip_version": "4"
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_rule_sets_get

Create a new Ruleset

Example Code


curl -X POST /orgs/{org_id}/sec_policy/{pversion}/rule_sets \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets

Auditable: Yes

Exposure: Public Stable

Create a new rule set.

Example Request Body

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "enabled": true,
  "scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "rules": [
    {
      "enabled": true,
      "description": "string",
      "external_data_set": null,
      "external_data_reference": null,
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "resolve_labels_as": {
        "providers": [
          "workloads"
        ],
        "consumers": [
          "workloads"
        ]
      },
      "sec_connect": true,
      "stateless": true,
      "machine_auth": true,
      "providers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          },
          "virtual_service": {
            "href": "string"
          },
          "virtual_server": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          },
          "virtual_service": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          }
        }
      ],
      "consuming_security_principals": [
        {
          "href": "string"
        }
      ],
      "unscoped_consumers": true,
      "network_type": "brn",
      "use_workload_subnets": [
        "providers"
      ]
    }
  ],
  "ip_tables_rules": [
    {
      "enabled": true,
      "description": "string",
      "statements": [
        {
          "table_name": "nat",
          "chain_name": "PREROUTING",
          "parameters": "string"
        }
      ],
      "actors": [
        {
          "actors": "string",
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "ip_version": "4"
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_rule_sets_post false none
» name body string true* Name (must be unique)
» description body string false Description
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» enabled body boolean false Enabled flag
» scopes body [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] true* Rule set scopes
»» exclusion body boolean false Boolean to specify whether or not the scope is an exclusion
»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»» href body string true* none
»» label_group body sec_policy_virtual_servers_get/properties/created_by false none
» rules body [object] false Array of sec rules (access rules) in this rule set
»» enabled body boolean true* Enabled flag
»» description body string false Description
»» external_data_set body string,null false External data set identifier
»» external_data_reference body string,null false External data reference identifier
»» ingress_services body [oneOf] true* Array of service URI and port/protocol combinations
»»» anonymous body sec_policy_virtual_servers_get/properties/created_by false none
»»» anonymous body object false none
»»»» port body integer false Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol.
»»»» to_port body integer false Upper end of port range; this field should not be included if specifying an individual port.
»»»» proto body integer true* Transport protocol (numeric)
»»» anonymous body object false none
»»»» name body string true* Name (does not need to be unique)
»»»» description body string false Description
»»»» service_ports body [object] false Service ports
»»»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»» proto body integer true* Transport protocol
»»»»» icmp_type body integer,null false ICMP Type (integer 0-255 for icmp protocol)
»»»»» icmp_code body integer,null false ICMP Code (integer 0-15 for icmp protocol)
»»»» windows_services body [sec_policy_services_get/properties/windows_services/items] false Windows services
»»»»» service_name body string,null false Name of Windows Service
»»»»» process_name body string,null false Name of running process
»»»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»» proto body integer,null false Transport protocol
»»»»» icmp_type body integer false ICMP Type (integer 0-255 for icmp protocol)
»»»»» icmp_code body integer false ICMP Code (integer 0-15 for icmp protocol)
»»»» external_data_set body string true* External data set identifier
»»»» external_data_reference body string true* External data reference identifier
»»» resolve_labels_as body sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as true* none
»»»» providers body [string] true* none
»»»» consumers body [string] true* none
»»» sec_connect body boolean false Whether a secure connection is established
»»» stateless body boolean false Whether packet filtering is stateless for the rule
»»» machine_auth body boolean false Whether machine authentication is enabled
»»» providers body [object] true* Providers
»»»» actors body string false Rule actors are all workloads ('ams')
»»»» label_dimension body string false Rule actors that are all workloads with a specific label dimension
»»»» exclusion body boolean false Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»»» label_group body object false none
»»»»» href body string true* Label group URI
»»»» workload body object false none
»»»»» href body string true* Workload URI
»»»» virtual_service body object false none
»»»»» href body string true* Virtual service URI
»»»» virtual_server body object false none
»»»»» href body string true* Virtual server URI
»»»» ip_list body object false URI of associated IP List
»»»»» href body string true* IP List URI
»»»» consumers body [object] true* Consumers
»»»»» actors body string false Rule actors are all workloads or container host
»»»»» label_dimension body string false Rule actors that are all workloads with a specific label dimension
»»»»» exclusion body boolean false Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»»»» label_group body object false none
»»»»»» href body string true* Label group URI
»»»»» workload body object false none
»»»»»» href body string true* Workload URI
»»»»» virtual_service body object false none
»»»»»» href body string true* Virtual service URI
»»»»» ip_list body sec_policy_virtual_servers_get/properties/created_by false none
»»»» consuming_security_principals body [object] false Hrefs of consuming security principals
»»»»» href body string true* URI of security principal
»»»» unscoped_consumers body boolean false Set the scope for rule consumers to All
»»»» network_type body sec_policy_rule_sets_put/properties/rules/items/properties/network_type false Network types that this rule should apply to.
»»»» use_workload_subnets body [string] false Whether to use workload subnets instead of IP addresses for the providers/consumers
»»» ip_tables_rules body [object] false Array of custom iptables rules in this rule set
»»»» enabled body boolean true* Enabled flag
»»»» description body string false Description
»»»» statements body [sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/statements/items] true* list of the iptables statements in this rule
»»»»» table_name body string true* name of the iptables table for this rule
»»»»» chain_name body string true* name of the iptables chain for this rule
»»»»» parameters body string true* the remainder of the iptables rules (excluding table/chain)
»»»» actors body [object] true* none
»»»»» actors body string false Rule Actors are all workloads ('ams')
»»»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»»»» label_group body sec_policy_virtual_servers_get/properties/created_by false none
»»»»» workload body sec_policy_virtual_servers_get/properties/created_by false none
»»»» ip_version body string true* IP version for the rules to be applied to

Enumerated Values

Parameter Value
»»»» proto 6
»»»» proto 17
»»»» providers workloads
»»»» providers virtual_services
»»»» consumers workloads
»»»» consumers virtual_services
»»»» actors ams
»»»» label_dimension app
»»»»» actors ams
»»»»» actors container_host
»»»»» label_dimension app
»»»» network_type brn
»»»» network_type non_brn
»»»» network_type all
»»»» use_workload_subnets providers
»»»» use_workload_subnets consumers
»»»»» table_name nat
»»»»» table_name mangle
»»»»» table_name filter
»»»»» chain_name PREROUTING
»»»»» chain_name INPUT
»»»»» chain_name OUTPUT
»»»»» chain_name FORWARD
»»»»» chain_name POSTROUTING
»»»» ip_version 4
»»»» ip_version 6

Responses

Status Meaning Description Schema
201 Created Success None

Update a Ruleset

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}

Auditable: Yes

Exposure: Public Stable

Modify Rule Set

Example Request Body

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "enabled": true,
  "update_type": "create",
  "scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "rules": [
    {}
  ],
  "ip_tables_rules": [
    {}
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
rule_set_id path integer true* Rule Set ID
body body sec_policy_rule_sets_put false none
» name body string false Name (must be unique)
» description body string false Description
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» enabled body boolean false Enabled flag
» update_type body string false Type of update
» scopes body [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] false Rule set scopes
»» exclusion body boolean false Boolean to specify whether or not the scope is an exclusion
»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»» href body string true* none
»» label_group body sec_policy_virtual_servers_get/properties/created_by false none
» rules body [anyOf] false Array of rules in this rule set
»» href body string false URI of Rule
»» enabled body boolean false Enabled flag
»» description body string false Description
»» external_data_set body string,null false External data set identifier
»» external_data_reference body string false External data reference identifier
»» ingress_services body [oneOf] false Array of service URI and port/protocol combinations
»»» anonymous body sec_policy_virtual_servers_get/properties/created_by false none
»»» anonymous body object false none
»»»» port body integer false Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol.
»»»» to_port body integer false Upper end of port range; this field should not be included if specifying an individual port.
»»»» proto body integer true* Transport protocol (numeric)
»»» anonymous body object false none
»»»» name body string true* Name (does not need to be unique)
»»»» description body string false Description
»»»» service_ports body [object] false Service ports
»»»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»» proto body integer true* Transport protocol
»»»»» icmp_type body integer,null false ICMP Type (integer 0-255 for icmp protocol)
»»»»» icmp_code body integer,null false ICMP Code (integer 0-15 for icmp protocol)
»»»» windows_services body [sec_policy_services_get/properties/windows_services/items] false Windows services
»»»»» service_name body string,null false Name of Windows Service
»»»»» process_name body string,null false Name of running process
»»»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»» proto body integer,null false Transport protocol
»»»»» icmp_type body integer false ICMP Type (integer 0-255 for icmp protocol)
»»»»» icmp_code body integer false ICMP Code (integer 0-15 for icmp protocol)
»»»» external_data_set body string true* External data set identifier
»»»» external_data_reference body string true* External data reference identifier
»»» resolve_labels_as body sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as false none
»»»» providers body [string] true* none
»»»» consumers body [string] true* none
»»» sec_connect body boolean false Whether a secure connection is established
»»» stateless body boolean false Whether packet filtering is stateless for the rule
»»» machine_auth body boolean false Whether machine authentication is enabled
»»» providers body [object] false Providers
»»»» actors body string false Rule actors are all workloads ('ams')
»»»» label_dimension body string false Rule actors that are all workloads with a specific label dimension
»»»» exclusion body boolean false Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»»» label_group body object false none
»»»»» href body string true* Label group URI
»»»» workload body object false none
»»»»» href body string true* Workload URI
»»»» virtual_service body object false none
»»»»» href body string true* Virtual service URI
»»»» virtual_server body object false none
»»»»» href body string true* Virtual server URI
»»»» ip_list body object false URI of associated IP List
»»»»» href body string true* IP List URI
»»»» consumers body [object] false Consumers
»»»»» actors body string false Rule actors are all workloads or container host
»»»»» label_dimension body string false Rule actors that are all workloads with a specific label dimension
»»»»» exclusion body boolean false Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»»»» label_group body object false none
»»»»»» href body string true* Label group URI
»»»»» workload body object false none
»»»»»» href body string true* Workload URI
»»»»» virtual_service body object false none
»»»»»» href body string true* Virtual service URI
»»»»» ip_list body sec_policy_virtual_servers_get/properties/created_by false none
»»»» consuming_security_principals body [object] false Hrefs of consuming security principals
»»»»» href body string true* URI of security principal
»»»» update_type body string false Type of update
»»»» unscoped_consumers body boolean false Set the scope for rule consumers to All
»»»» network_type body sec_policy_rule_sets_put/properties/rules/items/properties/network_type false Network types that this rule should apply to.
»»»» use_workload_subnets body [string] false Whether to use workload subnets instead of IP addresses for the providers/consumers
»»»» anonymous body object false none
»»»» anonymous body object false none
»»» ip_tables_rules body [anyOf] false Array of iptables rules in this ruleset
»»»» href body string false URI of Rule
»»»» enabled body boolean false Enabled flag
»»»» description body string false Description
»»»» statements body [sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/statements/items] false list of the iptables statements in this rule
»»»»» table_name body string true* name of the iptables table for this rule
»»»»» chain_name body string true* name of the iptables chain for this rule
»»»»» parameters body string true* the remainder of the iptables rules (excluding table/chain)
»»»» actors body [object] false none
»»»»» actors body string false Rule Actors are all workloads ('ams')
»»»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»»»» label_group body sec_policy_virtual_servers_get/properties/created_by false none
»»»»» workload body sec_policy_virtual_servers_get/properties/created_by false none
»»»» ip_version body string false IP version for the rules to be applied to
»»»» update_type body string false Type of update
»»»» anonymous body object false none
»»»» anonymous body object false none

Enumerated Values

Parameter Value
» update_type create
» update_type update
» update_type delete
»»»» proto 6
»»»» proto 17
»»»» providers workloads
»»»» providers virtual_services
»»»» consumers workloads
»»»» consumers virtual_services
»»»» actors ams
»»»» label_dimension app
»»»»» actors ams
»»»»» actors container_host
»»»»» label_dimension app
»»»» update_type create
»»»» update_type update
»»»» update_type delete
»»»» network_type brn
»»»» network_type non_brn
»»»» network_type all
»»»» use_workload_subnets providers
»»»» use_workload_subnets consumers
»»»»» table_name nat
»»»»» table_name mangle
»»»»» table_name filter
»»»»» chain_name PREROUTING
»»»»» chain_name INPUT
»»»»» chain_name OUTPUT
»»»»» chain_name FORWARD
»»»»» chain_name POSTROUTING
»»»» ip_version 4
»»»» ip_version 6
»»»» update_type create
»»»» update_type update
»»»» update_type delete

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Ruleset

Example Code


curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}

Exposure: Public Stable

Auditable: Yes

Delete Rule Set

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
rule_set_id path integer true* Rule Set ID

Responses

Status Meaning Description Schema
204 No Content Success None

Get Security Rules

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules

Exposure: Public Stable

Auditable: No

Get the collection of rules

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
rule_set_id path integer true* Rule Set ID
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates

Example Response Body

200 Response

{
  "href": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null,
  "enabled": true,
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "ingress_services": [
    {
      "href": "string"
    }
  ],
  "resolve_labels_as": {
    "providers": [
      "workloads"
    ],
    "consumers": [
      "workloads"
    ]
  },
  "sec_connect": true,
  "stateless": true,
  "machine_auth": true,
  "providers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string",
        "key": "string",
        "value": "string"
      },
      "label_group": {
        "href": "string",
        "key": "string",
        "name": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string",
        "name": null
      },
      "virtual_server": {
        "href": "string"
      },
      "ip_list": {
        "href": "string",
        "created_at": "2025-04-01T00:21:27Z",
        "updated_at": "2025-04-01T00:21:27Z",
        "deleted_at": null,
        "created_by": {
          "href": "string"
        },
        "updated_by": {
          "href": "string"
        },
        "deleted_by": null,
        "update_type": "create",
        "name": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string",
        "key": "string",
        "value": "string"
      },
      "label_group": {
        "href": "string",
        "key": "string",
        "name": "string"
      },
      "workload": {
        "href": "string",
        "name": null,
        "hostname": null,
        "deleted": null
      },
      "virtual_service": {
        "href": "string"
      },
      "ip_list": {
        "href": "string",
        "created_at": "2025-04-01T00:21:27Z",
        "updated_at": "2025-04-01T00:21:27Z",
        "deleted_at": null,
        "created_by": {
          "href": "string"
        },
        "updated_by": {
          "href": "string"
        },
        "deleted_by": null,
        "update_type": "create",
        "name": "string"
      }
    }
  ],
  "consuming_security_principals": [
    {
      "href": "string",
      "sid": "string",
      "name": "string",
      "description": "string",
      "deleted": true,
      "used_by_ruleset": true
    }
  ],
  "unscoped_consumers": true,
  "update_type": "create",
  "network_type": "brn",
  "use_workload_subnets": [
    "providers"
  ]
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_rule_sets_sec_rules_get

Get a Security Rule

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id}

Exposure: Public Stable

Auditable: No

Get Rule by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
rule_set_id path integer true* Rule Set ID
sec_rule_id path integer true* Rule ID

Example Response Body

200 Response

{
  "href": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null,
  "enabled": true,
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "ingress_services": [
    {
      "href": "string"
    }
  ],
  "resolve_labels_as": {
    "providers": [
      "workloads"
    ],
    "consumers": [
      "workloads"
    ]
  },
  "sec_connect": true,
  "stateless": true,
  "machine_auth": true,
  "providers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string",
        "key": "string",
        "value": "string"
      },
      "label_group": {
        "href": "string",
        "key": "string",
        "name": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string",
        "name": null
      },
      "virtual_server": {
        "href": "string"
      },
      "ip_list": {
        "href": "string",
        "created_at": "2025-04-01T00:21:27Z",
        "updated_at": "2025-04-01T00:21:27Z",
        "deleted_at": null,
        "created_by": {
          "href": "string"
        },
        "updated_by": {
          "href": "string"
        },
        "deleted_by": null,
        "update_type": "create",
        "name": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string",
        "key": "string",
        "value": "string"
      },
      "label_group": {
        "href": "string",
        "key": "string",
        "name": "string"
      },
      "workload": {
        "href": "string",
        "name": null,
        "hostname": null,
        "deleted": null
      },
      "virtual_service": {
        "href": "string"
      },
      "ip_list": {
        "href": "string",
        "created_at": "2025-04-01T00:21:27Z",
        "updated_at": "2025-04-01T00:21:27Z",
        "deleted_at": null,
        "created_by": {
          "href": "string"
        },
        "updated_by": {
          "href": "string"
        },
        "deleted_by": null,
        "update_type": "create",
        "name": "string"
      }
    }
  ],
  "consuming_security_principals": [
    {
      "href": "string",
      "sid": "string",
      "name": "string",
      "description": "string",
      "deleted": true,
      "used_by_ruleset": true
    }
  ],
  "unscoped_consumers": true,
  "update_type": "create",
  "network_type": "brn",
  "use_workload_subnets": [
    "providers"
  ]
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_rule_sets_sec_rules_get

Create a Security Rule

Example Code


curl -X POST /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules

Auditable: Yes

Exposure: Public Stable

Create new rule

Example Request Body

{
  "enabled": true,
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ingress_services": [
    {
      "href": "string"
    }
  ],
  "resolve_labels_as": {
    "providers": [
      "workloads"
    ],
    "consumers": [
      "workloads"
    ]
  },
  "sec_connect": true,
  "stateless": true,
  "machine_auth": true,
  "providers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "virtual_server": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consuming_security_principals": [
    {
      "href": "string"
    }
  ],
  "unscoped_consumers": true,
  "network_type": "brn",
  "use_workload_subnets": [
    "providers"
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
rule_set_id path integer true* Rule Set ID
body body sec_policy_rule_sets_sec_rules_post false none
» enabled body boolean true* Enabled flag
» description body string false Description
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» ingress_services body [oneOf] true* Array of service URI and port/protocol combinations
»» anonymous body sec_policy_virtual_servers_get/properties/created_by false none
»»» href body string true* none
»» anonymous body object false none
»»» port body integer false Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol.
»»» to_port body integer false Upper end of port range; this field should not be included if specifying an individual port.
»»» proto body integer true* Transport protocol (numeric)
»» anonymous body object false none
»»» name body string true* Name (does not need to be unique)
»»» description body string false Description
»»» service_ports body [object] false Service ports
»»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»» proto body integer true* Transport protocol
»»»» icmp_type body integer,null false ICMP Type (integer 0-255 for icmp protocol)
»»»» icmp_code body integer,null false ICMP Code (integer 0-15 for icmp protocol)
»»» windows_services body [sec_policy_services_get/properties/windows_services/items] false Windows services
»»»» service_name body string,null false Name of Windows Service
»»»» process_name body string,null false Name of running process
»»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»» proto body integer,null false Transport protocol
»»»» icmp_type body integer false ICMP Type (integer 0-255 for icmp protocol)
»»»» icmp_code body integer false ICMP Code (integer 0-15 for icmp protocol)
»»» external_data_set body string true* External data set identifier
»»» external_data_reference body string true* External data reference identifier
»» resolve_labels_as body sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as true* none
»»» providers body [string] true* none
»»» consumers body [string] true* none
»» sec_connect body boolean false Whether a secure connection is established
»» stateless body boolean false Whether packet filtering is stateless for the rule
»» machine_auth body boolean false Whether machine authentication is enabled
»» providers body [object] true* Providers
»»» actors body string false Rule actors are all workloads ('ams')
»»» label_dimension body string false Rule actors that are all workloads with a specific label dimension
»»» exclusion body boolean false Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»» label_group body object false none
»»»» href body string true* Label group URI
»»» workload body object false none
»»»» href body string true* Workload URI
»»» virtual_service body object false none
»»»» href body string true* Virtual service URI
»»» virtual_server body object false none
»»»» href body string true* Virtual server URI
»»» ip_list body object false URI of associated IP List
»»»» href body string true* IP List URI
»»» consumers body [object] true* Consumers
»»»» actors body string false Rule actors are all workloads or container host
»»»» label_dimension body string false Rule actors that are all workloads with a specific label dimension
»»»» exclusion body boolean false Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»»» label_group body object false none
»»»»» href body string true* Label group URI
»»»» workload body object false none
»»»»» href body string true* Workload URI
»»»» virtual_service body object false none
»»»»» href body string true* Virtual service URI
»»»» ip_list body sec_policy_virtual_servers_get/properties/created_by false none
»»» consuming_security_principals body [object] false Hrefs of consuming security principals
»»»» href body string true* URI of security principal
»»» unscoped_consumers body boolean false Set the scope for rule consumers to All
»»» network_type body sec_policy_rule_sets_put/properties/rules/items/properties/network_type false Network types that this rule should apply to.
»»» use_workload_subnets body [string] false Whether to use workload subnets instead of IP addresses for the providers/consumers

Enumerated Values

Parameter Value
»»» proto 6
»»» proto 17
»»» providers workloads
»»» providers virtual_services
»»» consumers workloads
»»» consumers virtual_services
»»» actors ams
»»» label_dimension app
»»»» actors ams
»»»» actors container_host
»»»» label_dimension app
»»» network_type brn
»»» network_type non_brn
»»» network_type all
»»» use_workload_subnets providers
»»» use_workload_subnets consumers

Responses

Status Meaning Description Schema
201 Created Success None

Update a Security Rule

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id}

Auditable: Yes

Exposure: Public Stable

Modify Rule

Example Request Body

{
  "enabled": true,
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ingress_services": [
    {
      "href": "string"
    }
  ],
  "resolve_labels_as": {
    "providers": [
      "workloads"
    ],
    "consumers": [
      "workloads"
    ]
  },
  "sec_connect": true,
  "stateless": true,
  "machine_auth": true,
  "providers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "virtual_server": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consuming_security_principals": [
    {
      "href": "string"
    }
  ],
  "update_type": "create",
  "unscoped_consumers": true,
  "network_type": "brn",
  "use_workload_subnets": [
    "providers"
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
rule_set_id path integer true* Rule Set ID
sec_rule_id path integer true* Rule ID
body body sec_policy_rule_sets_sec_rules_put false none
» enabled body boolean false Enabled flag
» description body string false Description
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» ingress_services body [oneOf] false Array of service URI and port/protocol combinations
»» anonymous body sec_policy_virtual_servers_get/properties/created_by false none
»»» href body string true* none
»» anonymous body object false none
»»» port body integer false Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol.
»»» to_port body integer false Upper end of port range; this field should not be included if specifying an individual port.
»»» proto body integer true* Transport protocol (numeric)
»» anonymous body object false none
»»» name body string true* Name (does not need to be unique)
»»» description body string false Description
»»» service_ports body [object] false Service ports
»»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»» proto body integer true* Transport protocol
»»»» icmp_type body integer,null false ICMP Type (integer 0-255 for icmp protocol)
»»»» icmp_code body integer,null false ICMP Code (integer 0-15 for icmp protocol)
»»» windows_services body [sec_policy_services_get/properties/windows_services/items] false Windows services
»»»» service_name body string,null false Name of Windows Service
»»»» process_name body string,null false Name of running process
»»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»» proto body integer,null false Transport protocol
»»»» icmp_type body integer false ICMP Type (integer 0-255 for icmp protocol)
»»»» icmp_code body integer false ICMP Code (integer 0-15 for icmp protocol)
»»» external_data_set body string true* External data set identifier
»»» external_data_reference body string true* External data reference identifier
»» resolve_labels_as body sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as false none
»»» providers body [string] true* none
»»» consumers body [string] true* none
»» sec_connect body boolean false Whether a secure connection is established
»» stateless body boolean false Whether packet filtering is stateless for the rule
»» machine_auth body boolean false Whether machine authentication is enabled
»» providers body [object] false Providers
»»» actors body string false Rule actors are all workloads ('ams')
»»» label_dimension body string false Rule actors that are all workloads with a specific label dimension
»»» exclusion body boolean false Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»» label_group body object false none
»»»» href body string true* Label group URI
»»» workload body object false none
»»»» href body string true* Workload URI
»»» virtual_service body object false none
»»»» href body string true* Virtual service URI
»»» virtual_server body object false none
»»»» href body string true* Virtual server URI
»»» ip_list body object false URI of associated IP List
»»»» href body string true* IP List URI
»»» consumers body [object] false Consumers
»»»» actors body string false Rule actors are all workloads or container host
»»»» label_dimension body string false Rule actors that are all workloads with a specific label dimension
»»»» exclusion body boolean false Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»»» label body sec_policy_virtual_servers_get/properties/created_by false none
»»»» label_group body object false none
»»»»» href body string true* Label group URI
»»»» workload body object false none
»»»»» href body string true* Workload URI
»»»» virtual_service body object false none
»»»»» href body string true* Virtual service URI
»»»» ip_list body sec_policy_virtual_servers_get/properties/created_by false none
»»» consuming_security_principals body [object] false Hrefs of consuming security principals
»»»» href body string true* URI of security principal
»»» update_type body string false Type of update
»»» unscoped_consumers body boolean false Set the scope for rule consumers to All
»»» network_type body sec_policy_rule_sets_put/properties/rules/items/properties/network_type false Network types that this rule should apply to.
»»» use_workload_subnets body [string] false Whether to use workload subnets instead of IP addresses for the providers/consumers

Enumerated Values

Parameter Value
»»» proto 6
»»» proto 17
»»» providers workloads
»»» providers virtual_services
»»» consumers workloads
»»» consumers virtual_services
»»» actors ams
»»» label_dimension app
»»»» actors ams
»»»» actors container_host
»»»» label_dimension app
»»» update_type create
»»» update_type update
»»» update_type delete
»»» network_type brn
»»» network_type non_brn
»»» network_type all
»»» use_workload_subnets providers
»»» use_workload_subnets consumers

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Security Rule

Example Code


curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/rule_sets/{rule_set_id}/sec_rules/{sec_rule_id}

Exposure: Public Stable

Auditable: Yes

Delete Rule

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
rule_set_id path integer true* Rule Set ID
sec_rule_id path integer true* Rule ID

Responses

Status Meaning Description Schema
204 No Content Success None

SAML Configs

Get all SAML configurations

Example Code


curl -X GET /authentication_settings/saml_configs \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/authentication_settings/saml_configs

Exposure: Public Experimental

Auditable: No

Get all SAML configurations

Example Response Body

200 Response

{
  "href": "string",
  "cluster_fqdn": "string",
  "idp_sso_target_url": "string",
  "idp_slo_target_url": "string",
  "idp_cert": "string",
  "issuer": "string",
  "consumer_service_url": "string",
  "consumer_logout_url": "string",
  "name_identifier_format": "string",
  "authn_context": "string",
  "force_authn": true,
  "sign_authn_request": false,
  "pce_signing_cert": "string",
  "pce_signing_cert_expires_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "username": "string"
  },
  "updated_by": {
    "username": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success authentication_settings_saml_configs_get

Get SAML configuration

Example Code


curl -X GET /authentication_settings/saml_configs/{uuid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/authentication_settings/saml_configs/{uuid}

Exposure: Public Experimental

Auditable: No

Get SAML configuration

Parameters

Name In Type Required Description
uuid path string true* SAMLConfig UUID

Example Response Body

200 Response

{
  "href": "string",
  "cluster_fqdn": "string",
  "idp_sso_target_url": "string",
  "idp_slo_target_url": "string",
  "idp_cert": "string",
  "issuer": "string",
  "consumer_service_url": "string",
  "consumer_logout_url": "string",
  "name_identifier_format": "string",
  "authn_context": "string",
  "force_authn": true,
  "sign_authn_request": false,
  "pce_signing_cert": "string",
  "pce_signing_cert_expires_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "username": "string"
  },
  "updated_by": {
    "username": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success authentication_settings_saml_configs_get

Update SAML configuration

Example Code


curl -X PUT /authentication_settings/saml_configs/{uuid} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/authentication_settings/saml_configs/{uuid}

Auditable: Yes

Exposure: Public Experimental

Update SAML configuration

Example Request Body

{
  "idp_sso_target_url": "string",
  "idp_slo_target_url": "string",
  "idp_cert": "string",
  "authn_context": "string",
  "force_authn": true,
  "sign_authn_request": false
}

Parameters

Name In Type Required Description
uuid path string true* SAMLConfig UUID
body body authentication_settings_saml_configs_put false none
» idp_sso_target_url body string false The identity provider URL to which the authentication request should be sent
»» anonymous body string(url) false none
»» anonymous body string false none
» idp_slo_target_url body any false The identity provider URL to which the logout request should be sent
»» anonymous body string(url) false none
»» anonymous body string false none
» idp_cert body string false The certificate provided from the identity provider when setting up the relationship
» authn_context body string false The URI of the authentication context class you want the identity provider to use to authenticate user, with possible values being NULL (unspecified) or urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
» force_authn body boolean false Defines whether or not the identity provider should force re-authentication of the user, even if the user has still a valid session
» sign_authn_request body boolean false Defines whether or not PCE should sign saml authN request to IdP; default is false

Enumerated Values

Parameter Value
»» anonymous
»» anonymous

Responses

Status Meaning Description Schema
204 No Content Success None

Generate a new cert for signing SAML authentication requests

Example Code


curl -X POST /authentication_settings/saml_configs/{uuid}/pce_signing_cert \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/authentication_settings/saml_configs/{uuid}/pce_signing_cert

Auditable: Yes

Exposure: Public Experimental

Generate a new cert for signing SAML AuthN requests

Example Request Body

{}

Parameters

Name In Type Required Description
uuid path string true* SAMLConfig UUID
body body authentication_settings_saml_configs_pce_signing_cert_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Security Policies

Get Security Policy Versions

Example Code


curl -X GET /orgs/{org_id}/sec_policy \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy

Exposure: Public Stable

Auditable: No

Get the collection of committed security policies

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "href": "string",
  "version": 0,
  "workloads_affected": null,
  "commit_message": null,
  "object_counts": {
    "rule_sets": 0,
    "ip_lists": 0,
    "services": 0,
    "virtual_services": 0,
    "label_groups": 0,
    "virtual_servers": 0,
    "firewall_settings": 0,
    "secure_connect_gateways": 0,
    "enforcement_boundaries": 0
  },
  "created_at": "string",
  "created_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_get

Get a Security Policy Version

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}

Exposure: Public Stable

Auditable: No

Get security policy by version

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version

Example Response Body

200 Response

{
  "href": "string",
  "version": 0,
  "workloads_affected": null,
  "commit_message": null,
  "object_counts": {
    "rule_sets": 0,
    "ip_lists": 0,
    "services": 0,
    "virtual_services": 0,
    "label_groups": 0,
    "virtual_servers": 0,
    "firewall_settings": 0,
    "secure_connect_gateways": 0,
    "enforcement_boundaries": 0
  },
  "created_at": "string",
  "created_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_get

Get Security Policy Modifications

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/modified_objects \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/modified_objects

Exposure: Public Experimental

Auditable: No

Get the collection of modified objects in the given version of the policy

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version

Example Response Body

200 Response

{
  "update_type": null,
  "object_type": null,
  "href": null,
  "name": "string",
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_modified_objects_get

Get Pending Security Policy

Example Code


curl -X GET /orgs/{org_id}/sec_policy/pending \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/pending

Exposure: Public Experimental

Auditable: No

Get the collection of pending uncommitted security policy objects.

Parameters

Name In Type Required Description
org_id path integer true* Organization
max_results query integer false Maximum number of policy objects to return (per type)

Example Response Body

200 Response

{
  "rule_sets": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "string",
      "related_ip_lists": [
        {
          "href": "string"
        }
      ],
      "related_services": [
        {
          "href": "string"
        }
      ]
    }
  ],
  "firewall_settings": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "ip_lists": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "services": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "virtual_servers": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "label_groups": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "secure_connect_gateways": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "virtual_services": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "enforcement_boundaries": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_pending_get

Revert the collection of pending uncommitted security policy objects

Example Code


curl -X DELETE /orgs/{org_id}/sec_policy/pending
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/sec_policy/pending

Exposure: Public Experimental

Auditable: Yes

Revert the collection of pending uncommitted security policy objects.

Parameters

Name In Type Required Description
org_id path integer true* Organization

Responses

Status Meaning Description Schema
204 No Content Success None

Revert Pending Security Policy

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/delete \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/delete

Auditable: Yes

Exposure: Public Experimental

Revert the given collection of pending uncommitted security policy objects. The request is rejected if the list does not constitute a dependency closure.

Example Request Body

{
  "change_subset": {
    "label_groups": [
      {
        "href": "string"
      }
    ],
    "services": [
      {
        "href": "string"
      }
    ],
    "rule_sets": [
      {
        "href": "string"
      }
    ],
    "ip_lists": [
      {
        "href": "string"
      }
    ],
    "virtual_services": [
      {
        "href": "string"
      }
    ],
    "firewall_settings": [
      {
        "href": "string"
      }
    ],
    "secure_connect_gateways": [
      {
        "href": "string"
      }
    ],
    "virtual_servers": [
      {
        "href": "string"
      }
    ],
    "enforcement_boundaries": [
      {
        "href": "string"
      }
    ]
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body sec_policy_delete_put false none
» change_subset body sec_policy_post/properties/change_subset false Hash of pending hrefs, organized by model
»» label_groups body [sec_policy_virtual_servers_get/properties/created_by] false none
»»» href body string true* none
»» services body [sec_policy_virtual_servers_get/properties/created_by] false none
»» rule_sets body [sec_policy_virtual_servers_get/properties/created_by] false none
»» ip_lists body [sec_policy_virtual_servers_get/properties/created_by] false none
»» virtual_services body [sec_policy_virtual_servers_get/properties/created_by] false none
»» firewall_settings body [sec_policy_virtual_servers_get/properties/created_by] false none
»» secure_connect_gateways body [sec_policy_virtual_servers_get/properties/created_by] false none
»» virtual_servers body [sec_policy_virtual_servers_get/properties/created_by] false none
»» enforcement_boundaries body [sec_policy_virtual_servers_get/properties/created_by] false none

Responses

Status Meaning Description Schema
204 No Content Success None

Get dependency info for a set of objects

Example Code


curl -X POST /orgs/{org_id}/sec_policy/{pversion}/dependencies \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/dependencies

Auditable: No

Exposure: Public Experimental

Get dependency info for a set of objects. The set can consist of any pending or draft (i.e., updated but not yet committed) policy objects.

Example Request Body

{
  "operation": "commit",
  "change_subset": {
    "label_groups": [
      {
        "href": "string"
      }
    ],
    "services": [
      {
        "href": "string"
      }
    ],
    "rule_sets": [
      {
        "href": "string"
      }
    ],
    "ip_lists": [
      {
        "href": "string"
      }
    ],
    "virtual_services": [
      {
        "href": "string"
      }
    ],
    "firewall_settings": [
      {
        "href": "string"
      }
    ],
    "secure_connect_gateways": [
      {
        "href": "string"
      }
    ],
    "virtual_servers": [
      {
        "href": "string"
      }
    ],
    "enforcement_boundaries": [
      {
        "href": "string"
      }
    ]
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_dependencies_post false none
» operation body string true* Commit or revert
» change_subset body sec_policy_post/properties/change_subset true* Hash of pending hrefs, organized by model
»» label_groups body [sec_policy_virtual_servers_get/properties/created_by] false none
»»» href body string true* none
»» services body [sec_policy_virtual_servers_get/properties/created_by] false none
»» rule_sets body [sec_policy_virtual_servers_get/properties/created_by] false none
»» ip_lists body [sec_policy_virtual_servers_get/properties/created_by] false none
»» virtual_services body [sec_policy_virtual_servers_get/properties/created_by] false none
»» firewall_settings body [sec_policy_virtual_servers_get/properties/created_by] false none
»» secure_connect_gateways body [sec_policy_virtual_servers_get/properties/created_by] false none
»» virtual_servers body [sec_policy_virtual_servers_get/properties/created_by] false none
»» enforcement_boundaries body [sec_policy_virtual_servers_get/properties/created_by] false none

Enumerated Values

Parameter Value
» operation commit
» operation revert

Responses

Status Meaning Description Schema
201 Created Success None

Provision Security Policy Changes

Example Code


curl -X POST /orgs/{org_id}/sec_policy \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy

Auditable: Yes

Exposure: Public Stable

Commit current draft. If a list of entities is supplied explicitly, only the entities in that list would be committed. The request would however be rejected if the list does not constitute a dependency closure.

Example Request Body

{
  "update_description": "string",
  "change_subset": {
    "label_groups": [
      {
        "href": "string"
      }
    ],
    "services": [
      {
        "href": "string"
      }
    ],
    "rule_sets": [
      {
        "href": "string"
      }
    ],
    "ip_lists": [
      {
        "href": "string"
      }
    ],
    "virtual_services": [
      {
        "href": "string"
      }
    ],
    "firewall_settings": [
      {
        "href": "string"
      }
    ],
    "secure_connect_gateways": [
      {
        "href": "string"
      }
    ],
    "virtual_servers": [
      {
        "href": "string"
      }
    ],
    "enforcement_boundaries": [
      {
        "href": "string"
      }
    ]
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body sec_policy_post false none
» update_description body string false Optional description for the requested change or update.
» change_subset body sec_policy_post/properties/change_subset false Hash of pending hrefs, organized by model
»» label_groups body [sec_policy_virtual_servers_get/properties/created_by] false none
»»» href body string true* none
»» services body [sec_policy_virtual_servers_get/properties/created_by] false none
»» rule_sets body [sec_policy_virtual_servers_get/properties/created_by] false none
»» ip_lists body [sec_policy_virtual_servers_get/properties/created_by] false none
»» virtual_services body [sec_policy_virtual_servers_get/properties/created_by] false none
»» firewall_settings body [sec_policy_virtual_servers_get/properties/created_by] false none
»» secure_connect_gateways body [sec_policy_virtual_servers_get/properties/created_by] false none
»» virtual_servers body [sec_policy_virtual_servers_get/properties/created_by] false none
»» enforcement_boundaries body [sec_policy_virtual_servers_get/properties/created_by] false none

Responses

Status Meaning Description Schema
201 Created Success None

Restore Previous Security Policy

Example Code


curl -X POST /orgs/{org_id}/sec_policy/{pversion}/restore \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/restore

Auditable: Yes

Exposure: Public Stable

Restore security policy to this version

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_restore_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Determine which rules allow or block communication

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/policy_check \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/policy_check

Exposure: Public Experimental

Auditable: No

Determine which rules allow or block communication

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
dst_container_workload query string false The URI of the destination container workload
dst_external_ip query string false The external IP of the destination workload
dst_workload query string false The URI of the destination workload
network_type query string false Type of network to check
port query integer false The specific port number to check
protocol query integer false The specific protocol number to check
service query string false The specific service to check
src_container_workload query string false The URI of the source container workload
src_external_ip query string false The external IP of the source workload
src_workload query string false The URI of the source workload

Enumerated Values

Parameter Value
network_type any
network_type brn
network_type non_brn

Example Response Body

200 Response

{
  "sec_rules": [
    {
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": {
        "username": "string"
      },
      "updated_by": {
        "username": "string"
      },
      "deleted_by": null,
      "update_type": null,
      "update_label": null,
      "href": "string",
      "enabled": true,
      "description": null,
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "egress_services": [
        {
          "href": "string"
        }
      ],
      "resolve_labels_as": {
        "providers": [
          "workloads"
        ],
        "consumers": [
          "workloads"
        ]
      },
      "sec_connect": true,
      "stateless": true,
      "machine_auth": true,
      "providers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string"
          },
          "virtual_service": {
            "href": "string",
            "name": null
          },
          "virtual_server": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string",
            "name": null,
            "hostname": null,
            "deleted": null
          },
          "virtual_service": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consuming_security_principals": [
        {
          "href": "string",
          "sid": "string",
          "name": "string",
          "description": "string",
          "deleted": true,
          "used_by_ruleset": true
        }
      ],
      "unscoped_consumers": true,
      "use_workload_subnets": [
        "providers"
      ],
      "rule_set": {
        "created_at": "2025-04-01T00:21:27Z",
        "updated_at": "2025-04-01T00:21:27Z",
        "deleted_at": null,
        "created_by": {
          "username": "string"
        },
        "updated_by": {
          "username": "string"
        },
        "deleted_by": null,
        "update_type": null,
        "update_label": null,
        "href": "string",
        "name": "string",
        "enabled": true,
        "external_data_set": null,
        "external_data_reference": null,
        "scopes": [
          [
            {
              "exclusion": false,
              "label": {
                "href": "string",
                "key": "string",
                "value": "string"
              },
              "label_group": {
                "href": "string",
                "key": "string",
                "name": "string"
              }
            }
          ]
        ],
        "caps": [
          "write"
        ]
      },
      "log_flow": true,
      "network_type": "brn"
    }
  ],
  "deny_rules": [
    {
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": null,
      "updated_by": null,
      "deleted_by": null,
      "update_type": "create",
      "href": "string",
      "providers": [
        {
          "actors": "ams",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "egress_services": [
        {
          "href": "string"
        }
      ],
      "caps": [
        "write"
      ],
      "enabled": true,
      "description": null,
      "network_type": "brn",
      "override": false,
      "unscoped_consumers": true
    }
  ],
  "override_deny_rules": [
    {
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": null,
      "updated_by": null,
      "deleted_by": null,
      "update_type": "create",
      "href": "string",
      "providers": [
        {
          "actors": "ams",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "egress_services": [
        {
          "href": "string"
        }
      ],
      "caps": [
        "write"
      ],
      "enabled": true,
      "description": null,
      "network_type": "brn",
      "override": false,
      "unscoped_consumers": true
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_policy_check_get

Security Policy Check

Get Rules Allowing Communication

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/allow \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/allow

Exposure: Public Experimental

Auditable: No

Determine which rule(s) allow communication, if any

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
dst_container_workload query string false The URI of the destination container workload
dst_external_ip query string false The external IP of the destination workload
dst_workload query string false The URI of the destination workload
network_type query string false Type of network to check
port query integer false The specific port number to check
protocol query integer false The specific protocol number to check
service query string false The specific service to check
src_container_workload query string false The URI of the source container workload
src_external_ip query string false The external IP of the source workload
src_workload query string false The URI of the source workload

Enumerated Values

Parameter Value
network_type brn
network_type non_brn

Example Response Body

200 Response

[
  {
    "href": "string",
    "created_at": "2025-04-01T00:21:27Z",
    "updated_at": "2025-04-01T00:21:27Z",
    "deleted_at": null,
    "created_by": {
      "href": "string"
    },
    "updated_by": {
      "href": "string"
    },
    "deleted_by": null,
    "enabled": true,
    "description": null,
    "external_data_set": null,
    "external_data_reference": null,
    "ingress_services": [
      {
        "href": "string"
      }
    ],
    "resolve_labels_as": {
      "providers": [
        "workloads"
      ],
      "consumers": [
        "workloads"
      ]
    },
    "sec_connect": true,
    "stateless": true,
    "machine_auth": true,
    "providers": [
      {
        "actors": "ams",
        "label_dimension": "app",
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        },
        "workload": {
          "href": "string"
        },
        "virtual_service": {
          "href": "string",
          "name": null
        },
        "virtual_server": {
          "href": "string"
        },
        "ip_list": {
          "href": "string",
          "created_at": "2025-04-01T00:21:27Z",
          "updated_at": "2025-04-01T00:21:27Z",
          "deleted_at": null,
          "created_by": {
            "href": "string"
          },
          "updated_by": {
            "href": "string"
          },
          "deleted_by": null,
          "update_type": "create",
          "name": "string"
        }
      }
    ],
    "consumers": [
      {
        "actors": "ams",
        "label_dimension": "app",
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        },
        "workload": {
          "href": "string",
          "name": null,
          "hostname": null,
          "deleted": null
        },
        "virtual_service": {
          "href": "string"
        },
        "ip_list": {
          "href": "string",
          "created_at": "2025-04-01T00:21:27Z",
          "updated_at": "2025-04-01T00:21:27Z",
          "deleted_at": null,
          "created_by": {
            "href": "string"
          },
          "updated_by": {
            "href": "string"
          },
          "deleted_by": null,
          "update_type": "create",
          "name": "string"
        }
      }
    ],
    "consuming_security_principals": [
      {
        "href": "string",
        "sid": "string",
        "name": "string",
        "description": "string",
        "deleted": true,
        "used_by_ruleset": true
      }
    ],
    "unscoped_consumers": true,
    "update_type": "create",
    "network_type": "brn",
    "use_workload_subnets": [
      "providers"
    ]
  }
]

Responses

Status Meaning Description Schema
200 OK Success sec_policy_allow_get

Security Principals

Get Security Principals

Example Code


curl -X GET /orgs/{org_id}/security_principals \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/security_principals

Exposure: Public Stable

Auditable: No

Get all security principals for an org

Parameters

Name In Type Required Description
org_id path integer true* Organization
max_results query integer false Maximum number of entries to return
name query string false Name of security principal to filter by
sid query string false SID of security principal to filter by

Example Response Body

200 Response

{
  "href": "string",
  "sid": "string",
  "name": "string",
  "description": "string",
  "deleted": true,
  "used_by_ruleset": true
}

Responses

Status Meaning Description Schema
200 OK Success security_principals_get

Get a Security Principal

Example Code


curl -X GET /orgs/{org_id}/security_principals/{sid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/security_principals/{sid}

Exposure: Public Stable

Auditable: No

Get the info for one SID

Parameters

Name In Type Required Description
org_id path integer true* Organization
sid path string true* Security principal SID

Example Response Body

200 Response

{
  "href": "string",
  "sid": "string",
  "name": "string",
  "description": "string",
  "deleted": true,
  "used_by_ruleset": true
}

Responses

Status Meaning Description Schema
200 OK Success security_principals_get

Create a Security Principal

Example Code


curl -X POST /orgs/{org_id}/security_principals \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/security_principals

Auditable: Yes

Exposure: Public Stable

Create a new security principal for an org

Example Request Body

{
  "sid": "string",
  "name": "string",
  "description": "string"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body security_principals_post false none
» sid body string true* Active Directory SID
» name body string true* Name of the security principal
» description body string false A longer description of the security principal

Responses

Status Meaning Description Schema
201 Created Success None

Bulk Create Security Principals

Example Code


curl -X PUT /orgs/{org_id}/security_principals/bulk_create \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/security_principals/bulk_create

Auditable: Yes

Exposure: Public Stable

Bulk create security principals for an org

Example Request Body

[
  {
    "sid": "string",
    "name": "string",
    "description": "string"
  }
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body security_principals_bulk_create_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Update a Security Principal

Example Code


curl -X PUT /orgs/{org_id}/security_principals/{sid} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/security_principals/{sid}

Auditable: Yes

Exposure: Public Stable

Modify the security principal for one SID

Example Request Body

{
  "name": "string",
  "description": "string"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
sid path string true* Security principal SID
body body security_principals_put false none
» name body string false Name of the security principal
» description body string false A longer description of the security principal

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Security Principal

Example Code


curl -X DELETE /orgs/{org_id}/security_principals/{sid}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/security_principals/{sid}

Exposure: Public Stable

Auditable: Yes

Delete a specific security principal

Parameters

Name In Type Required Description
org_id path integer true* Organization
sid path string true* Security principal SID

Responses

Status Meaning Description Schema
204 No Content Success None

Selective Enforcement Rules

Server Load Balancers

Get a List of Server Load Balancers

Example Code


curl -X GET /orgs/{org_id}/slbs \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/slbs

Exposure: Public Experimental

Auditable: No

Get the server load balancers

Parameters

Name In Type Required Description
org_id path integer true* Organization
description query string false Description of the SLB to filter. Supports partial matches
device_type query string false Device type to filter
has_virtual_server query boolean false Filtering criteria - if the SLB has a virtual server
max_results query integer false Maximum number of SLBs to return.
name query string false Name on which to filter. Supports partial matches
num_devices query integer false Number of devices to filter
status query string false SLB status to filter

Enumerated Values

Parameter Value
num_devices 1
num_devices 2
status active
status pending
status error

Example Response Body

200 Response

{
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "devices": [
    {
      "href": "string",
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      },
      "status": {
        "connection_state": "pending",
        "software_version": "string",
        "sync_state": "in_sync"
      }
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success slbs_get

Create a Server Load Balancer

Example Code


curl -X POST /orgs/{org_id}/slbs \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/slbs

Auditable: Yes

Exposure: Public Experimental

Create a server load balancer

Example Request Body

{
  "name": "string",
  "description": "string",
  "nfc": {
    "href": "string"
  },
  "network_enforcement_node": {
    "href": "string"
  },
  "device_type": "string",
  "devices": [
    {
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      }
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body slbs_post false none
» name body string true* The short friendly name of the server load balancer
» description body string false The long description of the server load balancer
» nfc body object false DEPRECATED AND REPLACED (USE 'network_enforcement_node' INSTEAD) Network Function Controller that should manage this SLB. Can be skipped if there exists only 1 NFC in the system, or if there are no NFCs, in which case, the server would auto-deploy an NFC to manage the new SLB (and any SLBs created thereafter). Cannot be used along with network_enforcement_node
»» href body string true* NFC URI
» network_enforcement_node body object false Network enforcement node that should manage this SLB. Can be skipped if there exists only 1 NEN in the system, or if there are no NENs, in which case, the server would auto-deploy an NEN to manage the new SLB (and any SLBs created thereafter). Cannot be used along with nfc
»» href body string true* Network enforcement node URI
» device_type body slbs_post/properties/device_type true* Device type of the server load balancer
» devices body [object] true* Management configuration of the devices associated with this SLB Network VF.
»» config body slbs_post/properties/devices/items/properties/config true* Management configuration info for the SLB device.
»»» host body string false The IP or fqdn of the device
»»» port body integer false Host port
»»» credential_type body string false Type of the credentials
»»» username body string false username for credential
»»» credential body string,null false credential
»»» check_certificate body boolean false Whether enforce peer certificate verify

Enumerated Values

Parameter Value
»»» credential_type password

Responses

Status Meaning Description Schema
201 Created Success None

Get the Specified Server Load Balancer Info

Example Code


curl -X GET /orgs/{org_id}/slbs/{slb_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/slbs/{slb_id}

Exposure: Public Experimental

Auditable: No

Get the server load balancer information

Parameters

Name In Type Required Description
org_id path integer true* Organization
slb_id path string true* Slb UUID

Example Response Body

200 Response

{
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "devices": [
    {
      "href": "string",
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      },
      "status": {
        "connection_state": "pending",
        "software_version": "string",
        "sync_state": "in_sync"
      }
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success slbs_get

Delete the Specified Server Load Balancer

Example Code


curl -X DELETE /orgs/{org_id}/slbs/{slb_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/slbs/{slb_id}

Exposure: Public Experimental

Auditable: Yes

Delete the server load balancer

Parameters

Name In Type Required Description
org_id path integer true* Organization
slb_id path string true* Slb UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Update the Specified Server Load Balancer Info

Example Code


curl -X PUT /orgs/{org_id}/slbs/{slb_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/slbs/{slb_id}

Auditable: Yes

Exposure: Public Experimental

Update the server load balancer information

Example Request Body

{
  "name": "string",
  "description": "string",
  "nfc": {
    "href": "string"
  },
  "network_enforcement_node": {
    "href": "string"
  },
  "device_type": "string",
  "devices": [
    {
      "href": "string",
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      }
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
slb_id path string true* Slb UUID
body body slbs_put false none
» name body string false The short friendly name of the server load balancer
» description body string false The long description of the server load balancer
» nfc body object false DEPRECATED AND REPLACED (USE 'network_enforcement_node' INSTEAD) Network function controller managing this SLB
»» href body string true* NFC URI
» network_enforcement_node body object false Network enforcement node managing this SLB
»» href body string true* Network enforcement node URI
» device_type body slbs_post/properties/device_type false Device type of the server load balancer
» devices body [object] false Management configuration of the devices associated with this SLB Network VF.
»» href body string true* SLB device URI.
»» config body slbs_post/properties/devices/items/properties/config false Management configuration info for the SLB device.
»»» host body string false The IP or fqdn of the device
»»» port body integer false Host port
»»» credential_type body string false Type of the credentials
»»» username body string false username for credential
»»» credential body string,null false credential
»»» check_certificate body boolean false Whether enforce peer certificate verify

Enumerated Values

Parameter Value
»»» credential_type password

Responses

Status Meaning Description Schema
204 No Content Success None

Services

Get Security Policy Services

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/services \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/services

Exposure: Public Stable

Auditable: No

Get the collection of Services

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
description query string false Description of Service(s) to return. Supports partial matches
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
include_ransomware_protection_percent query boolean false Include average protection percent in ransomware object.
is_ransomware query boolean false Services associated with ransomware.
max_results query integer false Maximum number of Services to return.
name query string false Name of Service(s) to return. Supports partial matches
port query string false Specify port or port range to filter results. The range is from -1 to 65535 (0 is not supported).
proto query integer false Protocol to filter on

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": "string",
  "risk_details": {
    "ransomware": null
  },
  "description_url": "string",
  "process_name": "string",
  "service_ports": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0,
      "icmp_type": null,
      "icmp_code": null
    }
  ],
  "windows_services": [
    {
      "service_name": null,
      "process_name": null,
      "port": 0,
      "to_port": 0,
      "proto": null,
      "icmp_type": 0,
      "icmp_code": 0
    }
  ],
  "external_data_set": null,
  "external_data_reference": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": {
    "href": "string"
  },
  "update_type": "string"
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_services_get

Get a Security Policy Service

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/services/{service_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/services/{service_id}

Exposure: Public Stable

Auditable: No

Get Service by id

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
service_id path string true* Service ID

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "description": "string",
  "risk_details": {
    "ransomware": null
  },
  "description_url": "string",
  "process_name": "string",
  "service_ports": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0,
      "icmp_type": null,
      "icmp_code": null
    }
  ],
  "windows_services": [
    {
      "service_name": null,
      "process_name": null,
      "port": 0,
      "to_port": 0,
      "proto": null,
      "icmp_type": 0,
      "icmp_code": 0
    }
  ],
  "external_data_set": null,
  "external_data_reference": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": {
    "href": "string"
  },
  "update_type": "string"
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_services_get

Create a Security Policy Service

Example Code


curl -X POST /orgs/{org_id}/sec_policy/{pversion}/services \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/services

Auditable: Yes

Exposure: Public Stable

Create new Service

Example Request Body

{
  "name": "string",
  "description": "string",
  "risk_details": {
    "ransomware": {
      "category": "admin",
      "severity": "low",
      "os_platforms": [
        "windows"
      ]
    }
  },
  "process_name": "string",
  "service_ports": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0,
      "icmp_type": null,
      "icmp_code": null
    }
  ],
  "windows_services": [
    {
      "service_name": null,
      "process_name": null,
      "port": 0,
      "to_port": 0,
      "proto": null,
      "icmp_type": 0,
      "icmp_code": 0
    }
  ],
  "external_data_set": null,
  "external_data_reference": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_services_post false none
» name body string true* Name (does not need to be unique)
» description body string false Description
» risk_details body object false none
»» ransomware body object false none
»»» category body string false Categorization based on Admin or Legacy port used in the service
»»» severity body string false Severity of this service
»»» os_platforms body [string] false Operating system for this ransomware service
»» process_name body string false The process name
»» service_ports body [object] false Service ports
»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»» proto body integer true* Transport protocol
»»» icmp_type body integer,null false ICMP Type (integer 0-255 for icmp protocol)
»»» icmp_code body integer,null false ICMP Code (integer 0-15 for icmp protocol)
»» windows_services body [sec_policy_services_get/properties/windows_services/items] false Windows services
»»» service_name body string,null false Name of Windows Service
»»» process_name body string,null false Name of running process
»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»» proto body integer,null false Transport protocol
»»» icmp_type body integer false ICMP Type (integer 0-255 for icmp protocol)
»»» icmp_code body integer false ICMP Code (integer 0-15 for icmp protocol)
»» external_data_set body string,null false External data set identifier
»» external_data_reference body string,null false External data reference identifier

Enumerated Values

Parameter Value
»»» category admin
»»» category legacy
»»» severity low
»»» severity medium
»»» severity high
»»» severity critical
»»» os_platforms windows
»»» os_platforms linux

Responses

Status Meaning Description Schema
201 Created Success None

Update a Security Policy Service

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/services/{service_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/services/{service_id}

Auditable: Yes

Exposure: Public Stable

Modify Service

Example Request Body

{
  "name": "string",
  "description": "string",
  "risk_details": {
    "ransomware": {
      "category": "admin",
      "severity": "low",
      "os_platforms": [
        "windows"
      ]
    }
  },
  "process_name": "string",
  "service_ports": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0,
      "icmp_type": null,
      "icmp_code": null
    }
  ],
  "windows_services": [
    {
      "service_name": null,
      "process_name": null,
      "port": 0,
      "to_port": 0,
      "proto": null,
      "icmp_type": 0,
      "icmp_code": 0
    }
  ],
  "external_data_set": null,
  "external_data_reference": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
service_id path string true* Service ID
body body sec_policy_services_put false none
» name body string false Name (does not need to be unique)
» description body string false Description
» risk_details body object false none
»» ransomware body object false none
»»» category body string false Categorization based on Admin or Legacy port used in the service
»»» severity body string false Severity of this service
»»» os_platforms body [string] false Operating system for this ransomware service
»» process_name body string false The process name
»» service_ports body [object] false Service ports
»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»» proto body integer true* Transport protocol
»»» icmp_type body integer,null false ICMP Type (integer 0-255 for icmp protocol)
»»» icmp_code body integer,null false ICMP Code (integer 0-15 for icmp protocol)
»» windows_services body [sec_policy_services_get/properties/windows_services/items] false Windows services
»»» service_name body string,null false Name of Windows Service
»»» process_name body string,null false Name of running process
»»» port body integer false Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»» proto body integer,null false Transport protocol
»»» icmp_type body integer false ICMP Type (integer 0-255 for icmp protocol)
»»» icmp_code body integer false ICMP Code (integer 0-15 for icmp protocol)
»» external_data_set body string,null false External data set identifier
»» external_data_reference body string,null false External data reference identifier

Enumerated Values

Parameter Value
»»» category admin
»»» category legacy
»»» severity low
»»» severity medium
»»» severity high
»»» severity critical
»»» os_platforms windows
»»» os_platforms linux

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Security Policy Service

Example Code


curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/services/{service_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/services/{service_id}

Exposure: Public Stable

Auditable: Yes

Delete Service

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
service_id path string true* Service ID

Responses

Status Meaning Description Schema
204 No Content Success None

Service Bindings

Return all virtual service bindings

Example Code


curl -X GET /orgs/{org_id}/service_bindings \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/service_bindings

Exposure: Public Experimental

Auditable: No

Return all virtual service bindings

Parameters

Name In Type Required Description
org_id path integer true* Organization
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
max_results query integer false Maximum number of virtual service bindings to return.
virtual_service query string false Virtual service URI
workload query string false Workload URI

Example Response Body

200 Response

[
  {}
]

Responses

Status Meaning Description Schema
200 OK Success service_bindings_get

Create a virtual service binding

Example Code


curl -X POST /orgs/{org_id}/service_bindings \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/service_bindings

Auditable: Yes

Exposure: Public Experimental

Create a bound service binding

Example Request Body

[
  {}
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body service_bindings_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Get service binding by ID

Example Code


curl -X GET /orgs/{org_id}/service_bindings/{service_binding_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/service_bindings/{service_binding_id}

Exposure: Public Experimental

Auditable: No

Get service binding by id

Parameters

Name In Type Required Description
org_id path integer true* Organization
service_binding_id path string true* Service Binding ID

Example Response Body

200 Response

[
  {}
]

Responses

Status Meaning Description Schema
200 OK Success service_bindings_get

Delete a service binding by ID

Example Code


curl -X DELETE /orgs/{org_id}/service_bindings/{service_binding_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/service_bindings/{service_binding_id}

Exposure: Public Experimental

Auditable: Yes

Delete a service binding by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
service_binding_id path string true* Service Binding ID

Responses

Status Meaning Description Schema
204 No Content Success None

Support Bundle Requests

Return the collection of PCE support bundle requests

Example Code


curl -X GET /orgs/{org_id}/support_bundle_requests \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/support_bundle_requests

Exposure: Public Experimental

Auditable: No

Return the collection of PCE support bundle requests

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "href": {
    "href": "string"
  },
  "name": "string",
  "download_url": {
    "href": "string"
  },
  "requested_at": "2025-04-01T00:21:27Z",
  "completed_at": null,
  "status": "string",
  "created_by": {
    "href": "string"
  },
  "include_logs": true,
  "starting_at": null,
  "ending_at": null
}

Responses

Status Meaning Description Schema
200 OK Success support_bundle_requests_get

Create a PCE support bundle request

Example Code


curl -X POST /orgs/{org_id}/support_bundle_requests \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/support_bundle_requests

Auditable: Yes

Exposure: Public Experimental

Create a PCE support bundle request

Example Request Body

{
  "include_logs": true,
  "starting_at": null,
  "ending_at": null
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
ending_at query string false Time at which to exclude entries
include_logs query boolean false Indicate whether to include logs
starting_at query string false Time from which to include entries
body body support_bundle_requests_post false none
» include_logs body boolean false Set to true if logs are to be included
» starting_at body string,null(date-time) false Start date for log filtering
» ending_at body string,null(date-time) false End date for log filtering.

Responses

Status Meaning Description Schema
201 Created Success None

Delete a PCE support bundle request

Example Code


curl -X DELETE /orgs/{org_id}/support_bundle_requests/{uuid}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/support_bundle_requests/{uuid}

Exposure: Public Experimental

Auditable: Yes

Delete a PCE support bundle request

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* Support bundle request UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Return a specific PCE support bundle request

Example Code


curl -X GET /orgs/{org_id}/support_bundle_requests/{uuid} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/support_bundle_requests/{uuid}

Exposure: Public Experimental

Auditable: No

Return a specific PCE support bundle request

Parameters

Name In Type Required Description
org_id path integer true* Organization
uuid path string true* Support bundle request UUID

Example Response Body

200 Response

{
  "href": {
    "href": "string"
  },
  "name": "string",
  "download_url": {
    "href": "string"
  },
  "requested_at": "2025-04-01T00:21:27Z",
  "completed_at": null,
  "status": "string",
  "created_by": {
    "href": "string"
  },
  "include_logs": true,
  "starting_at": null,
  "ending_at": null
}

Responses

Status Meaning Description Schema
200 OK Success support_bundle_requests_get

Syslog Destinations

Get Syslog Destinations

Example Code


curl -X GET /orgs/{org_id}/settings/syslog/destinations \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/settings/syslog/destinations

Exposure: Public Stable

Auditable: No

Get syslog destinations for the org

Parameters

Name In Type Required Description
org_id path integer true* Org ID

Example Response Body

200 Response

[
  {
    "href": "string",
    "pce_scope": [
      "string"
    ],
    "type": "string",
    "description": "string",
    "audit_event_logger": {
      "configuration_event_included": true,
      "system_event_included": true,
      "min_severity": "error"
    },
    "traffic_event_logger": {
      "traffic_flow_allowed_event_included": true,
      "traffic_flow_potentially_blocked_event_included": true,
      "traffic_flow_blocked_event_included": true
    },
    "node_status_logger": {
      "node_status_included": true
    },
    "remote_syslog": {
      "address": "string",
      "port": 0,
      "protocol": 0,
      "tls_enabled": true,
      "tls_ca_bundle": "string",
      "tls_verify_cert": true
    }
  }
]

Responses

Status Meaning Description Schema
200 OK Success settings_syslog_destinations_get

Get a Syslog Destination

Example Code


curl -X GET /orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id}

Exposure: Public Stable

Auditable: No

Get a PCE destination by UUID

Parameters

Name In Type Required Description
org_id path integer true* Org ID
syslog_destination_id path string true* PCE destination UUID

Example Response Body

200 Response

[
  {
    "href": "string",
    "pce_scope": [
      "string"
    ],
    "type": "string",
    "description": "string",
    "audit_event_logger": {
      "configuration_event_included": true,
      "system_event_included": true,
      "min_severity": "error"
    },
    "traffic_event_logger": {
      "traffic_flow_allowed_event_included": true,
      "traffic_flow_potentially_blocked_event_included": true,
      "traffic_flow_blocked_event_included": true
    },
    "node_status_logger": {
      "node_status_included": true
    },
    "remote_syslog": {
      "address": "string",
      "port": 0,
      "protocol": 0,
      "tls_enabled": true,
      "tls_ca_bundle": "string",
      "tls_verify_cert": true
    }
  }
]

Responses

Status Meaning Description Schema
200 OK Success settings_syslog_destinations_get

Create a Syslog Destination

Example Code


curl -X POST /orgs/{org_id}/settings/syslog/destinations \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/settings/syslog/destinations

Auditable: Yes

Exposure: Public Stable

Post a new syslog destinations for org

Example Request Body

{
  "pce_scope": [
    "string"
  ],
  "type": "local_syslog",
  "description": "string",
  "audit_event_logger": {
    "configuration_event_included": true,
    "system_event_included": true,
    "min_severity": "error"
  },
  "traffic_event_logger": {
    "traffic_flow_allowed_event_included": true,
    "traffic_flow_potentially_blocked_event_included": true,
    "traffic_flow_blocked_event_included": true
  },
  "node_status_logger": {
    "node_status_included": true
  },
  "remote_syslog": {
    "address": "string",
    "port": 0,
    "protocol": 0,
    "tls_enabled": true,
    "tls_ca_bundle": "string",
    "tls_verify_cert": true
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
body body settings_syslog_destinations_post false none
» pce_scope body [string] true* none
» type body string true* Destination type
» description body string true* Description of the destination
» audit_event_logger body object true* none
»» configuration_event_included body boolean true* Configuration (Northbound) auditable events
»» system_event_included body boolean true* System (PCE) auditable events
»» min_severity body settings_syslog_destinations_post/properties/audit_event_logger/properties/min_severity true* Minimum severity level of audit event messages.
» traffic_event_logger body object true* none
»» traffic_flow_allowed_event_included body boolean true* Set to enable traffic flow events
»» traffic_flow_potentially_blocked_event_included body boolean true* Set to enable traffic flow events
»» traffic_flow_blocked_event_included body boolean true* Set to enable traffic flow events
» node_status_logger body object true* none
»» node_status_included body boolean true* Syslog messages regarding status of the nodes
» remote_syslog body object false none
»» address body string true* The remote syslog IP or DNS address
»» port body integer true* The remote syslog port
»» protocol body integer true* The protocol for streaming syslog messages
»» tls_enabled body boolean true* To enable TLS
»» tls_ca_bundle body string false Trustee CA bundle
»» tls_verify_cert body boolean true* Perform TLS verification

Enumerated Values

Parameter Value
» type local_syslog
» type remote_syslog
»» min_severity error
»» min_severity warning
»» min_severity informational

Responses

Status Meaning Description Schema
201 Created Success None

Update a Syslog Destination

Example Code


curl -X PUT /orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id}

Auditable: Yes

Exposure: Public Stable

Create or Update a syslog destination

Example Request Body

{
  "href": "string",
  "pce_scope": [
    "string"
  ],
  "type": "local_syslog",
  "description": "string",
  "audit_event_logger": {
    "configuration_event_included": true,
    "system_event_included": true,
    "min_severity": "error"
  },
  "traffic_event_logger": {
    "traffic_flow_allowed_event_included": true,
    "traffic_flow_potentially_blocked_event_included": true,
    "traffic_flow_blocked_event_included": true
  },
  "node_status_logger": {
    "node_status_included": true
  },
  "remote_syslog": {
    "address": "string",
    "port": 0,
    "protocol": 0,
    "tls_enabled": true,
    "tls_ca_bundle": "string",
    "tls_verify_cert": true
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
syslog_destination_id path string true* PCE destination UUID
body body settings_syslog_destinations_put false none
» href body string false URI of the destination
» pce_scope body [string] false none
» type body string false Destination type
» description body string false Description of the destination
» audit_event_logger body object false none
»» configuration_event_included body boolean false Configuration (Northbound) auditable events
»» system_event_included body boolean false System (PCE) auditable events
»» min_severity body settings_syslog_destinations_post/properties/audit_event_logger/properties/min_severity false Minimum severity level of audit event messages.
» traffic_event_logger body object false none
»» traffic_flow_allowed_event_included body boolean false Set to enable traffic flow events
»» traffic_flow_potentially_blocked_event_included body boolean false Set to enable traffic flow events
»» traffic_flow_blocked_event_included body boolean false Set to enable traffic flow events
» node_status_logger body object false none
»» node_status_included body boolean false Syslog messages regarding status of the nodes
» remote_syslog body object false none
»» address body string false The remote syslog IP or DNS address
»» port body integer false The remote syslog port
»» protocol body integer false The protocol for streaming syslog messages
»» tls_enabled body boolean false To enable TLS
»» tls_ca_bundle body string false Trustee CA bundle
»» tls_verify_cert body boolean false Perform TLS verification

Enumerated Values

Parameter Value
» type local_syslog
» type remote_syslog
»» min_severity error
»» min_severity warning
»» min_severity informational

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Syslog Destination

Example Code


curl -X DELETE /orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/settings/syslog/destinations/{syslog_destination_id}

Exposure: Public Stable

Auditable: Yes

Delete destination by UUID

Parameters

Name In Type Required Description
org_id path integer true* Org ID
syslog_destination_id path string true* PCE destination UUID

Responses

Status Meaning Description Schema
204 No Content Success None

System Events

Get System Events

Example Code


curl -X GET /system_events \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/system_events

Exposure: Public Stable

Auditable: No

Get a list of system events

Parameters

Name In Type Required Description
created_by query string false User, agent, or system that created the event
event_type query string false Type of event
max_results query integer false Maximum number of results to return
severity query string false Severity of event
status query string false Status of event
timestamp[gte] query string false Earliest event date to return (RFC 3339 format)
timestamp[lte] query string false Latest event date to return (RFC 3339 format)

Enumerated Values

Parameter Value
severity emerg
severity alert
severity crit
severity warning
severity err
severity notice
severity info
severity debug
status success
status failure
timestamp[gte] success
timestamp[gte] failure
timestamp[lte] success
timestamp[lte] failure

Example Response Body

200 Response

{
  "href": "string",
  "org_id": 0,
  "version": "string",
  "event_id": "string",
  "event_type": "string",
  "status": "string",
  "severity": "string",
  "timestamp": "2025-04-01T00:21:27Z",
  "pce_fqdn": "string",
  "created_by": {},
  "action": null,
  "resource_changes": [
    {
      "href": "string",
      "version": "string",
      "org_id": 0,
      "uuid": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "resource": null,
      "changes": {},
      "change_type": "string"
    }
  ],
  "notifications": [
    {
      "href": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "notification_type": "string",
      "severity": "err",
      "info": null
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success system_events_get

Get a System Event

Example Code


curl -X GET /system_events/{composite_log_event_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/system_events/{composite_log_event_id}

Exposure: Public Stable

Auditable: No

Get a system event by id

Parameters

Name In Type Required Description
composite_log_event_id path string true* UUID of system event to return

Example Response Body

200 Response

{
  "href": "string",
  "org_id": 0,
  "version": "string",
  "event_id": "string",
  "event_type": "string",
  "status": "string",
  "severity": "string",
  "timestamp": "2025-04-01T00:21:27Z",
  "pce_fqdn": "string",
  "created_by": {},
  "action": null,
  "resource_changes": [
    {
      "href": "string",
      "version": "string",
      "org_id": 0,
      "uuid": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "resource": null,
      "changes": {},
      "change_type": "string"
    }
  ],
  "notifications": [
    {
      "href": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "notification_type": "string",
      "severity": "err",
      "info": null
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success system_events_get

Traffic Analysis Queries (deprecated)

DEPRECATED AND REPLACED (USE traffic_flows/async_queries INSTEAD)

Example Code


curl -X POST /orgs/{org_id}/traffic_flows/traffic_analysis_queries \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/traffic_flows/traffic_analysis_queries

Auditable: No

Exposure: Public Experimental

DEPRECATED AND REPLACED (USE traffic_flows/async_queries INSTEAD)

Example Request Body

null

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body traffic_flows_traffic_analysis_queries_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Traffic Collector Settings

Get Settings Traffic Collectors

Example Code


curl -X GET /orgs/{org_id}/settings/traffic_collector \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/settings/traffic_collector

Exposure: Public Stable

Auditable: No

Get traffic_collector settings for the org

Parameters

Name In Type Required Description
org_id path integer true* Org ID

Example Response Body

200 Response

{
  "href": "string",
  "transmission": "string",
  "data_source": "string",
  "network": "string",
  "target": {
    "src_port": 0,
    "dst_port": 0,
    "proto": 0,
    "dst_ip": "string",
    "src_ip": "string"
  },
  "action": "string"
}

Responses

Status Meaning Description Schema
200 OK Success settings_traffic_collector_get

Create a Settings Traffic Collector

Example Code


curl -X POST /orgs/{org_id}/settings/traffic_collector \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/settings/traffic_collector

Auditable: Yes

Exposure: Public Stable

Post a new traffic_collector setting for org

Example Request Body

{
  "transmission": "broadcast",
  "data_source": "any",
  "network": "any",
  "target": {
    "src_port": 0,
    "dst_port": 0,
    "proto": 0,
    "dst_ip": "string",
    "src_ip": "string"
  },
  "action": "drop"
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
body body settings_traffic_collector_post false none
» transmission body string true* transmission type: broadcast/multicast/unicast
» data_source body string false flow summary data source
» network body string false flow summary network
» target body object false none
»» src_port body integer false none
»» dst_port body integer false none
»» proto body integer true* none
»» dst_ip body string false single destination ip address or CIDR
»» src_ip body string false single source ip address or CIDR
» action body string true* drop or aggregate the target traffic

Enumerated Values

Parameter Value
» transmission broadcast
» transmission multicast
» transmission unicast
» data_source any
» data_source server
» data_source endpoint
» network any
» network corporate
» network external
» action drop
» action aggregate

Responses

Status Meaning Description Schema
201 Created Success None

Update a Settings Traffic Collector

Example Code


curl -X PUT /orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id}

Auditable: Yes

Exposure: Public Stable

Update a traffic_collector setting

Example Request Body

{
  "transmission": "broadcast",
  "data_source": "any",
  "network": "any",
  "target": {
    "src_port": null,
    "dst_port": null,
    "proto": 0,
    "dst_ip": "string",
    "src_ip": "string"
  }
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
traffic_collector_setting_id path string true* traffic_collector setting UUID
body body settings_traffic_collector_put false none
» transmission body string false transmission type: broadcast/multicast/unicast
» data_source body string false flow summary data source
» network body string false flow summary network
» target body object false none
»» src_port body integer,null false none
»» dst_port body integer,null false none
»» proto body integer false none
»» dst_ip body string false single destination ip address or CIDR
»» src_ip body string false single source ip address or CIDR

Enumerated Values

Parameter Value
» transmission broadcast
» transmission multicast
» transmission unicast
» data_source any
» data_source server
» data_source endpoint
» network any
» network corporate
» network external

Responses

Status Meaning Description Schema
204 No Content Success None

Get a Settings Traffic Collector

Example Code


curl -X GET /orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id}

Exposure: Public Stable

Auditable: No

Get a traffic collector setting by UUID

Parameters

Name In Type Required Description
org_id path integer true* Org ID
traffic_collector_setting_id path string true* traffic_collector setting UUID

Example Response Body

200 Response

{
  "href": "string",
  "transmission": "string",
  "data_source": "string",
  "network": "string",
  "target": {
    "src_port": 0,
    "dst_port": 0,
    "proto": 0,
    "dst_ip": "string",
    "src_ip": "string"
  },
  "action": "string"
}

Responses

Status Meaning Description Schema
200 OK Success settings_traffic_collector_get

Delete a Settings Traffic Collector

Example Code


curl -X DELETE /orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/settings/traffic_collector/{traffic_collector_setting_id}

Exposure: Public Stable

Auditable: Yes

Delete a traffic_collector setting by UUID

Parameters

Name In Type Required Description
org_id path integer true* Org ID
traffic_collector_setting_id path string true* traffic_collector setting UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Trusted Proxy IPs

Get Trusted Proxy IPs

Example Code


curl -X GET /orgs/{org_id}/settings/trusted_proxy_ips \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/settings/trusted_proxy_ips

Exposure: Public Stable

Auditable: No

Get Trusted Proxy IPs

Parameters

Name In Type Required Description
org_id path integer true* Organization

Example Response Body

200 Response

{
  "max_trusted_proxy_ips_per_region": 0,
  "trusted_proxy_ips": [
    {
      "pce_fqdn": "string",
      "ip": "string"
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success settings_trusted_proxy_ips_get

Create or Update Trusted Proxy IPs

Example Code


curl -X PUT /orgs/{org_id}/settings/trusted_proxy_ips \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/settings/trusted_proxy_ips

Auditable: Yes

Exposure: Public Stable

Create or Update Trusted Proxy IPs

Example Request Body

{
  "trusted_proxy_ips": [
    {
      "pce_fqdn": null,
      "ip": null
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body settings_trusted_proxy_ips_put false none
» trusted_proxy_ips body [object] true* IPs or CIDRs trusted (per-region) for handling clients' X-Forwarded-For header
»» pce_fqdn body string,null true* FQDN of PCE region, or null if not in supercluster
»» ip body orgs_access_restrictions_post/properties/ips/items true* none
»»» anonymous body any false none
»»» anonymous body any false none

Responses

Status Meaning Description Schema
204 No Content Success None

Users

Get All Users' Information

Example Code


curl -X GET /users \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/users

Exposure: Public Stable

Auditable: No

Get all of the users

Parameters

Name In Type Required Description
type query string false User type which to filter, (e.g. local or external)

Example Response Body

200 Response

{
  "href": "string",
  "username": "string",
  "last_login_on": "string",
  "last_login_ip_address": "string",
  "login_count": 0,
  "full_name": "string",
  "time_zone": "string",
  "locked": true,
  "effective_groups": [
    "string"
  ],
  "local_profile": {},
  "updated_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "type": "string",
  "presence_status": "string"
}

Responses

Status Meaning Description Schema
200 OK Success users_get

Get All Org Users' Information

Example Code


curl -X GET /users/{id}/orgs \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/users/{id}/orgs

Exposure: Public Stable

Auditable: No

Get list of orgs the user has access to

Parameters

Name In Type Required Description
id path integer true* User ID

Example Response Body

200 Response

{
  "href": "string",
  "username": "string",
  "last_login_on": "string",
  "last_login_ip_address": "string",
  "login_count": 0,
  "full_name": "string",
  "time_zone": "string",
  "locked": true,
  "effective_groups": [
    "string"
  ],
  "local_profile": {},
  "updated_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "type": "string",
  "presence_status": "string"
}

Responses

Status Meaning Description Schema
200 OK Success users_get

Get a User's Information

Example Code


curl -X GET /users/{id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/users/{id}

Exposure: Public Stable

Auditable: No

Get the user information

Parameters

Name In Type Required Description
id path integer true* User ID

Example Response Body

200 Response

{
  "href": "string",
  "username": "string",
  "last_login_on": "string",
  "last_login_ip_address": "string",
  "login_count": 0,
  "full_name": "string",
  "time_zone": "string",
  "locked": true,
  "effective_groups": [
    "string"
  ],
  "local_profile": {},
  "updated_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "type": "string",
  "presence_status": "string"
}

Responses

Status Meaning Description Schema
200 OK Success users_get

Create a New User

Example Code


curl -X POST /users \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/users

Auditable: Yes

Exposure: Public Stable

Create a new local user

Example Request Body

{
  "username": "[email protected]",
  "full_name": "string",
  "time_zone": "string",
  "type": "local"
}

Parameters

Name In Type Required Description
body body users_post false none
» username body string(email) true* username is an email address e.g. [email protected]
» full_name body string false User's full name
» time_zone body string false Time Zone IANA Region Name
» type body string true* User's type, i.e. user authenticated local or remotely via SAML

Enumerated Values

Parameter Value
» type local

Responses

Status Meaning Description Schema
201 Created Success None

Update User Information

Example Code


curl -X PUT /users/{id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/users/{id}

Auditable: Yes

Exposure: Public Stable

Update the user information

Example Request Body

{
  "full_name": "string",
  "time_zone": "string",
  "locked": true
}

Parameters

Name In Type Required Description
id path integer true* User ID
body body users_put false none
» full_name body string false User's full name
» time_zone body string false Time Zone IANA Region Name
» locked body boolean false Flag to indicate whether account is locked

Responses

Status Meaning Description Schema
204 No Content Success None

Login & Get Session Token

Example Code


curl -X GET /users/login \
  -H 'Authorization: Token token=<auth_token>'

GET /api/v2/users/login

Exposure: Public Stable

Auditable: Yes

Login a specific user, and return a session token. Uses an authentication token. For implementation details see the Authentication section in the Illumio ASP REST API Guide.

Example Response Body

200 Response

{
  "href": "string",
  "auth_username": "string",
  "session_token": "string",
  "inactivity_expiration_minutes": 0,
  "last_login_on": "2025-04-01T00:21:27Z",
  "last_login_ip_address": "string",
  "full_name": "string",
  "type": "string",
  "time_zone": "string",
  "product_version": {
    "product_version": {
      "version": "string",
      "build": 0,
      "release_info": "string",
      "engineering_info": "string",
      "long_display": "string",
      "short_display": "string",
      "product_name": "string"
    }
  }
}

Responses

Status Meaning Description Schema
200 OK Success users_login_get

Logout & Destroy Session Token

Example Code


curl -X PUT /users/{id}/logout \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/users/{id}/logout

Auditable: Yes

Exposure: Public Stable

Logout a specific user and destroy the access token

Example Request Body

{}

Parameters

Name In Type Required Description
id path integer true* User ID
body body users_logout_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Users Local Profile

Create a Local User Profile from an External User ID

Example Code


curl -X POST /users/{user_id}/local_profile \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/users/{user_id}/local_profile

Auditable: Yes

Exposure: Public Stable

Create a local user profile from an external user ID.

Example Request Body

{}

Parameters

Name In Type Required Description
user_id path integer true* User ID
body body users_local_profile_post false none

Responses

Status Meaning Description Schema
201 Created Success None

Reinvite a User

Example Code


curl -X PUT /users/{user_id}/local_profile/reinvite \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/users/{user_id}/local_profile/reinvite

Auditable: Yes

Exposure: Public Stable

Resend invitation email for local user

Example Request Body

{}

Parameters

Name In Type Required Description
user_id path integer true* User ID
body body users_local_profile_reinvite_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Change a User Password

Example Code


curl -X PUT /users/{user_id}/local_profile/password \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/users/{user_id}/local_profile/password

Auditable: Yes

Exposure: Public Stable

Change local user password

Example Request Body

{
  "current_password": "string",
  "new_password": "string"
}

Parameters

Name In Type Required Description
user_id path integer true* User ID
body body users_local_profile_password_put false none
» current_password body string true* current password
» new_password body string true* new password

Responses

Status Meaning Description Schema
204 No Content Success None

Convert Local User to External User

Example Code


curl -X DELETE /users/{user_id}/local_profile
  \ -u $KEY:$TOKEN

DELETE /api/v2/users/{user_id}/local_profile

Exposure: Public Stable

Auditable: Yes

Delete local user profile

Parameters

Name In Type Required Description
user_id path integer true* User ID

Responses

Status Meaning Description Schema
204 No Content Success None

Vens

Get the collection of all VENs

Example Code


curl -X GET /orgs/{org_id}/vens \
  -H 'Authorization: Token token=<auth_token>'

GET /api/v2/orgs/{org_id}/vens

Exposure: Public Experimental

Auditable: No

Get all VENs

Parameters

Name In Type Required Description
org_id path integer true* Organization
activation_type query string false The method in which the VEN was activated
active_pce_fqdn query string false FQDN of the PCE
authentication_recovery query boolean false Return VENs in or not in authentication recovery
condition query string false A specific error condition to filter by
container_clusters query string false Array of container cluster URIs, encoded as a JSON string
description query string false Description of VEN(s) to return. Supports partial matches.
disconnected_before query string(date-time) false Return VENs that have been disconnected since the given time
health query string false The overall health (condition) of the VEN
hostname query string false Hostname of VEN(s) to return. Supports partial matches.
ip_address query string false IP address of VEN(s) to return. Supports partial matches
labels query string false 2D Array of label URIs, encoded as a JSON string
last_goodbye_at[gte] query string false Greater than or equal to value for last goodbye at timestamp
last_goodbye_at[lte] query string false Less than or equal to value for last goodbye at timestamp
last_heartbeat_at[gte] query string false Greater than or equal to value for last heartbeat timestamp
last_heartbeat_at[lte] query string false Less than or equal to value for last heartbeat timestamp
max_results query integer false Maximum number of VENs to return.
name query string false Name of VEN(s) to return. Supports partial matches.
os query string false Operating System of VEN(s) to return. Supports partial matches.
status query string false The current status of the VEN
upgrade_pending query boolean false Only return VENs with/without a pending upgrade
ven_type query string false Return only VENs of the specific type: server, endpoint, or containerized
version[gte] query string false Greater than or equal to value for version
version[lte] query string false Less than or equal to value for version

Enumerated Values

Parameter Value
activation_type pairing_key
activation_type kerberos
activation_type ca_signed_certificate
activation_type self_signed_certificate
condition agent.upgrade_time_out
condition agent.missing_heartbeats_after_upgrade
condition agent.clone_detected
condition agent.missed_heartbeats
condition agent.too_many_interfaces_reported
condition agent.authentication_recovery
condition agent.self_signed_certificate_in_grace_period
condition agent.self_signed_certificate_expired
condition agent.unauthenticated_clone_detected
condition agent.weak_tls_ciphers_used
health healthy
health unhealthy
health error
health warning
last_goodbye_at[gte] server
last_goodbye_at[gte] endpoint
last_goodbye_at[gte] containerized
last_goodbye_at[lte] server
last_goodbye_at[lte] endpoint
last_goodbye_at[lte] containerized
last_heartbeat_at[gte] server
last_heartbeat_at[gte] endpoint
last_heartbeat_at[gte] containerized
last_heartbeat_at[lte] server
last_heartbeat_at[lte] endpoint
last_heartbeat_at[lte] containerized
status active
status suspended
status stopped
status uninstalled
ven_type server
ven_type endpoint
ven_type containerized

Example Response Body

200 Response

{
  "href": "string",
  "name": null,
  "description": null,
  "hostname": "string",
  "uid": null,
  "os_id": null,
  "os_detail": null,
  "os_platform": null,
  "version": "string",
  "status": "string",
  "activation_type": "string",
  "active_pce_fqdn": null,
  "target_pce_fqdn": null,
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "interfaces": [
    {
      "name": "string",
      "link_state": null,
      "address": "string",
      "cidr_block": null,
      "default_gateway_address": null,
      "network": {
        "href": "string",
        "name": null
      },
      "network_detection_mode": null,
      "friendly_name": null,
      "href": "string"
    }
  ],
  "workloads": [
    {
      "href": "string",
      "name": null,
      "managed": true,
      "hostname": null,
      "instance_id": null,
      "data_center": null,
      "data_center_zone": null,
      "service_principal_name": null,
      "os_id": null,
      "os_detail": null,
      "labels": [
        {
          "href": "string",
          "key": "string",
          "value": "string"
        }
      ],
      "public_ip": null,
      "interfaces": [
        {
          "name": "string",
          "link_state": null,
          "address": "string",
          "cidr_block": null,
          "default_gateway_address": null,
          "network": {
            "href": "string",
            "name": null
          },
          "network_detection_mode": null,
          "friendly_name": null,
          "href": "string"
        }
      ],
      "security_policy_applied_at": null,
      "security_policy_received_at": null,
      "security_policy_sync_state": "string",
      "log_traffic": true,
      "mode": "idle",
      "enforcement_mode": "idle",
      "visibility_level": "string",
      "online": true
    }
  ],
  "container_cluster": null,
  "secure_connect": null,
  "last_heartbeat_at": null,
  "last_goodbye_at": null,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "string"
  },
  "conditions": [
    {
      "first_reported_timestamp": "2025-04-01T00:21:27Z",
      "latest_event": {
        "notification_type": "string",
        "severity": "err",
        "href": "string",
        "info": {},
        "timestamp": "2025-04-01T00:21:27Z"
      }
    }
  ],
  "authentication_recovery": true,
  "caps": [
    "string"
  ],
  "ven_type": "server",
  "upgrade_expires_at": null,
  "upgrade_target_version": null
}

Responses

Status Meaning Description Schema
200 OK Success vens_get

Start unpairing of one or more VENs

Example Code


curl -X PUT /orgs/{org_id}/vens/unpair \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/vens/unpair

Auditable: Yes

Exposure: Public Experimental

Sent by the user to unpair multiple agents

Example Request Body

{
  "vens": [
    {
      "href": "string"
    }
  ],
  "firewall_restore": "default"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body vens_unpair_put false none
» vens body [object] true* VENs to unpair
»» href body string true* URI of VEN to unpair
» firewall_restore body string false The strategy to use to restore the firewall state after the VEN is uninstalled.

Enumerated Values

Parameter Value
» firewall_restore saved
» firewall_restore default
» firewall_restore disable

Responses

Status Meaning Description Schema
204 No Content Success None

Sent by the user to upgrade VENs

Example Code


curl -X PUT /orgs/{org_id}/vens/upgrade \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/vens/upgrade

Auditable: Yes

Exposure: Public Experimental

Sent by the user to upgrade VENs.

Example Request Body

{
  "release": "string",
  "vens": [
    {
      "href": "string"
    }
  ],
  "upgrade_timeout_seconds": 900
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body vens_upgrade_put false none
» release body string true* The software release to upgrade to.
» vens body [object] true* An array of VENs to upgrade
»» href body string true* VEN URI
» upgrade_timeout_seconds body integer false Number of seconds during which the PCE tries to trigger the agent upgrade.

Responses

Status Meaning Description Schema
204 No Content Success None

Enable or disable authentication recovery for a list of VENs

Example Code


curl -X PUT /orgs/{org_id}/vens/authentication_recovery \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/vens/authentication_recovery

Auditable: Yes

Exposure: Public Experimental

Enable or disable authentication recovery for a list of VENs

Example Request Body

{
  "vens": [
    {
      "href": "string"
    }
  ],
  "recovery_enabled": false,
  "recovery_duration_seconds": 3600
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body vens_authentication_recovery_put false none
» vens body [object] true* List of VENs to be put in or out of recovery
»» href body string true* URI of the VEN
» recovery_enabled body boolean true* Enable/disable recovery for the VENs
» recovery_duration_seconds body integer true* Put the VENs in recovery for the specified duration in seconds

Responses

Status Meaning Description Schema
204 No Content Success None

Get details on a VEN instance

Example Code


curl -X GET /orgs/{org_id}/vens/{ven_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/vens/{ven_id}

Exposure: Public Experimental

Auditable: No

Get one VEN

Parameters

Name In Type Required Description
org_id path integer true* Organization
ven_id path string true* VEN id

Example Response Body

200 Response

{
  "href": "string",
  "name": null,
  "description": null,
  "hostname": "string",
  "uid": null,
  "os_id": null,
  "os_detail": null,
  "os_platform": null,
  "version": "string",
  "status": "string",
  "activation_type": "string",
  "active_pce_fqdn": null,
  "target_pce_fqdn": null,
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "interfaces": [
    {
      "name": "string",
      "link_state": null,
      "address": "string",
      "cidr_block": null,
      "default_gateway_address": null,
      "network": {
        "href": "string",
        "name": null
      },
      "network_detection_mode": null,
      "friendly_name": null,
      "href": "string"
    }
  ],
  "workloads": [
    {
      "href": "string",
      "name": null,
      "managed": true,
      "hostname": null,
      "instance_id": null,
      "data_center": null,
      "data_center_zone": null,
      "service_principal_name": null,
      "os_id": null,
      "os_detail": null,
      "labels": [
        {
          "href": "string",
          "key": "string",
          "value": "string"
        }
      ],
      "public_ip": null,
      "interfaces": [
        {
          "name": "string",
          "link_state": null,
          "address": "string",
          "cidr_block": null,
          "default_gateway_address": null,
          "network": {
            "href": "string",
            "name": null
          },
          "network_detection_mode": null,
          "friendly_name": null,
          "href": "string"
        }
      ],
      "security_policy_applied_at": null,
      "security_policy_received_at": null,
      "security_policy_sync_state": "string",
      "log_traffic": true,
      "mode": "idle",
      "enforcement_mode": "idle",
      "visibility_level": "string",
      "online": true
    }
  ],
  "container_cluster": null,
  "secure_connect": null,
  "last_heartbeat_at": null,
  "last_goodbye_at": null,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "string"
  },
  "conditions": [
    {
      "first_reported_timestamp": "2025-04-01T00:21:27Z",
      "latest_event": {
        "notification_type": "string",
        "severity": "err",
        "href": "string",
        "info": {},
        "timestamp": "2025-04-01T00:21:27Z"
      }
    }
  ],
  "authentication_recovery": true,
  "caps": [
    "string"
  ],
  "ven_type": "server",
  "upgrade_expires_at": null,
  "upgrade_target_version": null
}

Responses

Status Meaning Description Schema
200 OK Success vens_get

Set the target_pce_fqdn on a VEN

Example Code


curl -X PUT /orgs/{org_id}/vens/{ven_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/vens/{ven_id}

Auditable: Yes

Exposure: Public Experimental

Update VENs name, description, or target PCE FQDN

Example Request Body

{
  "target_pce_fqdn": "string",
  "name": null,
  "description": null,
  "status": "active"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
ven_id path string true* VEN id
body body vens_put false none
» target_pce_fqdn body string false cluster FQDN for target PCE
» name body string,null false Friendly name of the VEN
» description body string,null false Description of the VEN
» status body string false VEN Status

Enumerated Values

Parameter Value
» status active
» status suspended

Responses

Status Meaning Description Schema
204 No Content Success None

Post VEN statistics for later analysis

Example Code


curl -X POST /orgs/{org_id}/vens/statistics \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/vens/statistics

Auditable: No

Exposure: Public Experimental

Post VEN statistics for later analysis.

Example Request Body

{
  "property_counts": [
    {
      "property": "status",
      "values": [
        "string"
      ],
      "filters": [
        {
          "filter_property": "status",
          "values": [
            "string"
          ]
        }
      ]
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body vens_statistics_post false none
» property_counts body [object] true* none
»» property body string true* none
»» values body [string] false none
»» filters body [object] false none
»»» filter_property body string true* none
»»» values body [string] false none

Enumerated Values

Parameter Value
»» property status
»» property version
»» property health
»» property condition
»» property os_id
»» property enforcement_mode
»» property ven_type
»»» filter_property status
»»» filter_property version
»»» filter_property health
»»» filter_property condition
»»» filter_property os_id
»»» filter_property enforcement_mode
»»» filter_property ven_type

Responses

Status Meaning Description Schema
201 Created Success None

Sent by the user to execute remote action on VEN

Example Code


curl -X PUT /orgs/{org_id}/vens/remote_action \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/vens/remote_action

Auditable: Yes

Exposure: Public Experimental

Sent by the user to execute remote action on VEN.

Example Request Body

{
  "action": "restart",
  "vens": [
    {
      "href": "string"
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body vens_remote_action_put false none
» action body string true* Remote action type
» vens body [object] true* An array of VENs to restart
»» href body string true* VEN URI

Enumerated Values

Parameter Value
» action restart

Responses

Status Meaning Description Schema
204 No Content Success None

Ven Software Releases

Get Available Releases for an Organization

Example Code


curl -X GET /orgs/{org_id}/software/ven/releases \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/software/ven/releases

Exposure: Public Experimental

Auditable: No

Get available releases for org

Parameters

Name In Type Required Description
org_id path integer true* Organization
ven_type query string false Return releases that support a specific VEN type (server or endpoint) or releases that only support both servers and endpoints (all)

Enumerated Values

Parameter Value
ven_type server
ven_type endpoint
ven_type all

Example Response Body

200 Response

{
  "release": "string",
  "href": "string",
  "default": true,
  "default_release_ven_types": [
    "string"
  ],
  "org_id": 0,
  "ven_types": [
    "server"
  ],
  "images": [
    {
      "release": "string",
      "distribution": "string",
      "architecture": "string",
      "major_version": 0,
      "min_minor_version": 0,
      "max_minor_version": null,
      "filename": "string",
      "href": "string",
      "ven_types": [
        "server"
      ]
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success software_ven_releases_get

DEPRECATED. Set the Default Release for this Organization

Example Code


curl -X PUT /orgs/{org_id}/software/ven/releases/default \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/software/ven/releases/default

Auditable: Yes

Exposure: Public Experimental

DEPRECATED. Set the default release for this org

Example Request Body

{
  "release": "string"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body software_ven_releases_default_put false none
» release body string true* The software release to set as the default for this org.

Responses

Status Meaning Description Schema
204 No Content Success None

Set the Default Release for this Organization

Example Code


curl -X PUT /orgs/{org_id}/software/ven/releases/defaults \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/software/ven/releases/defaults

Auditable: Yes

Exposure: Public Experimental

Set the default release for this org

Example Request Body

[
  {
    "href": "string",
    "ven_type": "server"
  }
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body software_ven_releases_defaults_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Get Details about a VEN Release

Example Code


curl -X GET /orgs/{org_id}/software/ven/releases/{release} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/software/ven/releases/{release}

Exposure: Public Experimental

Auditable: No

Get details about a VEN release

Parameters

Name In Type Required Description
org_id path integer true* Organization
release path string true* Release identifier

Example Response Body

200 Response

{
  "release": "string",
  "href": "string",
  "default": true,
  "default_release_ven_types": [
    "string"
  ],
  "org_id": 0,
  "ven_types": [
    "server"
  ],
  "images": [
    {
      "release": "string",
      "distribution": "string",
      "architecture": "string",
      "major_version": 0,
      "min_minor_version": 0,
      "max_minor_version": null,
      "filename": "string",
      "href": "string",
      "ven_types": [
        "server"
      ]
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success software_ven_releases_get

Remove a release from the org/repo

Example Code


curl -X DELETE /orgs/{org_id}/software/ven/releases/{release}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/software/ven/releases/{release}

Exposure: Public Experimental

Auditable: Yes

Remove a release from the org/repo

Parameters

Name In Type Required Description
org_id path integer true* Organization
release path string true* Release identifier

Responses

Status Meaning Description Schema
204 No Content Success None

Get the List of VEN Software Images for a Given Release

Example Code


curl -X GET /orgs/{org_id}/software/ven/releases/{release}/images \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/software/ven/releases/{release}/images

Exposure: Public Experimental

Auditable: No

Get the list of VEN software images for a given release

Parameters

Name In Type Required Description
org_id path integer true* Organization
release path string true* Release identifier

Example Response Body

200 Response

[
  {
    "release": "string",
    "distribution": "string",
    "architecture": "string",
    "major_version": 0,
    "min_minor_version": 0,
    "max_minor_version": null,
    "filename": "string",
    "href": "string",
    "ven_types": [
      "server"
    ]
  }
]

Responses

Status Meaning Description Schema
200 OK Success software_ven_releases_images_get

Virtual Servers

Get a List of Virtual Servers

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/virtual_servers \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_servers

Exposure: Public Experimental

Auditable: No

Get the virtual servers

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
active_pce_fqdn query string false FQDN of the PCE
discovered_virtual_server query string false URI of discovered virtual server to filter by
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
labels query string false 2D array of label URIs, encoded as a JSON string. Filter by virtual server labels.
max_results query integer false Maximum number of discovered virtual servers to return
mode query string false Mode of the virtual server(s) to return
name query string false Name of virtual server(s) to return. Supports partial matches
network_enforcement_node.hostname query string false Hostname of NEN object to filter virtual server(s)
slb query string false URI of SLB object to filter virtual server(s)
vip query string false Frontend (VIP) address of the virtual server(s). Supports suffix-wildcard matches
vip_port query integer false Port of frontend VIP of the virtual server(s)
vip_proto query integer false Protocol of frontend VIP of the virtual server(s)

Enumerated Values

Parameter Value
mode unmanaged
mode enforced

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "service": {
    "href": "string"
  },
  "providers": [
    {}
  ],
  "mode": "string",
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "discovered_virtual_server": null,
  "update_type": "create",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_virtual_servers_get

Create a Virtual Server

Example Code


curl -X POST /orgs/{org_id}/sec_policy/{pversion}/virtual_servers \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_servers

Auditable: Yes

Exposure: Public Experimental

Create a virtual server

Example Request Body

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "labels": [
    {
      "href": "string"
    }
  ],
  "service": {
    "href": "string"
  },
  "providers": [
    {
      "label": {
        "href": "string"
      }
    }
  ],
  "discovered_virtual_server": {
    "href": "string"
  },
  "mode": "unmanaged"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_virtual_servers_post false none
» name body string true* The short friendly name of the virtual server
» description body string false The long description of the virtual server
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» labels body [object] true* Assigned labels
»» href body string true* Label URI
» service body object true* URI of associated service
»» href body string true* Service URI
» providers body [oneOf] true* none
»» anonymous body object false none
»»» label body object true* none
»»»» href body string true* Label URI
»»» anonymous body object false none
»»»» workload body object true* none
»»»»» href body string true* Workload URI
»»»» discovered_virtual_server body object true* Corresponding discovered virtual server
»»»»» href body string true* Discovered virtual server URI
»»»» mode body string true* Management mode of the virtual server

Enumerated Values

Parameter Value
»»»» mode unmanaged
»»»» mode enforced

Responses

Status Meaning Description Schema
201 Created Success None

Get the Specified Virtual Server

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/virtual_servers/{virtual_server_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_servers/{virtual_server_id}

Exposure: Public Experimental

Auditable: No

Get the virtual server

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
virtual_server_id path string true* Virtual server UUID

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "service": {
    "href": "string"
  },
  "providers": [
    {}
  ],
  "mode": "string",
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "discovered_virtual_server": null,
  "update_type": "create",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null
}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_virtual_servers_get

Delete the Specified Virtual Server

Example Code


curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/virtual_servers/{virtual_server_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_servers/{virtual_server_id}

Exposure: Public Experimental

Auditable: Yes

Delete the virtual server

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
virtual_server_id path string true* Virtual server UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Update the Specified Virtual Server

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/virtual_servers/{virtual_server_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_servers/{virtual_server_id}

Auditable: Yes

Exposure: Public Experimental

Update the virtual server

Example Request Body

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "labels": [
    {
      "href": "string"
    }
  ],
  "service": {
    "href": "string"
  },
  "providers": [
    {
      "label": {
        "href": "string"
      }
    }
  ],
  "discovered_virtual_server": {
    "href": "string"
  },
  "mode": "unmanaged"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
virtual_server_id path string true* Virtual server UUID
body body sec_policy_virtual_servers_put false none
» name body string false The short friendly name of the virtual server
» description body string false The long description of the virtual server
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» labels body [object] false Assigned labels
»» href body string true* Label URI
» service body object false URI of associated service
»» href body string true* Service URI
» providers body [oneOf] false none
»» anonymous body object false none
»»» label body object true* none
»»»» href body string true* Label URI
»»» anonymous body object false none
»»»» workload body object true* none
»»»»» href body string true* Workload URI
»»»» discovered_virtual_server body object false Corresponding discovered virtual server
»»»»» href body string true* Discovered virtual server URI
»»»» mode body string false Management mode of the virtual server

Enumerated Values

Parameter Value
»»»» mode unmanaged
»»»» mode enforced

Responses

Status Meaning Description Schema
204 No Content Success None

Virtual Services

Get Virtual Services

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/virtual_services \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services

Exposure: Public Stable

Auditable: No

Return the set of Virtual Services

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
description query string false Description on which to filter. Supports partial matches
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
labels query string false List of lists of label URIs, encoded as a JSON string
max_results query integer false Maximum number of Virtual Services to return.
name query string false Name on which to filter. Supports partial matches
service query string false Service URI
service_address.fqdn query string false FQDN configured under service_address property, supports partial matches
service_address.ip query string false IP address configured under service_address property, supports partial matches
service_ports.port query string false Specify port or port range to filter results. The range is from -1 to 65535.
service_ports.proto query integer false Protocol to filter on
usage query boolean false Include Virtual Service usage flags

Example Response Body

200 Response

{}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_virtual_services_get

Get a Virtual Service

Example Code


curl -X GET /orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id}

Exposure: Public Stable

Auditable: No

Get Virtual Service by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
virtual_service_id path string true* Virtual Service ID
usage query boolean false Include Virtual Service usage flags

Example Response Body

200 Response

{}

Responses

Status Meaning Description Schema
200 OK Success sec_policy_virtual_services_get

Create a Virtual Service

Example Code


curl -X POST /orgs/{org_id}/sec_policy/{pversion}/virtual_services \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services

Auditable: Yes

Exposure: Public Stable

Create a virtual service

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_virtual_services_post false none
» name body string true* Name
» description body string false Description
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» labels body [object] false Assigned labels
»» href body string true* Label URI
» service_ports body [object] false Service ports
»» port body integer false Port Number (integer 0-65535 or -1 for any port). Also the startng port when specifying a range.
»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»» proto body integer true* none
» service body object false URI of associated service
» apply_to body string false Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network
» ip_overrides body [string] false Array of IPs or CIDRs as IP overrides
» service_addresses body [oneOf] false none
»» anonymous body object false none
»»» ip body string true* IP address to assign to the virtual service
»»» network body object false none
»»»» href body string true* Network URI for this IP address
»»» port body integer false Port associated with the IP address for the service (1-65535 integer)
»»» anonymous body object false none
»»» anonymous body object false none
»» anonymous body object false none
»»» fqdn body string true* FQDN to assign to the virtual service
»»» description body string false none
»»» port body integer false Port associated with the FQDN for the service
»» anonymous body object false none
»» anonymous body object false none

Enumerated Values

Parameter Value
»» proto 6
»» proto 17
» apply_to host_only
» apply_to internal_bridge_network

Responses

Status Meaning Description Schema
201 Created Success None

Bulk Create Virtual Services

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/virtual_services/bulk_create \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/bulk_create

Auditable: Yes

Exposure: Public Stable

Bulk create virtual services

Example Request Body

[
  {}
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_virtual_services_bulk_create_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Update a Virtual Service

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id}

Auditable: Yes

Exposure: Public Stable

Modify a Virtual Service by ID

Example Request Body

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "labels": [
    {
      "href": "string"
    }
  ],
  "service_ports": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 6
    }
  ],
  "service": {},
  "apply_to": "host_only",
  "ip_overrides": [
    "string"
  ],
  "service_addresses": [
    {}
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
virtual_service_id path string true* Virtual Service ID
body body sec_policy_virtual_services_put false none
» name body string false Name
» description body string false Description
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» labels body [object] false Assigned labels
»» href body string true* Label URI
» service_ports body [object] false Service ports
»» port body integer false Port Number (integer 0-65535 or -1 for any port). Also the startng port when specifying a range.
»» to_port body integer false High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»» proto body integer true* none
» service body object false URI of associated service
» apply_to body string false Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network
» ip_overrides body [string] false Array of IPs or CIDRs as IP overrides
» service_addresses body [oneOf] false none
»» anonymous body object false none
»»» ip body string true* IP address to assign to the virtual service
»»» network body object false none
»»»» href body string true* Network URI for this IP address
»»» port body integer false Port associated with the IP address for the service (1-65535 integer)
»»» anonymous body object false none
»»» anonymous body object false none
»» anonymous body object false none
»»» fqdn body string true* FQDN to assign to the virtual service
»»» description body string false none
»»» port body integer false Port associated with the FQDN for the service

Enumerated Values

Parameter Value
»» proto 6
»» proto 17
» apply_to host_only
» apply_to internal_bridge_network

Responses

Status Meaning Description Schema
204 No Content Success None

Bulk Update Virtual Servcies

Example Code


curl -X PUT /orgs/{org_id}/sec_policy/{pversion}/virtual_services/bulk_update \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/bulk_update

Auditable: Yes

Exposure: Public Stable

Bulk update virtual services

Example Request Body

[
  {
    "href": "string",
    "name": "string",
    "description": "string",
    "external_data_set": null,
    "external_data_reference": null,
    "labels": [
      {
        "href": "string"
      }
    ],
    "service": {},
    "service_ports": [
      {
        "port": 0,
        "to_port": 0,
        "proto": 6
      }
    ],
    "apply_to": "host_only",
    "ip_overrides": [
      "string"
    ],
    "service_addresses": [
      {}
    ]
  }
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
body body sec_policy_virtual_services_bulk_update_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Virtual Service

Example Code


curl -X DELETE /orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/sec_policy/{pversion}/virtual_services/{virtual_service_id}

Exposure: Public Stable

Auditable: Yes

Delete a Virtual Service by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
pversion path string true* Security Policy Version
virtual_service_id path string true* Virtual Service ID

Responses

Status Meaning Description Schema
204 No Content Success None

Vulnerabilities

Get Vulnerabilities

Example Code


curl -X GET /orgs/{org_id}/vulnerabilities \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/vulnerabilities

Exposure: Public Experimental

Auditable: No

Get the vulnerabilities collection

Parameters

Name In Type Required Description
org_id path integer true* Organization
max_results query integer false Maximum number of vulnerabilities to return.

Example Response Body

200 Response

[
  {
    "href": "string",
    "score": 0,
    "cve_ids": [
      "string"
    ],
    "description": "string",
    "name": "string",
    "created_at": "2025-04-01T00:21:27Z",
    "updated_at": "2025-04-01T00:21:27Z",
    "created_by": {
      "href": "string"
    },
    "updated_by": {
      "href": "string"
    }
  }
]

Responses

Status Meaning Description Schema
200 OK Success vulnerabilities_get

Get a Vulnerability

Example Code


curl -X GET /orgs/{org_id}/vulnerabilities/{reference_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/vulnerabilities/{reference_id}

Exposure: Public Experimental

Auditable: No

Get Vulnerability by reference ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
reference_id path string true* Vulnerability Reference ID

Example Response Body

200 Response

[
  {
    "href": "string",
    "score": 0,
    "cve_ids": [
      "string"
    ],
    "description": "string",
    "name": "string",
    "created_at": "2025-04-01T00:21:27Z",
    "updated_at": "2025-04-01T00:21:27Z",
    "created_by": {
      "href": "string"
    },
    "updated_by": {
      "href": "string"
    }
  }
]

Responses

Status Meaning Description Schema
200 OK Success vulnerabilities_get

Create or Modify a Vulnerability

Example Code


curl -X PUT /orgs/{org_id}/vulnerabilities/{reference_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/vulnerabilities/{reference_id}

Auditable: Yes

Exposure: Public Experimental

Create or update the vulnerability

Example Request Body

{
  "score": 0,
  "cve_ids": [
    "string"
  ],
  "description": "string",
  "name": "string"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
reference_id path string true* Vulnerability Reference ID
body body vulnerabilities_put false none
» score body integer true* The normalized score of the vulnerability within the range of 0 to 100. CVSS Score can be used here with a 10x multiplier.
» cve_ids body [string] false The cve_ids for the vulnerability
» description body string false An arbitrary field to store some details of the vulnerability class
» name body string true* The title/name of the vulnerability

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Vulnerability

Example Code


curl -X DELETE /orgs/{org_id}/vulnerabilities/{reference_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/vulnerabilities/{reference_id}

Exposure: Public Experimental

Auditable: Yes

Delete Vulnerability by reference ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
reference_id path string true* Vulnerability Reference ID

Responses

Status Meaning Description Schema
204 No Content Success None

Vulnerability Reports

Get Vulnerability Report Collection

Example Code


curl -X GET /orgs/{org_id}/vulnerability_reports \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/vulnerability_reports

Exposure: Public Experimental

Auditable: No

Get the vulnerability report collection

Parameters

Name In Type Required Description
org_id path integer true* Organization
max_results query integer false Maximum number of vulnerability_reports to return.

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "report_type": "string",
  "num_vulnerabilities": 0,
  "authoritative": true,
  "scanned_ips": [
    "string"
  ],
  "exported_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success vulnerability_reports_get

Get a Vulerability Report

Example Code


curl -X GET /orgs/{org_id}/vulnerability_reports/{reference_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/vulnerability_reports/{reference_id}

Exposure: Public Experimental

Auditable: No

Get Vulnerability Report by reference ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
reference_id path string true* Vulnerability Report Reference ID

Example Response Body

200 Response

{
  "href": "string",
  "name": "string",
  "report_type": "string",
  "num_vulnerabilities": 0,
  "authoritative": true,
  "scanned_ips": [
    "string"
  ],
  "exported_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Responses

Status Meaning Description Schema
200 OK Success vulnerability_reports_get

Update a Vulerability Report

Example Code


curl -X PUT /orgs/{org_id}/vulnerability_reports/{reference_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/vulnerability_reports/{reference_id}

Auditable: Yes

Exposure: Public Experimental

Create a vulnerability_report

Example Request Body

{
  "name": "string",
  "report_type": "string",
  "authoritative": true,
  "scanned_ips": [
    "2001:0db8:85a3:0000:0000:8a2e:0370:7334"
  ],
  "detected_vulnerabilities": [
    {
      "ip_address": "2001:0db8:85a3:0000:0000:8a2e:0370:7334",
      "port": 0,
      "proto": 0,
      "workload": {
        "href": "string"
      },
      "vulnerability": {
        "href": "string"
      },
      "external_data_reference": "string",
      "state": "active"
    }
  ],
  "exported_at": "2025-04-01T00:21:27Z"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
reference_id path string true* Vulnerability Report Reference ID
body body vulnerability_reports_put false none
» name body string true* User generated name of the vulnerability report
» report_type body string true* A string representing the type of the report
» authoritative body boolean false Boolean value specifies whether a report is authoritative (or) not
» scanned_ips body [oneOf] false The ips on which the scan was performed
»» anonymous body number false none
»» anonymous body number false none
» detected_vulnerabilities body [object] false none
»» ip_address body any true* none
»» port body integer false The port which is associated with the vulnerability
»» proto body integer false The protocol which is associated with the vulnerability
»» workload body object true* none
»»» href body string true* The URI of the workload to which this vulnerability belongs
»» vulnerability body object true* none
»»» href body string true* The URI of the vulnerability class to which this vulnerability belongs
»» external_data_reference body string false external data reference json string for vulnerability
»» state body string false detected vulnerability state
» exported_at body string(date-time) false The timestamp (rfc3339 timestamp) at which this report was exported

Enumerated Values

Parameter Value
»» state active
»» state fixed

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Vulerability Report

Example Code


curl -X DELETE /orgs/{org_id}/vulnerability_reports/{reference_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/vulnerability_reports/{reference_id}

Exposure: Public Experimental

Auditable: Yes

Delete a vulnerability report by ID

Parameters

Name In Type Required Description
org_id path integer true* Organization
reference_id path string true* Vulnerability Report Reference ID

Responses

Status Meaning Description Schema
204 No Content Success None

Workload Interfaces

DEPRECATED. Get All Workload Interface Statuses

Example Code


curl -X GET /orgs/{org_id}/workloads/{workload_id}/interfaces \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/workloads/{workload_id}/interfaces

Exposure: Public Stable

Auditable: No

DEPRECATED WITH NO REPLACEMENT. Get the interface statuses (all interfaces)

Parameters

Name In Type Required Description
org_id path integer true* Organization
workload_id path string true* Workload UUID
name query string false Name of interface(s) to return. Supports partial matches

Example Response Body

200 Response

{
  "name": "string",
  "link_state": null,
  "address": "string",
  "cidr_block": null,
  "default_gateway_address": null,
  "network": {
    "href": "string",
    "name": null
  },
  "network_detection_mode": null,
  "friendly_name": null,
  "href": "string"
}

Responses

Status Meaning Description Schema
200 OK Success workloads_interfaces_get

DEPRECATED. Get Workload Interface Status

Example Code


curl -X GET /orgs/{org_id}/workloads/{workload_id}/interfaces/{name} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/workloads/{workload_id}/interfaces/{name}

Exposure: Public Stable

Auditable: No

DEPRECATED WITH NO REPLACEMENT. Get the interface status (single interface). Use get_collection API filtering by name.

Parameters

Name In Type Required Description
org_id path integer true* Organization
workload_id path string true* Workload UUID
name path string true* Interface Name

Example Response Body

200 Response

{
  "name": "string",
  "link_state": null,
  "address": "string",
  "cidr_block": null,
  "default_gateway_address": null,
  "network": {
    "href": "string",
    "name": null
  },
  "network_detection_mode": null,
  "friendly_name": null,
  "href": "string"
}

Responses

Status Meaning Description Schema
200 OK Success workloads_interfaces_get

DEPRECATED. Create an interface for a specific workload

Example Code


curl -X POST /orgs/{org_id}/workloads/{workload_id}/interfaces \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/workloads/{workload_id}/interfaces

Auditable: Yes

Exposure: Public Stable

DEPRECATED WITH NO REPLACEMENT. Create an interface for a specific workload.

Example Request Body

{
  "name": "string",
  "link_state": "up",
  "address": "string",
  "cidr_block": 0,
  "default_gateway_address": "string",
  "friendly_name": "string"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
workload_id path string true* Workload UUID
body body workloads_interfaces_post false none
» name body string true* Interface name
» link_state body string true* Link State
» address body any false none
»» anonymous body number false none
»» anonymous body number false none
» cidr_block body integer false The number of bits in the subnet /24 is 255.255.255.0
» default_gateway_address body any false none
» friendly_name body string false User-friendly name for interface

Enumerated Values

Parameter Value
» link_state up
» link_state down
» link_state unknown

Responses

Status Meaning Description Schema
201 Created Success None

DEPRECATED. Delete a Workload Interface

Example Code


curl -X DELETE /orgs/{org_id}/workloads/{workload_id}/interfaces/{name}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/workloads/{workload_id}/interfaces/{name}

Exposure: Public Stable

Auditable: Yes

DEPRECATED WITH NO REPLACEMENT. Delete an interface. Use the PUT /interfaces/delete to delete multiple interfaces.

Parameters

Name In Type Required Description
org_id path integer true* Organization
workload_id path string true* Workload UUID
name path string true* Interface Name

Responses

Status Meaning Description Schema
204 No Content Success None

Workload Settings

Get Workloads Settings

Example Code


curl -X GET /orgs/{org_id}/settings/workloads \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/settings/workloads

Exposure: Public Stable

Auditable: No

Get workload setting properties

Parameters

Name In Type Required Description
org_id path integer true* Org ID

Example Response Body

200 Response

{
  "workload_disconnected_timeout_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1,
      "ven_type": "server"
    }
  ],
  "workload_goodbye_timeout_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1,
      "ven_type": "server"
    }
  ],
  "workload_disconnected_notification_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "warning": -1,
      "ven_type": "server"
    }
  ],
  "ven_uninstall_timeout_hours": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1
    }
  ]
}

Responses

Status Meaning Description Schema
200 OK Success settings_workloads_get

Update Workloads Settings

Example Code


curl -X PUT /orgs/{org_id}/settings/workloads \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/settings/workloads

Auditable: Yes

Exposure: Public Stable

Update workload setting properties

Example Request Body

{
  "workload_disconnected_timeout_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1,
      "ven_type": "server"
    }
  ],
  "workload_goodbye_timeout_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1,
      "ven_type": "server"
    }
  ],
  "workload_disconnected_notification_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "warning": -1,
      "ven_type": "server"
    }
  ],
  "ven_uninstall_timeout_hours": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1
    }
  ]
}

Parameters

Name In Type Required Description
org_id path integer true* Org ID
body body settings_workloads_put false none
» workload_disconnected_timeout_seconds body [object] false none
»» scope body [object] true* Assigned labels
»»» href body string true* Label URI
»» value body integer true* Property value associated with the scope
»» ven_type body string,null false The ven type that this property is applicable to
» workload_goodbye_timeout_seconds body [object] false none
» workload_disconnected_notification_seconds body [object] false none
»» scope body [object] true* Assigned labels
»» warning body integer true* Workload disconnect warning timeout
»» ven_type body string,null false The ven type that this property is applicable to
» ven_uninstall_timeout_hours body [object] false none
»» scope body [object] true* Assigned labels
»» value body integer true* Property value associated with the scope

Enumerated Values

Parameter Value
»» ven_type server
»» ven_type endpoint
»» ven_type null
»» ven_type server
»» ven_type endpoint

Responses

Status Meaning Description Schema
204 No Content Success None

Workloads

Get Workloads

Example Code


curl -X GET /orgs/{org_id}/workloads \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/workloads

Exposure: Public Stable

Auditable: No

Get the workload information

Parameters

Name In Type Required Description
org_id path integer true* Organization
agent.active_pce_fqdn query string false FQDN of the PCE
container_clusters query string false List of container cluster URIs, encoded as a JSON string
description query string false Description of workload(s) to return. Supports partial matches
enforcement_mode query string false Enforcement mode of workload(s) to return
enforcement_modes query string false List of enforcement modes, encoded as a JSON string
external_data_reference query string false A unique identifier within the external data source
external_data_set query string false The data source from which a resource originates
hostname query string false Hostname of workload(s) to return. Supports partial matches
include_deleted query boolean false Include deleted workloads
ip_address query string false IP address of workload(s) to return. Supports partial matches
labels query string false List of lists of label URIs, encoded as a JSON string
last_heartbeat_on[gte] query string false Greater than or equal to value for last heartbeat on timestamp
last_heartbeat_on[lte] query string false Less than or equal to value for last heartbeat on timestamp
log_traffic query boolean false Whether we want to log traffic events from this workload
managed query boolean false Return managed or unmanaged workloads using this filter
max_results query integer false Maximum number of workloads to return.
mode query string false Management mode of workload(s) to return. DEPRECATED AND REPLACED (Use enforcement_mode)
name query string false Name of workload(s) to return. Supports partial matches
online query boolean false Return online/offline workloads using this filter
os_id query string false Operating System of workload(s) to return. Supports partial matches
policy_health query string false Policy of health of workload(s) to return. Valid values: active, warning, error, suspended
risk_summary.ransomware.workload_exposure_severity query string false The ransomware severity of the workload. Valid values: low, medium, high, critical, fully_protected
security_policy_sync_state query string false Advanced search option for workload based on policy sync state
security_policy_update_mode query string false Advanced search option for workload based on security policy update mode
soft_deleted query boolean false DEPRECATED WITH NO REPLACEMENT: Only soft-deleted workloads
ven query string false URI of VEN to filter by.
ven.ven_type query string false Return only Workloads with VENs of the specific type: server, endpoint, or containerized
visibility_level query string false Filter by visibility level
vulnerability_summary.vulnerability_exposure_score[gte] query integer false Greater than or equal to value for vulnerability_exposure_score
vulnerability_summary.vulnerability_exposure_score[lte] query integer false Less than or equal to value for vulnerability_exposure_score

Enumerated Values

Parameter Value
enforcement_mode visibility_only
enforcement_mode full
enforcement_mode idle
enforcement_mode selective
last_heartbeat_on[gte] server
last_heartbeat_on[gte] endpoint
last_heartbeat_on[gte] containerized
last_heartbeat_on[lte] server
last_heartbeat_on[lte] endpoint
last_heartbeat_on[lte] containerized
security_policy_sync_state staged
security_policy_update_mode static
security_policy_update_mode adaptive
ven.ven_type server
ven.ven_type endpoint
ven.ven_type containerized
visibility_level flow_full_detail
visibility_level flow_summary
visibility_level flow_drops
visibility_level flow_off
visibility_level enhanced_data_collection

Example Response Body

200 Response

{
  "href": "string",
  "deleted": true,
  "delete_type": "string",
  "name": "string",
  "description": "string",
  "managed": true,
  "hostname": "string",
  "service_principal_name": "string",
  "agent_to_pce_certificate_authentication_id": null,
  "distinguished_name": "string",
  "public_ip": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "interfaces": {
    "name": "string",
    "link_state": null,
    "address": "string",
    "cidr_block": null,
    "default_gateway_address": null,
    "network": {
      "href": "string",
      "name": null
    },
    "network_detection_mode": null,
    "friendly_name": null,
    "href": "string"
  },
  "service_provider": "string",
  "data_center": "string",
  "data_center_zone": "string",
  "os_id": "string",
  "os_detail": "string",
  "online": true,
  "firewall_coexistence": null,
  "containers_inherit_host_policy": true,
  "blocked_connection_action": "drop",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "services": {
    "uptime_seconds": 0,
    "created_at": "2025-04-01T00:21:27Z",
    "open_service_ports": [
      {
        "protocol": 0,
        "address": "string",
        "port": 0,
        "process_name": "string",
        "user": "string",
        "package": "string",
        "win_service_name": "string"
      }
    ]
  },
  "vulnerabilities_summary": {
    "num_vulnerabilities": 0,
    "vulnerability_score": 0,
    "max_vulnerability_score": 0,
    "vulnerable_port_exposure": null,
    "vulnerable_port_wide_exposure": {
      "any": null,
      "ip_list": null
    },
    "vulnerability_exposure_score": null,
    "full_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "selective_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "visibility_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "current_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "max_vulnerability_exposure_score": null,
    "vulnerability_computation_state": "not_applicable",
    "last_updated_at": "2025-04-01T00:21:27Z"
  },
  "detected_vulnerabilities": {
    "detected_vulnerability_summary": {
      "num_vulnerabilities": 0,
      "vulnerability_score": 0,
      "max_vulnerability_score": 0,
      "vulnerable_port_exposure": null,
      "vulnerable_port_wide_exposure": {
        "any": null,
        "ip_list": null
      },
      "vulnerability_exposure_score": null,
      "full_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "selective_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "visibility_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "current_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "max_vulnerability_exposure_score": null,
      "vulnerability_computation_state": "not_applicable",
      "last_updated_at": "2025-04-01T00:21:27Z"
    },
    "workload_detected_vulnerabilities": [
      {
        "ip_address": "string",
        "port": 0,
        "proto": 0,
        "port_exposure": null,
        "port_vulnerability_exposure_score": null,
        "full_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "selective_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "visibility_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "current_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "port_wide_exposure": {
          "any": null,
          "ip_list": null
        },
        "workload": {
          "href": "string"
        },
        "vulnerability": {
          "href": "string",
          "score": 0,
          "name": "string"
        },
        "vulnerability_report": {
          "href": "string"
        }
      }
    ],
    "last_updated_at": "2025-04-01T00:21:27Z"
  },
  "risk_summary": {
    "ransomware": null
  },
  "agent": {
    "config": {
      "mode": "string",
      "log_traffic": true,
      "security_policy_update_mode": "string"
    },
    "href": "string",
    "secure_connect": {
      "matching_issuer_name": "string"
    },
    "status": {
      "uid": "string",
      "last_heartbeat_on": null,
      "uptime_seconds": null,
      "agent_version": "string",
      "managed_since": "2025-04-01T00:21:27Z",
      "fw_config_current": true,
      "firewall_rule_count": 0,
      "security_policy_refresh_at": "2025-04-01T00:21:27Z",
      "security_policy_applied_at": "2025-04-01T00:21:27Z",
      "security_policy_received_at": "2025-04-01T00:21:27Z",
      "agent_health_errors": {
        "errors": [
          "string"
        ],
        "warnings": [
          "string"
        ]
      },
      "agent_health": [
        {
          "type": "string",
          "severity": "string",
          "audit_event": "string"
        }
      ],
      "security_policy_sync_state": "string"
    },
    "active_pce_fqdn": "string",
    "target_pce_fqdn": "string",
    "type": "string"
  },
  "ven": {
    "href": "string",
    "hostname": "string",
    "name": "string",
    "status": "string",
    "ven_type": "server"
  },
  "enforcement_mode": "idle",
  "selectively_enforced_services": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": {
    "href": "string"
  },
  "container_cluster": {
    "href": "string",
    "name": "string"
  },
  "ike_authentication_certificate": {},
  "datacenter_nat_1to1": true
}

Responses

Status Meaning Description Schema
200 OK Success workloads_get

Get a Workload

Example Code


curl -X GET /orgs/{org_id}/workloads/{workload_id} \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/workloads/{workload_id}

Exposure: Public Stable

Auditable: No

Get the workload information

Parameters

Name In Type Required Description
org_id path integer true* Organization
workload_id path string true* Workload UUID

Example Response Body

200 Response

{
  "href": "string",
  "deleted": true,
  "delete_type": "string",
  "name": "string",
  "description": "string",
  "managed": true,
  "hostname": "string",
  "service_principal_name": "string",
  "agent_to_pce_certificate_authentication_id": null,
  "distinguished_name": "string",
  "public_ip": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "interfaces": {
    "name": "string",
    "link_state": null,
    "address": "string",
    "cidr_block": null,
    "default_gateway_address": null,
    "network": {
      "href": "string",
      "name": null
    },
    "network_detection_mode": null,
    "friendly_name": null,
    "href": "string"
  },
  "service_provider": "string",
  "data_center": "string",
  "data_center_zone": "string",
  "os_id": "string",
  "os_detail": "string",
  "online": true,
  "firewall_coexistence": null,
  "containers_inherit_host_policy": true,
  "blocked_connection_action": "drop",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "services": {
    "uptime_seconds": 0,
    "created_at": "2025-04-01T00:21:27Z",
    "open_service_ports": [
      {
        "protocol": 0,
        "address": "string",
        "port": 0,
        "process_name": "string",
        "user": "string",
        "package": "string",
        "win_service_name": "string"
      }
    ]
  },
  "vulnerabilities_summary": {
    "num_vulnerabilities": 0,
    "vulnerability_score": 0,
    "max_vulnerability_score": 0,
    "vulnerable_port_exposure": null,
    "vulnerable_port_wide_exposure": {
      "any": null,
      "ip_list": null
    },
    "vulnerability_exposure_score": null,
    "full_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "selective_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "visibility_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "current_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "max_vulnerability_exposure_score": null,
    "vulnerability_computation_state": "not_applicable",
    "last_updated_at": "2025-04-01T00:21:27Z"
  },
  "detected_vulnerabilities": {
    "detected_vulnerability_summary": {
      "num_vulnerabilities": 0,
      "vulnerability_score": 0,
      "max_vulnerability_score": 0,
      "vulnerable_port_exposure": null,
      "vulnerable_port_wide_exposure": {
        "any": null,
        "ip_list": null
      },
      "vulnerability_exposure_score": null,
      "full_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "selective_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "visibility_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "current_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "max_vulnerability_exposure_score": null,
      "vulnerability_computation_state": "not_applicable",
      "last_updated_at": "2025-04-01T00:21:27Z"
    },
    "workload_detected_vulnerabilities": [
      {
        "ip_address": "string",
        "port": 0,
        "proto": 0,
        "port_exposure": null,
        "port_vulnerability_exposure_score": null,
        "full_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "selective_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "visibility_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "current_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "port_wide_exposure": {
          "any": null,
          "ip_list": null
        },
        "workload": {
          "href": "string"
        },
        "vulnerability": {
          "href": "string",
          "score": 0,
          "name": "string"
        },
        "vulnerability_report": {
          "href": "string"
        }
      }
    ],
    "last_updated_at": "2025-04-01T00:21:27Z"
  },
  "risk_summary": {
    "ransomware": null
  },
  "agent": {
    "config": {
      "mode": "string",
      "log_traffic": true,
      "security_policy_update_mode": "string"
    },
    "href": "string",
    "secure_connect": {
      "matching_issuer_name": "string"
    },
    "status": {
      "uid": "string",
      "last_heartbeat_on": null,
      "uptime_seconds": null,
      "agent_version": "string",
      "managed_since": "2025-04-01T00:21:27Z",
      "fw_config_current": true,
      "firewall_rule_count": 0,
      "security_policy_refresh_at": "2025-04-01T00:21:27Z",
      "security_policy_applied_at": "2025-04-01T00:21:27Z",
      "security_policy_received_at": "2025-04-01T00:21:27Z",
      "agent_health_errors": {
        "errors": [
          "string"
        ],
        "warnings": [
          "string"
        ]
      },
      "agent_health": [
        {
          "type": "string",
          "severity": "string",
          "audit_event": "string"
        }
      ],
      "security_policy_sync_state": "string"
    },
    "active_pce_fqdn": "string",
    "target_pce_fqdn": "string",
    "type": "string"
  },
  "ven": {
    "href": "string",
    "hostname": "string",
    "name": "string",
    "status": "string",
    "ven_type": "server"
  },
  "enforcement_mode": "idle",
  "selectively_enforced_services": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": {
    "href": "string"
  },
  "container_cluster": {
    "href": "string",
    "name": "string"
  },
  "ike_authentication_certificate": {},
  "datacenter_nat_1to1": true
}

Responses

Status Meaning Description Schema
200 OK Success workloads_get

Create a Workload

Example Code


curl -X POST /orgs/{org_id}/workloads \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

POST /api/v2/orgs/{org_id}/workloads

Auditable: Yes

Exposure: Public Stable

Used to create a workload

Example Request Body

{}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body workloads_post false none
» name body string false The short friendly name of the workload
» description body string false The long description of the workload
» external_data_set body string,null false External data set identifier
» external_data_reference body string,null false External data reference identifier
» hostname body string false The hostname reported from the host itself
» service_principal_name body string,null false The Kerberos Service Principal Name (SPN)
» agent_to_pce_certificate_authentication_id body string,null false PKI Certificate identifier to be used by the PCE for authenticating the VEN
» distinguished_name body string false X.509 Subject distinguished name
» public_ip body string,null false The public IP address of the server
» interfaces body [object] false Workload network interfaces
»» name body string true* Interface name
»» link_state body string false Link State
»» address body any true* none
»»» anonymous body number false none
»»» anonymous body number false none
»» cidr_block body integer false The number of bits in the subnet /24 is 255.255.255.0
»» default_gateway_address body any false none
»» friendly_name body string false User-friendly name for interface
»» network body sec_policy_virtual_servers_get/properties/created_by false none
»»» href body string true* none
»» service_provider body string false Service provider
»» data_center body string false Data center
»» data_center_zone body string false Data center zone
»» os_id body string false Our OS identifier
»» os_detail body string false Additional OS details - just displayed to end user
»» online body boolean false If this workload is online
»» labels body [object] false Assigned labels
»»» href body string true* Label URI
»» agent body object false DEPRECATED AND REPLACED (USE enforcement_mode and visibility_level) Agent info
»»» config body workloads_post/properties/agent/properties/config false DEPRECATED AND REPLACED by 'ven', 'enforcement_mode', and 'visibility_level'
»»»» mode body pairing_profiles_get/properties/mode false DEPRECATED AND REPLACED (Use enforcement_mode instead)
»»»» log_traffic body boolean false DEPRECATED WITH NO REPLACEMENT True if we want to log traffic events from this workload
»»» enforcement_mode body container_clusters_container_workload_profiles_get/properties/enforcement_mode false Workload enforcement mode
»»» anonymous body object false none
»»» anonymous body object false none

Enumerated Values

Parameter Value
»» link_state up
»» link_state down
»» link_state unknown
»»»» mode idle
»»»» mode illuminated
»»»» mode enforced
»»»» mode selective
»»» enforcement_mode idle
»»» enforcement_mode visibility_only
»»» enforcement_mode full
»»» enforcement_mode selective

Responses

Status Meaning Description Schema
201 Created Success None

Bulk Create Workloads

Example Code


curl -X PUT /orgs/{org_id}/workloads/bulk_create \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/workloads/bulk_create

Auditable: Yes

Exposure: Public Stable

Bulk create workloads

Example Request Body

[
  {}
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body workloads_bulk_create_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Bulk update workloads using csv file

Example Code


curl -X PUT /orgs/{org_id}/workloads/bulk_import

PUT /api/v2/orgs/{org_id}/workloads/bulk_import

Exposure: Public Experimental

Auditable: Yes

Bulk update workloads using csv file

Parameters

Name In Type Required Description
org_id path integer true* Organization
create_labels query boolean false When updating labels via csv, create new labels if they do not exist
delete_token query string false delete token is used to specify the value in the csv which indicates the deletion of a label
dry_run query boolean false in draft mode, api will only return the statistics of the potential changes but not making any changes

Responses

Status Meaning Description Schema
204 No Content Success None

Unpair a Workload

Example Code


curl -X PUT /orgs/{org_id}/workloads/unpair \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/workloads/unpair

Auditable: Yes

Exposure: Public Stable

DEPRECATED AND REPLACED (USE /orgs/:org_id/vens/unpair INSTEAD)

Example Request Body

{
  "workloads": [
    {
      "href": "string"
    }
  ],
  "ip_table_restore": "default"
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body workloads_unpair_put false none
» workloads body [object] true* Workloads to update
»» href body string true* URI of workload to update
» ip_table_restore body string false The desired state of IP tables after the agent is uninstalled.

Enumerated Values

Parameter Value
» ip_table_restore saved
» ip_table_restore default
» ip_table_restore disable

Responses

Status Meaning Description Schema
204 No Content Success None

Update a Workload

Example Code


curl -X PUT /orgs/{org_id}/workloads/{workload_id} \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/workloads/{workload_id}

Auditable: Yes

Exposure: Public Stable

Update the workload information

Example Request Body

{
  "href": "string",
  "name": "string",
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "service_principal_name": null,
  "agent_to_pce_certificate_authentication_id": null,
  "service_provider": "string",
  "data_center": "string",
  "data_center_zone": "string",
  "labels": [
    {
      "href": "string"
    }
  ],
  "agent": {
    "href": "string",
    "config": {
      "mode": "idle",
      "log_traffic": true
    },
    "status": {
      "status": "active"
    }
  },
  "enforcement_mode": "idle",
  "datacenter_nat_1to1": true
}

Parameters

Name In Type Required Description
org_id path integer true* Organization
workload_id path string true* Workload UUID
body body workloads_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Bulk Update Workloads

Example Code


curl -X PUT /orgs/{org_id}/workloads/bulk_update \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/workloads/bulk_update

Auditable: Yes

Exposure: Public Stable

Bulk update workloads

Example Request Body

[]

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body workloads_bulk_update_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Delete a Workload

Example Code


curl -X DELETE /orgs/{org_id}/workloads/{workload_id}
  \ -u $KEY:$TOKEN

DELETE /api/v2/orgs/{org_id}/workloads/{workload_id}

Exposure: Public Stable

Auditable: Yes

Delete the workload record

Parameters

Name In Type Required Description
org_id path integer true* Organization
workload_id path string true* Workload UUID

Responses

Status Meaning Description Schema
204 No Content Success None

Get ransomware details for this workload

Example Code


curl -X GET /orgs/{org_id}/workloads/{workload_id}/risk_details \
  -u $KEY:$TOKEN -H 'Accept: application/json'

GET /api/v2/orgs/{org_id}/workloads/{workload_id}/risk_details

Exposure: Public Experimental

Auditable: No

Get ransomware details for this workload

Parameters

Name In Type Required Description
org_id path integer true* Organization
workload_id path string true* Workload UUID

Example Response Body

200 Response

{
  "risk_details": {}
}

Responses

Status Meaning Description Schema
200 OK Success workloads_risk_details_get

Bulk Delete Workloads

Example Code


curl -X PUT /orgs/{org_id}/workloads/bulk_delete \
  -u $KEY:$TOKEN -H 'Content-Type: application/json'

PUT /api/v2/orgs/{org_id}/workloads/bulk_delete

Auditable: Yes

Exposure: Public Stable

Bulk delete workloads

Example Request Body

[
  {
    "href": "string"
  }
]

Parameters

Name In Type Required Description
org_id path integer true* Organization
body body workloads_bulk_delete_put false none

Responses

Status Meaning Description Schema
204 No Content Success None

Schemas

network_devices_network_endpoints_get

[
  {
    "href": "string",
    "config": {
      "endpoint_type": "string",
      "name": "string",
      "traffic_flow_id": "string",
      "workload_discovery": true
    },
    "workload_discovery": true,
    "network_device": {
      "href": "string"
    },
    "workloads": [
      {
        "href": "string"
      }
    ],
    "status": "string"
  }
]

Properties

Name Type Required Restrictions Description
href string false none URL of device endpoint
config network_devices_network_endpoints_post/properties/config false none none
workload_discovery boolean false none Flag to indicate if workload discovery is enabled
network_device object false none Associated network device
» href string false none URI of network device
workloads [object] false none List of managed workloads
» href string false none URI of workload
status string false none Endpoint status

network_devices_network_endpoints_post

{
  "config": {
    "endpoint_type": "string",
    "name": "string",
    "traffic_flow_id": "string",
    "workload_discovery": true
  },
  "workloads": [
    {
      "href": "string"
    }
  ]
}

Properties

Name Type Required Restrictions Description
config object true* none none
» endpoint_type string false none The type of endpoint
» name string false none The name of the endpoint e.g. interface name
» traffic_flow_id string false none A traffic flow identifier for this endpoint e.g. switch port IfIndex
» workload_discovery boolean false none Flag to indicate if workload discovery is enabled
workloads [object] false none List of managed workloads
» href string true* none URI of workload

network_devices_network_endpoints_put

{
  "config": {
    "endpoint_type": "string",
    "name": "string",
    "traffic_flow_id": "string",
    "workload_discovery": true
  },
  "workloads": [
    {
      "href": "string"
    }
  ]
}

Properties

Name Type Required Restrictions Description
config network_devices_network_endpoints_post/properties/config false none none
workloads [object] false none List of managed workloads
» href string true* none URI of workload

network_devices_get

[
  {
    "href": "string",
    "config": {
      "name": "string",
      "description": "string",
      "device_type": "string",
      "manufacturer": "string",
      "model": "string",
      "ip_address": "string",
      "credentials": {
        "type": "cli",
        "port": 0,
        "username": "string",
        "password": "string"
      }
    },
    "configure": true,
    "enforcement_instructions_generation_in_progress": true,
    "enforcement_instructions_data_href": "string",
    "enforcement_instructions_data_timestamp": "2025-04-01T00:21:27Z",
    "enforcement_instructions_ack_href": "string",
    "enforcement_instructions_ack_timestamp": "2025-04-01T00:21:27Z",
    "supported_endpoint_type": "string",
    "endpoints": [
      {
        "href": "string"
      }
    ],
    "network_enforcement_node": {
      "href": "string"
    },
    "status": "string"
  }
]

Properties

Name Type Required Restrictions Description
href string true* none URI of network device
config network_enforcement_nodes_network_devices_post true* none none
configure boolean false none Enable configuration of the device by the network enforcement platform
enforcement_instructions_generation_in_progress boolean false none Flag to indicate if an enforceement instructions generation is in progress for this network_device
enforcement_instructions_data_href string false none href to download the enforcement instructions data (this expires 7 days after data uploaded from network enforcement node)
enforcement_instructions_data_timestamp string(date-time) false none Timestamp indicating when enforcement instructions data were received from network enforcement node
enforcement_instructions_ack_href string false none href to download the enforcement instructions ack log (this expires 7 days after data uploaded from network enforcement node)
enforcement_instructions_ack_timestamp string(date-time) false none Timestamp indicating when enforcement instructions ack log was received from network enforcement node
supported_endpoint_type string true* none Type of endpoint supported by this device
endpoints [object] false none none
» href string false none URI of endpoint
network_enforcement_node object true* none none
» href string false none URI of owning network_enforcement_agent
status string false none Status of device

network_devices_multi_enforcement_instructions_request_post

{}

Supply one of the following properties

Properties

Name Type Required Restrictions Description
all_devices boolean false none Flag to indicate that enforcement instructions are required for all network devices
network_devices [object] false none none
» href string false none href of network device

oneOf

Name Type Required Restrictions Description
anonymous object false none none

xor

Name Type Required Restrictions Description
anonymous object false none none

Enumerated Values

Property Value
all_devices true*

network_devices_multi_enforcement_instructions_applied_post

{}

Supply one of the following properties

Properties

Name Type Required Restrictions Description
all_devices boolean false none Flag to indicate that enforcement instructions are required for all network devices
network_devices [object] false none none
» href string false none href of network device

oneOf

Name Type Required Restrictions Description
anonymous object false none none

xor

Name Type Required Restrictions Description
anonymous object false none none

Enumerated Values

Property Value
all_devices true*

network_enforcement_nodes_network_devices_post

{
  "name": "string",
  "description": "string",
  "device_type": "string",
  "manufacturer": "string",
  "model": "string",
  "ip_address": "string",
  "credentials": {
    "type": "cli",
    "port": 0,
    "username": "string",
    "password": "string"
  }
}

Properties

Name Type Required Restrictions Description
name string false none The name of the device
description string false none Description of the device
device_type string false none Type of device
manufacturer string false none The manufacturer of the device
model string false none The model of the device
ip_address string false none The IP address of the device
credentials object false none none
» type string false none The type of credential used to access the device
» port integer false none The device port, if non-standard for credential type
» username string false none The username used to access the device
» password string false none The password used to access the device

Enumerated Values

Property Value
type cli
type api

network_devices_put

{
  "name": "string",
  "description": "string",
  "device_type": "string",
  "manufacturer": "string",
  "model": "string",
  "ip_address": "string",
  "credentials": {
    "type": "cli",
    "port": 0,
    "username": "string",
    "password": "string"
  }
}

Properties

None

network_devices_enforcement_instructions_request_post

{}

Properties

None

network_devices_enforcement_instructions_applied_post

{}

Properties

None

network_enforcement_nodes_get

[
  {
    "uuid": "string",
    "org_id": 0,
    "hostname": "string",
    "name": "string",
    "public_ip": "string",
    "software_version": "string",
    "last_status_at": null,
    "uptime_seconds": null,
    "network_devices": [],
    "supported_devices": [
      {
        "device_type": "string",
        "manufacturers": [
          {
            "manufacturer": "string",
            "models": [
              {
                "model": "string",
                "endpoint_type": "string"
              }
            ]
          }
        ]
      }
    ],
    "conditions": [
      {
        "first_reported_timestamp": "2025-04-01T00:21:27Z",
        "latest_event": {
          "notification_type": "string",
          "severity": "err",
          "href": "string",
          "info": {},
          "timestamp": "2025-04-01T00:21:27Z"
        }
      }
    ],
    "target_pce_fqdn": null,
    "active_pce_fqdn": null
  }
]

Properties

Name Type Required Restrictions Description
uuid string false none The uuid for this network enforcement node
org_id integer false none The org id for this network enforcement node
hostname string false none The hostname for this network enforcement node
name string false none User friendly name for this network enforcement node
public_ip string false none Public ip of this network enforcement node
software_version string false none Network enforcement node software version string
last_status_at string,null(date-time) false none The last time (rfc3339 timestamp) a status was received from this node
uptime_seconds integer,null false none How long since the last restart of this service.
network_devices array false none Managed network devices
supported_devices [object] false none none
» device_type string false none Type of network device
» manufacturers [object] false none none
»» manufacturer string false none Device manufacturer
»» models [object] false none none
»»» model string true* none Device model
»»» endpoint_type string false none Type of supported endpoint
»» conditions vens_get/properties/conditions false none Resource errors. If there are no errors or warnings, then the array value will be empty.
»» target_pce_fqdn string,null false none The FQDN of the PCE the Network Enforcement Node will use for future connections
»» active_pce_fqdn string,null false none The FQDN of the PCE that received the Network Enforcement Node's last heartbeat

network_enforcement_nodes_virtual_server_discovery_jobs_get

{
  "href": "string",
  "status": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "completed_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "connection_state": "string",
  "virtual_server_infos": [
    {
      "ip_address": "string",
      "port": 0,
      "discovered_virtual_server": {
        "href": "string"
      }
    }
  ]
}

Details of virtual servers discovery

Properties

Name Type Required Restrictions Description
href string true* none URI of the requested Virtual Servers discovery job
status string true* none The current state of the request
created_at string(date-time) true* none The time (rfc3339 timestamp) at which this job was created
completed_at string(date-time) false none The time (rfc3339 timestamp) at which this job was completed
created_by object true* none none
» href string true* none User who originally created this Virtual Server discovery job
connection_state string false none Status of most recent connection to the SLB device
virtual_server_infos [object] false none Information of job completion
» ip_address string false none Virtual server IP address
» port integer false none Virtual server port
» discovered_virtual_server object false none Discovered Virtual Server. Null indicates not found
»» href string true* none URI of Discovered Virtual Server

network_enforcement_nodes_put

{
  "target_pce_fqdn": "string"
}

Update a NEN's target PCE.

Properties

Name Type Required Restrictions Description
target_pce_fqdn string false none cluster FQDN for target PCE

login_users_authenticate_post

{
  "one_time_password": "string"
}

Properties

oneOf

Name Type Required Restrictions Description
anonymous object false none none
» one_time_password string false none The time-based one-time password for two-factor authentication.

xor

Name Type Required Restrictions Description
anonymous null false none none

login_users_password_put

{
  "password": "string"
}

Properties

Name Type Required Restrictions Description
password string true* none New password

traffic_flows_database_metrics_get

{
  "flows_days": 0,
  "flows_days_limit": 0,
  "flows_oldest_day": "2025-04-01",
  "flows_size_gb": 0,
  "flows_size_gb_limit": 0,
  "server": {
    "num_flows_days": 0,
    "num_flows_days_limit": 0,
    "flows_oldest_day": "2025-04-01",
    "flows_size_gb": 0,
    "flows_size_gb_limit": 0,
    "num_daily_tables": 0,
    "num_weekly_tables": 0
  },
  "endpoint": {
    "num_flows_days": 0,
    "num_flows_days_limit": 0,
    "flows_oldest_day": "2025-04-01",
    "flows_size_gb": 0,
    "flows_size_gb_limit": 0,
    "num_daily_tables": 0,
    "num_weekly_tables": 0
  },
  "backlog": {
    "total_disk_used_gb": 0,
    "total_file_count": 0
  },
  "updated_at": "2025-04-01T00:21:27Z"
}

Organization flow database usage metrics

Properties

Name Type Required Restrictions Description
flows_days integer true* none Organization's total number of days of flow data.
flows_days_limit integer true* none Organization's limit on total number of days of flow data.
flows_oldest_day string(date) false none Organization's oldest day of flow data (yyyy-mm-dd).
flows_size_gb number true* none Organization's total number of gigabytes of flow data.
flows_size_gb_limit number true* none Organization's limit on total number of gigabytes of flow data.
server object false none none
» num_flows_days integer false none Organization's total number of days of server flow data.
» num_flows_days_limit integer false none Organization's limit on total number of days of server flow data.
» flows_oldest_day string(date) false none Organization's oldest day of server flow data (yyyy-mm-dd).
» flows_size_gb number false none Organization's total number of gigabytes of server flow data.
» flows_size_gb_limit number false none Organization's limit on total number of gigabytes of server flow data.
» num_daily_tables number false none The number of server daily tables, including FlowLink and CloudSecure, counted once for each unique day.
» num_weekly_tables number false none The number of server weekly tables, including FlowLink and CloudSecure, counted once for each unique week.
endpoint object false none none
» num_flows_days integer false none Organization's total number of days of endpoint flow data.
» num_flows_days_limit integer false none Organization's limit on total number of days of endpoint flow data.
» flows_oldest_day string(date) false none Organization's oldest day of endpoint flow data (yyyy-mm-dd).
» flows_size_gb number false none Organization's total number of gigabytes of endpoint flow data.
» flows_size_gb_limit number false none Organization's limit on total number of gigabytes of endpoint flow data.
» num_daily_tables number false none The number of endpoint daily tables, counted once for each unique day.
» num_weekly_tables number false none The number of endpoint weekly tables, counted once for each unique week.
backlog object false none none
» total_disk_used_gb number false none total gigabytes used to store flow data input files.
» total_file_count integer false none total number of flow data input files
updated_at string(date-time) true* none Timestamp in UTC when these flow metrics were generated

traffic_flows_async_queries_post

{
  "query_name": "string",
  "start_date": "2025-04-01",
  "end_date": "2025-04-01",
  "sources_destinations_query_op": "and",
  "sources": {
    "include": [
      [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    ],
    "exclude": [
      {
        "label": {
          "href": "string"
        }
      }
    ]
  },
  "destinations": {
    "include": [
      [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    ],
    "exclude": [
      {
        "label": {
          "href": "string"
        }
      }
    ]
  },
  "data_sources": {
    "include": [
      "server"
    ],
    "exclude": [
      "server"
    ]
  },
  "services": {
    "include": [
      {
        "port": 0,
        "to_port": 0,
        "proto": 0,
        "process_name": "string",
        "windows_service_name": "string"
      }
    ],
    "exclude": [
      {
        "port": 0,
        "to_port": 0,
        "proto": 0,
        "process_name": "string",
        "windows_service_name": "string"
      }
    ]
  },
  "policy_decisions": [
    "allowed"
  ],
  "boundary_decisions": [
    "blocked"
  ],
  "max_results": 0,
  "exclude_workloads_from_ip_list_query": true
}

Properties

Name Type Required Restrictions Description
query_name string true* none Query Name
start_date string(date) false none Starting date for query
end_date string(date) false none Ending date for query
sources_destinations_query_op string false none Query logical operator between sources and destinations
sources object true* none Source labels, workloads, IP addresses to include or exclude
» include [array] true* none List of included sources or targets

oneOf

Name Type Required Restrictions Description
»» anonymous object false none A label parameter for a traffic query
»»» label object true* none none
»»»» href string true* none Label URI

xor

Name Type Required Restrictions Description
»»» anonymous object false none A label group parameter for a traffic query
»»»» label_group object true* none none
»»»»» href string true* none Label group URI

xor

Name Type Required Restrictions Description
»»»» anonymous object false none A workload parameter for a traffic query
»»»»» workload object true* none none
»»»»»» href string true* none Workload URI

xor

Name Type Required Restrictions Description
»»»»» anonymous object false none An IP address parameter for a traffic query
»»»»»» ip_address string true* none IP address value

xor

Name Type Required Restrictions Description
»»»»» anonymous object false none An IP List parameter for a traffic query
»»»»»» ip_list object true* none none
»»»»»»» href string true* none IP List draft URI

xor

Name Type Required Restrictions Description
»»»»»» anonymous object false none Explorer filter for all managed services (workloads, virtual_services etc)
»»»»»»» actors string false none All managed workloads ('ams')

xor

Name Type Required Restrictions Description
»»»»»» anonymous object false none Cloud resource Id parameter for a traffic query
»»»»»»» cloud_resource object true* none none
»»»»»»»» resource_uuid string true* none UUID of cloud resource

xor

Name Type Required Restrictions Description
»»»»»»» anonymous object false none Data-center parameter for a traffic query
»»»»»»»» data_center object true* none none
»»»»»»»»» type string true* none Type of the datacenter, such as core/cloud/aws/azure/gcp

continued

Name Type Required Restrictions Description
»»»»»»»» exclude [anyOf] true* none List of excluded sources or targets

anyOf

Name Type Required Restrictions Description
»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false none A label parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false none A label group parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false none A workload parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false none An IP address parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false none An IP List parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false none Cloud resource Id parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false none Data-center parameter for a traffic query

continued

Name Type Required Restrictions Description
»»»»»»»» destinations object true* none Target labels, workloads, IP addresses, domain names, transmission to include or exclude
»»»»»»»»» include [array] true* none List of included sources or targets

oneOf

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false none A label parameter for a traffic query

xor

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false none A label group parameter for a traffic query

xor

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false none A workload parameter for a traffic query

xor

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false none An IP address parameter for a traffic query

xor

Name Type Required Restrictions Description
»»»»»»»»»» anonymous object false none An DNS parameter for a traffic query
»»»»»»»»»»» fqdn string true* none parameter for querying the matched fqdn

xor

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false none An IP List parameter for a traffic query

xor

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/5 false none Explorer filter for all managed services (workloads, virtual_services etc)

xor

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false none Cloud resource Id parameter for a traffic query

xor

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false none Data-center parameter for a traffic query

continued

Name Type Required Restrictions Description
»»»»»»»»» exclude [anyOf] true* none List of excluded sources or targets

anyOf

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/0 false none A label parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/1 false none A label group parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/2 false none A workload parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/3 false none An IP address parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/destinations/properties/include/items/items/oneOf/4 false none An DNS parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»»» anonymous object false none Parameter representing broadcast/multiccast
»»»»»»»»»»» transmission string true* none transmission type

or

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/4 false none An IP List parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/6 false none Cloud resource Id parameter for a traffic query

or

Name Type Required Restrictions Description
»»»»»»»»»» anonymous traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false none Data-center parameter for a traffic query

continued

Name Type Required Restrictions Description
»»»»»»»»» data_sources object false none Data sources of the flows to include or exclude
»»»»»»»»»» include [string] false none List of included services
»»»»»»»»»» exclude [string] false none List of excluded data sources
»»»»»»»»» services object true* none Services (5-tuple of port/to_port/proto/process/service) to include or exclude
»»»»»»»»»» include [object] true* none List of included services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»» port integer false none Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»» proto integer false none protocol number
»»»»»»»»»»» process_name string false none Process Name
»»»»»»»»»»» windows_service_name string false none Windows Service Name
»»»»»»»»»» exclude [object] true* none List of excluded services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»»»» port integer false none Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»»»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»»»» proto integer false none protocol number
»»»»»»»»»»» process_name string false none Process Name
»»»»»»»»»»» windows_service_name string false none Windows Service Name
»»»»»»»»»» policy_decisions [string] true* none List of policy decisions
»»»»»»»»»» boundary_decisions [string] false none List of boundary decisions
»»»»»»»»»» max_results integer true* none maximum number of flows to return
»»»»»»»»»» exclude_workloads_from_ip_list_query boolean false none exclude workload traffic when IP List is provided either in consumer or provider part of traffic query

Enumerated Values

Property Value
sources_destinations_query_op and
sources_destinations_query_op or
actors ams
type core
type cloud
type aws
type azure
type gcp
transmission broadcast
transmission multicast
transmission unicast

traffic_flows_async_queries_get

{
  "href": "http://example.com",
  "result": "http://example.com",
  "status": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "http://example.com"
  },
  "query_parameters": {
    "query_name": "string",
    "start_date": "2025-04-01",
    "end_date": "2025-04-01",
    "sources_destinations_query_op": "and",
    "sources": {
      "include": [
        [
          {
            "label": {
              "href": "string"
            }
          }
        ]
      ],
      "exclude": [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    },
    "destinations": {
      "include": [
        [
          {
            "label": {
              "href": "string"
            }
          }
        ]
      ],
      "exclude": [
        {
          "label": {
            "href": "string"
          }
        }
      ]
    },
    "data_sources": {
      "include": [
        "server"
      ],
      "exclude": [
        "server"
      ]
    },
    "services": {
      "include": [
        {
          "port": 0,
          "to_port": 0,
          "proto": 0,
          "process_name": "string",
          "windows_service_name": "string"
        }
      ],
      "exclude": [
        {
          "port": 0,
          "to_port": 0,
          "proto": 0,
          "process_name": "string",
          "windows_service_name": "string"
        }
      ]
    },
    "policy_decisions": [
      "allowed"
    ],
    "boundary_decisions": [
      "blocked"
    ],
    "max_results": 0,
    "exclude_workloads_from_ip_list_query": true
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "matches_count": 0,
  "flows_count": 0,
  "regions": [
    {
      "pce_fqdn": "string",
      "responded": true,
      "matches_count": 0,
      "flows_count": 0
    }
  ]
}

Asynchronous explorer query status

Properties

Name Type Required Restrictions Description
href string(uri) true* none Query URI
result string(uri) false none Result download URI, availble only if status is completed
status string true* none Current query status
created_at string(date-time) true* none Timestamp in UTC when this query was created
created_by object true* none none
» href string(uri) true* none User who created this query
query_parameters object true* none none
» query_name string true* none Query Name
» start_date string(date) false none Starting date for query
» end_date string(date) false none Ending date for query
» sources_destinations_query_op string false none Query logical operator between sources and destinations
» sources object true* none Source labels, workloads, IP addresses to include or exclude
»» include traffic_flows_async_queries_post/properties/sources/properties/include true* none List of included sources or targets
»» exclude traffic_flows_async_queries_post/properties/sources/properties/exclude true* none List of excluded sources or targets
» destinations object true* none Target labels, workloads, IP addresses, domain names, transmission to include or exclude
»» include traffic_flows_async_queries_post/properties/destinations/properties/include true* none List of included sources or targets
»» exclude traffic_flows_async_queries_post/properties/destinations/properties/exclude true* none List of excluded sources or targets
» data_sources object false none Data sources of the flows to include or exclude
»» include [string] false none List of included services
»» exclude [string] false none List of excluded data sources
» services object true* none Services (5-tuple of port/to_port/proto/process/service) to include or exclude
»» include [object] true* none List of included services (5-tuple of port/to_port/proto/process/service)
»»» port integer false none Port Number (integer 0-65535). Also the starting port when specifying a range.
»»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»» proto integer false none protocol number
»»» process_name string false none Process Name
»»» windows_service_name string false none Windows Service Name
»» exclude [object] true* none List of excluded services (5-tuple of port/to_port/proto/process/service)
»»» port integer false none Port Number (integer 0-65535). Also the starting port when specifying a range.
»»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»» proto integer false none protocol number
»»» process_name string false none Process Name
»»» windows_service_name string false none Windows Service Name
»» policy_decisions [string] true* none List of policy decisions
»» boundary_decisions [string] false none List of boundary decisions
»» max_results integer true* none maximum number of flows to return
»» exclude_workloads_from_ip_list_query boolean false none exclude workload traffic when IP List is provided either in consumer or provider part of traffic query
» updated_at string(date-time) false none Timestamp in UTC when this async query was last updated.
» matches_count integer false none query result count
» flows_count integer false none result count after query limits and RBAC filtering are applied
» regions [object] false none Region-specific response metadata
»» pce_fqdn string true* none FQDN of PCE region
»» responded boolean true* none supercluster region responded with query results
»» matches_count integer false none region query result count
»» flows_count integer false none region result count after query limits and RBAC filtering are applied

Enumerated Values

Property Value
sources_destinations_query_op and
sources_destinations_query_op or

traffic_flows_async_queries_download_get

[
  {
    "src": {
      "ip": "string",
      "workload": {
        "href": "string",
        "hostname": "string",
        "name": "string",
        "os_type": "windows",
        "enforcement_mode": "idle",
        "labels": [
          {
            "href": "string"
          }
        ],
        "managed": true
      },
      "cloud_resource": {
        "resource_uuid": "string",
        "labels": [
          {
            "href": "string"
          }
        ],
        "type": "aws"
      },
      "data_center": {
        "data_center": {
          "type": "core"
        }
      },
      "ip_lists": [
        {
          "name": "string",
          "href": "string",
          "size": 0,
          "rules": [
            {
              "href": "string"
            }
          ],
          "enforcement_boundaries": [
            {
              "href": "string"
            }
          ],
          "override_deny_rules": [
            {
              "href": "string"
            }
          ]
        }
      ],
      "virtual_server": {
        "name": "string",
        "href": "string",
        "enforcement_mode": "unmanaged",
        "labels": [
          {
            "href": "string"
          }
        ]
      },
      "virtual_service": {
        "name": "string",
        "href": "string",
        "labels": [
          {
            "href": "string"
          }
        ],
        "workload_enforcement_mode": "idle"
      },
      "fqdn_name": "string"
    },
    "dst": {
      "ip": "string",
      "workload": {
        "href": "string",
        "hostname": "string",
        "name": "string",
        "os_type": "windows",
        "enforcement_mode": "idle",
        "labels": [
          {
            "href": "string"
          }
        ],
        "managed": true
      },
      "cloud_resource": {
        "resource_uuid": "string",
        "labels": [
          {
            "href": "string"
          }
        ],
        "type": "aws"
      },
      "data_center": {
        "data_center": {
          "type": "core"
        }
      },
      "ip_lists": [
        {
          "name": "string",
          "href": "string",
          "size": 0,
          "rules": [
            {
              "href": "string"
            }
          ],
          "enforcement_boundaries": [
            {
              "href": "string"
            }
          ],
          "override_deny_rules": [
            {
              "href": "string"
            }
          ]
        }
      ],
      "virtual_server": {
        "name": "string",
        "href": "string",
        "enforcement_mode": "unmanaged",
        "labels": [
          {
            "href": "string"
          }
        ]
      },
      "virtual_service": {
        "name": "string",
        "href": "string",
        "labels": [
          {
            "href": "string"
          }
        ],
        "workload_enforcement_mode": "idle"
      },
      "fqdn_name": "string"
    },
    "service": {
      "port": 0,
      "proto": 0,
      "process_name": "string",
      "windows_service_name": "string",
      "user_name": "string"
    },
    "num_connections": 0,
    "policy_decision": "string",
    "boundary_decision": "string",
    "draft_policy_decision": "string",
    "flow_direction": "string",
    "transmission": "string",
    "timestamp_range": {
      "first_detected": "2025-04-01T00:21:27Z",
      "last_detected": "2025-04-01T00:21:27Z"
    },
    "state": "string",
    "dst_bo": 0,
    "dst_bi": 0,
    "icmp_type": 0,
    "icmp_code": 0,
    "network": {
      "name": "string",
      "href": "string"
    },
    "rules": [
      {
        "href": "string"
      }
    ],
    "enforcement_boundaries": [
      {
        "href": "string"
      }
    ],
    "override_deny_rules": [
      {
        "href": "string"
      }
    ],
    "caps": [
      "write"
    ],
    "client_type": "string"
  }
]

The list of traffic flows matching the query

Properties

Name Type Required Restrictions Description
src object true* none Traffic flow endpoint details
» ip string false none IP v4 or v6 address
» workload detected_core_services_get/properties/workload false none Workload details of the traffic-flow endpoint
» cloud_resource object false none Cloud Resource details of the traffic-flow endpoint
»» resource_uuid string true* none The UUID of the resource
»» labels detected_core_services_get/properties/workload/properties/labels true* none Assigned labels
»» type string true* none none
» data_center traffic_flows_async_queries_post/properties/sources/properties/include/items/items/oneOf/7 false none Data-center parameter for a traffic query
» ip_lists [object] false none none
»» name string false none Name of the ip_list
»» href string true* none The resource(URI) representation of the ip list. This is always the draft version.
»» size integer false none The number of ip addresses that the ip list covers
»» rules traffic_flows_async_queries_download_get/items/properties/rules false none Explorer query parameters
»» enforcement_boundaries traffic_flows_async_queries_download_get/items/properties/enforcement_boundaries false none Explorer query parameters
»» override_deny_rules traffic_flows_async_queries_download_get/items/properties/enforcement_boundaries false none List of override deny rules for the traffic flow. This is always the draft version
» virtual_server object false none virtual server details of the traffic-flow endpoint
»» name string false none Name of the virtual server
»» href string true* none The resource(URI) representation of the virtual server
»» enforcement_mode string false none virtual server enforcement mode
»» labels detected_core_services_get/properties/workload/properties/labels false none Assigned labels
» virtual_service object false none virtual service details of the traffic-flow endpoint
»» name string false none Name of the virtual service
»» href string true* none The resource(URI) representation of the virtual service
»» labels detected_core_services_get/properties/workload/properties/labels false none Assigned labels
»» workload_enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
» fqdn_name string false none fqdn name of the provider
dst traffic_flows_async_queries_download_get/items/properties/src true* none Traffic flow endpoint details
service object true* none Port, protocol, process, service name and user_name for a traffic flow
» port integer true* none Destination port
» proto integer true* none IANA protocol number
» process_name string false none Process Name for this flow
» windows_service_name string false none Windows Service Name for this flow
» user_name string false none User Name for this flow
num_connections integer true* none The number of times this flow was seen
policy_decision string true* none Policy decision made
boundary_decision string false none Boundary indicates if the flow was blocked due to an enforcement boundary
draft_policy_decision string false none draft policy decision of the flow
flow_direction string true* none Flow direction
transmission string false none transmission type: broadcast/multicast
timestamp_range object true* none Timestamp ranges for the flow detected
» first_detected string(date-time) true* none The first time this flow was detected within the time range specified by the query
» last_detected string(date-time) true* none The last time this flow was detected within the time range specified by the query
state string false none state of the flow
dst_bo integer false none Bytes sent till now by the destination over the flow during the interval
dst_bi integer false none Bytes received till now by the destination over the flow during the interval
icmp_type integer false none ICMP type for the flow
icmp_code integer false none ICMP code for the flow
network object false none PCE network on which this flow was observed.
» name string false none The network name.
» href string false none network href
rules [oneOf] false none Allow rules for specific policy objects

oneOf

Name Type Required Restrictions Description
» anonymous object false none none
»» href string true* none The resource (URI) representation of an allow rule. This is always the draft version.

xor

Name Type Required Restrictions Description
» anonymous object false none none
»» essential_service_rule string true* none The name of an essential service rule.

continued

Name Type Required Restrictions Description
» enforcement_boundaries [object] false none List of enforcement_boundaries details of the traffic-flow endpoint. This is always the draft version
»» href string true* none The resource (URI) representation of an enforcement boundary. This is always the draft version.
» override_deny_rules traffic_flows_async_queries_download_get/items/properties/enforcement_boundaries false none List of enforcement_boundaries details of the traffic-flow endpoint. This is always the draft version
» caps [string] true* none Array of permissions for the flow for the current user
» client_type string false none type of client which reported this flow

Enumerated Values

Property Value
type aws
type azure
type ocp
type gcp
type unknown
enforcement_mode unmanaged
enforcement_mode enforced

traffic_flows_async_queries_update_rules_put

null

Properties

None

traffic_flows_async_queries_put

{
  "status": "cancel_requested"
}

Properties

Name Type Required Restrictions Description
status string true* none Query status

Enumerated Values

Property Value
status cancel_requested

traffic_flows_traffic_analysis_queries_post

null

Properties

None

workloads_post

{}

Properties

Name Type Required Restrictions Description
name string false none The short friendly name of the workload
description string false none The long description of the workload
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
hostname string false none The hostname reported from the host itself
service_principal_name string,null false none The Kerberos Service Principal Name (SPN)
agent_to_pce_certificate_authentication_id string,null false none PKI Certificate identifier to be used by the PCE for authenticating the VEN
distinguished_name string false none X.509 Subject distinguished name
public_ip string,null false none The public IP address of the server
interfaces [object] false none Workload network interfaces
» name string true* none Interface name
» link_state string false none Link State
» address vulnerability_reports_put/properties/scanned_ips/items true* none The IP Address to assign to this interface
» cidr_block integer false none The number of bits in the subnet /24 is 255.255.255.0
» default_gateway_address vulnerability_reports_put/properties/scanned_ips/items false none The IP Address of the default gateway
» friendly_name string false none User-friendly name for interface
» network sec_policy_virtual_servers_get/properties/created_by false none none
service_provider string false none Service provider
data_center string false none Data center
data_center_zone string false none Data center zone
os_id string false none Our OS identifier
os_detail string false none Additional OS details - just displayed to end user
online boolean false none If this workload is online
labels [object] false none Assigned labels
» href string true* none Label URI
agent object false none DEPRECATED AND REPLACED (USE enforcement_mode and visibility_level) Agent info
» config object false none DEPRECATED AND REPLACED by 'ven', 'enforcement_mode', and 'visibility_level'
»» mode pairing_profiles_get/properties/mode false none DEPRECATED AND REPLACED (Use enforcement_mode instead)
»» log_traffic boolean false none DEPRECATED WITH NO REPLACEMENT True if we want to log traffic events from this workload
» enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode

anyOf

Name Type Required Restrictions Description
» anonymous object false none none

or

Name Type Required Restrictions Description
» anonymous object false none none

Enumerated Values

Property Value
link_state up
link_state down
link_state unknown

workloads_get

{
  "href": "string",
  "deleted": true,
  "delete_type": "string",
  "name": "string",
  "description": "string",
  "managed": true,
  "hostname": "string",
  "service_principal_name": "string",
  "agent_to_pce_certificate_authentication_id": null,
  "distinguished_name": "string",
  "public_ip": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "interfaces": {
    "name": "string",
    "link_state": null,
    "address": "string",
    "cidr_block": null,
    "default_gateway_address": null,
    "network": {
      "href": "string",
      "name": null
    },
    "network_detection_mode": null,
    "friendly_name": null,
    "href": "string"
  },
  "service_provider": "string",
  "data_center": "string",
  "data_center_zone": "string",
  "os_id": "string",
  "os_detail": "string",
  "online": true,
  "firewall_coexistence": null,
  "containers_inherit_host_policy": true,
  "blocked_connection_action": "drop",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "services": {
    "uptime_seconds": 0,
    "created_at": "2025-04-01T00:21:27Z",
    "open_service_ports": [
      {
        "protocol": 0,
        "address": "string",
        "port": 0,
        "process_name": "string",
        "user": "string",
        "package": "string",
        "win_service_name": "string"
      }
    ]
  },
  "vulnerabilities_summary": {
    "num_vulnerabilities": 0,
    "vulnerability_score": 0,
    "max_vulnerability_score": 0,
    "vulnerable_port_exposure": null,
    "vulnerable_port_wide_exposure": {
      "any": null,
      "ip_list": null
    },
    "vulnerability_exposure_score": null,
    "full_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "selective_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "visibility_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "current_enforcement_vulnerability_exposure": {
      "vulnerable_port_exposure": null,
      "vulnerability_exposure_score": null
    },
    "max_vulnerability_exposure_score": null,
    "vulnerability_computation_state": "not_applicable",
    "last_updated_at": "2025-04-01T00:21:27Z"
  },
  "detected_vulnerabilities": {
    "detected_vulnerability_summary": {
      "num_vulnerabilities": 0,
      "vulnerability_score": 0,
      "max_vulnerability_score": 0,
      "vulnerable_port_exposure": null,
      "vulnerable_port_wide_exposure": {
        "any": null,
        "ip_list": null
      },
      "vulnerability_exposure_score": null,
      "full_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "selective_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "visibility_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "current_enforcement_vulnerability_exposure": {
        "vulnerable_port_exposure": null,
        "vulnerability_exposure_score": null
      },
      "max_vulnerability_exposure_score": null,
      "vulnerability_computation_state": "not_applicable",
      "last_updated_at": "2025-04-01T00:21:27Z"
    },
    "workload_detected_vulnerabilities": [
      {
        "ip_address": "string",
        "port": 0,
        "proto": 0,
        "port_exposure": null,
        "port_vulnerability_exposure_score": null,
        "full_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "selective_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "visibility_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "current_enforcement_vulnerability_exposure": {
          "vulnerable_port_exposure": null,
          "port_vulnerability_exposure_score": null
        },
        "port_wide_exposure": {
          "any": null,
          "ip_list": null
        },
        "workload": {
          "href": "string"
        },
        "vulnerability": {
          "href": "string",
          "score": 0,
          "name": "string"
        },
        "vulnerability_report": {
          "href": "string"
        }
      }
    ],
    "last_updated_at": "2025-04-01T00:21:27Z"
  },
  "risk_summary": {
    "ransomware": null
  },
  "agent": {
    "config": {
      "mode": "string",
      "log_traffic": true,
      "security_policy_update_mode": "string"
    },
    "href": "string",
    "secure_connect": {
      "matching_issuer_name": "string"
    },
    "status": {
      "uid": "string",
      "last_heartbeat_on": null,
      "uptime_seconds": null,
      "agent_version": "string",
      "managed_since": "2025-04-01T00:21:27Z",
      "fw_config_current": true,
      "firewall_rule_count": 0,
      "security_policy_refresh_at": "2025-04-01T00:21:27Z",
      "security_policy_applied_at": "2025-04-01T00:21:27Z",
      "security_policy_received_at": "2025-04-01T00:21:27Z",
      "agent_health_errors": {
        "errors": [
          "string"
        ],
        "warnings": [
          "string"
        ]
      },
      "agent_health": [
        {
          "type": "string",
          "severity": "string",
          "audit_event": "string"
        }
      ],
      "security_policy_sync_state": "string"
    },
    "active_pce_fqdn": "string",
    "target_pce_fqdn": "string",
    "type": "string"
  },
  "ven": {
    "href": "string",
    "hostname": "string",
    "name": "string",
    "status": "string",
    "ven_type": "server"
  },
  "enforcement_mode": "idle",
  "selectively_enforced_services": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": {
    "href": "string"
  },
  "container_cluster": {
    "href": "string",
    "name": "string"
  },
  "ike_authentication_certificate": {},
  "datacenter_nat_1to1": true
}

Properties

Name Type Required Restrictions Description
href string false none URI of workload
deleted boolean true* none This workload has been deleted
delete_type string false none DEPRECATED WITH NO REPLACEMENT: Workload deletion type
name string true* none Interface name
description string true* none The description of this workload
managed boolean true* none True if the workload is managed, else false
hostname string true* none The hostname of this workload
service_principal_name string true* none The Kerberos Service Principal Name (SPN)
agent_to_pce_certificate_authentication_id string,null false none PKI Certificate identifier to be used by the PCE for authenticating the VEN
distinguished_name string false none X.509 Subject distinguished name
public_ip string true* none The public IP address of the server
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
interfaces object true* none Workload network interfaces
» name string true* none Interface name
» link_state string,null true* none Link State
» address string true* none The IP Address to assign to this interface
» cidr_block integer,null true* none The number of bits in the subnet /24 is 255.255.255.0
» default_gateway_address string,null true* none The IP Address of the default gateway
» network object,null true* none Network that the interface belongs to

anyOf

Name Type Required Restrictions Description
»» anonymous workloads_interfaces_get/properties/network/anyOf/0 false none Network object used in workloads and workload interfaces

or

Name Type Required Restrictions Description
»» anonymous null false none none

continued

Name Type Required Restrictions Description
» network_detection_mode string,null true* none Network Detection Mode
» friendly_name string,null true* none User-friendly name for interface
» href string false none DEPRECATED WITH NO REPLACEMENT
service_provider string true* none Service provider
data_center string true* none Data center
data_center_zone string true* none Data center zone
os_id string true* none Our OS identifier
os_detail string true* none Additional OS details - just displayed to end user
online boolean true* none If this workload is online
firewall_coexistence object,null false none Firewall coexistence mode
» illumio_primary boolean false none Illumio is the primary firewall if set to true
containers_inherit_host_policy boolean false none This workload will apply the policy it receives both to itself and the containers hosted by it
blocked_connection_action string false none firewall action for blocked connections
labels [object] true* none List of labels associated with this workload
» href string true* none The URI of the VEN that manages this workload. This replaces the 'agent' field of this object.
» key string true* none Key in key-value pair
» value string true* none Value in key-value pair
services object true* none Service report
» uptime_seconds integer false none How long since the last reboot of this box - used as a timestamp for this
» created_at string(date-time) false none Timestamp when this service was first created
» open_service_ports [object] false none A list of open ports
»» protocol integer true* none Transport protocol
»» address string true* none The local address this service is bound to
»» port integer true* none The local port this service is bound to
»» process_name string true* none The process name (including the full path)
»» user string true* none The user account that the process is running under
»» package string false none The RPM/DEB pacakge that the program is part of
»» win_service_name string false none Name of the Windows service
» vulnerabilities_summary object false none Vulnerabilities summary associated with the workload
»» num_vulnerabilities integer true* none Number of associated vulnerabilities
»» vulnerability_score integer false none The aggregated vulnerability score of the workload across all the vulnerable ports.
»» max_vulnerability_score integer true* none The maximum of all the vulnerability scores associated with the detected_vulnerabilities on the workload.
»» vulnerable_port_exposure integer,null false none The aggregated vulnerability port exposure score of the workload in full enforcement mode across all the vulnerable ports
»» vulnerable_port_wide_exposure object false none none
»»» any boolean,null false none The boolean value representing if at least one port is exposed to internet (any rule) on the workload
»»» ip_list boolean,null false none The boolean value representing if at least one port is exposed to ip_list(s) on the workload
»» vulnerability_exposure_score integer,null false none The aggregated vulnerability exposure score of the workload in full enforcement mode across all the vulnerable ports.
»» full_enforcement_vulnerability_exposure object false none Vulnerability exposure details
»»» vulnerable_port_exposure integer,null false none The aggregated vulnerability port exposure score of the workload in the specified mode across all the vulnerable ports
»»» vulnerability_exposure_score integer,null false none The aggregated vulnerability exposure score of the workload in the specified mode across all vulnerable ports
»» selective_enforcement_vulnerability_exposure workloads_get/properties/vulnerabilities_summary/properties/full_enforcement_vulnerability_exposure false none Vulnerability exposure details
»» visibility_enforcement_vulnerability_exposure workloads_get/properties/vulnerabilities_summary/properties/full_enforcement_vulnerability_exposure false none Vulnerability exposure details
»» current_enforcement_vulnerability_exposure workloads_get/properties/vulnerabilities_summary/properties/full_enforcement_vulnerability_exposure false none Vulnerability exposure details
»» max_vulnerability_exposure_score integer,null false none The maximum vulnerability exposure score of the workload in its current enforcement state across all vulnerable ports
»» vulnerability_computation_state string false none Indicates the computation state for the vulnerability exposure score for the workload.
»» last_updated_at string(date-time) false none Indicates when the vulnerability data was last updated
» detected_vulnerabilities object false none none
»» detected_vulnerability_summary workloads_get/properties/vulnerabilities_summary true* none Vulnerabilities summary associated with the workload
»» workload_detected_vulnerabilities [object] true* none Collection of the detected vulnerabilities associated with the workload
»»» ip_address string true* none The ip address of the host where the vulnerability is found
»»» port integer false none The port which is associated with the vulnerability
»»» proto integer false none The protocol which is associated with the vulnerability
»»» port_exposure integer,null false none The exposure of the port based on the current policy
»»» port_vulnerability_exposure_score integer,null false none The vulnerability exposure score calculated for the port, based on the port exposure and vulnerability
»»» full_enforcement_vulnerability_exposure object false none Vulnerability exposure details for workloads
»»»» vulnerable_port_exposure integer,null false none The exposure of the port based on the current policy for the specified enforcement mode
»»»» port_vulnerability_exposure_score integer,null false none The vulnerability exposure score calculated for the port, based on the port exposure and vulnerability for the specified enforcement mode
»»» selective_enforcement_vulnerability_exposure workloads_get/properties/detected_vulnerabilities/properties/workload_detected_vulnerabilities/items/properties/full_enforcement_vulnerability_exposure false none Vulnerability exposure details for workloads
»»» visibility_enforcement_vulnerability_exposure workloads_get/properties/detected_vulnerabilities/properties/workload_detected_vulnerabilities/items/properties/full_enforcement_vulnerability_exposure false none Vulnerability exposure details for workloads
»»» current_enforcement_vulnerability_exposure workloads_get/properties/detected_vulnerabilities/properties/workload_detected_vulnerabilities/items/properties/full_enforcement_vulnerability_exposure false none Vulnerability exposure details for workloads
»»» port_wide_exposure object false none none
»»»» any boolean,null false none The boolean value representing if the port is exposed to internet (any rule).
»»»» ip_list boolean,null false none The boolean value representing if the port is exposed to ip_list(s)
»»» workload object false none none
»»»» href string true* none The URI of the workload to which this vulnerability belongs to
»»» vulnerability object true* none none
»»»» href string true* none The URI of the vulnerability class to which this vulnerability belongs to
»»»» score integer false none The normalized score of the vulnerability within the range of 0 to 100
»»»» name string false none The title/name of the vulnerability
»»» vulnerability_report object false none none
»»»» href string true* none The URI of the report to which this vulnerability belongs to
»»» last_updated_at string(date-time) false none Indicates when the vulnerability data was last updated
»» risk_summary object false none Risk Summary for this workload
»»» ransomware object,null true* none none
»»»» workload_exposure_severity string true* none Exposed ransomware severity for workload
»»»» ransomware_protection_percent number true* none Ransomware protection percentage for this workload
»»»» last_updated_at string(date-time) true* none The time at which the ransomware stats are last computed at
»»» agent object true* none DEPRECATED AND REPLACED (USE 'ven' INSTEAD). Information about the agent that manages this workload.
»»»» config object false none none
»»»»» mode string false none DEPRECATED AND REPLACED (Use workload enforcement_mode instead)
»»»»» log_traffic boolean false none True if we want to log traffic events from this workload
»»»»» security_policy_update_mode string false none Defines the current policy update mode which can be either adaptive or static based on static policy scopes
»»»» href string false none URI of agent
»»»» secure_connect object false none none
»»»»» matching_issuer_name string false none Issuer name match criteria for certificate used during establishing secure connections.
»»»» status object false none none
»»»»» uid string true* none The unique ID reported by the server
»»»»» last_heartbeat_on string,null(date-time) true* none The last time (rfc3339 timestamp) a heartbeat was received from this workload
»»»»» uptime_seconds integer,null true* none How long since the last reboot of this server. Recorded in DB at the time of the last heartbeat
»»»»» agent_version string false none Agent software version string
»»»»» managed_since string(date-time) true* none The time (rfc3339 timestamp) at which this workload became managed by a VEN
»»»»» fw_config_current boolean true* none If this workload's firewall config is up to date'
»»»»» firewall_rule_count integer true* none DEPRECATED WITH NO REPLACEMENT: Number of firewall rules currently installed
»»»»» security_policy_refresh_at string(date-time) true* none DEPRECATED AND REPLACED (USE security_policy_applied_at and security_policy_received_at INSTEAD)
»»»»» security_policy_applied_at string(date-time) false none Last reported time when policy was applied (UTC)
»»»»» security_policy_received_at string(date-time) false none Last reported time when policy was received (UTC)
»»»»» agent_health_errors object true* none DEPRECATED AND REPLACED (USE agent_health property INSTEAD)
»»»»»» errors [string] false none Errors associated with the security policy
»»»»»» warnings [string] false none Warnings associated with the security policy
»»»»» agent_health [object] true* none VEN Health. If there are no errors or warnings, then the array value will be empty.
»»»»»» type string true* none This field describes the error or the warning type
»»»»»» severity string true* none severity of the error type
»»»»»» audit_event string false none The URI of the audit event that was generated for the corresponding error or warning
»»»»» security_policy_sync_state string false none Current state of security policy
»»»» active_pce_fqdn string false none The FQDN of the PCE that received the agent's last heartbeat
»»»» target_pce_fqdn string false none The FQDN of the PCE the agent will use for future connections
»»»» type string false none Agent type
»»» ven object false none none
»»»» href string true* none The URI of the VEN that manages this workload. This replaces the 'agent' field of this object.
»»»» hostname string true* none The hostname of the host managed by the VEN.
»»»» name string true* none The friendly name of the VEN.
»»»» status string true* none Status of the VEN.
»»»» ven_type string false none VEN type
»»» enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
»»» selectively_enforced_services [object] false none none
»»»» port integer false none Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol.
»»»» to_port integer false none Upper end of port range; this field should not be included if specifying an individual port.
»»»» proto integer true* none Transport protocol (numeric)
»»» created_at string(date-time) true* none The time (rfc3339 timestamp) at which this workload was created
»»» updated_at string(date-time) true* none The time (rfc3339 timestamp) at which this workload was last updated
»»» deleted_at string(date-time) false none The time (rfc3339 timestamp) at which this workload was deleted
»»» created_by object false none none
»»»» href string true* none The URI of the user who created this workload
»»» updated_by object false none none
»»»» href string true* none The URI of the user who last updated this workload
»»» deleted_by object false none none
»»»» href string true* none The URI of the user who deleted this workload
»»» container_cluster object false none Container Cluster
»»»» href string true* none URI
»»»» name string true* none Name
»»» ike_authentication_certificate object false none IKE authentication certificate for certificate-based Secure Connect and Machine Auth connections
»»» datacenter_nat_1to1 boolean false none Datacenter NAT 1to1 mode ON. Used for enforcing creation of pseudo public interface

Enumerated Values

Property Value
vulnerability_computation_state not_applicable
vulnerability_computation_state syncing
vulnerability_computation_state in_sync
workload_exposure_severity critical
workload_exposure_severity high
workload_exposure_severity medium
workload_exposure_severity low
workload_exposure_severity fully_protected
ven_type server
ven_type endpoint
ven_type containerized

workloads_unpair_put

{
  "workloads": [
    {
      "href": "string"
    }
  ],
  "ip_table_restore": "default"
}

Properties

Name Type Required Restrictions Description
workloads [object] true* none Workloads to update
» href string true* none URI of workload to update
ip_table_restore string false none The desired state of IP tables after the agent is uninstalled.

Enumerated Values

Property Value
ip_table_restore saved
ip_table_restore default
ip_table_restore disable

workloads_bulk_create_put

[
  {}
]

Properties

Name Type Required Restrictions Description
name string false none The short friendly name of the workload
description string false none The long description of the workload
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
hostname string false none The hostname reported from the host itself
service_principal_name string,null false none The Kerberos Service Principal Name (SPN)
agent_to_pce_certificate_authentication_id string,null false none PKI Certificate identifier to be used by the PCE for authenticating the VEN
distinguished_name string false none X.509 Subject distinguished name
public_ip string,null false none The public IP address of the server
interfaces workloads_post/properties/interfaces false none Workload network interfaces
service_provider string false none Service provider
data_center string false none Data center
data_center_zone string false none Data center zone
os_id string false none Our OS identifier
os_detail string false none Additional OS details - just displayed to end user
online boolean false none If this workload is online
labels workloads_post/properties/labels false none Assigned labels
agent object false none DEPRECATED AND REPLACED (USE enforcement_mode and visibility_level) Agent info
» config workloads_post/properties/agent/properties/config false none DEPRECATED AND REPLACED by 'ven', 'enforcement_mode', and 'visibility_level'
enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode

anyOf

Name Type Required Restrictions Description
anonymous object false none none

or

Name Type Required Restrictions Description
anonymous object false none none

workloads_bulk_update_put

[]

Workload bulk_update: Input must conform to one of: workloads_with_ven_put.schema.json, workloads_with_ven_interfaces_put.schema.json, workloads_without_ven_put.schema.json

Properties

None

workloads_bulk_delete_put

[
  {
    "href": "string"
  }
]

Properties

Name Type Required Restrictions Description
href string true* none URI of a specific workload or workload collection URI with query parameters external_data_set and external_data_reference

workloads_risk_details_get

{
  "risk_details": {}
}

Properties

Name Type Required Restrictions Description
risk_details object false none none

workloads_put

{
  "href": "string",
  "name": "string",
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "service_principal_name": null,
  "agent_to_pce_certificate_authentication_id": null,
  "service_provider": "string",
  "data_center": "string",
  "data_center_zone": "string",
  "labels": [
    {
      "href": "string"
    }
  ],
  "agent": {
    "href": "string",
    "config": {
      "mode": "idle",
      "log_traffic": true
    },
    "status": {
      "status": "active"
    }
  },
  "enforcement_mode": "idle",
  "datacenter_nat_1to1": true
}

Properties

anyOf

Name Type Required Restrictions Description
anonymous object false none none
» href string false none Workload URI (bulk_update only)
» name string false none The short friendly name of the workload
» description string,null false none The long description of the workload
» external_data_set string,null false none External data set identifier
» external_data_reference string,null false none External data reference identifier
» service_principal_name string,null false none The Kerberos Service Principal Name (SPN)
» agent_to_pce_certificate_authentication_id string,null false none PKI Certificate identifier to be used by the PCE for authenticating the VEN
» service_provider string false none Service provider
» data_center string false none Data center
» data_center_zone string false none Data center zone
» labels workloads_post/properties/labels false none Assigned labels
» agent object false none DEPRECATED AND REPLACED (USE VEN INSTEAD for status, USE enforcement_mode and visibility_level for config)
»» href string false none URI of agent; will be ignored by the server
»» config workloads_post/properties/agent/properties/config false none DEPRECATED AND REPLACED by 'ven', 'enforcement_mode', and 'visibility_level'
»» status object false none none
»»» status string false none Updated agent status
»» enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
»» datacenter_nat_1to1 boolean false none Datacenter NAT 1to1 mode ON. Used for enforcing creation of pseudo public interface

or

Name Type Required Restrictions Description
» anonymous object false none none
»» href string false none Workload URI (bulk_update only)
»» name string false none The short friendly name of the workload
»» description string false none The long description of the workload
»» external_data_set string,null false none External data set identifier
»» external_data_reference string,null false none External data reference identifier
»» service_principal_name string,null false none The Kerberos Service Principal Name (SPN)
»» public_ip string false none The public IP address of the server
»» interfaces workloads_post/properties/interfaces false none Workload network interfaces
»» service_provider string false none Service provider
»» data_center string false none Data center
»» data_center_zone string false none Data center zone
»» labels workloads_post/properties/labels false none Assigned labels
»» agent object false none DEPRECATED AND REPLACED (USE VEN INSTEAD for status, USE enforcement_mode and visibility_level for config)
»»» href string false none URI of agent; will be ignored by the server
»»» config workloads_post/properties/agent/properties/config false none DEPRECATED AND REPLACED by 'ven', 'enforcement_mode', and 'visibility_level'
»»» status workloads_put/anyOf/0/properties/agent/properties/status false none none
»» enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
»» datacenter_nat_1to1 boolean false none Datacenter NAT 1to1 mode ON. Used for enforcing creation of pseudo public interface

or

Name Type Required Restrictions Description
» anonymous object false none none
»» href string false none Workload URI (bulk_update only)
»» name string false none The short friendly name of the workload
»» description string false none The long description of the workload
»» external_data_set string,null false none External data set identifier
»» external_data_reference string,null false none External data reference identifier
»» hostname string false none The hostname reported from the host itself
»» service_principal_name string,null false none The Kerberos Service Principal Name (SPN)
»» agent_to_pce_certificate_authentication_id string,null false none PKI Certificate identifier to be used by the PCE for authenticating the VEN
»» distinguished_name string false none X.509 Subject distinguished name
»» public_ip string,null false none The public IP address of the server
»» interfaces workloads_post/properties/interfaces false none Workload network interfaces
»» service_provider string false none Service provider
»» data_center string false none Data center
»» data_center_zone string false none Data center zone
»» os_id string false none Our OS identifier
»» os_detail string false none Additional OS details - just displayed to end user
»» online boolean false none If this workload is online
»» labels workloads_post/properties/labels false none Assigned labels
»» agent object false none Agent info
»»» href string false none URI of agent; will be ignored by the server
»»» config workloads_post/properties/agent/properties/config false none DEPRECATED AND REPLACED by 'ven', 'enforcement_mode', and 'visibility_level'
»» enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode

Enumerated Values

Property Value
status active
status suspended

labels_get

{
  "href": "string",
  "deleted": true,
  "key": "string",
  "value": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Properties

Name Type Required Restrictions Description
href string false none URI of this label
deleted boolean false none This label has been deleted
key string true* none Key in key-value pair
value string true* none Value in key-value pair
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
created_at string(date-time) true* none Timestamp when this label was first created
updated_at string(date-time) true* none Timestamp when this label was last updated
created_by object false none none
» href string true* none User who originally created this label
updated_by object false none none
» href string true* none User who last updated this label

labels_post

{
  "key": "string",
  "value": "string",
  "external_data_set": null,
  "external_data_reference": null
}

Properties

Name Type Required Restrictions Description
key string true* none Key in key-value pair
value string true* none Value in key-value pair
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier

labels_put

{
  "value": "string",
  "external_data_set": null,
  "external_data_reference": null
}

Properties

Name Type Required Restrictions Description
value string false none Value in key-value pair
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier

security_principals_get

{
  "href": "string",
  "sid": "string",
  "name": "string",
  "description": "string",
  "deleted": true,
  "used_by_ruleset": true
}

Properties

Name Type Required Restrictions Description
href string true* none URI of security principal
sid string true* none Active Directory SID
name string true* none Name of the security principal
description string false none A longer description of the security principal
deleted boolean true* none Flag to indicate if security principal has been deleted
used_by_ruleset boolean true* none Flag to indicate if this security principal is being used by a ruleset

security_principals_post

{
  "sid": "string",
  "name": "string",
  "description": "string"
}

Properties

Name Type Required Restrictions Description
sid string true* none Active Directory SID
name string true* none Name of the security principal
description string false none A longer description of the security principal

security_principals_bulk_create_put

[
  {
    "sid": "string",
    "name": "string",
    "description": "string"
  }
]

Properties

Name Type Required Restrictions Description
anonymous [security_principals_post] false none none

security_principals_put

{
  "name": "string",
  "description": "string"
}

Properties

Name Type Required Restrictions Description
name string false none Name of the security principal
description string false none A longer description of the security principal

pairing_profiles_get

{
  "href": "string",
  "name": "string",
  "description": "string",
  "mode": "idle",
  "enforcement_mode": "idle",
  "status": "string",
  "enabled": true,
  "total_use_count": 0,
  "allowed_uses_per_key": 1,
  "key_lifespan": 1,
  "last_pairing_at": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "last_pairing_key_generated_at": null,
  "last_pairing_key_generated_by": null,
  "is_default": true,
  "labels": [
    {
      "href": "string"
    }
  ],
  "env_label_lock": true,
  "loc_label_lock": true,
  "role_label_lock": true,
  "app_label_lock": true,
  "mode_lock": true,
  "enforcement_mode_lock": true,
  "log_traffic": true,
  "log_traffic_lock": true,
  "visibility_level": "flow_summary",
  "visibility_level_lock": true,
  "status_lock": true,
  "external_data_set": null,
  "external_data_reference": null,
  "agent_software_release": null,
  "ven_type": "specified_during_activation"
}

Properties

Name Type Required Restrictions Description
href string false none URI of the Pairing Profile
name string true* none The short friendly name of the Pairing Profile
description string true* none The long description of the Pairing Profile
mode string true* none DEPRECATED AND REPLACED (Use enforcement_mode instead)
enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
status string false none VEN should be in idle state when it activates
enabled boolean true* none The enabled flag of the Pairing Profile
total_use_count integer true* none The number of times the Pairing Profile has been used
allowed_uses_per_key any true* none The number of times the Pairing Profile can be used

oneOf

Name Type Required Restrictions Description
» anonymous integer false none none

xor

Name Type Required Restrictions Description
» anonymous string false none none

continued

Name Type Required Restrictions Description
key_lifespan any true* none Number of seconds Pairing Profile Keys will be valid for

oneOf

Name Type Required Restrictions Description
» anonymous integer false none none

xor

Name Type Required Restrictions Description
» anonymous string false none none

continued

Name Type Required Restrictions Description
last_pairing_at string,null true* none Timestamp when this Pairing Profile was last used for pairing a Workload
created_at string(date-time) true* none Timestamp when this Pairing Profile was first created
updated_at string(date-time) true* none Timestamp when this Pairing Profile was last updated
created_by sec_policy_virtual_servers_get/properties/created_by false none none
updated_by sec_policy_virtual_servers_get/properties/created_by false none none
last_pairing_key_generated_at string,null(date-time) true* none Timestamp of when the last pairing key was generated
last_pairing_key_generated_by any true* none User who generated the last pairing key

oneOf

Name Type Required Restrictions Description
» anonymous null false none none

xor

Name Type Required Restrictions Description
» anonymous sec_policy_virtual_servers_get/properties/created_by false none none

continued

Name Type Required Restrictions Description
is_default boolean true* none Flag indicating this is default auto-created Pairing Profile
labels workloads_post/properties/labels true* none Assigned labels
env_label_lock boolean true* none Flag that controls whether env Label can be overridden from pairing script
loc_label_lock boolean true* none Flag that controls whether loc Label can be overridden from pairing script
role_label_lock boolean true* none Flag that controls whether role Label can be overridden from pairing script
app_label_lock boolean true* none Flag that controls whether app Label can be overridden from pairing script
mode_lock boolean true* none DEPRECATED AND REPLACED (USE /enforcement_mode_lock INSTEAD) Flag that controls whether mode can be overridden from pairing script
enforcement_mode_lock boolean false none Flag that controls whether enforcement mode can be overridden from pairing script
log_traffic boolean true* none DEPRECATED AND REMOVED. Alerting status
log_traffic_lock boolean true* none DEPRECATED AND REMOVED. Flag that controls whether log_traffic can be overridden from pairing script
visibility_level any true* none Visibility level of the Workload (DEPRECATED VALUE: 'flow_full_detail')

oneOf

Name Type Required Restrictions Description
» anonymous string false none Visibility level of the workload

xor

Name Type Required Restrictions Description
» anonymous string false none none

continued

Name Type Required Restrictions Description
visibility_level_lock boolean true* none Flag that controls whether visibility_level can be overridden from pairing script
status_lock boolean false none Flag that controls whether status can be overridden from pairing script
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
agent_software_release string,null false none Agent Software Release associated with this Pairing Profile
ven_type string false none Type of VEN that this pairing profile will enforce. specified_during_activation option is deprecated and will be removed in the next API version.

Enumerated Values

Property Value
mode idle
mode illuminated
mode enforced
mode selective
anonymous flow_summary
anonymous flow_drops
anonymous flow_off
anonymous enhanced_data_collection
ven_type specified_during_activation
ven_type server
ven_type endpoint

pairing_profiles_post

{
  "name": "string",
  "description": "string",
  "mode": "idle",
  "mode_lock": true,
  "enforcement_mode": "idle",
  "enforcement_mode_lock": true,
  "enabled": true,
  "allowed_uses_per_key": 1,
  "key_lifespan": 1,
  "labels": [
    {
      "href": "string"
    }
  ],
  "env_label_lock": true,
  "loc_label_lock": true,
  "role_label_lock": true,
  "app_label_lock": true,
  "log_traffic": true,
  "log_traffic_lock": true,
  "visibility_level": "flow_full_detail",
  "visibility_level_lock": true,
  "external_data_set": null,
  "external_data_reference": null,
  "agent_software_release": null,
  "ven_type": "specified_during_activation"
}

Properties

Name Type Required Restrictions Description
name string false none The short friendly name of the pairing profile
description string false none The long description of the pairing profile
mode string false none DEPRECATED AND REPLACED (Use enforcement_mode instead)
mode_lock boolean false none DEPRECATED AND REPLACED (USE /enforcement_mode_lock INSTEAD) Flag that controls whether mode can be overridden from pairing script
enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
enforcement_mode_lock boolean false none Flag that controls whether enforcement mode can be overridden from pairing script
enabled boolean true* none The enabled flag of the pairing profile
allowed_uses_per_key any false none The number of times pairing profile keys can be used

oneOf

Name Type Required Restrictions Description
» anonymous integer false none none

xor

Name Type Required Restrictions Description
» anonymous string false none none

continued

Name Type Required Restrictions Description
key_lifespan any false none Number of seconds pairing profile keys will be valid for

oneOf

Name Type Required Restrictions Description
» anonymous integer false none none

xor

Name Type Required Restrictions Description
» anonymous string false none none

continued

Name Type Required Restrictions Description
labels workloads_post/properties/labels false none Assigned labels
env_label_lock boolean false none Flag that controls whether env label can be overridden from pairing script
loc_label_lock boolean false none Flag that controls whether loc label can be overridden from pairing script
role_label_lock boolean false none Flag that controls whether role label can be overridden from pairing script
app_label_lock boolean false none Flag that controls whether app label can be overridden from pairing script
log_traffic boolean false none DEPRECATED AND REMOVED. Alerting status
log_traffic_lock boolean false none DEPRECATED AND REMOVED. Flag that controls whether log_traffic can be overridden from pairing script
visibility_level string false none Visibility level of the agent (DEPRECATED VALUE: 'flow_full_detail')
visibility_level_lock boolean false none Flag that controls whether visibility_level can be overridden from pairing script
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
agent_software_release string,null false none Agent software release associated with this paring profile
ven_type pairing_profiles_get/properties/ven_type false none Type of VEN that this pairing profile will enforce. specified_during_activation option is deprecated and will be removed in the next API version.

Enumerated Values

Property Value
mode idle
mode illuminated
mode enforced
anonymous unlimited
anonymous unlimited
visibility_level flow_full_detail
visibility_level flow_summary
visibility_level flow_drops
visibility_level flow_off
visibility_level enhanced_data_collection

pairing_profiles_put

{
  "name": "string",
  "description": "string",
  "mode": "idle",
  "mode_lock": true,
  "enforcement_mode": "idle",
  "enforcement_mode_lock": true,
  "enabled": true,
  "allowed_uses_per_key": 1,
  "key_lifespan": 1,
  "labels": [
    {
      "href": "string"
    }
  ],
  "env_label_lock": true,
  "loc_label_lock": true,
  "role_label_lock": true,
  "app_label_lock": true,
  "log_traffic": true,
  "log_traffic_lock": true,
  "visibility_level": "flow_full_detail",
  "visibility_level_lock": true,
  "external_data_set": null,
  "external_data_reference": null,
  "agent_software_release": null
}

Properties

Name Type Required Restrictions Description
name string false none The short friendly name of the pairing profile
description string false none The long description of the pairing profile
mode pairing_profiles_post/properties/mode false none DEPRECATED AND REPLACED (Use enforcement_mode instead)
mode_lock boolean false none DEPRECATED AND REPLACED (USE /enforcement_mode_lock INSTEAD) Flag that controls whether mode can be overridden from pairing script
enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
enforcement_mode_lock boolean false none Flag that controls whether enforcement mode can be overridden from pairing script
enabled boolean false none The enabled flag of the pairing profile
allowed_uses_per_key any false none The number of times pairing profile keys can be used

oneOf

Name Type Required Restrictions Description
» anonymous integer false none none

xor

Name Type Required Restrictions Description
» anonymous string false none none

continued

Name Type Required Restrictions Description
key_lifespan any false none Number of seconds pairing profile keys will be valid for

oneOf

Name Type Required Restrictions Description
» anonymous integer false none none

xor

Name Type Required Restrictions Description
» anonymous string false none none

continued

Name Type Required Restrictions Description
labels workloads_post/properties/labels false none Assigned labels
env_label_lock boolean false none Flag that controls whether env label can be overridden from pairing script
loc_label_lock boolean false none Flag that controls whether loc label can be overridden from pairing script
role_label_lock boolean false none Flag that controls whether role label can be overridden from pairing script
app_label_lock boolean false none Flag that controls whether app label can be overridden from pairing script
log_traffic boolean false none DEPRECATED AND REMOVED. Alerting status
log_traffic_lock boolean false none DEPRECATED AND REMOVED. Flag that controls whether log_traffic can be overridden from pairing script
visibility_level string false none Visibility level of the agent (DEPRECATED VALUE: 'flow_full_detail')
visibility_level_lock boolean false none Flag that controls whether visibility_level can be overridden from pairing script
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
agent_software_release string,null false none Agent software release associated with this paring profile

Enumerated Values

Property Value
anonymous unlimited
anonymous unlimited
visibility_level flow_full_detail
visibility_level flow_summary
visibility_level flow_drops
visibility_level flow_off
visibility_level enhanced_data_collection

pairing_profiles_pairing_key_post

{}

Properties

None

sec_policy_enforcement_boundaries_get

{
  "href": "string",
  "name": "string",
  "providers": [
    {
      "actors": "ams",
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      }
    }
  ],
  "ingress_services": [
    {
      "href": "string"
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": null,
  "updated_by": null,
  "deleted_by": null,
  "update_type": "string",
  "enabled": true
}

Enforcement boundary

Properties

Name Type Required Restrictions Description
href string true* none The job URI.
name string true* none Name of the enforcement boundary
providers [object] true* none Enforcement boundary actor
» actors string false none Rule actors are all workloads ('ams')
» label sec_policy_virtual_servers_get/properties/created_by false none none
» label_group sec_policy_virtual_servers_get/properties/created_by false none none
» ip_list sec_policy_virtual_servers_get/properties/created_by false none none
» workload sec_policy_virtual_servers_get/properties/created_by false none none
consumers sec_policy_enforcement_boundaries_get/properties/providers true* none Enforcement boundary actor
ingress_services [oneOf] true* none Array of service URI and port/protocol combinations

oneOf

Name Type Required Restrictions Description
» anonymous sec_policy_virtual_servers_get/properties/created_by false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none
»» port integer false none Port number, or the starting port of a range. If unspecified, this will apply to all ports for the given protocol.
»» to_port integer false none Upper end of port range; this field should not be included if specifying an individual port.
»» proto integer true* none Transport protocol (numeric)

xor

Name Type Required Restrictions Description
» anonymous object false none none
»» name string true* none Name (does not need to be unique)
»» description string false none Description
»» service_ports sec_policy_services_get/properties/service_ports false none Service ports
»» windows_services sec_policy_services_get/properties/windows_services false none Windows services
»» external_data_set string true* none External data set identifier
»» external_data_reference string true* none External data reference identifier

continued

Name Type Required Restrictions Description
» created_at string(date-time) false none Timestamp when this Enforcement Boundary was first created
» updated_at string(date-time) false none Timestamp when this Enforcement Boundary was last updated
» deleted_at string,null(date-time) false none Timestamp when this Enforcement Boundary was deleted
» created_by object,null false none none
»» href string true* none User who originally created this Enforcement Boundary
» updated_by object,null false none none
»» href string true* none User who last updated this Enforcement Boundary
» deleted_by object,null false none none
»» href string true* none User who deleted this Enforcement Boundary
» update_type string false none Type of update
» enabled boolean false none Enabled flag

Enumerated Values

Property Value
actors ams
proto 6
proto 17

sec_policy_enforcement_boundaries_post

{
  "name": "string",
  "enabled": true,
  "providers": [
    {
      "actors": "ams",
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      }
    }
  ],
  "ingress_services": [
    {
      "href": "string"
    }
  ]
}

Create enforcement boundary

Properties

Name Type Required Restrictions Description
name string true* none Name of the enforcement boundary
enabled boolean false none Enabled flag
providers sec_policy_enforcement_boundaries_get/properties/providers true* none Enforcement boundary actor
consumers sec_policy_enforcement_boundaries_get/properties/providers true* none Enforcement boundary actor
ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services true* none Array of service URI and port/protocol combinations

sec_policy_enforcement_boundaries_put

{
  "name": "string",
  "enabled": true,
  "providers": [
    {
      "actors": "ams",
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      }
    }
  ],
  "ingress_services": [
    {
      "href": "string"
    }
  ]
}

Update enforcement boundary

Properties

Name Type Required Restrictions Description
name string false none Name of the enforcement boundary
enabled boolean false none Enabled flag
providers sec_policy_enforcement_boundaries_get/properties/providers false none Enforcement boundary actor
consumers sec_policy_enforcement_boundaries_get/properties/providers false none Enforcement boundary actor
ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services false none Array of service URI and port/protocol combinations

sec_policy_virtual_services_get

{}

Properties

Name Type Required Restrictions Description
href string true* none URI of the virtual service
created_at string(date-time) true* none Timestamp when this virtual service was first created
updated_at string(date-time) true* none Timestamp when this virtual service was last updated
deleted_at string,null(date-time) true* none Timestamp when this virtual service was deleted
created_by object,null false none none
» href string true* none none
updated_by sec_policy_virtual_services_get/properties/created_by false none none
deleted_by sec_policy_virtual_services_get/properties/created_by false none none
update_type string,null false none Versioned policy object update type
name string true* none Name
description string,null true* none Description
pce_fqdn string,null false none PCE FQDN for this container cluster. Used in Supercluster only
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
labels [object] true* none Virtual service labels
» href string true* none Label URI
» key string false none Key in key-value pair
» value string false none Value in key-value pair
service_ports [object] false none Service ports
» port integer false none Port Number (integer 0-65535 or -1 for any port). Also the startng port when specifying a range.
» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
» proto integer true* none none
service object false none URI of associated service
apply_to string false none Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network
ip_overrides [string] false none Array of IPs or CIDRs as IP overrides
service_addresses [oneOf] false none none

oneOf

Name Type Required Restrictions Description
» anonymous object false none none
»» ip string true* none IP address to assign to the virtual service
»» network object false none none
»»» href string true* none Network URI for this IP address
»» port integer false none Port associated with the IP address for the service (1-65535 integer)

anyOf

Name Type Required Restrictions Description
»» anonymous object false none none

or

Name Type Required Restrictions Description
»» anonymous object false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none
»» fqdn string true* none FQDN to assign to the virtual service
»» description string false none none
»» port integer false none Port associated with the FQDN for the service

oneOf

Name Type Required Restrictions Description
» anonymous object false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none

Enumerated Values

Property Value
update_type create
update_type update
update_type delete
update_type null
proto 6
proto 17

sec_policy_virtual_services_post

{}

Properties

Name Type Required Restrictions Description
name string true* none Name
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
labels [object] false none Assigned labels
» href string true* none Label URI
service_ports sec_policy_virtual_services_get/properties/service_ports false none Service ports
service object false none URI of associated service
apply_to string false none Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network
ip_overrides [string] false none Array of IPs or CIDRs as IP overrides
service_addresses sec_policy_virtual_services_get/properties/service_addresses false none none

oneOf

Name Type Required Restrictions Description
anonymous object false none none

xor

Name Type Required Restrictions Description
anonymous object false none none

Enumerated Values

Property Value
apply_to host_only
apply_to internal_bridge_network

sec_policy_virtual_services_bulk_create_put

[
  {}
]

Properties

Name Type Required Restrictions Description
name string true* none Name
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
labels sec_policy_virtual_services_post/properties/labels false none Assigned labels
service_ports sec_policy_virtual_services_get/properties/service_ports false none Service ports
service object false none URI of associated service
apply_to string false none Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network
ip_overrides [string] false none Array of IPs or CIDRs as IP overrides
service_addresses sec_policy_virtual_services_get/properties/service_addresses false none none

oneOf

Name Type Required Restrictions Description
anonymous object false none none

xor

Name Type Required Restrictions Description
anonymous object false none none

Enumerated Values

Property Value
apply_to host_only
apply_to internal_bridge_network

sec_policy_virtual_services_bulk_update_put

[
  {
    "href": "string",
    "name": "string",
    "description": "string",
    "external_data_set": null,
    "external_data_reference": null,
    "labels": [
      {
        "href": "string"
      }
    ],
    "service": {},
    "service_ports": [
      {
        "port": 0,
        "to_port": 0,
        "proto": 6
      }
    ],
    "apply_to": "host_only",
    "ip_overrides": [
      "string"
    ],
    "service_addresses": [
      {}
    ]
  }
]

Properties

Name Type Required Restrictions Description
href string false none Virtual Service URI
name string false none Name
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
labels sec_policy_virtual_services_post/properties/labels false none Assigned labels
service object false none URI of associated service
service_ports sec_policy_virtual_services_get/properties/service_ports false none Service ports
apply_to string false none Firewall rule target for workloads bound to this bound service: host_only or internal_bridge_network
ip_overrides [string] false none Array of IPs or CIDRs as IP overrides
service_addresses sec_policy_virtual_services_get/properties/service_addresses false none none

Enumerated Values

Property Value
apply_to host_only
apply_to internal_bridge_network

sec_policy_virtual_services_put

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "labels": [
    {
      "href": "string"
    }
  ],
  "service_ports": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 6
    }
  ],
  "service": {},
  "apply_to": "host_only",
  "ip_overrides": [
    "string"
  ],
  "service_addresses": [
    {}
  ]
}

Properties

Name Type Required Restrictions Description
name string false none Name
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
labels sec_policy_virtual_services_post/properties/labels false none Assigned labels
service_ports sec_policy_virtual_services_get/properties/service_ports false none Service ports
service object false none URI of associated service
apply_to string false none Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network
ip_overrides [string] false none Array of IPs or CIDRs as IP overrides
service_addresses sec_policy_virtual_services_get/properties/service_addresses false none none

Enumerated Values

Property Value
apply_to host_only
apply_to internal_bridge_network

sec_policy_ip_lists_get

{
  "href": "string",
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ip_ranges": [
    {
      "description": "string",
      "from_ip": "string",
      "to_ip": "string",
      "exclusion": true
    }
  ],
  "fqdns": [
    {
      "fqdn": "string",
      "description": "string"
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null
}

Properties

Name Type Required Restrictions Description
href string false none URI of the ip list
name string true* none Name (must be unique)
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
ip_ranges [object] false none IP addresses or ranges
» description string false none Description
» from_ip string true* none IP address or a low end of IP range. Might be specified with CIDR notation
» to_ip string false none High end of an IP range
» exclusion boolean false none Whether this IP address is an exclusion. Exclusions must be a strict subset of inclusive IP addresses.
fqdns [object] false none Collection of FQDN
» fqdn string true* none none
» description string false none none
created_at string(date-time) false none Time stamp when this IP List was first created
updated_at string(date-time) false none Time stamp when this IP List was last updated
deleted_at string,null(date-time) false none Time stamp when this IP List was deleted
created_by object false none none
» href string true* none User who originally created this IP List
updated_by object false none none
» href string true* none User who last updated this IP List
deleted_by object,null false none none
» href string true* none User who deleted this IP List

sec_policy_ip_lists_post

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ip_ranges": [
    {
      "description": "string",
      "from_ip": "string",
      "to_ip": "string",
      "exclusion": true
    }
  ],
  "fqdns": [
    {
      "fqdn": "string",
      "description": "string"
    }
  ]
}

Properties

Name Type Required Restrictions Description
name string true* none Name (must be unique)
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
ip_ranges sec_policy_ip_lists_get/properties/ip_ranges false none IP addresses or ranges
fqdns [object] false none Collection of FQDN
» fqdn string true* none none
» description string false none none

sec_policy_ip_lists_put

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ip_ranges": [
    {
      "description": "string",
      "from_ip": "string",
      "to_ip": "string",
      "exclusion": true
    }
  ],
  "fqdns": [
    {
      "fqdn": "string",
      "description": "string"
    }
  ]
}

Properties

Name Type Required Restrictions Description
name string false none Name (must be unique)
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
ip_ranges sec_policy_ip_lists_get/properties/ip_ranges false none IP addresses or ranges
fqdns [object] false none Collection of FQDN
» fqdn string true* none none
» description string false none none

sec_policy_label_groups_post

{
  "name": "string",
  "description": null,
  "key": "string",
  "labels": [
    {
      "href": "string"
    }
  ],
  "sub_groups": [
    {
      "href": "string"
    }
  ],
  "external_data_set": null,
  "external_data_reference": null
}

Properties

Name Type Required Restrictions Description
name string true* none Name of the label group
description string,null false none The long description of the label group
key string true* none Key in key-value pair of contained labels or label groups
labels [sec_policy_virtual_servers_get/properties/created_by] false none Contained labels
sub_groups [sec_policy_virtual_servers_get/properties/created_by] false none Contained label groups
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier

sec_policy_label_groups_get

{
  "href": "string",
  "name": "string",
  "description": null,
  "key": "string",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "sub_groups": [
    {
      "href": "string",
      "name": "string"
    }
  ],
  "usage": {
    "label_group": true,
    "ruleset": true,
    "rule": true,
    "static_policy_scopes": true,
    "containers_inherit_host_policy_scopes": true,
    "blocked_connection_reject_scopes": true,
    "enforcement_boundary": true,
    "loopback_interfaces_in_policy_scopes": true,
    "ip_forwarding_enabled_scopes": true,
    "rule_hit_count_enabled_scopes": true,
    "protection_schema": true
  },
  "external_data_set": null,
  "external_data_reference": null,
  "update_type": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null
}

Properties

Name Type Required Restrictions Description
href string true* none URI of this Label Group
name string true* none Name of the Label Group
description string,null true* none The long description of the Label Group
key string true* none Key in key-value pair of contained Labels or Label Groups
labels [object] false none Contained Labels
» href string true* none Label URI
» key string true* none Label key (same as Label Group key)
» value string true* none Label value in key-value pair
sub_groups [object] false none Contained Label Groups
» href string true* none Contained Label Group URI
» name string true* none Name of sub Label Group
usage object false none none
» label_group boolean true* none Label Group is referenced by another Label Group
» ruleset boolean true* none Label Group is referenced by at least one Ruleset
» rule boolean true* none Label Group is referenced by at least one Rule
» static_policy_scopes boolean true* none Label Group is referenced by Static Policy Scopes
» containers_inherit_host_policy_scopes boolean true* none Label Group is referenced by Containers Inherit Host Policy Scopes
» blocked_connection_reject_scopes boolean true* none Label Group is referenced by Blocked Connection Reject Scopes
» enforcement_boundary boolean true* none Label Group is referenced by at least one Enforcement Boundary
» loopback_interfaces_in_policy_scopes boolean true* none Label Group is referenced by Loopback Interfaces in Policy Scopes
» ip_forwarding_enabled_scopes boolean true* none Label Group is referenced by IP Forwarding Enabled Scopes
» rule_hit_count_enabled_scopes boolean true* none Label Group is referenced by Rule Hit Count Enabled Scopes
» protection_schema boolean false none Label Group is referenced by Protection Schema objects (Xpress)
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
update_type string,null false none Type of update
created_at string(date-time) true* none Timestamp when this Label Group was first created
updated_at string(date-time) true* none Timestamp when this Label Group was last updated
deleted_at string,null(date-time) true* none Timestamp when this Label Group was deleted
created_by sec_policy_virtual_servers_get/properties/created_by true* none none
updated_by sec_policy_virtual_servers_get/properties/created_by true* none none
deleted_by any true* none User who deleted this Label Group

oneOf

Name Type Required Restrictions Description
» anonymous null false none none

xor

Name Type Required Restrictions Description
» anonymous sec_policy_virtual_servers_get/properties/created_by false none none

sec_policy_label_groups_member_of_get

[
  {
    "href": "string",
    "name": "string"
  }
]

Properties

Name Type Required Restrictions Description
href string true* none Parent label group URI
name string false none Name of parent label group

labels_summary

[
  {
    "href": "string",
    "key": "string",
    "value": "string"
  }
]

Assigned labels summary

Properties

Name Type Required Restrictions Description
href string true* none Label URI
key string false none Key in key-value pair
value string false none Value in key-value pair

sec_policy_label_groups_put

{
  "name": "string",
  "description": null,
  "labels": [
    {
      "href": "string"
    }
  ],
  "sub_groups": [
    {
      "href": "string"
    }
  ],
  "external_data_set": null,
  "external_data_reference": null
}

Properties

Name Type Required Restrictions Description
name string false none Name of the label group
description string,null false none The long description of the label group
labels [sec_policy_virtual_servers_get/properties/created_by] false none Contained labels
sub_groups [sec_policy_virtual_servers_get/properties/created_by] false none Contained label groups
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier

sec_policy_services_get

{
  "href": "string",
  "name": "string",
  "description": "string",
  "risk_details": {
    "ransomware": null
  },
  "description_url": "string",
  "process_name": "string",
  "service_ports": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0,
      "icmp_type": null,
      "icmp_code": null
    }
  ],
  "windows_services": [
    {
      "service_name": null,
      "process_name": null,
      "port": 0,
      "to_port": 0,
      "proto": null,
      "icmp_type": 0,
      "icmp_code": 0
    }
  ],
  "external_data_set": null,
  "external_data_reference": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": {
    "href": "string"
  },
  "update_type": "string"
}

Properties

Name Type Required Restrictions Description
href string false none URI of the service
name string true* none Name (does not need to be unique)
description string false none Description
risk_details object false none none
» ransomware object,null true* none none
»» category string true* none Categorization based on Admin or Legacy port used in the service
»» severity string true* none Severity of this service
»» average_protection_percent number false none This is the average of ransomware protection percentage for all the service ports in this service.
»» os_platforms [string] true* none Operating system for this ransomware service
» description_url string false none Description URL Read-only to prevent XSS attacks
» process_name string false none The process name
» service_ports [object] false none Service ports
»» port integer false none Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»» proto integer true* none Transport protocol
»» icmp_type integer,null false none ICMP Type (integer 0-255 for icmp protocol)
»» icmp_code integer,null false none ICMP Code (integer 0-15 for icmp protocol)
» windows_services [object] false none Windows services
»» service_name string,null false none Name of Windows Service
»» process_name string,null false none Name of running process
»» port integer false none Port Number (integer 1-65535). If not provided and proto needs ports it defaults to any.Also the starting port when specifying a range.
»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»» proto integer,null false none Transport protocol
»» icmp_type integer false none ICMP Type (integer 0-255 for icmp protocol)
»» icmp_code integer false none ICMP Code (integer 0-15 for icmp protocol)
» external_data_set string,null false none External data set identifier
» external_data_reference string,null false none External data reference identifier
» created_at string(date-time) false none Time stamp when this Service was first created
» updated_at string(date-time) false none Time stamp when this Service was last updated
» deleted_at string(date-time) false none Time stamp when this Service was deleted
» created_by object false none none
»» href string true* none User who originally created this Service
» updated_by object false none none
»» href string true* none User who last updated this Service
» deleted_by object false none none
»» href string true* none User who deleted this Service
» update_type string true* none Type of update

sec_policy_services_post

{
  "name": "string",
  "description": "string",
  "risk_details": {
    "ransomware": {
      "category": "admin",
      "severity": "low",
      "os_platforms": [
        "windows"
      ]
    }
  },
  "process_name": "string",
  "service_ports": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0,
      "icmp_type": null,
      "icmp_code": null
    }
  ],
  "windows_services": [
    {
      "service_name": null,
      "process_name": null,
      "port": 0,
      "to_port": 0,
      "proto": null,
      "icmp_type": 0,
      "icmp_code": 0
    }
  ],
  "external_data_set": null,
  "external_data_reference": null
}

Properties

Name Type Required Restrictions Description
name string true* none Name (does not need to be unique)
description string false none Description
risk_details object false none none
» ransomware object false none none
»» category string false none Categorization based on Admin or Legacy port used in the service
»» severity string false none Severity of this service
»» os_platforms [string] false none Operating system for this ransomware service
» process_name string false none The process name
» service_ports sec_policy_services_get/properties/service_ports false none Service ports
» windows_services sec_policy_services_get/properties/windows_services false none Windows services
» external_data_set string,null false none External data set identifier
» external_data_reference string,null false none External data reference identifier

Enumerated Values

Property Value
category admin
category legacy
severity low
severity medium
severity high
severity critical

sec_policy_services_put

{
  "name": "string",
  "description": "string",
  "risk_details": {
    "ransomware": {
      "category": "admin",
      "severity": "low",
      "os_platforms": [
        "windows"
      ]
    }
  },
  "process_name": "string",
  "service_ports": [
    {
      "port": 0,
      "to_port": 0,
      "proto": 0,
      "icmp_type": null,
      "icmp_code": null
    }
  ],
  "windows_services": [
    {
      "service_name": null,
      "process_name": null,
      "port": 0,
      "to_port": 0,
      "proto": null,
      "icmp_type": 0,
      "icmp_code": 0
    }
  ],
  "external_data_set": null,
  "external_data_reference": null
}

Properties

Name Type Required Restrictions Description
name string false none Name (does not need to be unique)
description string false none Description
risk_details object false none none
» ransomware object false none none
»» category string false none Categorization based on Admin or Legacy port used in the service
»» severity string false none Severity of this service
»» os_platforms [string] false none Operating system for this ransomware service
» process_name string false none The process name
» service_ports sec_policy_services_get/properties/service_ports false none Service ports
» windows_services sec_policy_services_get/properties/windows_services false none Windows services
» external_data_set string,null false none External data set identifier
» external_data_reference string,null false none External data reference identifier

Enumerated Values

Property Value
category admin
category legacy
severity low
severity medium
severity high
severity critical

sec_policy_virtual_servers_post

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "labels": [
    {
      "href": "string"
    }
  ],
  "service": {
    "href": "string"
  },
  "providers": [
    {
      "label": {
        "href": "string"
      }
    }
  ],
  "discovered_virtual_server": {
    "href": "string"
  },
  "mode": "unmanaged"
}

Properties

Name Type Required Restrictions Description
name string true* none The short friendly name of the virtual server
description string false none The long description of the virtual server
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
labels workloads_post/properties/labels true* none Assigned labels
service object true* none URI of associated service
» href string true* none Service URI
providers [oneOf] true* none none

oneOf

Name Type Required Restrictions Description
» anonymous object false none none
»» label object true* none none
»»» href string true* none Label URI

xor

Name Type Required Restrictions Description
»» anonymous object false none none
»»» workload object true* none none
»»»» href string true* none Workload URI

continued

Name Type Required Restrictions Description
»»» discovered_virtual_server object true* none Corresponding discovered virtual server
»»»» href string true* none Discovered virtual server URI
»»» mode string true* none Management mode of the virtual server

Enumerated Values

Property Value
mode unmanaged
mode enforced

sec_policy_virtual_servers_get

{
  "href": "string",
  "name": "string",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "service": {
    "href": "string"
  },
  "providers": [
    {}
  ],
  "mode": "string",
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "discovered_virtual_server": null,
  "update_type": "create",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null
}

Properties

Name Type Required Restrictions Description
href string true* none href of virtual server
name string true* none The short friendly name of the virtual server
labels [sec_policy_virtual_services_get/properties/labels/items] true* none none
service sec_policy_virtual_servers_get/properties/created_by true* none none
providers [object] true* none none
mode string true* none Management mode of the virtual server
description string,null false none The long description of the virtual server
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
discovered_virtual_server object,null true* none Corresponding discovered virtual server
» href string true* none Discovered virtual server URI
» dvs_identifier string true* none NFC-generated unique identifier for virtual server
» mode string true* none Virtual server mode of operation
» name string true* none Configured name of virtual server
» vip_port object true* none none
»» vip string(ipv4) true* none Virtual server IP
»» protocol workloads_get/properties/services/properties/open_service_ports/items/properties/protocol true* none Transport protocol
»» port string true* none Virtual server port(s)
» update_type sec_policy_virtual_services_get/properties/update_type true* none Versioned policy object update type
» created_at string(date-time) true* none The time (rfc3339 timestamp) at which this virtual server was created
» updated_at string(date-time) true* none The time (rfc3339 timestamp) at which this virtual server was last updated
» deleted_at string,null(date-time) true* none The time (rfc3339 timestamp) at which this virtual server was deleted
» created_by object true* none none
»» href string true* none none
» updated_by sec_policy_virtual_servers_get/properties/created_by true* none none
» deleted_by sec_policy_virtual_services_get/properties/created_by true* none none

sec_policy_virtual_servers_put

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "labels": [
    {
      "href": "string"
    }
  ],
  "service": {
    "href": "string"
  },
  "providers": [
    {
      "label": {
        "href": "string"
      }
    }
  ],
  "discovered_virtual_server": {
    "href": "string"
  },
  "mode": "unmanaged"
}

Properties

Name Type Required Restrictions Description
name string false none The short friendly name of the virtual server
description string false none The long description of the virtual server
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
labels workloads_post/properties/labels false none Assigned labels
service object false none URI of associated service
» href string true* none Service URI
providers [oneOf] false none none

oneOf

Name Type Required Restrictions Description
» anonymous object false none none
»» label object true* none none
»»» href string true* none Label URI

xor

Name Type Required Restrictions Description
»» anonymous object false none none
»»» workload object true* none none
»»»» href string true* none Workload URI

continued

Name Type Required Restrictions Description
»»» discovered_virtual_server object false none Corresponding discovered virtual server
»»»» href string true* none Discovered virtual server URI
»»» mode string false none Management mode of the virtual server

Enumerated Values

Property Value
mode unmanaged
mode enforced

sec_policy_rule_sets_get

{
  "href": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null,
  "update_type": "create",
  "name": "string",
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "enabled": true,
  "scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "rules": [
    {
      "href": "string",
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": {
        "href": "string"
      },
      "updated_by": {
        "href": "string"
      },
      "deleted_by": null,
      "enabled": true,
      "description": null,
      "external_data_set": null,
      "external_data_reference": null,
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "resolve_labels_as": {
        "providers": [
          "workloads"
        ],
        "consumers": [
          "workloads"
        ]
      },
      "sec_connect": true,
      "stateless": true,
      "machine_auth": true,
      "providers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string"
          },
          "virtual_service": {
            "href": "string",
            "name": null
          },
          "virtual_server": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string",
            "name": null,
            "hostname": null,
            "deleted": null
          },
          "virtual_service": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consuming_security_principals": [
        {
          "href": "string",
          "sid": "string",
          "name": "string",
          "description": "string",
          "deleted": true,
          "used_by_ruleset": true
        }
      ],
      "unscoped_consumers": true,
      "update_type": "create",
      "network_type": "brn",
      "use_workload_subnets": [
        "providers"
      ]
    }
  ],
  "ip_tables_rules": [
    {
      "href": "string",
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": {
        "href": "string"
      },
      "updated_by": {
        "href": "string"
      },
      "deleted_by": null,
      "update_type": "create",
      "enabled": true,
      "description": null,
      "statements": [
        {
          "table_name": "nat",
          "chain_name": "PREROUTING",
          "parameters": "string"
        }
      ],
      "actors": [
        {
          "actors": "string",
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "ip_version": "4"
    }
  ]
}

Properties

Name Type Required Restrictions Description
href string false none URI of the rule set
created_at string(date-time) true* none Timestamp when this rule set was first created
updated_at string(date-time) true* none Timestamp when this rule set was last updated
deleted_at string,null(date-time) true* none Timestamp when this rule set was deleted
created_by object false none none
» href string true* none User who originally created this rule set
updated_by object false none none
» href string true* none User who last updated this rule set
deleted_by object,null false none none
» href string true* none User who deleted this rule set
update_type sec_policy_virtual_services_get/properties/update_type false none Versioned policy object update type
name string true* none Name (must be unique)
description string,null true* none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
enabled boolean true* none Enabled flag
scopes [sec_policy_firewall_settings_get/properties/blocked_connection_reject_scopes/items] true* none Rule set scopes
rules [object] false none Array of rules in this rule set
» href string false none URI of object
» created_at string(date-time) false none Timestamp when this rule set was first created
» updated_at string(date-time) false none Timestamp when this rule set was last updated
» deleted_at string,null(date-time) false none Timestamp when this rule set was deleted
» created_by object false none none
»» href string true* none User who originally created this rule set
» updated_by object false none none
»» href string true* none User who last updated this rule set
» deleted_by object,null false none none
»» href string true* none User who deleted this rule set
» enabled boolean true* none Enabled flag
» description string,null false none Description
» external_data_set string,null false none External data set identifier
» external_data_reference string,null false none External data reference identifier
» ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services true* none Array of service URI and port/protocol combinations
» resolve_labels_as sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as true* none none
» sec_connect boolean false none Whether a secure connection is established
» stateless boolean false none Whether packet filtering is stateless for the rule
» machine_auth boolean false none Whether machine authentication is enabled
» providers sec_policy_rule_sets_sec_rules_get/properties/providers true* none Providers
» consumers sec_policy_rule_sets_sec_rules_get/properties/consumers true* none Consumers
» consuming_security_principals sec_policy_rule_sets_sec_rules_get/properties/consuming_security_principals false none Hrefs of consuming security principals
» unscoped_consumers boolean false none Set the scope for rule consumers to All
» update_type sec_policy_virtual_services_get/properties/update_type false none Versioned policy object update type
» network_type sec_policy_rule_sets_put/properties/rules/items/properties/network_type false none Network types that this rule should apply to.
» use_workload_subnets sec_policy_rule_sets_put/properties/rules/items/properties/use_workload_subnets false none Whether to use workload subnets instead of IP addresses for the providers/consumers
ip_tables_rules [object] false none Array of iptables rules in this rule set
» href string true* none URI of object
» created_at string(date-time) false none Timestamp when this rule set was first created
» updated_at string(date-time) false none Timestamp when this rule set was last updated
» deleted_at string,null(date-time) false none Timestamp when this rule set was deleted
» created_by object false none none
»» href string true* none User who originally created this rule set
» updated_by object false none none
»» href string true* none User who last updated this rule set
» deleted_by object,null false none none
»» href string true* none User who deleted this rule set
» update_type sec_policy_virtual_services_get/properties/update_type false none Versioned policy object update type
» enabled boolean true* none Enabled flag
» description string,null false none Description
» statements [sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/statements/items] true* none list of the iptables statements in this rule
» actors [object] true* none none
»» actors string false none Rule Actors are all workloads ('ams')
»» label sec_policy_virtual_services_get/properties/labels/items false none none
»» label_group object false none none
»»» href string true* none Label group URI
»» workload object false none none
»»» href string true* none Workload URI
»» ip_version string true* none IP version for the rules to be applied to

Enumerated Values

Property Value
ip_version 4
ip_version 6

sec_policy_rule_sets_post

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "enabled": true,
  "scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "rules": [
    {
      "enabled": true,
      "description": "string",
      "external_data_set": null,
      "external_data_reference": null,
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "resolve_labels_as": {
        "providers": [
          "workloads"
        ],
        "consumers": [
          "workloads"
        ]
      },
      "sec_connect": true,
      "stateless": true,
      "machine_auth": true,
      "providers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          },
          "virtual_service": {
            "href": "string"
          },
          "virtual_server": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          },
          "virtual_service": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          }
        }
      ],
      "consuming_security_principals": [
        {
          "href": "string"
        }
      ],
      "unscoped_consumers": true,
      "network_type": "brn",
      "use_workload_subnets": [
        "providers"
      ]
    }
  ],
  "ip_tables_rules": [
    {
      "enabled": true,
      "description": "string",
      "statements": [
        {
          "table_name": "nat",
          "chain_name": "PREROUTING",
          "parameters": "string"
        }
      ],
      "actors": [
        {
          "actors": "string",
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "ip_version": "4"
    }
  ]
}

Properties

Name Type Required Restrictions Description
name string true* none Name (must be unique)
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
enabled boolean false none Enabled flag
scopes [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] true* none Rule set scopes
rules [object] false none Array of sec rules (access rules) in this rule set
» enabled boolean true* none Enabled flag
» description string false none Description
» external_data_set string,null false none External data set identifier
» external_data_reference string,null false none External data reference identifier
» ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services true* none Array of service URI and port/protocol combinations
» resolve_labels_as sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as true* none none
» sec_connect boolean false none Whether a secure connection is established
» stateless boolean false none Whether packet filtering is stateless for the rule
» machine_auth boolean false none Whether machine authentication is enabled
» providers sec_policy_rule_sets_put/properties/rules/items/properties/providers true* none Providers
» consumers sec_policy_rule_sets_put/properties/rules/items/properties/consumers true* none Consumers
» consuming_security_principals sec_policy_rule_sets_put/properties/rules/items/properties/consuming_security_principals false none Hrefs of consuming security principals
» unscoped_consumers boolean false none Set the scope for rule consumers to All
» network_type sec_policy_rule_sets_put/properties/rules/items/properties/network_type false none Network types that this rule should apply to.
» use_workload_subnets sec_policy_rule_sets_put/properties/rules/items/properties/use_workload_subnets false none Whether to use workload subnets instead of IP addresses for the providers/consumers
ip_tables_rules [object] false none Array of custom iptables rules in this rule set
» enabled boolean true* none Enabled flag
» description string false none Description
» statements [sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/statements/items] true* none list of the iptables statements in this rule
» actors sec_policy_rule_sets_put/properties/ip_tables_rules/items/properties/actors true* none none
» ip_version string true* none IP version for the rules to be applied to

Enumerated Values

Property Value
ip_version 4
ip_version 6

sec_policy_rule_sets_put

{
  "name": "string",
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "enabled": true,
  "update_type": "create",
  "scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "rules": [
    {}
  ],
  "ip_tables_rules": [
    {}
  ]
}

Properties

Name Type Required Restrictions Description
name string false none Name (must be unique)
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
enabled boolean false none Enabled flag
update_type string false none Type of update
scopes sec_policy_rule_sets_post/properties/scopes false none Rule set scopes
rules [anyOf] false none Array of rules in this rule set
» href string false none URI of Rule
» enabled boolean false none Enabled flag
» description string false none Description
» external_data_set string,null false none External data set identifier
» external_data_reference string false none External data reference identifier
» ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services false none Array of service URI and port/protocol combinations
» resolve_labels_as object false none none
»» providers [string] true* none none
»» consumers [string] true* none none
» sec_connect boolean false none Whether a secure connection is established
» stateless boolean false none Whether packet filtering is stateless for the rule
» machine_auth boolean false none Whether machine authentication is enabled
» providers [object] false none Providers
»» actors string false none Rule actors are all workloads ('ams')
»» label_dimension string false none Rule actors that are all workloads with a specific label dimension
»» exclusion boolean false none Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»» label sec_policy_virtual_servers_get/properties/created_by false none none
»» label_group object false none none
»»» href string true* none Label group URI
»» workload object false none none
»»» href string true* none Workload URI
»» virtual_service object false none none
»»» href string true* none Virtual service URI
»» virtual_server object false none none
»»» href string true* none Virtual server URI
»» ip_list object false none URI of associated IP List
»»» href string true* none IP List URI
»» consumers [object] false none Consumers
»»» actors string false none Rule actors are all workloads or container host
»»» label_dimension string false none Rule actors that are all workloads with a specific label dimension
»»» exclusion boolean false none Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»» label sec_policy_virtual_servers_get/properties/created_by false none none
»»» label_group object false none none
»»»» href string true* none Label group URI
»»» workload object false none none
»»»» href string true* none Workload URI
»»» virtual_service object false none none
»»»» href string true* none Virtual service URI
»»» ip_list sec_policy_virtual_servers_get/properties/created_by false none none
»» consuming_security_principals [object] false none Hrefs of consuming security principals
»»» href string true* none URI of security principal
»» update_type string false none Type of update
»» unscoped_consumers boolean false none Set the scope for rule consumers to All
»» network_type string false none Network types that this rule should apply to.
»» use_workload_subnets [string] false none Whether to use workload subnets instead of IP addresses for the providers/consumers

anyOf

Name Type Required Restrictions Description
»» anonymous object false none none

or

Name Type Required Restrictions Description
»» anonymous object false none none

continued

Name Type Required Restrictions Description
» ip_tables_rules [anyOf] false none Array of iptables rules in this ruleset
»» href string false none URI of Rule
»» enabled boolean false none Enabled flag
»» description string false none Description
»» statements [object] false none list of the iptables statements in this rule
»»» table_name string true* none name of the iptables table for this rule
»»» chain_name string true* none name of the iptables chain for this rule
»»» parameters string true* none the remainder of the iptables rules (excluding table/chain)
»» actors [object] false none none
»»» actors string false none Rule Actors are all workloads ('ams')
»»» label sec_policy_virtual_servers_get/properties/created_by false none none
»»» label_group sec_policy_virtual_servers_get/properties/created_by false none none
»»» workload sec_policy_virtual_servers_get/properties/created_by false none none
»» ip_version string false none IP version for the rules to be applied to
»» update_type string false none Type of update

anyOf

Name Type Required Restrictions Description
»» anonymous object false none none

or

Name Type Required Restrictions Description
»» anonymous object false none none

Enumerated Values

Property Value
update_type create
update_type update
update_type delete
actors ams
label_dimension app
actors ams
actors container_host
label_dimension app
update_type create
update_type update
update_type delete
network_type brn
network_type non_brn
network_type all
table_name nat
table_name mangle
table_name filter
chain_name PREROUTING
chain_name INPUT
chain_name OUTPUT
chain_name FORWARD
chain_name POSTROUTING
ip_version 4
ip_version 6
update_type create
update_type update
update_type delete

container_clusters_container_workload_profiles_get

{
  "href": "string",
  "name": null,
  "namespace": null,
  "description": "string",
  "assign_labels": [
    {
      "href": "string"
    }
  ],
  "labels": [
    {
      "key": "string",
      "assignment": {
        "href": "string",
        "value": "string"
      }
    }
  ],
  "enforcement_mode": "idle",
  "managed": true,
  "linked": true,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "updated_at": "2025-04-01T00:21:27Z"
}

Properties

Name Type Required Restrictions Description
href string false none URI of the container workload profile
name string,null false none A friendly name given to a profile if the namespace is not user friendly
namespace string,null false none Namespace name
description string false none Description of the profile
assign_labels sec_policy_virtual_services_post/properties/labels false none Assigned labels
labels [oneOf] false none Labels to assign to the workload that matches the namespace

oneOf

Name Type Required Restrictions Description
» anonymous object false none none
»» key string true* none The label key
»» assignment object true* none The label href to set
»»» href string true* none Label URI
»»» value string false none Label Name

xor

Name Type Required Restrictions Description
»» anonymous object false none none
»»» key string true* none The label key
»»» restriction [object] true* none The list of allowed label hrefs
»»»» href string true* none Label URI
»»»» value string false none Label Name

continued

Name Type Required Restrictions Description
»»» enforcement_mode string false none Workload enforcement mode
»»» managed boolean false none If the namespace is managed or not
»»» linked boolean false none True if the namespace exists in the cluster and is reported by kubelink
»»» created_at string(date-time) false none Time stamp when this profile was created
»»» created_by object false none none
»»»» href string true* none User who originally created this profile
»»» updated_by object false none none
»»»» href string true* none User who last updated this profile
»»» updated_at string(date-time) false none Time stamp when this profile was updated

Enumerated Values

Property Value
enforcement_mode idle
enforcement_mode visibility_only
enforcement_mode full
enforcement_mode selective

container_clusters_container_workload_profiles_post

{
  "name": null,
  "description": "string",
  "assign_labels": [
    {
      "href": "string"
    }
  ],
  "labels": [
    {
      "key": "string",
      "assignment": {
        "href": "string"
      }
    }
  ],
  "enforcement_mode": "idle",
  "managed": true
}

Properties

Name Type Required Restrictions Description
name string,null true* none A friendly name given to a profile if the namespace is not user friendly
description string false none Description of the profile
assign_labels sec_policy_virtual_services_post/properties/labels false none Assigned labels
labels [oneOf] false none Labels to assign to the workload that matches the namespace

oneOf

Name Type Required Restrictions Description
» anonymous object false none none
»» key string true* none The label key
»» assignment object true* none The label href to set
»»» href string true* none Label URI

xor

Name Type Required Restrictions Description
»» anonymous object false none none
»»» key string true* none The label key
»»» restriction [object] true* none The list of allowed label hrefs
»»»» href string true* none Label URI

continued

Name Type Required Restrictions Description
»»» enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
»»» managed boolean false none If the namespace is managed or not

container_clusters_container_workload_profiles_update_put

{
  "container_workload_profiles": [
    {
      "href": "string"
    }
  ],
  "labels": [
    {
      "key": "string",
      "assignment": {
        "href": "string"
      }
    }
  ],
  "enforcement_mode": "idle",
  "managed": true
}

Properties

Name Type Required Restrictions Description
container_workload_profiles [object] false none List of Container Workload Profile hrefs
» href string true* none Container Workload Profile URI
labels [container_clusters_container_workload_profiles_post/properties/labels/items] false none Labels to assign to the workload that matches the namespace
enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
managed boolean false none If the namespace is managed or not

container_clusters_container_workload_profiles_put

{
  "name": null,
  "description": null,
  "assign_labels": [
    {
      "href": "string"
    }
  ],
  "labels": [
    {
      "key": "string",
      "assignment": {
        "href": "string"
      }
    }
  ],
  "enforcement_mode": "idle",
  "managed": true
}

Properties

Name Type Required Restrictions Description
name string,null false none A friendly name given to a profile if the namespace is not user friendly
description string,null false none Description of the profile
assign_labels sec_policy_virtual_services_post/properties/labels false none Assigned labels
labels [container_clusters_container_workload_profiles_post/properties/labels/items] false none Labels to assign to the workload that matches the namespace
enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
managed boolean false none If the namespace is managed or not

container_clusters_get

{
  "href": "string",
  "name": "string",
  "description": "string",
  "nodes": [
    {
      "pod_subnet": "string"
    }
  ],
  "container_runtime": "string",
  "manager_type": "string",
  "last_connected": "2025-04-01T00:21:27Z",
  "online": true,
  "errors": [
    {
      "audit_event": {
        "href": "string"
      },
      "duplicate_ids": [],
      "error_type": "string"
    }
  ],
  "kubelink_version": "string",
  "pce_fqdn": "string",
  "cluster_mode": "legacy",
  "datacenter_nat_1to1": true
}

Properties

Name Type Required Restrictions Description
href string false none URI of container cluster
name string false none User assigned name of the cluster
description string false none User assigned description of the cluster
nodes [object] false none none
» pod_subnet string false none Pod Subnet
container_runtime string false none The Container Runtime used in this cluster
manager_type string false none Manager for this cluster (and version)
last_connected string(date-time) false none none
online boolean false none none
errors [object] false none none
» audit_event object false none none
»» href string false none none
» duplicate_ids array false none none
» error_type string true* none none
kubelink_version string false none Kubelink software version string
pce_fqdn string false none PCE FQDN for this container cluster. Used in Supercluster only
cluster_mode string false none Cluster mode of Container Cluster
datacenter_nat_1to1 boolean false none Datacenter NAT 1to1 mode ON. Used for enforcing creation of pseudo public interfaces on nodes

container_clusters_post

{
  "name": "string",
  "description": "string",
  "datacenter_nat_1to1": true
}

Properties

Name Type Required Restrictions Description
name string false none User assigned name of the cluster
description string false none User assigned description of the cluster
datacenter_nat_1to1 boolean false none Datacenter NAT 1to1 mode ON. Used for enforcing creation of pseudo public interfaces on nodes

container_clusters_put

{
  "name": "string",
  "description": "string",
  "datacenter_nat_1to1": true
}

Properties

Name Type Required Restrictions Description
name string false none User assigned name of the cluster
description string false none User assigned description of the cluster
datacenter_nat_1to1 boolean false none Datacenter NAT 1to1 mode ON. Used for enforcing creation of pseudo public interfaces on nodes

container_clusters_service_backends_get

[
  {
    "name": "string",
    "kind": "string",
    "namespace": "string",
    "updated_at": "string",
    "created_at": "string",
    "virtual_services": {
      "href": "string",
      "name": "string"
    }
  }
]

The Backend Services associated with Container Clusters

Properties

Name Type Required Restrictions Description
name string true* none The name of the Container Cluster Backend
kind string true* none The type (or kind) of Container Cluster Backend
namespace string false none The namespace of the Container Cluster Backend
updated_at string true* none The time (rfc339 timestamp) at which the Container Cluster Backend was last updated
created_at string true* none The time (rfc339 timestamp) in which the Container Cluster Backend was created
virtual_services object true* none none
» href string true* none The URI to the associated virtual service
» name string true* none The name of virtual service

vens_get

{
  "href": "string",
  "name": null,
  "description": null,
  "hostname": "string",
  "uid": null,
  "os_id": null,
  "os_detail": null,
  "os_platform": null,
  "version": "string",
  "status": "string",
  "activation_type": "string",
  "active_pce_fqdn": null,
  "target_pce_fqdn": null,
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "interfaces": [
    {
      "name": "string",
      "link_state": null,
      "address": "string",
      "cidr_block": null,
      "default_gateway_address": null,
      "network": {
        "href": "string",
        "name": null
      },
      "network_detection_mode": null,
      "friendly_name": null,
      "href": "string"
    }
  ],
  "workloads": [
    {
      "href": "string",
      "name": null,
      "managed": true,
      "hostname": null,
      "instance_id": null,
      "data_center": null,
      "data_center_zone": null,
      "service_principal_name": null,
      "os_id": null,
      "os_detail": null,
      "labels": [
        {
          "href": "string",
          "key": "string",
          "value": "string"
        }
      ],
      "public_ip": null,
      "interfaces": [
        {
          "name": "string",
          "link_state": null,
          "address": "string",
          "cidr_block": null,
          "default_gateway_address": null,
          "network": {
            "href": "string",
            "name": null
          },
          "network_detection_mode": null,
          "friendly_name": null,
          "href": "string"
        }
      ],
      "security_policy_applied_at": null,
      "security_policy_received_at": null,
      "security_policy_sync_state": "string",
      "log_traffic": true,
      "mode": "idle",
      "enforcement_mode": "idle",
      "visibility_level": "string",
      "online": true
    }
  ],
  "container_cluster": null,
  "secure_connect": null,
  "last_heartbeat_at": null,
  "last_goodbye_at": null,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "string"
  },
  "conditions": [
    {
      "first_reported_timestamp": "2025-04-01T00:21:27Z",
      "latest_event": {
        "notification_type": "string",
        "severity": "err",
        "href": "string",
        "info": {},
        "timestamp": "2025-04-01T00:21:27Z"
      }
    }
  ],
  "authentication_recovery": true,
  "caps": [
    "string"
  ],
  "ven_type": "server",
  "upgrade_expires_at": null,
  "upgrade_target_version": null
}

Properties

Name Type Required Restrictions Description
href string false none URI of VEN
name string,null false none Friendly name for the VEN
description string,null false none The description of the VEN
hostname string true* none The hostname of the host managed by the VEN
uid string,null false none The unique ID of the host managed by the VEN
os_id string,null false none OS identifier of the host managed by the VEN
os_detail string,null false none Additional OS details from the host managed by the VEN
os_platform string,null false none OS platform of the host managed by the VEN
version string false none Software version of the VEN
status string false none Status of the VEN
activation_type string false none The method by which the VEN was activated
active_pce_fqdn string,null false none The FQDN of the PCE that the VEN last connected to
target_pce_fqdn string,null false none The FQDN of the PCE that the VEN will use for future connections
labels [object] false none Labels assigned to the host managed by the VEN.
» href string true* none Label URI
» key string false none Key of the label, only present in expanded representations.
» value string false none Value of the label, only present in expanded representations.
interfaces [workloads_get/properties/interfaces] false none Network interfaces of the host managed by the VEN.
workloads [object] false none none
» href string true* none Workload URI
» name string,null false none The short friendly name of the workload, only present in expanded representations.
» managed boolean false none True if the workload is managed, else false
» hostname string,null false none The hostname of the workload, only present in expanded representations.
» instance_id string,null false none Instance identifier for the host
» data_center string,null false none Data center
» data_center_zone string,null false none Data center zone
» service_principal_name string,null false none The Kerberos Service Principal Name (SPN)
» os_id string,null false none OS identifier for the workload, only present in expanded representations.
» os_detail string,null false none Additional OS details, only present in expanded representations.
» labels [object] false none Labels assigned to the workload., only present in expanded representations.
»» href string false none Label URI
»» key string false none Key of the label
»» value string false none Value of the label
» public_ip string,null false none The public IP of the server, only present in expanded representations.
» interfaces [workloads_get/properties/interfaces] false none Network interfaces of the workload, only present in expanded representations.
» security_policy_applied_at string,null(date-time) false none Last reported time when policy was applied to the workload (UTC), only present in expanded representations.
» security_policy_received_at string,null(date-time) false none Last reported time when policy was received by the workload (UTC), only present in expanded representations.
» security_policy_sync_state string false none Current state of security policy
» log_traffic boolean false none DEPRECATED AND REMOVED. True if we want to log traffic events from this workload, only present in expanded representations.
» mode pairing_profiles_get/properties/mode false none DEPRECATED AND REPLACED (Use enforcement_mode instead)
» enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
» visibility_level string false none Visibility level of the workload, only present in expanded representations.
» online boolean false none If this workload is online and present in policy, only present in expanded representations.
container_cluster object,null false none none
» href string true* none The URI of the container cluster managed by this VEN
» name string false none The name of the container cluster managed by this VEN, only present in expanded representations.
secure_connect object,null false none none
» matching_issuer_name string false none Issuer name match criteria for certificate used during establishing secure connections.
last_heartbeat_at string,null(date-time) false none The last time (rfc3339 timestamp) a heartbeat was received from this VEN
last_goodbye_at string,null(date-time) false none The time (rfc3339 timestamp) of the last goodbye from the VEN
created_at string(date-time) false none The time (rfc3339 timestamp) at which this VEN was created
created_by object false none none
» href string true* none The URI of the user who created this VEN
updated_at string(date-time) false none The time (rfc3339 timestamp) at which this VEN was last updated
updated_by object false none none
» href string true* none The URI of the user who last updated this VEN
conditions [object] false none Resource errors. If there are no errors or warnings, then the array value will be empty.
» first_reported_timestamp string(date-time) false none The timestamp of the first event that reported this condition.
» latest_event object false none The latest notification event that was generated for the corresponding condition
»» notification_type string false none The notification_type of the event
»» severity string false none Severity of the condition, same as the event
»» href string false none The href of the event
»» info object false none The information from the notification event that was generated by the condition.
»» timestamp string(date-time) false none RFC 3339 timestamp at which this event was created
» authentication_recovery boolean false none Specifies if the VEN is in authentication recovery
» caps [string] false none Permission types
» ven_type workloads_get/properties/ven/properties/ven_type false none VEN type
» upgrade_expires_at string,null(date-time) false none The time (rfc3339 timestamp) at which the PCE stops attempting VEN upgrade
» upgrade_target_version string,null false none The software release to upgrade to.

Enumerated Values

Property Value
severity err
severity warning

vens_unpair_put

{
  "vens": [
    {
      "href": "string"
    }
  ],
  "firewall_restore": "default"
}

Properties

Name Type Required Restrictions Description
vens [object] true* none VENs to unpair
» href string true* none URI of VEN to unpair
firewall_restore string false none The strategy to use to restore the firewall state after the VEN is uninstalled.

Enumerated Values

Property Value
firewall_restore saved
firewall_restore default
firewall_restore disable

vens_upgrade_put

{
  "release": "string",
  "vens": [
    {
      "href": "string"
    }
  ],
  "upgrade_timeout_seconds": 900
}

Properties

Name Type Required Restrictions Description
release string true* none The software release to upgrade to.
vens [object] true* none An array of VENs to upgrade
» href string true* none VEN URI
upgrade_timeout_seconds integer false none Number of seconds during which the PCE tries to trigger the agent upgrade.

vens_remote_action_put

{
  "action": "restart",
  "vens": [
    {
      "href": "string"
    }
  ]
}

Properties

Name Type Required Restrictions Description
action string true* none Remote action type
vens [object] true* none An array of VENs to restart
» href string true* none VEN URI

Enumerated Values

Property Value
action restart

vens_authentication_recovery_put

{
  "vens": [
    {
      "href": "string"
    }
  ],
  "recovery_enabled": false,
  "recovery_duration_seconds": 3600
}

Properties

Name Type Required Restrictions Description
vens [object] true* none List of VENs to be put in or out of recovery
» href string true* none URI of the VEN
recovery_enabled boolean true* none Enable/disable recovery for the VENs
recovery_duration_seconds integer true* none Put the VENs in recovery for the specified duration in seconds

vens_statistics_post

{
  "property_counts": [
    {
      "property": "status",
      "values": [
        "string"
      ],
      "filters": [
        {
          "filter_property": "status",
          "values": [
            "string"
          ]
        }
      ]
    }
  ]
}

Properties

Name Type Required Restrictions Description
property_counts [object] true* none none
» property string true* none none
» values [string] false none none
» filters [object] false none none
»» filter_property string true* none none
»» values [string] false none none

Enumerated Values

Property Value
property status
property version
property health
property condition
property os_id
property enforcement_mode
property ven_type
filter_property status
filter_property version
filter_property health
filter_property condition
filter_property os_id
filter_property enforcement_mode
filter_property ven_type

vens_put

{
  "target_pce_fqdn": "string",
  "name": null,
  "description": null,
  "status": "active"
}

Update a VEN's name, description, or target PCE.

Properties

Name Type Required Restrictions Description
target_pce_fqdn string false none cluster FQDN for target PCE
name string,null false none Friendly name of the VEN
description string,null false none Description of the VEN
status string false none VEN Status

Enumerated Values

Property Value
status active
status suspended

orgs_permissions_get

[
  {
    "role": {
      "href": "string"
    },
    "scope": [
      {
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ],
    "auth_security_principal": {
      "href": "string"
    },
    "href": "string"
  }
]

The list of the auth_security_principals in this org

Properties

allOf

Name Type Required Restrictions Description
anonymous orgs_permissions_post/allOf/0 false none Permission granted

and

Name Type Required Restrictions Description
anonymous object false none none
» href string true* none URI of permission

orgs_permissions_post

{
  "role": {
    "href": "string"
  },
  "scope": [
    {
      "label": {
        "href": "string",
        "key": "string",
        "value": "string"
      },
      "label_group": {
        "href": "string",
        "key": "string",
        "name": "string"
      }
    }
  ],
  "auth_security_principal": {
    "href": "string"
  }
}

Properties

Name Type Required Restrictions Description
role orgs_permissions_put/properties/role true* none none
scope orgs_permissions_put/properties/scope true* none none
auth_security_principal orgs_permissions_put/properties/auth_security_principal true* none none

orgs_permissions_put

{}

The details of the permission to edit

Properties

Name Type Required Restrictions Description
role object false none none
» href string true* none URI of Role
scope [object] false none none
» label object false none none
»» href string true* none Label URI
»» key string false none Label type
»» value string false none Label name
» label_group object false none none
»» href string true* none Label group URI
»» key string false none Label group type
»» name string false none Label group name
» auth_security_principal object false none none
»» href string true* none URI of auth_security_principal

anyOf

Name Type Required Restrictions Description
» anonymous object false none none

or

Name Type Required Restrictions Description
» anonymous object false none none

or

Name Type Required Restrictions Description
» anonymous object false none none

slbs_post

{
  "name": "string",
  "description": "string",
  "nfc": {
    "href": "string"
  },
  "network_enforcement_node": {
    "href": "string"
  },
  "device_type": "string",
  "devices": [
    {
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      }
    }
  ]
}

Properties

Name Type Required Restrictions Description
name string true* none The short friendly name of the server load balancer
description string false none The long description of the server load balancer
nfc object false none DEPRECATED AND REPLACED (USE 'network_enforcement_node' INSTEAD) Network Function Controller that should manage this SLB. Can be skipped if there exists only 1 NFC in the system, or if there are no NFCs, in which case, the server would auto-deploy an NFC to manage the new SLB (and any SLBs created thereafter). Cannot be used along with network_enforcement_node
» href string true* none NFC URI
network_enforcement_node object false none Network enforcement node that should manage this SLB. Can be skipped if there exists only 1 NEN in the system, or if there are no NENs, in which case, the server would auto-deploy an NEN to manage the new SLB (and any SLBs created thereafter). Cannot be used along with nfc
» href string true* none Network enforcement node URI
device_type string true* none Device type of the server load balancer
devices [object] true* none Management configuration of the devices associated with this SLB Network VF.
» config object true* none Management configuration info for the SLB device.
»» host string false none The IP or fqdn of the device
»» port integer false none Host port
»» credential_type string false none Type of the credentials
»» username string false none username for credential
»» credential string,null false none credential
»» check_certificate boolean false none Whether enforce peer certificate verify

Enumerated Values

Property Value
credential_type password

slbs_get

{
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "devices": [
    {
      "href": "string",
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      },
      "status": {
        "connection_state": "pending",
        "software_version": "string",
        "sync_state": "in_sync"
      }
    }
  ]
}

Update info about a change tracked resource in the system.

Properties

Name Type Required Restrictions Description
created_at string(date-time) true* none The time (rfc3339 timestamp) at which this resource was created
updated_at string(date-time) true* none The time (rfc3339 timestamp) at which this resource was last updated
created_by object true* none none
» href string true* none The URI of the user who created this resource
updated_by object true* none none
» href string true* none The URI of the user who last updated this resource
devices array false none none
» href string true* none URI of the managed SLB device.
» config slbs_post/properties/devices/items/properties/config true* none Management configuration info for the SLB device.
» status object false none The current status of the SLB device.
»» connection_state string true* none Status of most recent connection to the SLB device
»» software_version string false none Software version reported by the SLB device
»» sync_state string false none Sync-state of the SLB device if it is part of an HA group.

Enumerated Values

Property Value
connection_state pending
connection_state successful
connection_state cannot_resolve
connection_state cannot_connect
connection_state bad_credentials
connection_state bad_certificate
connection_state bad_request
connection_state dup_device
sync_state in_sync
sync_state not_sync

slbs_put

{
  "name": "string",
  "description": "string",
  "nfc": {
    "href": "string"
  },
  "network_enforcement_node": {
    "href": "string"
  },
  "device_type": "string",
  "devices": [
    {
      "href": "string",
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      }
    }
  ]
}

Properties

Name Type Required Restrictions Description
name string false none The short friendly name of the server load balancer
description string false none The long description of the server load balancer
nfc object false none DEPRECATED AND REPLACED (USE 'network_enforcement_node' INSTEAD) Network function controller managing this SLB
» href string true* none NFC URI
network_enforcement_node object false none Network enforcement node managing this SLB
» href string true* none Network enforcement node URI
device_type slbs_post/properties/device_type false none Device type of the server load balancer
devices [object] false none Management configuration of the devices associated with this SLB Network VF.
» href string true* none SLB device URI.
» config slbs_post/properties/devices/items/properties/config false none Management configuration info for the SLB device.

discovered_virtual_servers_get

{
  "href": "string",
  "dvs_identifier": "string",
  "name": "string",
  "vip_port": {
    "vip": "192.168.0.1",
    "protocol": 0,
    "port": "string"
  },
  "local_ips": [
    "192.168.0.1"
  ],
  "mode": "string",
  "slb": {
    "href": "string"
  },
  "snat_type": "string",
  "snat_pool_ips": [
    "192.168.0.1"
  ],
  "service_checks": [
    {
      "protocol": 0,
      "port": 0
    }
  ],
  "nfc": {
    "href": "string"
  },
  "network_enforcement_node": {
    "href": "string"
  },
  "virtual_server": null,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Properties

Name Type Required Restrictions Description
href string true* none href of discovered virtual server
dvs_identifier string true* none NFC-generated unique identifier for discovered virtual server
name string true* none Configured name of virtual server
vip_port sec_policy_virtual_servers_get/properties/discovered_virtual_server/properties/vip_port true* none none
local_ips [string] true* none Local IPs of virtual server
mode string true* none Virtual server mode of operation
slb sec_policy_virtual_servers_get/properties/created_by true* none none
snat_type string false none SNAT source ip type
snat_pool_ips [string] false none NAT source IPs of virtual server
service_checks [object] true* none none
» protocol integer true* none none
» port integer false none Service check port. Only present when protocol is 6 (tcp) or 17 (udp).
nfc sec_policy_virtual_servers_get/properties/created_by true* none none
network_enforcement_node sec_policy_virtual_servers_get/properties/created_by true* none none
virtual_server object,null false none The virtual server policy object corresponding to this discovered virtual server
» href string true* none href of virtual server
» update_type sec_policy_virtual_services_get/properties/update_type true* none Versioned policy object update type
» mode string true* none enforcement mode of virtual server
» labels [object] true* none labels for virtual server
»» href string true* none href of label
»» key string true* none key in key-value pair
»» value string true* none value in key-value pair
» created_at string(date-time) true* none The time (rfc3339 timestamp) at which this server load balancer was created
» updated_at string(date-time) true* none The time (rfc3339 timestamp) at which this server load balancer was last updated
» created_by sec_policy_virtual_servers_get/properties/created_by true* none none
» updated_by sec_policy_virtual_servers_get/properties/created_by true* none none

service_accounts_post

{
  "name": "string",
  "description": "string",
  "access_restriction": null,
  "permissions": [
    {
      "role": {
        "href": "string"
      },
      "scope": [
        {
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          }
        }
      ]
    }
  ],
  "api_key": {
    "expires_in_seconds": "default"
  }
}

Properties

Name Type Required Restrictions Description
name string true* none Name of the service_account
description string false none The description of the service_account
access_restriction object,null false none Access restriction assigned to the keys created under this service_account
» href string true* none Access restriction URI
permissions [object] true* none The list of permissions
» role orgs_permissions_put/properties/role true* none none
» scope orgs_permissions_put/properties/scope true* none none
api_key object true* none none
» expires_in_seconds any true* none Validity of the api_key, in seconds

oneOf

Name Type Required Restrictions Description
»» anonymous string false none none

xor

Name Type Required Restrictions Description
»» anonymous integer false none none

Enumerated Values

Property Value
anonymous default

service_accounts_get

{
  "name": "string",
  "description": "string",
  "access_restriction": null,
  "permissions": [
    {
      "href": "string",
      "role": {
        "href": "string"
      },
      "scope": [
        {
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          }
        }
      ]
    }
  ],
  "href": "string",
  "api_keys": [
    {
      "key_id": "string",
      "auth_username": "string",
      "name": null,
      "description": "string",
      "state": "string",
      "expires_in_seconds": 0,
      "created_at": "2025-04-01T00:21:27Z",
      "created_by": {
        "href": "string"
      },
      "last_login_on": "2025-04-01T00:21:27Z",
      "account": {
        "href": "string",
        "type": "string",
        "name": "string",
        "access_restriction": null,
        "permissions": [
          {
            "href": "string",
            "role": {
              "href": "string"
            },
            "scope": [
              {
                "label": {
                  "href": "string",
                  "key": "string",
                  "value": "string"
                },
                "label_group": {
                  "href": "string",
                  "key": "string",
                  "name": "string"
                }
              }
            ]
          }
        ]
      },
      "href": "string"
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Properties

Name Type Required Restrictions Description
name string true* none Service account name
description string false none Description of the service_account
access_restriction object,null false none Access restriction assigned to the api_keys under this service_account
» href string true* none Access restriction URI
permissions [object] true* none List of permissions
» href string false none URI of the permission entity
» role orgs_permissions_put/properties/role true* none none
» scope orgs_permissions_put/properties/scope true* none none
href string true* none URI of service_account
api_keys [object] true* none List of associated api_keys
» key_id string true* none The key ID
» auth_username string true* none Username required for authentication
» name string,null true* none The key name - just a label to be used
» description string false none The description of the key
» state string false none State of the api_key
» expires_in_seconds integer false none Validity of the api_key in seconds
» created_at string(date-time) true* none Timestamp when this key was first created (RFC 3339)
» created_by object false none none
»» href string true* none User who originally created this api key
» last_login_on string(date-time) false none Timestamp when this key was last used
» account object false none none
»» href string true* none Associated identity
»» type string true* none Type of account
»» name string true* none Name of the account
»» access_restriction object,null false none Access restriction assigned to the api_keys under this service_account
»»» href string true* none Access restriction URI
»» permissions [object] false none List of permissions
»»» href string false none URI of the permission entity
»»» role orgs_permissions_put/properties/role true* none none
»»» scope orgs_permissions_put/properties/scope true* none none
»» href string true* none URI of the key
» created_at string(date-time) true* none Timestamp when this service account was first created (RFC 3339)
» updated_at string(date-time) true* none Timestamp when this service account was last updated
» created_by object true* none none
»» href string true* none User who originally created this service account
» updated_by object true* none none
»» href string true* none User who last updated this service account

service_accounts_put

{
  "name": "string",
  "description": "string",
  "access_restriction": null,
  "permissions": [
    {
      "href": "string",
      "role": {
        "href": "string"
      },
      "scope": [
        {
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          }
        }
      ]
    }
  ]
}

Properties

Name Type Required Restrictions Description
name string false none Service account name
description string false none Description of the service_account
access_restriction object,null false none Access restriction assigned to the keys created under this service_account
» href string true* none Access restriction URI
permissions [object] false none List of permissions
» href string false none URI of the permission entity
» role orgs_permissions_put/properties/role true* none none
» scope orgs_permissions_put/properties/scope true* none none

kubernetes_workloads_get

{
  "href": "string",
  "name": "string",
  "namespace": "string",
  "kind": "string",
  "labels": [
    {
      "href": "string",
      "key": "string",
      "value": "string"
    }
  ],
  "enforcement_mode": "idle",
  "visibility_level": "flow_summary",
  "container_workload_profile": {
    "href": "string",
    "name": null,
    "namespace": null,
    "description": "string",
    "assign_labels": [
      {
        "href": "string"
      }
    ],
    "labels": [
      {
        "key": "string",
        "assignment": {
          "href": "string",
          "value": "string"
        }
      }
    ],
    "enforcement_mode": "idle",
    "managed": true,
    "linked": true,
    "created_at": "2025-04-01T00:21:27Z",
    "created_by": {
      "href": "string"
    },
    "updated_by": {
      "href": "string"
    },
    "updated_at": "2025-04-01T00:21:27Z"
  },
  "container_cluster": {
    "href": "string",
    "name": "string",
    "description": "string",
    "nodes": [
      {
        "pod_subnet": "string"
      }
    ],
    "container_runtime": "string",
    "manager_type": "string",
    "last_connected": "2025-04-01T00:21:27Z",
    "online": true,
    "errors": [
      {
        "audit_event": {
          "href": "string"
        },
        "duplicate_ids": [],
        "error_type": "string"
      }
    ],
    "kubelink_version": "string",
    "pce_fqdn": "string",
    "cluster_mode": "legacy",
    "datacenter_nat_1to1": true
  },
  "security_policy_applied_at": null,
  "security_policy_sync_state": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "metadata": {
    "labels": {},
    "annotations": {},
    "external_service_uid": "string"
  },
  "private_ip_addresses": [
    "2001:0db8:85a3:0000:0000:8a2e:0370:7334"
  ],
  "container_cluster_service": {}
}

Properties

Name Type Required Restrictions Description
href string false none URI of the kubernetes workload
name string true* none Container workload name
namespace string true* none k8s namespace where this k8s Workload belongs to
kind string true* none k8s resource kind, e.g. Deployment
labels [sec_policy_virtual_services_get/properties/labels/items] false none none
enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
visibility_level pairing_profiles_get/properties/visibility_level/oneOf/0 false none Visibility level of the workload
container_workload_profile object false none none
» href string false none URI of the container workload profile
» name string,null false none A friendly name given to a profile if the namespace is not user friendly
» namespace string,null false none Namespace name
» description string false none Description of the profile
» assign_labels sec_policy_virtual_services_post/properties/labels false none DEPRECATED: Labels to assign to the workload that matches the namespace
» labels [oneOf] false none Labels to assign to the workload that matches the namespace

oneOf

Name Type Required Restrictions Description
»» anonymous object false none none
»»» key string true* none The label key
»»» assignment object true* none The label href to set
»»»» href string true* none Label URI
»»»» value string false none Label Name

xor

Name Type Required Restrictions Description
»»» anonymous object false none none
»»»» key string true* none The label key
»»»» restriction [object] true* none The list of allowed label hrefs
»»»»» href string true* none Label URI
»»»»» value string false none Label Name

continued

Name Type Required Restrictions Description
»»»» enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
»»»» managed boolean false none If the namespace is managed or not
»»»» linked boolean false none True if the namespace exists in the cluster and is reported by kubelink
»»»» created_at string(date-time) false none Time stamp when this profile was created
»»»» created_by object false none none
»»»»» href string true* none User who originally created this profile
»»»» updated_by object false none none
»»»»» href string true* none User who last updated this profile
»»»» updated_at string(date-time) false none Time stamp when this profile was updated
»»» container_cluster object false none none
»»»» href string false none URI of container cluster
»»»» name string false none User assigned name of the cluster
»»»» description string false none User assigned description of the cluster
»»»» nodes [object] false none none
»»»»» pod_subnet string false none Pod Subnet
»»»» container_runtime string false none The Container Runtime used in this cluster
»»»» manager_type string false none Manager for this cluster (and version)
»»»» last_connected string(date-time) false none none
»»»» online boolean false none none
»»»» errors [object] false none none
»»»»» audit_event object false none none
»»»»»» href string false none none
»»»»» duplicate_ids array false none none
»»»»» error_type string true* none none
»»»» kubelink_version string false none Kubelink software version string
»»»» pce_fqdn string false none PCE FQDN for this container cluster. Used in Supercluster only
»»»» cluster_mode string false none Cluster mode of Container Cluster
»»»» datacenter_nat_1to1 boolean false none Datacenter NAT 1to1 mode ON. Used for enforcing creation of pseudo public interfaces on nodes
»»» security_policy_applied_at string,null(date-time) false none Last reported time when policy was processed by CLAS to the k8s workload (UTC)
»»» security_policy_sync_state string false none Current state of security policy
»»» created_at string(date-time) false none RFC 3339 timestamp at which this record was created
»»» updated_at string(date-time) false none RFC 3339 timestamp at which this record was updated
»»» metadata object false none k8s object metadata
»»»» labels object false none k8s key/value pairs attached to object that specify identifying attributes
»»»» annotations object false none k8s key/value pairs representing arbitrary non-identifying metadata of object
»»»» external_service_uid string false none k8s object uid of external traffic service (NodePort or LoadBalancer)
»»» private_ip_addresses [vulnerability_reports_put/properties/scanned_ips/items] false none Kubernetes Workload's private Pod IP addresses
»»» container_cluster_service object false none none
»»»» href string true* none URI of the virtual service
»»»» created_at string(date-time) true* none Timestamp when this virtual service was first created
»»»» updated_at string(date-time) true* none Timestamp when this virtual service was last updated
»»»» deleted_at string,null(date-time) true* none Timestamp when this virtual service was deleted
»»»» created_by sec_policy_virtual_services_get/properties/created_by false none User who originally created this virtual service
»»»» updated_by sec_policy_virtual_services_get/properties/created_by false none User who last updated this virtual service
»»»» deleted_by sec_policy_virtual_services_get/properties/created_by false none User who deleted this virtual service
»»»» update_type sec_policy_virtual_services_get/properties/update_type false none Update type for the virtual service
»»»» name string true* none Name
»»»» description string,null true* none Description
»»»» pce_fqdn string,null false none PCE FQDN for this container cluster. Used in Supercluster only
»»»» external_data_set string,null false none External data set identifier
»»»» external_data_reference string,null false none External data reference identifier
»»»» labels [sec_policy_virtual_services_get/properties/labels/items] true* none Virtual service labels
»»»» service_ports sec_policy_virtual_services_get/properties/service_ports false none Service ports
»»»» service object false none URI of associated service
»»»» apply_to string false none Firewall rule target for workloads bound to this virtual service: host_only or internal_bridge_network
»»»» ip_overrides [string] false none Array of IPs or CIDRs as IP overrides
»»»» service_addresses sec_policy_virtual_services_get/properties/service_addresses false none none

oneOf

Name Type Required Restrictions Description
»»»» anonymous object false none none

xor

Name Type Required Restrictions Description
»»»» anonymous object false none none

software_ven_releases_images_get

[
  {
    "release": "string",
    "distribution": "string",
    "architecture": "string",
    "major_version": 0,
    "min_minor_version": 0,
    "max_minor_version": null,
    "filename": "string",
    "href": "string",
    "ven_types": [
      "server"
    ]
  }
]

Properties

Name Type Required Restrictions Description
release string true* none The OS release
distribution string true* none The OS distribution
architecture string true* none The OS architecture
major_version integer true* none The OS major version
min_minor_version integer true* none The OS minimum minor version
max_minor_version integer,null false none The OS maximum minor version
filename string true* none The image filename for this OS distribution
href string true* none The URI to download the image file
ven_types [string] false none Supported ven types in this release

software_ven_releases_get

{
  "release": "string",
  "href": "string",
  "default": true,
  "default_release_ven_types": [
    "string"
  ],
  "org_id": 0,
  "ven_types": [
    "server"
  ],
  "images": [
    {
      "release": "string",
      "distribution": "string",
      "architecture": "string",
      "major_version": 0,
      "min_minor_version": 0,
      "max_minor_version": null,
      "filename": "string",
      "href": "string",
      "ven_types": [
        "server"
      ]
    }
  ]
}

List of VEN bundles in the PCE repo

Properties

Name Type Required Restrictions Description
release string true* none The release version
href string true* none URI associated to this release
default boolean true* none Flag to indicate if this is the default release for this Org
default_release_ven_types [string] false none none
org_id integer true* none ID of the Org
ven_types software_ven_releases_images_get/items/properties/ven_types false none Supported ven types in this release
images [object] false none none
» release string true* none The OS release
» distribution string true* none The OS distribution
» architecture string true* none The OS architecture
» major_version integer true* none The OS major version
» min_minor_version integer true* none The OS minimum minor version
» max_minor_version integer,null false none The OS maximum minor version
» filename string true* none The image filename for this OS distribution
» href string true* none The URI to download the image file
» ven_types software_ven_releases_images_get/items/properties/ven_types false none Supported ven types in this release

software_ven_releases_default_put

{
  "release": "string"
}

Properties

Name Type Required Restrictions Description
release string true* none The software release to set as the default for this org.

software_ven_releases_defaults_put

[
  {
    "href": "string",
    "ven_type": "server"
  }
]

Properties

Name Type Required Restrictions Description
href string true* none URI associated to this release
ven_type string true* none The type of the release marked as default

Enumerated Values

Property Value
ven_type server
ven_type endpoint

agents_get

{
  "name": null,
  "description": null,
  "online": null,
  "mode": null,
  "uid": "string",
  "last_heartbeat_on": null,
  "uptime_seconds": null,
  "hostname": "string",
  "agent_version": null,
  "public_ip": null,
  "ip_tables_saved": null,
  "os_id": null,
  "os_detail": null,
  "log_traffic": null,
  "target_pce_fqdn": null,
  "active_pce_fqdn": null,
  "labels": null,
  "visibility_level": null,
  "ven": {
    "href": "string"
  }
}

DEPRECATED AND REPLACED (USE /orgs/:xorg_id/vens/:ven_uuid INSTEAD)

Properties

Name Type Required Restrictions Description
name string,null true* none The short friendly name of the agent
description string,null false none The long description of the agent
online boolean,null true* none If this agent is online
mode any true* none none

oneOf

Name Type Required Restrictions Description
» anonymous null false none none

xor

Name Type Required Restrictions Description
» anonymous pairing_profiles_get/properties/mode false none DEPRECATED AND REPLACED (Use enforcement_mode instead)

continued

Name Type Required Restrictions Description
uid string true* none The unique ID reported by the server
last_heartbeat_on string,null(date-time) true* none The last time (rfc3339 timestamp) a heartbeat was received from this agent
uptime_seconds integer,null true* none How long since the last reboot of this server. Recorded in DB at the time of the last heartbeat
hostname string true* none The hostname reported from the host itself
agent_version string,null false none Agent software version string
public_ip string,null true* none The public IP address of the server
ip_tables_saved boolean,null false none The agent was able to save IP tables
os_id string,null false none Our OS identifier
os_detail string,null false none Additional OS details - just displayed to end user
log_traffic boolean,null true* none True if we want to log traffic events from this agent
target_pce_fqdn string,null false none The FQDN of the PCE the agent will use for future connections
active_pce_fqdn string,null false none The FQDN of the PCE that received the agent's last heartbeat
labels any false none none

oneOf

Name Type Required Restrictions Description
» anonymous null false none none

xor

Name Type Required Restrictions Description
» anonymous workloads_post/properties/labels false none Assigned labels

continued

Name Type Required Restrictions Description
visibility_level any true* none none

oneOf

Name Type Required Restrictions Description
» anonymous null false none none

xor

Name Type Required Restrictions Description
» anonymous string false none Visibility level of the agent

continued

Name Type Required Restrictions Description
ven sec_policy_virtual_servers_get/properties/created_by false none none

agents_update_put

{
  "target_pce_fqdn": "string"
}

target cluster for a VEN move

Properties

Name Type Required Restrictions Description
target_pce_fqdn string false none cluster FQDN for target PCE

vulnerabilities_get

[
  {
    "href": "string",
    "score": 0,
    "cve_ids": [
      "string"
    ],
    "description": "string",
    "name": "string",
    "created_at": "2025-04-01T00:21:27Z",
    "updated_at": "2025-04-01T00:21:27Z",
    "created_by": {
      "href": "string"
    },
    "updated_by": {
      "href": "string"
    }
  }
]

Properties

Name Type Required Restrictions Description
href string true* none The href of the vulnerability
score integer true* none The normalized score of the vulnerability within the range of 0 to 100. CVSS Score can be used here with a 10x multiplier.
cve_ids [string] false none The cve_ids for the vulnerability
description string false none An arbitrary field to store some details of the vulnerability class
name string true* none The title/name of the vulnerability
created_at string(date-time) false none The time (rfc3339 timestamp) at which this report was created
updated_at string(date-time) false none The time (rfc3339 timestamp) at which this report was last updated
created_by object false none none
» href string true* none The URI of the user who created this report
updated_by object false none none
» href string true* none The URI of the user who last updated this report

vulnerabilities_post

[
  {
    "reference_id": "string",
    "score": 0,
    "cve_ids": [
      "string"
    ],
    "description": "string",
    "name": "string"
  }
]

Properties

Name Type Required Restrictions Description
reference_id string true* none The reference id of the vulnerability
score integer true* none The normalized score of the vulnerability within the range of 0 to 100. CVSS Score can be used here with a 10x multiplier.
cve_ids [string] false none The cve_ids for the vulnerability
description string false none An arbitrary field to store some details of the vulnerability class
name string true* none The title/name of the vulnerability

vulnerabilities_put

{
  "score": 0,
  "cve_ids": [
    "string"
  ],
  "description": "string",
  "name": "string"
}

Vulnerability

Properties

Name Type Required Restrictions Description
score integer true* none The normalized score of the vulnerability within the range of 0 to 100. CVSS Score can be used here with a 10x multiplier.
cve_ids [string] false none The cve_ids for the vulnerability
description string false none An arbitrary field to store some details of the vulnerability class
name string true* none The title/name of the vulnerability

vulnerability_reports_get

{
  "href": "string",
  "name": "string",
  "report_type": "string",
  "num_vulnerabilities": 0,
  "authoritative": true,
  "scanned_ips": [
    "string"
  ],
  "exported_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  }
}

Vulnerability report

Properties

Name Type Required Restrictions Description
href string true* none The resource(URI) representation of the vulnerability report
name string true* none User generated name of the vulnerability report
report_type string true* none A string representing the type of the report
num_vulnerabilities integer true* none Number of vulnerabilities that belong to this report
authoritative boolean false none Boolean value specifies whether a report is authoritative (or) not
scanned_ips [string] false none The ips on which the scan was performed
exported_at string(date-time) false none The timestamp (rfc3339 timestamp) at which this report was exported
created_at string(date-time) true* none The time (rfc3339 timestamp) at which this report was created
updated_at string(date-time) true* none The time (rfc3339 timestamp) at which this report was last updated
created_by object true* none none
» href string true* none The URI of the user who created this report
updated_by object true* none none
» href string true* none The URI of the user who last updated this report

vulnerability_reports_put

{
  "name": "string",
  "report_type": "string",
  "authoritative": true,
  "scanned_ips": [
    "2001:0db8:85a3:0000:0000:8a2e:0370:7334"
  ],
  "detected_vulnerabilities": [
    {
      "ip_address": "2001:0db8:85a3:0000:0000:8a2e:0370:7334",
      "port": 0,
      "proto": 0,
      "workload": {
        "href": "string"
      },
      "vulnerability": {
        "href": "string"
      },
      "external_data_reference": "string",
      "state": "active"
    }
  ],
  "exported_at": "2025-04-01T00:21:27Z"
}

Properties

Name Type Required Restrictions Description
name string true* none User generated name of the vulnerability report
report_type string true* none A string representing the type of the report
authoritative boolean false none Boolean value specifies whether a report is authoritative (or) not
scanned_ips [oneOf] false none The ips on which the scan was performed

oneOf

Name Type Required Restrictions Description
» anonymous number false none none

xor

Name Type Required Restrictions Description
» anonymous number false none none

continued

Name Type Required Restrictions Description
detected_vulnerabilities [object] false none none
» ip_address vulnerability_reports_put/properties/scanned_ips/items true* none The ip address of the host where the vulnerability is found
» port integer false none The port which is associated with the vulnerability
» proto integer false none The protocol which is associated with the vulnerability
» workload object true* none none
»» href string true* none The URI of the workload to which this vulnerability belongs
» vulnerability object true* none none
»» href string true* none The URI of the vulnerability class to which this vulnerability belongs
» external_data_reference string false none external data reference json string for vulnerability
» state string false none detected vulnerability state
exported_at string(date-time) false none The timestamp (rfc3339 timestamp) at which this report was exported

Enumerated Values

Property Value
state active
state fixed

reports_risk_summary_ransomware_timeseries_statistics_post

[
  {
    "property": "num_managed_workloads",
    "resolution": "day",
    "max_results": 5
  }
]

Properties

Name Type Required Restrictions Description
property string true* none The property for which time series data is requested.
resolution string false none The granularity for the time series data. E.g. day, week, month, quarter
max_results integer false none none

Enumerated Values

Property Value
property num_managed_workloads
property ransomware_protection_coverage_percent
property num_workloads_by_exposure
resolution day
resolution week
resolution month
resolution quarter

reports_risk_summary_get

{
  "ransomware": null
}

Risk Summary for this org

Properties

Name Type Required Restrictions Description
ransomware object,null true* none none
» num_total_workloads integer true* none Total workload count
» num_protected_workloads integer true* none Count of protected workloads
» ransomware_protection_coverage_percent number false none Ransomware protection coverage percentage
» workloads_by_exposure object true* none none
»» critical integer false none Number of workloads that have 1 or more critically risky services as its highest risk
»» high integer false none Number of workloads that have 1 or more high risk services as its highest risk
»» medium integer false none Number of workloads that have 1 or more medium risk services as its highest risk
»» low integer false none Number of workloads that have 1 or more low risk services as its highest risk
»» fully_protected integer false none Number of workloads that have no risky services and are fully protected
» risky_ports_by_severity object true* none Risky ports by Severity
»» critical object false none none
»»» num_protected_ports integer true* none Number of protected ports for this risk level, across all protection ready workloads
»»» num_unprotected_ports integer true* none Number of unprotected ports for this risk level, across all protection ready workloads
»» high reports_risk_summary_get/properties/ransomware/properties/risky_ports_by_severity/properties/critical false none none
»» medium reports_risk_summary_get/properties/ransomware/properties/risky_ports_by_severity/properties/critical false none none
»» low reports_risk_summary_get/properties/ransomware/properties/risky_ports_by_severity/properties/critical false none none
» risky_ports_by_category object true* none Risky ports by category type
»» admin reports_risk_summary_get/properties/ransomware/properties/risky_ports_by_severity/properties/critical false none none
»» legacy reports_risk_summary_get/properties/ransomware/properties/risky_ports_by_severity/properties/critical false none none
» top_risky_applications [object] true* none Top risky app groups in the organization by ransomware protection percent
»» app_group object true* none none
»»» href string false none URI of the app group
»» labels [object] true* none Assigned labels summary
»»» href string true* none Label URI
»»» key string false none Key in key-value pair
»»» value string false none Value in key-value pair
»» num_workloads integer true* none Total Number of workloads in this app group
»» ransomware_protection_percent number true* none Ransomware protection percentage for this app group in the org
» top_risky_services [object] true* none Top risky ransomware services in the organization by ransomware protection percent
»» href string true* none href of the service
»» name string true* none Name of the service
»» ransomware_protection_percent number true* none Ransomware protection percentage for this service in the org
» num_risky_services integer true* none Total number of risky services in the organization
» num_unenforced_workloads integer true* none The number of unenforced workloads (idle/visibility) in the organization
» last_updated_at string(date-time) true* none The time at which the protection stats are last computed at

app_groups_risk_summary_get

[
  {
    "app_group": {
      "href": "string"
    },
    "labels": [
      {
        "href": "string"
      }
    ],
    "risk_summary": {
      "ransomware": null
    }
  }
]

Risk Summary for each app group

Properties

Name Type Required Restrictions Description
app_group object true* none none
» href string false none URI of the app group
labels workloads_post/properties/labels true* none Assigned labels
risk_summary object true* none Risk Summary for this app group
» ransomware object,null true* none Ransomware risk summary for this app group
»» workload_exposure_severity workloads_get/properties/risk_summary/properties/ransomware/properties/workload_exposure_severity true* none Exposed ransomware severity for workload
»» ransomware_protection_percent number true* none Ransomware protection percentage for this app-group
»» last_updated_at string(date-time) true* none The time at which the ransomware stats are last computed at

app_groups_risk_details_get

{
  "risk_details": {}
}

Risk Details for this app group

Properties

Name Type Required Restrictions Description
risk_details object false none none

workloads_interfaces_post

{
  "name": "string",
  "link_state": "up",
  "address": "string",
  "cidr_block": 0,
  "default_gateway_address": "string",
  "friendly_name": "string"
}

Properties

Name Type Required Restrictions Description
name string true* none Interface name
link_state string true* none Link State
address vulnerability_reports_put/properties/scanned_ips/items false none none
cidr_block integer false none The number of bits in the subnet /24 is 255.255.255.0
default_gateway_address vulnerability_reports_put/properties/scanned_ips/items false none none
friendly_name string false none User-friendly name for interface

Enumerated Values

Property Value
link_state up
link_state down
link_state unknown

workloads_interfaces_get

{
  "name": "string",
  "link_state": null,
  "address": "string",
  "cidr_block": null,
  "default_gateway_address": null,
  "network": {
    "href": "string",
    "name": null
  },
  "network_detection_mode": null,
  "friendly_name": null,
  "href": "string"
}

Workload network interfaces

Properties

Name Type Required Restrictions Description
name string true* none Interface name
link_state string,null true* none Link State
address string true* none The IP Address to assign to this interface
cidr_block integer,null true* none The number of bits in the subnet /24 is 255.255.255.0
default_gateway_address string,null true* none The IP Address of the default gateway
network object,null true* none Network that the interface belongs to

anyOf

Name Type Required Restrictions Description
» anonymous object false none Network object used in workloads and workload interfaces
»» href string true* none URI of the network
»» name string,null false none Name of the network.

or

Name Type Required Restrictions Description
» anonymous null false none none

continued

Name Type Required Restrictions Description
network_detection_mode string,null true* none Network Detection Mode
friendly_name string,null true* none User-friendly name for interface
href string false none DEPRECATED WITH NO REPLACEMENT

label_mapping_rules_run_post

{
  "workloads": [
    {
      "href": "string"
    }
  ],
  "rules": [
    {
      "href": "string"
    }
  ],
  "assign_labels": true
}

Properties

Name Type Required Restrictions Description
workloads [sec_policy_virtual_servers_get/properties/created_by] false none HREFs of the workloads to which the rules need to be applied
rules [sec_policy_virtual_servers_get/properties/created_by] false none HREFs of the label_mapping_rules which need to be applied
assign_labels boolean false none Determines whether the labels should be assigned automatically as a part of the run

label_mapping_rules_run_get

{
  "href": "http://example.com",
  "result": "http://example.com",
  "status": "string",
  "progress_percent": 0,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "http://example.com"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "label_mapping_params": {
    "workloads": [
      {
        "href": "string"
      }
    ],
    "rules": [
      {
        "href": "string"
      }
    ],
    "assign_labels": true
  }
}

Properties

Name Type Required Restrictions Description
href string(uri) false none Job URI
result string(uri) false none Result download URI. Available only if the job status is completed
status string false none Current job status
progress_percent integer false none Progress Percentage of the job
created_at string(date-time) false none Timestamp in UTC when this job was created
created_by object false none none
» href string(uri) true* none User who created this run
updated_at string(date-time) false none Timestamp in UTC when this job was updated
label_mapping_params object false none none
» workloads [sec_policy_virtual_servers_get/properties/created_by] false none HREFs of the workloads to which the rules need to be applied
» rules [sec_policy_virtual_servers_get/properties/created_by] false none HREFs of the label_mapping_rules which need to be applied
» assign_labels boolean false none Determines whether the labels should be assigned automatically as a part of the run

label_mapping_rules_run_download_get

{
  "results": [
    {
      "href": "string",
      "hostname": null,
      "existing_labels": [
        {
          "href": "string",
          "key": "string",
          "value": "string"
        }
      ],
      "labels_to_assign": [
        {
          "href": "string",
          "key": "string",
          "value": "string",
          "label_mapping_rule": {
            "href": "string"
          }
        }
      ]
    }
  ]
}

Properties

Name Type Required Restrictions Description
results [object] false none none
» href string true* none URI of the workload
» hostname null,string false none Hostname of the workload
» existing_labels [object] true* none List of existing labels for the workload
»» href string false none URI of the label
»» key string false none key for the label
»» value string false none value for the label
» labels_to_assign [object] true* none List of labels to assign for the workload
»» href string false none URI of the label
»» key string false none key for the label
»» value string false none value for the label
»» label_mapping_rule object false none Defines which label mapping rule caused this label assignment
»»» href string false none HREF of the label mapping rule

label_mapping_rules_run_assign_labels_put

null

dummy schema file to assign labels when user clicks on Confirm. This applies the labels from review stage

Properties

None

label_mapping_rules_get

{
  "href": "string",
  "enabled": true,
  "expression": {
    "property": "hostname",
    "operator": "starts_with",
    "values": [
      "string"
    ]
  },
  "label_assignments": [
    {
      "label": {
        "key": "string",
        "value": "string"
      }
    }
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": null,
  "updated_by": null
}

Properties

Name Type Required Restrictions Description
href string false none URI for this label mapping rule
enabled boolean false none Enabled flag
expression object false none none

anyOf

Name Type Required Restrictions Description
» anonymous object false none none
»» property string true* none The workload property to compare. (hostname, ip_address etc.)
»» operator string true* none operator for the condition (starts_with, contains, equals, ends_with, is_in)
»» values [anyOf] true* none Value to use in comparison

anyOf

Name Type Required Restrictions Description
»»» anonymous string false none none

or

Name Type Required Restrictions Description
»»» anonymous object false none none
»»»» port integer false none Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't include this.
»»»» proto integer false none protocol number

or

Name Type Required Restrictions Description
»»» anonymous object false none none
»»»» logical_operator string true* none logical operator for the child expressions
»»»» child_expressions [anyOf] true* none none

anyOf

Name Type Required Restrictions Description
»»»»» anonymous object false none none
»»»»»» property string true* none The workload property to compare. (hostname, ip_address etc.)
»»»»»» operator string true* none operator for the condition (starts_with, contains, equals, ends_with, is_in)
»»»»»» values [anyOf] true* none Value to use in comparison

anyOf

Name Type Required Restrictions Description
»»»»»»» anonymous string false none none

or

Name Type Required Restrictions Description
»»»»»»» anonymous object false none none
»»»»»»»» port integer false none Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't include this.
»»»»»»»» proto integer false none protocol number

or

Name Type Required Restrictions Description
»»»»»»» anonymous object false none none
»»»»»»»» logical_operator string true* none logical operator for the child expressions
»»»»»»»» child_expressions [label_mapping_rules_get/properties/expression/anyOf/1/properties/child_expressions/items] true* none none

continued

Name Type Required Restrictions Description
»»»»»»» label_assignments [anyOf] false none List of label assignments for a rule

anyOf

Name Type Required Restrictions Description
»»»»»»»» anonymous object false none none
»»»»»»»»» label object true* none none
»»»»»»»»»» key string false none none
»»»»»»»»»» value string false none none

or

Name Type Required Restrictions Description
»»»»»»»»» anonymous object false none none
»»»»»»»»»» label object true* none none
»»»»»»»»»»» href string false none HREF of the pre-existing label

continued

Name Type Required Restrictions Description
»»»»»»»»»» created_at string(date-time) false none Timestamp when this rule was created in UTC timezone in RFC3389 format
»»»»»»»»»» updated_at string(date-time) false none Timestamp when this rule was updated in UTC timezone in RFC3389 format
»»»»»»»»»» created_by object,null false none none
»»»»»»»»»»» href string true* none User who originally created this rule
»»»»»»»»»» updated_by object,null false none none
»»»»»»»»»»» href string true* none User who last updated this rule

Enumerated Values

Property Value
property hostname
property ip_address
property os
property process
property port
operator starts_with
operator ends_with
operator contains
operator equals
operator is_in
logical_operator and
logical_operator or
logical_operator not
property hostname
property ip_address
property os
property process
property port
operator starts_with
operator ends_with
operator contains
operator equals
operator is_in
logical_operator and
logical_operator or
logical_operator not

label_mapping_rules_post

{
  "expression": {
    "property": "hostname",
    "operator": "starts_with",
    "values": [
      "string"
    ]
  },
  "label_assignments": [
    {
      "label": {
        "key": "string",
        "value": "string"
      }
    }
  ]
}

Properties

Name Type Required Restrictions Description
expression label_mapping_rules_get/properties/expression true* none none
label_assignments label_mapping_rules_get/properties/label_assignments true* none List of label assignments for a rule

label_mapping_rules_delete_put

{
  "rules": [
    {
      "href": "string"
    }
  ]
}

Properties

Name Type Required Restrictions Description
rules [object] true* none Rules to delete
» href string true* none URI of label mapping rule to delete

label_mapping_rules_update_put

[
  {
    "href": "string",
    "enabled": true,
    "expression": {
      "property": "hostname",
      "operator": "starts_with",
      "values": [
        "string"
      ]
    },
    "label_assignments": [
      {
        "label": {
          "key": "string",
          "value": "string"
        }
      }
    ]
  }
]

Properties

Name Type Required Restrictions Description
href string true* none href of the rule; required for bulk updates
enabled boolean false none Enabled flag
expression label_mapping_rules_get/properties/expression false none none
label_assignments label_mapping_rules_get/properties/label_assignments false none List of label assignments for a rule

label_mapping_rules_put

{
  "enabled": true,
  "expression": {
    "property": "hostname",
    "operator": "starts_with",
    "values": [
      "string"
    ]
  },
  "label_assignments": [
    {
      "label": {
        "key": "string",
        "value": "string"
      }
    }
  ]
}

Properties

Name Type Required Restrictions Description
enabled boolean false none Enabled flag
expression label_mapping_rules_get/properties/expression false none none
label_assignments label_mapping_rules_get/properties/label_assignments false none List of label assignments for a rule

label_mapping_rules_reorder_put

{
  "position": 0
}

Properties

Name Type Required Restrictions Description
position integer true* none Index of the new position for this rule

service_bindings_get

[
  {}
]

Properties

Name Type Required Restrictions Description
bound_service object true* none Bound service href
» href string false none none
workload object false none Workload href
» href string false none none
port_overrides [object] false none none
» port integer false none Port Number in the original service which to override (integer 0-65535). Starting port when specifying a range.
» proto integer false none Transport protocol in the original service which to override
» new_port integer true* none Overriding port number (or starting point when specifying a range)
» new_to_port integer false none Overriding port range ending port
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier

oneOf

Name Type Required Restrictions Description
anonymous object false none none

xor

Name Type Required Restrictions Description
anonymous object false none none

Enumerated Values

Property Value
proto 6
proto 17

service_bindings_post

[
  {}
]

Properties

Name Type Required Restrictions Description
virtual_service object true* none Virtual service href
» href string false none none
workload object false none Workload href
» href string false none none
port_overrides [service_bindings_get/items/properties/port_overrides/items] false none none
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier

oneOf

Name Type Required Restrictions Description
anonymous object false none none

xor

Name Type Required Restrictions Description
anonymous object false none none

sec_policy_rule_sets_sec_rules_get

{
  "href": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": null,
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": null,
  "enabled": true,
  "description": null,
  "external_data_set": null,
  "external_data_reference": null,
  "ingress_services": [
    {
      "href": "string"
    }
  ],
  "resolve_labels_as": {
    "providers": [
      "workloads"
    ],
    "consumers": [
      "workloads"
    ]
  },
  "sec_connect": true,
  "stateless": true,
  "machine_auth": true,
  "providers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string",
        "key": "string",
        "value": "string"
      },
      "label_group": {
        "href": "string",
        "key": "string",
        "name": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string",
        "name": null
      },
      "virtual_server": {
        "href": "string"
      },
      "ip_list": {
        "href": "string",
        "created_at": "2025-04-01T00:21:27Z",
        "updated_at": "2025-04-01T00:21:27Z",
        "deleted_at": null,
        "created_by": {
          "href": "string"
        },
        "updated_by": {
          "href": "string"
        },
        "deleted_by": null,
        "update_type": "create",
        "name": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string",
        "key": "string",
        "value": "string"
      },
      "label_group": {
        "href": "string",
        "key": "string",
        "name": "string"
      },
      "workload": {
        "href": "string",
        "name": null,
        "hostname": null,
        "deleted": null
      },
      "virtual_service": {
        "href": "string"
      },
      "ip_list": {
        "href": "string",
        "created_at": "2025-04-01T00:21:27Z",
        "updated_at": "2025-04-01T00:21:27Z",
        "deleted_at": null,
        "created_by": {
          "href": "string"
        },
        "updated_by": {
          "href": "string"
        },
        "deleted_by": null,
        "update_type": "create",
        "name": "string"
      }
    }
  ],
  "consuming_security_principals": [
    {
      "href": "string",
      "sid": "string",
      "name": "string",
      "description": "string",
      "deleted": true,
      "used_by_ruleset": true
    }
  ],
  "unscoped_consumers": true,
  "update_type": "create",
  "network_type": "brn",
  "use_workload_subnets": [
    "providers"
  ]
}

Properties

Name Type Required Restrictions Description
href string false none URI of object
created_at string(date-time) false none Timestamp when this rule set was first created
updated_at string(date-time) false none Timestamp when this rule set was last updated
deleted_at string,null(date-time) false none Timestamp when this rule set was deleted
created_by object false none none
» href string true* none User who originally created this rule set
updated_by object false none none
» href string true* none User who last updated this rule set
deleted_by object,null false none none
» href string true* none User who deleted this rule set
enabled boolean true* none Enabled flag
description string,null false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services true* none Array of service URI and port/protocol combinations
resolve_labels_as sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as true* none none
sec_connect boolean false none Whether a secure connection is established
stateless boolean false none Whether packet filtering is stateless for the rule
machine_auth boolean false none Whether machine authentication is enabled
providers [object] true* none Providers
» actors string false none Rule actors are all workloads ('ams')
» label_dimension string false none Rule actors that are all workloads with a specific label dimension
» exclusion boolean false none Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
» label sec_policy_virtual_services_get/properties/labels/items false none none
» label_group object false none none
»» href string true* none Label Group URI
»» key string false none Key in key-value pair
»» name string false none Name of label group
» workload object false none none
»» href string true* none Workload URI
» virtual_service object false none none
»» href string true* none Virtual service URI
»» name string,null false none Name of virtual service
» virtual_server object false none none
»» href string true* none Virtual server URI
» ip_list object false none IP List
»» href string true* none IP List URI
»» created_at string(date-time) false none Timestamp when this rule set was first created
»» updated_at string(date-time) false none Timestamp when this rule set was last updated
»» deleted_at string,null(date-time) false none Timestamp when this rule set was deleted
»» created_by object false none none
»»» href string true* none User who originally created this rule set
»» updated_by object false none none
»»» href string true* none User who last updated this rule set
»» deleted_by object,null false none none
»»» href string true* none User who deleted this rule set
»» update_type sec_policy_virtual_services_get/properties/update_type false none Versioned policy object update type
»» name string false none Name (must be unique)
» consumers [object] true* none Consumers
»» actors string false none Rule actors are all workloads or container host
»» label_dimension string false none Rule actors that are all workloads with a specific label dimension
»» exclusion boolean false none Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»» label sec_policy_virtual_services_get/properties/labels/items false none none
»» label_group sec_policy_rule_sets_sec_rules_get/properties/providers/items/properties/label_group false none none
»» workload object false none none
»»» href string true* none Workload URI
»»» name string,null false none Interface name
»»» hostname string,null false none The hostname of this workload
»»» deleted boolean,null false none This workload has been deleted
»» virtual_service object false none none
»»» href string true* none Virtual service URI
»» ip_list sec_policy_rule_sets_sec_rules_get/properties/providers/items/properties/ip_list false none IP List
» consuming_security_principals [object] false none Hrefs of consuming security principals
»» href string true* none URI of security principal
»» sid string false none Active Directory SID
»» name string false none Name of the security principal
»» description string false none A longer description of the security principal
»» deleted boolean false none Flag to indicate if security principal has been deleted
»» used_by_ruleset boolean false none Flag to indicate if this security principal is being used by a ruleset
» unscoped_consumers boolean false none Set the scope for rule consumers to All
» update_type sec_policy_virtual_services_get/properties/update_type false none Versioned policy object update type
» network_type sec_policy_rule_sets_put/properties/rules/items/properties/network_type false none Network types that this rule should apply to.
» use_workload_subnets sec_policy_rule_sets_put/properties/rules/items/properties/use_workload_subnets false none Whether to use workload subnets instead of IP addresses for the providers/consumers

Enumerated Values

Property Value
actors ams
label_dimension app
actors ams
actors container_host
label_dimension app

sec_policy_rule_sets_sec_rules_post

{
  "enabled": true,
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ingress_services": [
    {
      "href": "string"
    }
  ],
  "resolve_labels_as": {
    "providers": [
      "workloads"
    ],
    "consumers": [
      "workloads"
    ]
  },
  "sec_connect": true,
  "stateless": true,
  "machine_auth": true,
  "providers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "virtual_server": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consuming_security_principals": [
    {
      "href": "string"
    }
  ],
  "unscoped_consumers": true,
  "network_type": "brn",
  "use_workload_subnets": [
    "providers"
  ]
}

Properties

Name Type Required Restrictions Description
enabled boolean true* none Enabled flag
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services true* none Array of service URI and port/protocol combinations
resolve_labels_as sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as true* none none
sec_connect boolean false none Whether a secure connection is established
stateless boolean false none Whether packet filtering is stateless for the rule
machine_auth boolean false none Whether machine authentication is enabled
providers sec_policy_rule_sets_put/properties/rules/items/properties/providers true* none Providers
consumers sec_policy_rule_sets_put/properties/rules/items/properties/consumers true* none Consumers
consuming_security_principals sec_policy_rule_sets_put/properties/rules/items/properties/consuming_security_principals false none Hrefs of consuming security principals
unscoped_consumers boolean false none Set the scope for rule consumers to All
network_type sec_policy_rule_sets_put/properties/rules/items/properties/network_type false none Network types that this rule should apply to.
use_workload_subnets sec_policy_rule_sets_put/properties/rules/items/properties/use_workload_subnets false none Whether to use workload subnets instead of IP addresses for the providers/consumers

sec_policy_rule_sets_sec_rules_put

{
  "enabled": true,
  "description": "string",
  "external_data_set": null,
  "external_data_reference": null,
  "ingress_services": [
    {
      "href": "string"
    }
  ],
  "resolve_labels_as": {
    "providers": [
      "workloads"
    ],
    "consumers": [
      "workloads"
    ]
  },
  "sec_connect": true,
  "stateless": true,
  "machine_auth": true,
  "providers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "virtual_server": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "ams",
      "label_dimension": "app",
      "exclusion": false,
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consuming_security_principals": [
    {
      "href": "string"
    }
  ],
  "update_type": "create",
  "unscoped_consumers": true,
  "network_type": "brn",
  "use_workload_subnets": [
    "providers"
  ]
}

Properties

Name Type Required Restrictions Description
enabled boolean false none Enabled flag
description string false none Description
external_data_set string,null false none External data set identifier
external_data_reference string,null false none External data reference identifier
ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services false none Array of service URI and port/protocol combinations
resolve_labels_as sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as false none none
sec_connect boolean false none Whether a secure connection is established
stateless boolean false none Whether packet filtering is stateless for the rule
machine_auth boolean false none Whether machine authentication is enabled
providers sec_policy_rule_sets_put/properties/rules/items/properties/providers false none Providers
consumers sec_policy_rule_sets_put/properties/rules/items/properties/consumers false none Consumers
consuming_security_principals sec_policy_rule_sets_put/properties/rules/items/properties/consuming_security_principals false none Hrefs of consuming security principals
update_type string false none Type of update
unscoped_consumers boolean false none Set the scope for rule consumers to All
network_type sec_policy_rule_sets_put/properties/rules/items/properties/network_type false none Network types that this rule should apply to.
use_workload_subnets sec_policy_rule_sets_put/properties/rules/items/properties/use_workload_subnets false none Whether to use workload subnets instead of IP addresses for the providers/consumers

Enumerated Values

Property Value
update_type create
update_type update
update_type delete

sec_policy_firewall_settings_get

{
  "static_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "ike_authentication_type": "string",
  "firewall_coexistence": null,
  "allow_captive_portal_outbound": true,
  "containers_inherit_host_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "blocked_connection_reject_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "loopback_interfaces_in_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "ip_forwarding_enabled_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "rule_hit_count_enabled_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        }
      }
    ]
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "deleted_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "deleted_by": {
    "href": "string"
  },
  "update_type": "string"
}

Properties

Name Type Required Restrictions Description
static_policy_scopes sec_policy_rule_sets_get/properties/scopes false none Rule set scopes
ike_authentication_type string false none IKE authentication type to use for IPsec (SecureConnect and Machine Authentication)
firewall_coexistence array,null false none none
» scope workloads_post/properties/labels true* none Assigned labels
» workload_mode string false none Additional match criteria to select workload(s)
» illumio_primary boolean true* none Configure Illumio to be the primary firewall
allow_captive_portal_outbound boolean false none Defines whether or not to open the endpoint firewall to all outbound traffic when a captive portal scenario is discovered by the VEN
containers_inherit_host_policy_scopes sec_policy_rule_sets_get/properties/scopes false none Rule set scopes
blocked_connection_reject_scopes [array] false none Scopes whose blocked connection action will be reject
» exclusion boolean false none Boolean to specify whether or not the scope is an exclusion
» label sec_policy_virtual_services_get/properties/labels/items false none none
» label_group sec_policy_rule_sets_sec_rules_get/properties/providers/items/properties/label_group false none none
loopback_interfaces_in_policy_scopes [sec_policy_firewall_settings_get/properties/blocked_connection_reject_scopes/items] false none Workloads that match the scope will apply policy on loopback interfaces and the loopback interface's IPs will be distributed to peers.
ip_forwarding_enabled_scopes sec_policy_rule_sets_get/properties/scopes false none Rule set scopes
rule_hit_count_enabled_scopes sec_policy_rule_sets_get/properties/scopes false none Rule set scopes
created_at string(date-time) false none Time stamp when these firewall settings were first created
updated_at string(date-time) false none Time stamp when these firewall settings were last updated
deleted_at string(date-time) false none Time stamp when these firewall settings were deleted
created_by object false none none
» href string true* none User who originally created these firewall settings
updated_by object false none none
» href string true* none User who last updated these firewall settings
deleted_by object false none none
» href string true* none User who deleted these firewall settings
update_type string true* none Type of update

sec_policy_firewall_settings_put

{
  "update_type": "create",
  "static_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "ike_authentication_type": "psk",
  "firewall_coexistence": null,
  "allow_captive_portal_outbound": true,
  "containers_inherit_host_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "blocked_connection_reject_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "loopback_interfaces_in_policy_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "ip_forwarding_enabled_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ],
  "rule_hit_count_enabled_scopes": [
    [
      {
        "exclusion": false,
        "label": {
          "href": "string"
        },
        "label_group": {
          "href": "string"
        }
      }
    ]
  ]
}

Properties

Name Type Required Restrictions Description
update_type string false none Type of update
static_policy_scopes sec_policy_rule_sets_post/properties/scopes false none Rule set scopes
ike_authentication_type string false none IKE authentication type to use for IPsec (SecureConnect and Machine Authentication)
firewall_coexistence array,null false none none
» scope workloads_post/properties/labels true* none Assigned labels
» workload_mode string false none Additional match criteria to select workload(s)
» illumio_primary boolean true* none Configure Illumio to be the primary firewall
allow_captive_portal_outbound boolean false none Defines whether or not to open the endpoint firewall to all outbound traffic when a captive portal scenario is discovered by the VEN
containers_inherit_host_policy_scopes sec_policy_rule_sets_post/properties/scopes false none Rule set scopes
blocked_connection_reject_scopes [array] false none Scopes whose blocked connection action will be reject
» exclusion boolean false none Boolean to specify whether or not the scope is an exclusion
» label sec_policy_virtual_servers_get/properties/created_by false none none
» label_group sec_policy_virtual_servers_get/properties/created_by false none none
loopback_interfaces_in_policy_scopes [sec_policy_firewall_settings_put/properties/blocked_connection_reject_scopes/items] false none Workloads that match the scope will apply policy on loopback interfaces and the loopback interface's IPs will be distributed to peers.
ip_forwarding_enabled_scopes sec_policy_rule_sets_post/properties/scopes false none Rule set scopes
rule_hit_count_enabled_scopes sec_policy_rule_sets_post/properties/scopes false none Rule set scopes

Enumerated Values

Property Value
update_type create
update_type update
update_type delete
ike_authentication_type psk
ike_authentication_type certificate
workload_mode enforced
workload_mode illuminated

sec_policy_pending_get

{
  "rule_sets": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "string",
      "related_ip_lists": [
        {
          "href": "string"
        }
      ],
      "related_services": [
        {
          "href": "string"
        }
      ]
    }
  ],
  "firewall_settings": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "ip_lists": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "services": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "virtual_servers": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "label_groups": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "secure_connect_gateways": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "virtual_services": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ],
  "enforcement_boundaries": [
    {
      "name": "string",
      "href": "string",
      "updated_by": null,
      "updated_at": "2025-04-01T00:21:27Z",
      "update_type": "create",
      "caps": [
        "write"
      ]
    }
  ]
}

Properties

Name Type Required Restrictions Description
rule_sets [object] false none Array of modified rulesets in the current policy draft
» name string true* none Ruleset name
» href string false none URI of the Ruleset
» updated_by any true* none none
» updated_at string(date-time) true* none Time stamp when this resource was last updated
» update_type string true* none Type of update
» related_ip_lists [any] false none Related IP Lists
»» href string true* none URI of IP List
» related_services [any] false none Related Services
»» href string true* none URI of Service
» firewall_settings [object] false none Array of modified resources for a given type in the current policy draft
»» name string true* none Resource name
»» href string false none URI of the resource
»» updated_by any true* none none
»» updated_at string(date-time) true* none Time stamp when this resource was last updated
»» update_type string true* none Type of update
»» caps [string] false none Array of permissions for the entity for the current user - an empty array implies read only access
» ip_lists sec_policy_pending_get/properties/firewall_settings false none Array of modified resources for a given type in the current policy draft
» services sec_policy_pending_get/properties/firewall_settings false none Array of modified resources for a given type in the current policy draft
» virtual_servers sec_policy_pending_get/properties/firewall_settings false none Array of modified resources for a given type in the current policy draft
» label_groups sec_policy_pending_get/properties/firewall_settings false none Array of modified resources for a given type in the current policy draft
» secure_connect_gateways sec_policy_pending_get/properties/firewall_settings false none Array of modified resources for a given type in the current policy draft
» virtual_services sec_policy_pending_get/properties/firewall_settings false none Array of modified resources for a given type in the current policy draft
» enforcement_boundaries sec_policy_pending_get/properties/firewall_settings false none Array of modified resources for a given type in the current policy draft

Enumerated Values

Property Value
update_type create
update_type update
update_type delete

sec_policy_allow_get

[
  {
    "href": "string",
    "created_at": "2025-04-01T00:21:27Z",
    "updated_at": "2025-04-01T00:21:27Z",
    "deleted_at": null,
    "created_by": {
      "href": "string"
    },
    "updated_by": {
      "href": "string"
    },
    "deleted_by": null,
    "enabled": true,
    "description": null,
    "external_data_set": null,
    "external_data_reference": null,
    "ingress_services": [
      {
        "href": "string"
      }
    ],
    "resolve_labels_as": {
      "providers": [
        "workloads"
      ],
      "consumers": [
        "workloads"
      ]
    },
    "sec_connect": true,
    "stateless": true,
    "machine_auth": true,
    "providers": [
      {
        "actors": "ams",
        "label_dimension": "app",
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        },
        "workload": {
          "href": "string"
        },
        "virtual_service": {
          "href": "string",
          "name": null
        },
        "virtual_server": {
          "href": "string"
        },
        "ip_list": {
          "href": "string",
          "created_at": "2025-04-01T00:21:27Z",
          "updated_at": "2025-04-01T00:21:27Z",
          "deleted_at": null,
          "created_by": {
            "href": "string"
          },
          "updated_by": {
            "href": "string"
          },
          "deleted_by": null,
          "update_type": "create",
          "name": "string"
        }
      }
    ],
    "consumers": [
      {
        "actors": "ams",
        "label_dimension": "app",
        "exclusion": false,
        "label": {
          "href": "string",
          "key": "string",
          "value": "string"
        },
        "label_group": {
          "href": "string",
          "key": "string",
          "name": "string"
        },
        "workload": {
          "href": "string",
          "name": null,
          "hostname": null,
          "deleted": null
        },
        "virtual_service": {
          "href": "string"
        },
        "ip_list": {
          "href": "string",
          "created_at": "2025-04-01T00:21:27Z",
          "updated_at": "2025-04-01T00:21:27Z",
          "deleted_at": null,
          "created_by": {
            "href": "string"
          },
          "updated_by": {
            "href": "string"
          },
          "deleted_by": null,
          "update_type": "create",
          "name": "string"
        }
      }
    ],
    "consuming_security_principals": [
      {
        "href": "string",
        "sid": "string",
        "name": "string",
        "description": "string",
        "deleted": true,
        "used_by_ruleset": true
      }
    ],
    "unscoped_consumers": true,
    "update_type": "create",
    "network_type": "brn",
    "use_workload_subnets": [
      "providers"
    ]
  }
]

Properties

None

sec_policy_rule_search_post

{
  "enabled": true,
  "description": "string",
  "ingress_services": [
    {
      "href": "string"
    }
  ],
  "sec_connect": true,
  "machine_auth": true,
  "stateless": true,
  "providers": [
    {
      "actors": "string",
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "container_workload": {
        "href": "string"
      },
      "kubernetes_workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "virtual_server": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consumers": [
    {
      "actors": "string",
      "label": {
        "href": "string"
      },
      "label_group": {
        "href": "string"
      },
      "workload": {
        "href": "string"
      },
      "container_workload": {
        "href": "string"
      },
      "kubernetes_workload": {
        "href": "string"
      },
      "virtual_service": {
        "href": "string"
      },
      "ip_list": {
        "href": "string"
      }
    }
  ],
  "consuming_security_principals": [
    {
      "href": "string"
    }
  ],
  "unscoped_consumers": true,
  "update_type": "create",
  "resolve_actors": true,
  "rule_types": [
    "sec_rules"
  ]
}

Filters for Rule Search

Properties

Name Type Required Restrictions Description
enabled boolean false none Enabled flag of the Rule
description string false none Description of the Rule
ingress_services [oneOf] false none Services and ports used in the Rule

oneOf

Name Type Required Restrictions Description
» anonymous object false none none
»» href string true* none URI of the service

xor

Name Type Required Restrictions Description
» anonymous sec_policy_services_get/properties/windows_services/items false none none

continued

Name Type Required Restrictions Description
sec_connect boolean false none Whether a secure connection is established in the Rule
machine_auth boolean false none Whether machine authentication is enabled in the Rule
stateless boolean false none Whether stateless is enabled in the Rule
providers [object] false none Providers for Rule Search
» actors string false none Rule actors are all workloads ('ams')
» label object false none none
»» href string true* none Label URI
» label_group object false none none
»» href string true* none Label group URI
» workload object false none none
»» href string true* none Workload URI
» container_workload object false none none
»» href string true* none Container workload URI
» kubernetes_workload object false none none
»» href string true* none Kubernetes workload URI
» virtual_service object false none none
»» href string true* none Virtual service URI
» virtual_server object false none none
»» href string true* none Virtual server URI
» ip_list object false none URI of associated IP List
»» href string true* none IP List URI
» consumers [object] false none Providers for Rule Search
»» actors string false none Rule actors are all workloads ('ams')
»» label object false none none
»»» href string true* none Label URI
»» label_group object false none none
»»» href string true* none Label group URI
»» workload object false none none
»»» href string true* none Workload URI
»» container_workload object false none none
»»» href string true* none Container workload URI
»» kubernetes_workload object false none none
»»» href string true* none Kubernetes workload URI
»» virtual_service object false none none
»»» href string true* none Virtual service URI
»» ip_list object false none URI of associated IP List
»»» href string true* none IP List URI
»» consuming_security_principals sec_policy_rule_sets_put/properties/rules/items/properties/consuming_security_principals false none Hrefs of consuming security principals
»» unscoped_consumers boolean false none UB scope set to All in the Rule
»» update_type string false none Type of update for the Rule
»» resolve_actors boolean false none Resolve actors to do a deep Rule search
»» rule_types [string] false none List of rule types

Enumerated Values

Property Value
update_type create
update_type update
update_type delete

sec_policy_post

{
  "update_description": "string",
  "change_subset": {
    "label_groups": [
      {
        "href": "string"
      }
    ],
    "services": [
      {
        "href": "string"
      }
    ],
    "rule_sets": [
      {
        "href": "string"
      }
    ],
    "ip_lists": [
      {
        "href": "string"
      }
    ],
    "virtual_services": [
      {
        "href": "string"
      }
    ],
    "firewall_settings": [
      {
        "href": "string"
      }
    ],
    "secure_connect_gateways": [
      {
        "href": "string"
      }
    ],
    "virtual_servers": [
      {
        "href": "string"
      }
    ],
    "enforcement_boundaries": [
      {
        "href": "string"
      }
    ]
  }
}

Properties

Name Type Required Restrictions Description
update_description string false none Optional description for the requested change or update.
change_subset object false none Hash of pending hrefs, organized by model
» label_groups [sec_policy_virtual_servers_get/properties/created_by] false none none
» services [sec_policy_virtual_servers_get/properties/created_by] false none none
» rule_sets [sec_policy_virtual_servers_get/properties/created_by] false none none
» ip_lists [sec_policy_virtual_servers_get/properties/created_by] false none none
» virtual_services [sec_policy_virtual_servers_get/properties/created_by] false none none
» firewall_settings [sec_policy_virtual_servers_get/properties/created_by] false none none
» secure_connect_gateways [sec_policy_virtual_servers_get/properties/created_by] false none none
» virtual_servers [sec_policy_virtual_servers_get/properties/created_by] false none none
» enforcement_boundaries [sec_policy_virtual_servers_get/properties/created_by] false none none

sec_policy_get

{
  "href": "string",
  "version": 0,
  "workloads_affected": null,
  "commit_message": null,
  "object_counts": {
    "rule_sets": 0,
    "ip_lists": 0,
    "services": 0,
    "virtual_services": 0,
    "label_groups": 0,
    "virtual_servers": 0,
    "firewall_settings": 0,
    "secure_connect_gateways": 0,
    "enforcement_boundaries": 0
  },
  "created_at": "string",
  "created_by": {
    "href": "string"
  }
}

Properties

Name Type Required Restrictions Description
href string true* none URI of the policy
version integer true* none Policy version
workloads_affected integer,null true* none Number of workloads affected by the policy
commit_message string,null true* none Commit message for the policy
object_counts object false none Number of objects present in the given version of policy
» rule_sets integer false none none
» ip_lists integer false none none
» services integer false none none
» virtual_services integer false none none
» label_groups integer false none none
» virtual_servers integer false none none
» firewall_settings integer false none none
» secure_connect_gateways integer false none none
» enforcement_boundaries integer false none none
created_at string true* none Timestamp when this label was first created
created_by object false none none
» href string true* none User who originally created this label

sec_policy_delete_put

{
  "change_subset": {
    "label_groups": [
      {
        "href": "string"
      }
    ],
    "services": [
      {
        "href": "string"
      }
    ],
    "rule_sets": [
      {
        "href": "string"
      }
    ],
    "ip_lists": [
      {
        "href": "string"
      }
    ],
    "virtual_services": [
      {
        "href": "string"
      }
    ],
    "firewall_settings": [
      {
        "href": "string"
      }
    ],
    "secure_connect_gateways": [
      {
        "href": "string"
      }
    ],
    "virtual_servers": [
      {
        "href": "string"
      }
    ],
    "enforcement_boundaries": [
      {
        "href": "string"
      }
    ]
  }
}

Properties

Name Type Required Restrictions Description
change_subset sec_policy_post/properties/change_subset false none Hash of pending hrefs, organized by model

sec_policy_impact_post

{
  "change_subset": {
    "label_groups": [
      {
        "href": "string"
      }
    ],
    "services": [
      {
        "href": "string"
      }
    ],
    "rule_sets": [
      {
        "href": "string"
      }
    ],
    "ip_lists": [
      {
        "href": "string"
      }
    ],
    "virtual_services": [
      {
        "href": "string"
      }
    ],
    "firewall_settings": [
      {
        "href": "string"
      }
    ],
    "secure_connect_gateways": [
      {
        "href": "string"
      }
    ],
    "virtual_servers": [
      {
        "href": "string"
      }
    ],
    "enforcement_boundaries": [
      {
        "href": "string"
      }
    ]
  }
}

Properties

Name Type Required Restrictions Description
change_subset sec_policy_post/properties/change_subset false none Hash of pending hrefs, organized by model

sec_policy_dependencies_post

{
  "operation": "commit",
  "change_subset": {
    "label_groups": [
      {
        "href": "string"
      }
    ],
    "services": [
      {
        "href": "string"
      }
    ],
    "rule_sets": [
      {
        "href": "string"
      }
    ],
    "ip_lists": [
      {
        "href": "string"
      }
    ],
    "virtual_services": [
      {
        "href": "string"
      }
    ],
    "firewall_settings": [
      {
        "href": "string"
      }
    ],
    "secure_connect_gateways": [
      {
        "href": "string"
      }
    ],
    "virtual_servers": [
      {
        "href": "string"
      }
    ],
    "enforcement_boundaries": [
      {
        "href": "string"
      }
    ]
  }
}

Properties

Name Type Required Restrictions Description
operation string true* none Commit or revert
change_subset sec_policy_post/properties/change_subset true* none Hash of pending hrefs, organized by model

Enumerated Values

Property Value
operation commit
operation revert

sec_policy_restore_post

{}

Properties

None

sec_policy_policy_check_get

{
  "sec_rules": [
    {
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": {
        "username": "string"
      },
      "updated_by": {
        "username": "string"
      },
      "deleted_by": null,
      "update_type": null,
      "update_label": null,
      "href": "string",
      "enabled": true,
      "description": null,
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "egress_services": [
        {
          "href": "string"
        }
      ],
      "resolve_labels_as": {
        "providers": [
          "workloads"
        ],
        "consumers": [
          "workloads"
        ]
      },
      "sec_connect": true,
      "stateless": true,
      "machine_auth": true,
      "providers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string"
          },
          "virtual_service": {
            "href": "string",
            "name": null
          },
          "virtual_server": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "label_dimension": "app",
          "exclusion": false,
          "label": {
            "href": "string",
            "key": "string",
            "value": "string"
          },
          "label_group": {
            "href": "string",
            "key": "string",
            "name": "string"
          },
          "workload": {
            "href": "string",
            "name": null,
            "hostname": null,
            "deleted": null
          },
          "virtual_service": {
            "href": "string"
          },
          "ip_list": {
            "href": "string",
            "created_at": "2025-04-01T00:21:27Z",
            "updated_at": "2025-04-01T00:21:27Z",
            "deleted_at": null,
            "created_by": {
              "href": "string"
            },
            "updated_by": {
              "href": "string"
            },
            "deleted_by": null,
            "update_type": "create",
            "name": "string"
          }
        }
      ],
      "consuming_security_principals": [
        {
          "href": "string",
          "sid": "string",
          "name": "string",
          "description": "string",
          "deleted": true,
          "used_by_ruleset": true
        }
      ],
      "unscoped_consumers": true,
      "use_workload_subnets": [
        "providers"
      ],
      "rule_set": {
        "created_at": "2025-04-01T00:21:27Z",
        "updated_at": "2025-04-01T00:21:27Z",
        "deleted_at": null,
        "created_by": {
          "username": "string"
        },
        "updated_by": {
          "username": "string"
        },
        "deleted_by": null,
        "update_type": null,
        "update_label": null,
        "href": "string",
        "name": "string",
        "enabled": true,
        "external_data_set": null,
        "external_data_reference": null,
        "scopes": [
          [
            {
              "exclusion": false,
              "label": {
                "href": "string",
                "key": "string",
                "value": "string"
              },
              "label_group": {
                "href": "string",
                "key": "string",
                "name": "string"
              }
            }
          ]
        ],
        "caps": [
          "write"
        ]
      },
      "log_flow": true,
      "network_type": "brn"
    }
  ],
  "deny_rules": [
    {
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": null,
      "updated_by": null,
      "deleted_by": null,
      "update_type": "create",
      "href": "string",
      "providers": [
        {
          "actors": "ams",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "egress_services": [
        {
          "href": "string"
        }
      ],
      "caps": [
        "write"
      ],
      "enabled": true,
      "description": null,
      "network_type": "brn",
      "override": false,
      "unscoped_consumers": true
    }
  ],
  "override_deny_rules": [
    {
      "created_at": "2025-04-01T00:21:27Z",
      "updated_at": "2025-04-01T00:21:27Z",
      "deleted_at": null,
      "created_by": null,
      "updated_by": null,
      "deleted_by": null,
      "update_type": "create",
      "href": "string",
      "providers": [
        {
          "actors": "ams",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "consumers": [
        {
          "actors": "ams",
          "exclusion": false,
          "label": {
            "href": "string"
          },
          "label_group": {
            "href": "string"
          },
          "ip_list": {
            "href": "string"
          },
          "workload": {
            "href": "string"
          }
        }
      ],
      "ingress_services": [
        {
          "href": "string"
        }
      ],
      "egress_services": [
        {
          "href": "string"
        }
      ],
      "caps": [
        "write"
      ],
      "enabled": true,
      "description": null,
      "network_type": "brn",
      "override": false,
      "unscoped_consumers": true
    }
  ]
}

Properties

Name Type Required Restrictions Description
sec_rules [allOf] true* none Array of allow rules

allOf

Name Type Required Restrictions Description
» anonymous object false none Enforcement boundary
»» created_at string(date-time) false none Timestamp when record was first created
»» updated_at string(date-time) false none Timestamp when record was last updated
»» deleted_at string,null(date-time) false none Timestamp when record was deleted
»» created_by object false none none
»»» username string false none The username which created this record
»» updated_by object false none none
»»» username string false none The username which last updated this record
»» deleted_by object,null false none none
»»» username string false none The username which deleted this record
»» update_type any false none Type of update

oneOf

Name Type Required Restrictions Description
»»» anonymous null false none none

xor

Name Type Required Restrictions Description
»»» anonymous string false none none

continued

Name Type Required Restrictions Description
»» update_label any false none Type of update

oneOf

Name Type Required Restrictions Description
»»» anonymous null false none none

xor

Name Type Required Restrictions Description
»»» anonymous string false none none

continued

Name Type Required Restrictions Description
»» href string true* none URI of object
»» enabled boolean false none Enabled flag
»» description string,null false none Description
»» ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services true* none Array of service URI and port/protocol combinations
»» egress_services [sec_policy_virtual_servers_get/properties/created_by] false none Array of objects
»» resolve_labels_as sec_policy_rule_sets_put/properties/rules/items/properties/resolve_labels_as false none none
»» sec_connect boolean false none Whether a secure connection is established
»» stateless boolean false none Whether packet filtering is stateless for the rule
»» machine_auth boolean false none Whether machine authentication is enabled
»» providers sec_policy_rule_sets_sec_rules_get/properties/providers true* none Providers
»» consumers sec_policy_rule_sets_sec_rules_get/properties/consumers true* none Consumers
»» consuming_security_principals sec_policy_rule_sets_sec_rules_get/properties/consuming_security_principals false none Hrefs of consuming security principals
»» unscoped_consumers boolean false none Set the scope for rule consumers to All
»» use_workload_subnets sec_policy_rule_sets_put/properties/rules/items/properties/use_workload_subnets false none Whether to use workload subnets instead of IP addresses for the providers/consumers
»» rule_set sec_policy_policy_check_get/properties/sec_rules/items/allOf/1/rule_set false none Parent Rule Set of a Rule
»» log_flow boolean false none If false, the VEN will not log any traffic that matches this flow.
»» network_type sec_policy_rule_sets_put/properties/rules/items/properties/network_type false none Network types that this rule should apply to.

and

Name Type Required Restrictions Description
» anonymous any false none none

continued

Name Type Required Restrictions Description
deny_rules [allOf] true* none Array of deny rules

allOf

Name Type Required Restrictions Description
» anonymous object false none Enforcement boundary
»» created_at string(date-time) false none Timestamp when this Enforcement Boundary was first created
»» updated_at string(date-time) false none Timestamp when this Enforcement Boundary was last updated
»» deleted_at string,null(date-time) false none Timestamp when this Enforcement Boundary was deleted
»» created_by object,null false none none
»»» href string true* none User who originally created this Enforcement Boundary
»» updated_by object,null false none none
»»» href string true* none User who last updated this Enforcement Boundary
»» deleted_by object,null false none none
»»» href string true* none User who deleted this Enforcement Boundary
»» update_type sec_policy_virtual_services_get/properties/update_type false none Versioned policy object update type
»» href string true* none The job URI.
»» providers [object] true* none Enforcement boundary actor
»»» actors string false none Rule actors are all workloads ('ams')
»»» exclusion boolean false none Boolean to specify whether or not the actor is an exclusion - only for labels and label groups
»»» label sec_policy_virtual_servers_get/properties/created_by false none none
»»» label_group sec_policy_virtual_servers_get/properties/created_by false none none
»»» ip_list sec_policy_virtual_servers_get/properties/created_by false none none
»»» workload sec_policy_virtual_servers_get/properties/created_by false none none
»» consumers sec_policy_policy_check_get/properties/deny_rules/items/allOf/0/properties/providers true* none Enforcement boundary actor
»» ingress_services sec_policy_enforcement_boundaries_get/properties/ingress_services true* none Array of service URI and port/protocol combinations
»» egress_services sec_policy_policy_check_get/properties/sec_rules/items/allOf/0/properties/egress_services false none Array of objects
»» caps sec_policy_pending_get/properties/firewall_settings/items/properties/caps false none Array of permissions for the entity for the current user - an empty array implies read only access
»» enabled boolean false none Enabled flag
»» description string,null false none Description
»» network_type sec_policy_rule_sets_put/properties/rules/items/properties/network_type false none Network types that this rule should apply to.
»» override boolean false none When true, the deny rule will override and take precedence over other user defined allow rules.
»» unscoped_consumers boolean false none Set the scope for rule consumers to All

and

Name Type Required Restrictions Description
» anonymous any false none none

continued

Name Type Required Restrictions Description
override_deny_rules [allOf] true* none Array of override deny rules

allOf

Name Type Required Restrictions Description
» anonymous sec_policy_policy_check_get/properties/deny_rules/items/allOf/0 false none Enforcement boundary

and

Name Type Required Restrictions Description
» anonymous any false none none

Enumerated Values

Property Value
anonymous create
anonymous update
anonymous delete
anonymous create
anonymous update
anonymous delete
actors ams

sec_policy_modified_objects_get

{
  "update_type": null,
  "object_type": null,
  "href": null,
  "name": "string",
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "string"
  }
}

Properties

Name Type Required Restrictions Description
update_type any true* none Type of update
object_type any true* none Object Type
href any true* none Href of modified object
name string false none Name
updated_at string(date-time) true* none The time (rfc3339 timestamp) at which this resource was last updated
updated_by object true* none none
» href string true* none The URI of the user who last updated this resource

support_bundle_requests_get

{
  "href": {
    "href": "string"
  },
  "name": "string",
  "download_url": {
    "href": "string"
  },
  "requested_at": "2025-04-01T00:21:27Z",
  "completed_at": null,
  "status": "string",
  "created_by": {
    "href": "string"
  },
  "include_logs": true,
  "starting_at": null,
  "ending_at": null
}

Properties

Name Type Required Restrictions Description
href sec_policy_virtual_servers_get/properties/created_by true* none none
name string true* none The name of the support bundle
download_url any true* none none

oneOf

Name Type Required Restrictions Description
» anonymous sec_policy_virtual_servers_get/properties/created_by false none none

xor

Name Type Required Restrictions Description
» anonymous null false none none

continued

Name Type Required Restrictions Description
requested_at string(date-time) true* none Time support bundle requested
completed_at string,null(date-time) true* none Time support bundle completed
status string true* none A status annunciator indicating the state of this request
created_by sec_policy_virtual_servers_get/properties/created_by true* none none
include_logs boolean true* none Set to true if logs are to be included
starting_at string,null(date-time) true* none Start date for log filtering
ending_at string,null(date-time) true* none End date for log filtering.

support_bundle_requests_post

{
  "include_logs": true,
  "starting_at": null,
  "ending_at": null
}

Support bundle request for PCE cluster

Properties

Name Type Required Restrictions Description
include_logs boolean false none Set to true if logs are to be included
starting_at string,null(date-time) false none Start date for log filtering
ending_at string,null(date-time) false none End date for log filtering.

users_api_keys_get

{
  "key_id": "string",
  "auth_username": "string",
  "created_at": "2025-04-01T00:21:27Z",
  "name": "string",
  "description": "string",
  "href": "string"
}

Properties

Name Type Required Restrictions Description
key_id string true* none The key ID
auth_username string true* none Username required for authentication
created_at string(date-time) true* none Timestamp when this key was first created (RFC 3339)
name string true* none The key name - just a label to be used
description string false none The description of the key
href string true* none URI of the key

users_api_keys_post

{
  "name": "string",
  "description": "string"
}

Properties

Name Type Required Restrictions Description
name string true* none The key name - just a label to be used
description string false none The description of the key

users_api_keys_put

{
  "name": "string",
  "description": "string"
}

Properties

Name Type Required Restrictions Description
name string false none The key name - just a label to be used
description string false none The description of the key

users_local_profile_post

{}

Create local user profile

Properties

None

users_local_profile_password_put

{
  "current_password": "string",
  "new_password": "string"
}

Properties

Name Type Required Restrictions Description
current_password string true* none current password
new_password string true* none new password

users_local_profile_reinvite_put

{}

Reinvite a local user

Properties

None

users_post

{
  "username": "[email protected]",
  "full_name": "string",
  "time_zone": "string",
  "type": "local"
}

Properties

Name Type Required Restrictions Description
username string(email) true* none username is an email address e.g. [email protected]
full_name string false none User's full name
time_zone string false none Time Zone IANA Region Name
type string true* none User's type, i.e. user authenticated local or remotely via SAML

Enumerated Values

Property Value
type local

users_get

{
  "href": "string",
  "username": "string",
  "last_login_on": "string",
  "last_login_ip_address": "string",
  "login_count": 0,
  "full_name": "string",
  "time_zone": "string",
  "locked": true,
  "effective_groups": [
    "string"
  ],
  "local_profile": {},
  "updated_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "type": "string",
  "presence_status": "string"
}

Properties

Name Type Required Restrictions Description
href string true* none URI of the user
username string true* none The User name as an email address
last_login_on string true* none This is populated automatically after a login
last_login_ip_address string true* none This is populated automatically after a login
login_count integer true* none Number of times this user logged in
full_name string true* none User's full name
time_zone string true* none Time Zone IANA Region Name
locked boolean false none Flag to indicate whether account is locked
effective_groups [string] false none List of group names the user is a member of
local_profile object false none Local user profile
updated_at string(date-time) true* none Timestamp when this user was last updated
created_at string(date-time) true* none Timestamp when this user was first created
type string true* none User's type, i.e. user authenticated local or remotely via SAML
presence_status string false none Status of the user

users_login_get

{
  "href": "string",
  "auth_username": "string",
  "session_token": "string",
  "inactivity_expiration_minutes": 0,
  "last_login_on": "2025-04-01T00:21:27Z",
  "last_login_ip_address": "string",
  "full_name": "string",
  "type": "string",
  "time_zone": "string",
  "product_version": {
    "product_version": {
      "version": "string",
      "build": 0,
      "release_info": "string",
      "engineering_info": "string",
      "long_display": "string",
      "short_display": "string",
      "product_name": "string"
    }
  }
}

Properties

Name Type Required Restrictions Description
href string true* none User URI
auth_username string true* none Username required for authentication
session_token string true* none A token used in place of a password for all REST API calls for this user - it is only valid for the IP the login was called from
inactivity_expiration_minutes integer true* none How long this token will remain active if not used. It will last for at least this long.
last_login_on string(date-time) false none Last time the user logged in
last_login_ip_address string false none Last IP the user logged in from
full_name string true* none User's full name
type string true* none User's type, i.e. user authenticated local or remotely via SAML
time_zone string false none The time zone setting for this user
product_version object true* none none
» product_version object true* none The product version object
»» version string true* none The product version major.minor.patch
»» build integer true* none The build number
»» release_info string false none A extra string designator for the release
»» engineering_info string false none A extra string designator used for engineering only
»» long_display string false none A version string for human consumption
»» short_display string false none A version string for human consumption
»» product_name string true* none The product name (e.g. asp or edge)

users_logout_put

{}

Properties

None

users_put

{
  "full_name": "string",
  "time_zone": "string",
  "locked": true
}

Properties

Name Type Required Restrictions Description
full_name string false none User's full name
time_zone string false none Time Zone IANA Region Name
locked boolean false none Flag to indicate whether account is locked

orgs_roles_get

[
  {
    "href": "string"
  }
]

The list of roles in this org

Properties

Name Type Required Restrictions Description
anonymous [orgs_permissions_put/properties/role] false none The list of roles in this org

orgs_auth_security_principals_get

[
  {
    "type": "user",
    "name": "string",
    "display_name": "string",
    "access_restriction": null,
    "href": "string"
  }
]

The list of the auth_security_principals in this org

Properties

allOf

Name Type Required Restrictions Description
anonymous orgs_auth_security_principals_post/allOf/0 false none none

and

Name Type Required Restrictions Description
anonymous orgs_permissions_put/properties/auth_security_principal false none none

orgs_auth_security_principals_post

{
  "type": "user",
  "name": "string",
  "display_name": "string",
  "access_restriction": null
}

Properties

Name Type Required Restrictions Description
type string true* none type of the auth_security_principal
name string true* none name of auth_security_principal
display_name string false none name of auth_security_principal
access_restriction object,null false none Access restriction assigned to this user
» href string true* none Access restriction URI

Enumerated Values

Property Value
type user
type group

orgs_auth_security_principals_put

{}

The details of security principal to edit

Properties

Name Type Required Restrictions Description
type string false none type of the auth_security_principal
name string false none name of the auth_security_principal
display_name string false none display name of the auth_security_principal
access_restriction object,null false none Access restriction assigned to this user
» href string true* none Access restriction URI

anyOf

Name Type Required Restrictions Description
anonymous object false none none

or

Name Type Required Restrictions Description
anonymous object false none none

or

Name Type Required Restrictions Description
anonymous object false none none

or

Name Type Required Restrictions Description
anonymous object false none none

Enumerated Values

Property Value
type user
type group

orgs_access_restrictions_get

{
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "updated_by": {
    "href": "string"
  },
  "devices": [
    {
      "href": "string",
      "config": {
        "host": "string",
        "port": 0,
        "credential_type": "password",
        "username": "string",
        "credential": null,
        "check_certificate": true
      },
      "status": {
        "connection_state": "pending",
        "software_version": "string",
        "sync_state": "in_sync"
      }
    }
  ]
}

Properties

None

orgs_access_restrictions_post

{
  "name": "string",
  "description": "string",
  "ips": [
    null
  ],
  "enforcement_exclusions": null
}

Properties

Name Type Required Restrictions Description
name string true* none User assigned name of the access restriction
description string false none User assigned description of the access restriction
ips [oneOf] true* none Array of ip addresses or CIDR blocks

oneOf

Name Type Required Restrictions Description
» anonymous any false none none

xor

Name Type Required Restrictions Description
» anonymous any false none none

continued

Name Type Required Restrictions Description
enforcement_exclusions array,null false none The types of API access methods that are excluded from access restriction enforcement

orgs_access_restrictions_put

{
  "name": "string",
  "description": "string",
  "ips": [
    null
  ],
  "enforcement_exclusions": null
}

Properties

Name Type Required Restrictions Description
name string false none User assigned name of the access restriction
description string false none User assigned description of the access restriction
ips [orgs_access_restrictions_post/properties/ips/items] false none Array of ip addresses or CIDR blocks
enforcement_exclusions array,null false none The types of API access methods that are excluded from access restriction enforcement

settings_syslog_destinations_get

[
  {
    "href": "string",
    "pce_scope": [
      "string"
    ],
    "type": "string",
    "description": "string",
    "audit_event_logger": {
      "configuration_event_included": true,
      "system_event_included": true,
      "min_severity": "error"
    },
    "traffic_event_logger": {
      "traffic_flow_allowed_event_included": true,
      "traffic_flow_potentially_blocked_event_included": true,
      "traffic_flow_blocked_event_included": true
    },
    "node_status_logger": {
      "node_status_included": true
    },
    "remote_syslog": {
      "address": "string",
      "port": 0,
      "protocol": 0,
      "tls_enabled": true,
      "tls_ca_bundle": "string",
      "tls_verify_cert": true
    }
  }
]

List of destinations

Properties

Name Type Required Restrictions Description
href string true* none URI of the destination
pce_scope [string] true* none none
type string true* none Destination type
description string true* none Description of the destination
audit_event_logger object true* none none
» configuration_event_included boolean true* none Configuration (Northbound) auditable events
» system_event_included boolean true* none System (PCE) auditable events
» min_severity settings_syslog_destinations_post/properties/audit_event_logger/properties/min_severity true* none Minimum severity level of audit event messages.
traffic_event_logger object true* none none
» traffic_flow_allowed_event_included boolean true* none Set to enable traffic flow events
» traffic_flow_potentially_blocked_event_included boolean true* none Set to enable traffic flow events
» traffic_flow_blocked_event_included boolean true* none Set to enable traffic flow events
node_status_logger object true* none none
» node_status_included boolean true* none Syslog messages regarding status of the nodes
remote_syslog object false none none
» address string true* none The remote syslog IP or DNS address
» port integer true* none The remote syslog port
» protocol integer true* none The protocol for streaming syslog messages
» tls_enabled boolean true* none To enable TLS
» tls_ca_bundle string false none Trustee CA bundle
» tls_verify_cert boolean true* none Perform TLS verification

settings_syslog_destinations_post

{
  "pce_scope": [
    "string"
  ],
  "type": "local_syslog",
  "description": "string",
  "audit_event_logger": {
    "configuration_event_included": true,
    "system_event_included": true,
    "min_severity": "error"
  },
  "traffic_event_logger": {
    "traffic_flow_allowed_event_included": true,
    "traffic_flow_potentially_blocked_event_included": true,
    "traffic_flow_blocked_event_included": true
  },
  "node_status_logger": {
    "node_status_included": true
  },
  "remote_syslog": {
    "address": "string",
    "port": 0,
    "protocol": 0,
    "tls_enabled": true,
    "tls_ca_bundle": "string",
    "tls_verify_cert": true
  }
}

Properties

Name Type Required Restrictions Description
pce_scope [string] true* none none
type string true* none Destination type
description string true* none Description of the destination
audit_event_logger object true* none none
» configuration_event_included boolean true* none Configuration (Northbound) auditable events
» system_event_included boolean true* none System (PCE) auditable events
» min_severity string true* none Minimum severity level of audit event messages.
traffic_event_logger object true* none none
» traffic_flow_allowed_event_included boolean true* none Set to enable traffic flow events
» traffic_flow_potentially_blocked_event_included boolean true* none Set to enable traffic flow events
» traffic_flow_blocked_event_included boolean true* none Set to enable traffic flow events
node_status_logger object true* none none
» node_status_included boolean true* none Syslog messages regarding status of the nodes
remote_syslog object false none none
» address string true* none The remote syslog IP or DNS address
» port integer true* none The remote syslog port
» protocol integer true* none The protocol for streaming syslog messages
» tls_enabled boolean true* none To enable TLS
» tls_ca_bundle string false none Trustee CA bundle
» tls_verify_cert boolean true* none Perform TLS verification

Enumerated Values

Property Value
type local_syslog
type remote_syslog
min_severity error
min_severity warning
min_severity informational

settings_syslog_destinations_put

{
  "href": "string",
  "pce_scope": [
    "string"
  ],
  "type": "local_syslog",
  "description": "string",
  "audit_event_logger": {
    "configuration_event_included": true,
    "system_event_included": true,
    "min_severity": "error"
  },
  "traffic_event_logger": {
    "traffic_flow_allowed_event_included": true,
    "traffic_flow_potentially_blocked_event_included": true,
    "traffic_flow_blocked_event_included": true
  },
  "node_status_logger": {
    "node_status_included": true
  },
  "remote_syslog": {
    "address": "string",
    "port": 0,
    "protocol": 0,
    "tls_enabled": true,
    "tls_ca_bundle": "string",
    "tls_verify_cert": true
  }
}

Properties

Name Type Required Restrictions Description
href string false none URI of the destination
pce_scope [string] false none none
type string false none Destination type
description string false none Description of the destination
audit_event_logger object false none none
» configuration_event_included boolean false none Configuration (Northbound) auditable events
» system_event_included boolean false none System (PCE) auditable events
» min_severity settings_syslog_destinations_post/properties/audit_event_logger/properties/min_severity false none Minimum severity level of audit event messages.
traffic_event_logger object false none none
» traffic_flow_allowed_event_included boolean false none Set to enable traffic flow events
» traffic_flow_potentially_blocked_event_included boolean false none Set to enable traffic flow events
» traffic_flow_blocked_event_included boolean false none Set to enable traffic flow events
node_status_logger object false none none
» node_status_included boolean false none Syslog messages regarding status of the nodes
remote_syslog object false none none
» address string false none The remote syslog IP or DNS address
» port integer false none The remote syslog port
» protocol integer false none The protocol for streaming syslog messages
» tls_enabled boolean false none To enable TLS
» tls_ca_bundle string false none Trustee CA bundle
» tls_verify_cert boolean false none Perform TLS verification

Enumerated Values

Property Value
type local_syslog
type remote_syslog

settings_events_get

{
  "audit_event_retention_seconds": 0,
  "audit_event_min_severity": "error",
  "format": "string"
}

Org-based event setting

Properties

Name Type Required Restrictions Description
audit_event_retention_seconds integer true* none The time in seconds an audit event is stored in the database
audit_event_min_severity settings_syslog_destinations_post/properties/audit_event_logger/properties/min_severity true* none Minimum severity level of audit event messages.
format string true* none The log format (JSON, CEF, LEEF), which applies to all remote syslog destinations

settings_events_put

{
  "audit_event_retention_seconds": 86400,
  "audit_event_min_severity": "error",
  "format": "JSON"
}

Org-based event setting

Properties

Name Type Required Restrictions Description
audit_event_retention_seconds integer false none The time in seconds an audit event is stored in the database
audit_event_min_severity settings_syslog_destinations_post/properties/audit_event_logger/properties/min_severity false none Minimum severity level of audit event messages.
format string false none The log format (JSON, CEF, LEEF), which applies to all syslog destinations

Enumerated Values

Property Value
format JSON
format CEF
format LEEF

settings_trusted_proxy_ips_get

{
  "max_trusted_proxy_ips_per_region": 0,
  "trusted_proxy_ips": [
    {
      "pce_fqdn": "string",
      "ip": "string"
    }
  ]
}

Properties

Name Type Required Restrictions Description
max_trusted_proxy_ips_per_region integer true* none Maximum number of Trusted Proxy IPs allowed for each PCE
trusted_proxy_ips [object] true* none IPs or CIDRs trusted (per-region) for handling clients' X-Forwarded-For header
» pce_fqdn string true* none FQDN of PCE region, or null if not in supercluster
» ip string true* none IP address or CIDR trusted for handling clients' X-Forwarded-For header

settings_trusted_proxy_ips_put

{
  "trusted_proxy_ips": [
    {
      "pce_fqdn": null,
      "ip": null
    }
  ]
}

Properties

Name Type Required Restrictions Description
trusted_proxy_ips [object] true* none IPs or CIDRs trusted (per-region) for handling clients' X-Forwarded-For header
» pce_fqdn string,null true* none FQDN of PCE region, or null if not in supercluster
» ip orgs_access_restrictions_post/properties/ips/items true* none none

settings_workloads_get

{
  "workload_disconnected_timeout_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1,
      "ven_type": "server"
    }
  ],
  "workload_goodbye_timeout_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1,
      "ven_type": "server"
    }
  ],
  "workload_disconnected_notification_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "warning": -1,
      "ven_type": "server"
    }
  ],
  "ven_uninstall_timeout_hours": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1
    }
  ]
}

Workload setting properties

Properties

Name Type Required Restrictions Description
workload_disconnected_timeout_seconds [object] true* none none
» scope workloads_post/properties/labels true* none Assigned labels
» value integer true* none Property value associated with the scope
» ven_type string,null false none The ven type that this property is applicable to
workload_goodbye_timeout_seconds settings_workloads_get/properties/workload_disconnected_timeout_seconds true* none none
workload_disconnected_notification_seconds [object] true* none none
» scope workloads_post/properties/labels true* none Assigned labels
» warning integer true* none Workload disconnect warning timeout
» ven_type string,null false none The ven type that this property is applicable to
ven_uninstall_timeout_hours [object] true* none none
» scope workloads_post/properties/labels true* none Assigned labels
» value integer true* none Property value associated with the scope

Enumerated Values

Property Value
ven_type server
ven_type endpoint
ven_type null
ven_type server
ven_type endpoint

settings_workloads_put

{
  "workload_disconnected_timeout_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1,
      "ven_type": "server"
    }
  ],
  "workload_goodbye_timeout_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1,
      "ven_type": "server"
    }
  ],
  "workload_disconnected_notification_seconds": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "warning": -1,
      "ven_type": "server"
    }
  ],
  "ven_uninstall_timeout_hours": [
    {
      "scope": [
        {
          "href": "string"
        }
      ],
      "value": -1
    }
  ]
}

Workload setting properties

Properties

Name Type Required Restrictions Description
workload_disconnected_timeout_seconds settings_workloads_get/properties/workload_disconnected_timeout_seconds false none none
workload_goodbye_timeout_seconds settings_workloads_get/properties/workload_disconnected_timeout_seconds false none none
workload_disconnected_notification_seconds settings_workloads_get/properties/workload_disconnected_notification_seconds false none none
ven_uninstall_timeout_hours settings_workloads_get/properties/ven_uninstall_timeout_hours false none none

settings_traffic_collector_post

{
  "transmission": "broadcast",
  "data_source": "any",
  "network": "any",
  "target": {
    "src_port": 0,
    "dst_port": 0,
    "proto": 0,
    "dst_ip": "string",
    "src_ip": "string"
  },
  "action": "drop"
}

Properties

Name Type Required Restrictions Description
transmission string true* none transmission type: broadcast/multicast/unicast
data_source string false none flow summary data source
network string false none flow summary network
target object false none none
» src_port integer false none none
» dst_port integer false none none
» proto integer true* none none
» dst_ip string false none single destination ip address or CIDR
» src_ip string false none single source ip address or CIDR
action string true* none drop or aggregate the target traffic

Enumerated Values

Property Value
transmission broadcast
transmission multicast
transmission unicast
data_source any
data_source server
data_source endpoint
network any
network corporate
network external
action drop
action aggregate

settings_traffic_collector_get

{
  "href": "string",
  "transmission": "string",
  "data_source": "string",
  "network": "string",
  "target": {
    "src_port": 0,
    "dst_port": 0,
    "proto": 0,
    "dst_ip": "string",
    "src_ip": "string"
  },
  "action": "string"
}

Properties

Name Type Required Restrictions Description
href string true* none URI of the destination
transmission string true* none transmission type: broadcast/multicast/unicast
data_source string false none flow summary data source
network string false none flow summary network
target object false none none
» src_port integer false none none
» dst_port integer false none none
» proto integer true* none none
» dst_ip string false none single destination ip address or CIDR
» src_ip string false none single source ip address or CIDR
action string true* none drop or aggregate the target traffic

settings_traffic_collector_put

{
  "transmission": "broadcast",
  "data_source": "any",
  "network": "any",
  "target": {
    "src_port": null,
    "dst_port": null,
    "proto": 0,
    "dst_ip": "string",
    "src_ip": "string"
  }
}

Properties

Name Type Required Restrictions Description
transmission string false none transmission type: broadcast/multicast/unicast
data_source string false none flow summary data source
network string false none flow summary network
target object false none none
» src_port integer,null false none none
» dst_port integer,null false none none
» proto integer false none none
» dst_ip string false none single destination ip address or CIDR
» src_ip string false none single source ip address or CIDR

Enumerated Values

Property Value
transmission broadcast
transmission multicast
transmission unicast
data_source any
data_source server
data_source endpoint
network any
network corporate
network external

settings_get

{
  "href": "http://example.com",
  "num_assets_requiring_ransomware_protection": null,
  "automatic_label_application_on_ven_activation": true,
  "rule_based_label_maker_schedule_enabled": true,
  "rule_based_label_maker_schedule": null,
  "max_explorer_query_timespan_days": 97,
  "max_api_key_expiration_in_seconds": 7776000,
  "expired_api_keys_retention_in_seconds": 7776000,
  "advanced_ruleset_display": true,
  "ven_maintenance_token_required": false,
  "cloud_secure_tenant_id": "string",
  "use_census_permissions": true
}

Properties

Name Type Required Restrictions Description
href string(uri) false none Org Setting URI
num_assets_requiring_ransomware_protection integer,null false none number of assets that need ransomware protection for this org
automatic_label_application_on_ven_activation boolean false none Automatically apply label rules when VEN is activated
rule_based_label_maker_schedule_enabled boolean false none True or false based on whether the rule based label maker schedule is enabled.
rule_based_label_maker_schedule object,null false none Schedule used for application of label rules
» schedule_time string(date-time) false none The time at which the label rules should be run
» frequency string false none The frequency at which the schedule is to be executed
» day_of_week [string] false none Applies only in case of weekly schedule and indicates the days on which the schedule will be run.
» day_of_month integer false none Applies only in case of monthly schedule and indicates the day on which the schedule will be run.
max_explorer_query_timespan_days integer false none maximum timespan of an explorer query in day(s) for this org
max_api_key_expiration_in_seconds integer false none Validity of api_key in seconds; -1 specifies api_keys never expire
expired_api_keys_retention_in_seconds integer false none Retention of expired api_keys in the database
advanced_ruleset_display boolean false none When true, the UI will display rulesets in advanced mode. This means that scopes will be displayed for any unscoped rulesets, including newly added rulesets.
ven_maintenance_token_required boolean false none Identifies if the tampering protection for the VEN and endpoints is enabled or not.
cloud_secure_tenant_id string false none Cloud Secure tenant id corresponding to this organization
use_census_permissions boolean false none Flag to indicate whether the PCE org will obtain permissions from census or from local database

Enumerated Values

Property Value
frequency daily
frequency weekly
frequency monthly

settings_put

{
  "num_assets_requiring_ransomware_protection": 1,
  "automatic_label_application_on_ven_activation": true,
  "rule_based_label_maker_schedule_enabled": true,
  "rule_based_label_maker_schedule": null,
  "max_api_key_expiration_in_seconds": 7776000,
  "expired_api_keys_retention_in_seconds": 7776000,
  "advanced_ruleset_display": true,
  "ven_maintenance_token_required": false,
  "cloud_secure_tenant_id": "string",
  "use_census_permissions": true
}

Properties

Name Type Required Restrictions Description
num_assets_requiring_ransomware_protection integer false none number of assets that need ransomware protection for this org
automatic_label_application_on_ven_activation boolean false none Automatically apply labels rules when VEN is activated
rule_based_label_maker_schedule_enabled boolean false none True or false based on whether the rule based label maker schedule is enabled.
rule_based_label_maker_schedule settings_get/properties/rule_based_label_maker_schedule false none Schedule used for application of label rules
max_api_key_expiration_in_seconds integer false none Validity of api_key in seconds; -1 specifies api_keys never expire
expired_api_keys_retention_in_seconds integer false none Retention of expired api_keys in the database
advanced_ruleset_display boolean false none When true, the UI will display rulesets in advanced mode. This means that scopes will be displayed for any unscoped rulesets, including newly added rulesets.
ven_maintenance_token_required boolean false none Identifies if the tampering protection for the VEN and endpoints is enabled or not.
cloud_secure_tenant_id string false none Cloud Secure tenant id corresponding to this organization
use_census_permissions boolean false none Flag to indicate whether the PCE org will obtain permissions from census or from local database

service_accounts_api_keys_post

{
  "expires_in_seconds": "default"
}

api_key addition

Properties

Name Type Required Restrictions Description
expires_in_seconds any true* none Validity of the api_key, in seconds

oneOf

Name Type Required Restrictions Description
» anonymous string false none none

xor

Name Type Required Restrictions Description
» anonymous integer false none none

Enumerated Values

Property Value
anonymous default

api_keys_get

{
  "key_id": "string",
  "auth_username": "string",
  "name": null,
  "description": "string",
  "state": "string",
  "expires_in_seconds": 0,
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "string"
  },
  "last_login_on": "2025-04-01T00:21:27Z",
  "account": {
    "href": "string",
    "type": "string",
    "name": "string",
    "access_restriction": null,
    "permissions": [
      {
        "href": "string",
        "role": {
          "href": "string"
        },
        "scope": [
          {
            "label": {
              "href": "string",
              "key": "string",
              "value": "string"
            },
            "label_group": {
              "href": "string",
              "key": "string",
              "name": "string"
            }
          }
        ]
      }
    ]
  },
  "href": "string"
}

Properties

Name Type Required Restrictions Description
key_id string true* none The key ID
auth_username string true* none Username required for authentication
name string,null true* none The key name - just a label to be used
description string false none The description of the key
state string false none State of the api_key
expires_in_seconds integer false none Validity of the api_key in seconds
created_at string(date-time) true* none Timestamp when this key was first created (RFC 3339)
created_by object false none none
» href string true* none User who originally created this api key
last_login_on string(date-time) false none Timestamp when this key was last used
account object false none none
» href string true* none Associated identity
» type string true* none Type of account
» name string true* none Name of the account
» access_restriction object,null false none Access restriction assigned to the api_keys under this service_account
»» href string true* none Access restriction URI
» permissions [object] false none List of permissions
»» href string false none URI of the permission entity
»» role orgs_permissions_put/properties/role true* none none
»» scope orgs_permissions_put/properties/scope true* none none
» href string true* none URI of the key

optional_features_get

[
  {
    "name": "string",
    "preview": true,
    "enabled": true
  }
]

Properties

Name Type Required Restrictions Description
name string true* none The name of the feature
preview boolean false none Is this a preview feature
enabled boolean true* none Is this feature enabled

optional_features_put

[
  {
    "name": "ip_forwarding_firewall_setting",
    "enabled": true
  }
]

Properties

oneOf

Name Type Required Restrictions Description
anonymous object false none none
» name string true* none Name of the feature
» enabled boolean true* none Enable or disable this feature

xor

Name Type Required Restrictions Description
anonymous object false none none
» name string true* none Name of the feature
» enabled boolean true* none Enable or disable this feature
» key string false none Key required to enable the feature. Contact Illumio Support for more details.

Enumerated Values

Property Value
name ip_forwarding_firewall_setting
name ui_analytics
name illumination_classic
name ransomware_readiness_dashboard
name per_rule_flow_log_setting
name lightning_default
name collector_scanner_filters
name corporate_ips_groups
name labels_editing_warning_for_enforcement_mode
name label_based_network_detection
name cloudsecure_enabled
name windows_outbound_process_enforcement
name rule_based_label_mapping
name core_insights
name rule_info_exposure_to_syslog
name editable_dns_client_rule
name editable_dhcp_client_rule

authentication_settings_saml_configs_get

{
  "href": "string",
  "cluster_fqdn": "string",
  "idp_sso_target_url": "string",
  "idp_slo_target_url": "string",
  "idp_cert": "string",
  "issuer": "string",
  "consumer_service_url": "string",
  "consumer_logout_url": "string",
  "name_identifier_format": "string",
  "authn_context": "string",
  "force_authn": true,
  "sign_authn_request": false,
  "pce_signing_cert": "string",
  "pce_signing_cert_expires_at": "2025-04-01T00:21:27Z",
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "username": "string"
  },
  "updated_by": {
    "username": "string"
  }
}

Properties

Name Type Required Restrictions Description
href string true* none SAML config URI
cluster_fqdn string true* none The FQDN of the PCE cluster
idp_sso_target_url string true* none The identity provider URL to which the authentication request should be sent
idp_slo_target_url string true* none The identity provider URL to which the logout request should be sent
idp_cert string true* none The certificate provided from the identity provider when setting up the relationship
issuer string true* none The URL for the Illumio login server. Some identity providers might need this to establish the identity of the service provider requesting authentication.
consumer_service_url string true* none The Illumio login server URL at which the SAML authentication assertion should be received
consumer_logout_url string true* none The Illumio login server URL at which the SAML logout assertion should be received
name_identifier_format string false none Describes the format of the username required by the Illumio login server
authn_context string true* none The URI of the authentication context class you want the identity provider to use to authenticate user, with possible values being NULL (unspecified) or urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
force_authn boolean true* none Defines whether or not the identity provider should force re-authentication of the user, even if the user has still a valid session
sign_authn_request boolean true* none Defines whether or not PCE should sign saml authN request to IdP; default is false
pce_signing_cert string false none The certificate generated by the PCE that needs to be uploaded to the IdP; this certificate will be used by the IdP to verify the signature of authN request if sign_authn_request is enabled
pce_signing_cert_expires_at string(date-time) false none Timestamp of when pce_signing_cert expires
created_at string(date-time) true* none Timestamp when SAML configuration was first created
updated_at string(date-time) true* none Timestamp when SAML configuration was last updated
created_by object true* none none
» username string false none The username which created this SAML configuration
updated_by object true* none none
» username string false none The username which last updated this SAML configuration

authentication_settings_saml_configs_put

{
  "idp_sso_target_url": "string",
  "idp_slo_target_url": "string",
  "idp_cert": "string",
  "authn_context": "string",
  "force_authn": true,
  "sign_authn_request": false
}

Properties

Name Type Required Restrictions Description
idp_sso_target_url string false none The identity provider URL to which the authentication request should be sent

anyOf

Name Type Required Restrictions Description
» anonymous string(url) false none none

or

Name Type Required Restrictions Description
» anonymous string false none none

continued

Name Type Required Restrictions Description
idp_slo_target_url any false none The identity provider URL to which the logout request should be sent

anyOf

Name Type Required Restrictions Description
» anonymous string(url) false none none

or

Name Type Required Restrictions Description
» anonymous string false none none

continued

Name Type Required Restrictions Description
idp_cert string false none The certificate provided from the identity provider when setting up the relationship
authn_context string false none The URI of the authentication context class you want the identity provider to use to authenticate user, with possible values being NULL (unspecified) or urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
force_authn boolean false none Defines whether or not the identity provider should force re-authentication of the user, even if the user has still a valid session
sign_authn_request boolean false none Defines whether or not PCE should sign saml authN request to IdP; default is false

Enumerated Values

Property Value
anonymous
anonymous

authentication_settings_saml_configs_pce_signing_cert_post

{}

Properties

None

authentication_settings_ldap_configs_get

{
  "href": "string",
  "pce_fqdn": "string",
  "name": "string",
  "address": "string",
  "port": 0,
  "authentication_method": "string",
  "request_timeout_seconds": 1,
  "bind_distinguished_name": "string",
  "is_bind_password_set": true,
  "user_base_distinguished_name": "string",
  "user_distinguished_name_pattern": "string",
  "user_base_filter": "string",
  "username_attribute": "string",
  "full_name_attribute": "string",
  "user_memberof_attribute": "string",
  "tls_ca_bundle": "string",
  "insecure_disable_tls_certificate_verification": true,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "username": "string"
  },
  "updated_by": {
    "username": "string"
  }
}

Properties

Name Type Required Restrictions Description
href string true* none LDAP config URI
pce_fqdn string true* none The FQDN of the PCE cluster
name string false none Friendly name of the LDAP server
address string true* none IP address or host name of the LDAP server
port integer true* none Port number of the LDAP server
authentication_method string true* none Authentication types
request_timeout_seconds integer true* none Number of seconds to wait for response
bind_distinguished_name string true* none Distinguished name (DN) used to bind to the LDAP server
is_bind_password_set boolean true* none Flag to indicate whether Bind DN password is set
user_base_distinguished_name string true* none Base distinguished name to be used for login
user_distinguished_name_pattern string false none Pattern used to create a DN string for a user during login, e.g. uid=*,ou=people, where * will be replaced with the username
user_base_filter string false none Search filter used to query the LDAP tree for users
username_attribute string true* none Attribute on a user object which contains the username, e.g. uid, sAMAccountName
full_name_attribute string false none Attribute on a user object which contains the full name, e.g. cn, commonName, displayName
user_memberof_attribute string false none Attribute on a user object containing group membership information, e.g. memberOf, isMemberOf
tls_ca_bundle string true* none Trustee CA bundle
insecure_disable_tls_certificate_verification boolean true* none Specifies whether to verify the server certificate when establishing an SSL connection to the LDAP server. WARNING: The use of this feature decreases the security of the system, and should only be used with full understanding of the ramifications.
created_at string(date-time) true* none Timestamp when LDAP configuration was first created
updated_at string(date-time) true* none Timestamp when LDAP configuration was last updated
created_by object true* none none
» username string false none The username which created this LDAP configuration
updated_by object true* none none
» username string false none The username which last updated this LDAP configuration

authentication_settings_ldap_configs_post

{
  "pce_fqdn": "string",
  "name": null,
  "address": "string",
  "port": 0,
  "authentication_method": "LDAP",
  "request_timeout_seconds": 1,
  "bind_distinguished_name": null,
  "bind_password": null,
  "user_base_distinguished_name": "string",
  "user_distinguished_name_pattern": null,
  "user_base_filter": null,
  "username_attribute": "string",
  "full_name_attribute": null,
  "user_memberof_attribute": null,
  "tls_ca_bundle": null,
  "insecure_disable_tls_certificate_verification": true
}

Properties

Name Type Required Restrictions Description
pce_fqdn string false none The FQDN of the PCE cluster
name string,null false none Friendly name of the LDAP server
address string true* none IP address or host name of the LDAP server
port integer true* none Port number of the LDAP server
authentication_method string true* none Authentication types
request_timeout_seconds integer false none Number of seconds to wait for response
bind_distinguished_name string,null false none Distinguished name (DN) used to bind to the LDAP server
bind_password string,null false none Bind DN password
user_base_distinguished_name string true* none Base distinguished name to be used for login
user_distinguished_name_pattern string,null false none Pattern used to create a DN string for a user during login, e.g. uid=*,ou=people, where * will be replaced with the username
user_base_filter string,null false none Search filter used to query the LDAP tree for users
username_attribute string true* none Attribute on a user object which contains the username, e.g. uid, sAMAccountName
full_name_attribute string,null false none Attribute on a user object which contains the full name, e.g. cn, commonName, displayName
user_memberof_attribute string,null false none Attribute on a user object containing group membership information, e.g. memberOf, isMemberOf
tls_ca_bundle string,null false none Trustee CA bundle
insecure_disable_tls_certificate_verification boolean false none Specifies whether to verify the server certificate when establishing an SSL connection to the LDAP server. WARNING: The use of this feature decreases the security of the system, and should only be used with full understanding of the ramifications.

Enumerated Values

Property Value
authentication_method LDAP
authentication_method LDAPS
authentication_method STARTTLS

authentication_settings_ldap_configs_put

{
  "name": null,
  "address": "string",
  "port": 0,
  "authentication_method": "LDAP",
  "request_timeout_seconds": 1,
  "bind_distinguished_name": null,
  "bind_password": null,
  "user_base_distinguished_name": "string",
  "user_distinguished_name_pattern": null,
  "user_base_filter": null,
  "username_attribute": "string",
  "full_name_attribute": null,
  "user_memberof_attribute": null,
  "tls_ca_bundle": null,
  "insecure_disable_tls_certificate_verification": true
}

Properties

Name Type Required Restrictions Description
name string,null false none Friendly name of the LDAP server
address string false none IP address or host name of the LDAP server
port integer false none Port number of the LDAP server
authentication_method string false none Authentication types
request_timeout_seconds integer false none Number of seconds to wait for response
bind_distinguished_name string,null false none Distinguished name (DN) used to bind to the LDAP server
bind_password string,null false none Bind DN password
user_base_distinguished_name string false none Base distinguished name to be used for login
user_distinguished_name_pattern string,null false none Pattern used to create a DN string for a user during login, e.g. uid=*,ou=people, where * will be replaced with the username
user_base_filter string,null false none Search filter used to query the LDAP tree for users
username_attribute string false none Attribute on a user object which contains the username, e.g. uid, sAMAccountName
full_name_attribute string,null false none Attribute on a user object which contains the full name, e.g. cn, commonName, displayName
user_memberof_attribute string,null false none Attribute on a user object containing group membership information, e.g. memberOf, isMemberOf
tls_ca_bundle string,null false none Trustee CA bundle
insecure_disable_tls_certificate_verification boolean false none Specifies whether to verify the server certificate when establishing an SSL connection to the LDAP server. WARNING: The use of this feature decreases the security of the system, and should only be used with full understanding of the ramifications.

Enumerated Values

Property Value
authentication_method LDAP
authentication_method LDAPS
authentication_method STARTTLS

authentication_settings_ldap_configs_verify_connection_post

{}

Properties

None

authentication_settings_password_policy_get

{
  "require_type_number": true,
  "require_type_lowercase": true,
  "require_type_uppercase": true,
  "require_type_symbol": true,
  "min_characters_per_type": 0,
  "min_length": 0,
  "min_changed_characters": 0,
  "history_count": 0,
  "expire_time_days": 0,
  "session_timeout_minutes": 0,
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "username": "string"
  }
}

Properties

Name Type Required Restrictions Description
require_type_number boolean true* none Flag to indicate whether password must contain numerical digit
require_type_lowercase boolean true* none Flag to indicate whether password must contain lowercase letter
require_type_uppercase boolean true* none Flag to indicate whether password must contain uppercase letter
require_type_symbol boolean true* none Flag to indicate whether password must contain symbol (i.e. !@#$%^&*<>?)
min_characters_per_type integer true* none Minimum number of characters for each character type
min_length integer true* none Minimum length of password
min_changed_characters integer true* none Minimum number of changed characters for new passwords
history_count integer true* none Number of old passwords to remember
expire_time_days integer true* none Number of days password expires; a value of 0 means it never expires
session_timeout_minutes integer true* none Number of minutes to timeout the user session without activity
updated_at string(date-time) true* none Timestamp when password policy was last updated
updated_by object true* none none
» username string false none The username which last updated this password policy

authentication_settings_password_policy_put

{
  "require_type_number": true,
  "require_type_lowercase": true,
  "require_type_uppercase": true,
  "require_type_symbol": true,
  "min_characters_per_type": 0,
  "min_length": 0,
  "min_changed_characters": 0,
  "history_count": 0,
  "expire_time_days": 0,
  "session_timeout_minutes": 0
}

Properties

Name Type Required Restrictions Description
require_type_number boolean false none Flag to indicate whether password must contain numerical digit
require_type_lowercase boolean false none Flag to indicate whether password must contain lowercase letter
require_type_uppercase boolean false none Flag to indicate whether password must contain uppercase letter
require_type_symbol boolean false none Flag to indicate whether password must contain symbol (i.e. !@#$%^&*<>?)
min_characters_per_type integer false none Minimum number of characters for each character type
min_length integer false none Minimum length of password
min_changed_characters integer false none Minimum number of changed characters for new passwords
history_count integer false none Number of old passwords to remember
expire_time_days integer false none Number of days password expires; a value of 0 means it never expires
session_timeout_minutes integer false none Number of minutes to timeout the user session without activity

authentication_settings_get

{
  "authentication_type": "string"
}

Properties

Name Type Required Restrictions Description
authentication_type string true* none Authentication types

authentication_settings_put

{
  "authentication_type": "Local"
}

Properties

Name Type Required Restrictions Description
authentication_type string true* none Authentication types

Enumerated Values

Property Value
authentication_type Local
authentication_type RADIUS
authentication_type SAML
authentication_type LDAP

health_get

[
  {
    "status": "normal",
    "type": "string",
    "fqdn": "string",
    "available_seconds": 0,
    "notifications": [
      {
        "status": "normal",
        "token": "string",
        "message": "string"
      }
    ],
    "listen_only_mode_enabled_at": null,
    "nodes": [
      {
        "hostname": null,
        "ip_address": null,
        "runlevel": null,
        "uptime_seconds": null,
        "cpu": {
          "status": "normal",
          "percent": 0
        },
        "disk": [
          {
            "location": "string",
            "value": {
              "status": "normal",
              "percent": 0
            }
          }
        ],
        "memory": {
          "status": "normal",
          "percent": 0
        },
        "metrics": [
          {
            "metric": "string",
            "entries": [
              {
                "values": [
                  {
                    "status": "normal",
                    "name": "string",
                    "value": 0,
                    "unit": "millisecond",
                    "frequency": "second",
                    "display": "enclosed"
                  }
                ]
              }
            ],
            "last_updated_at": "2025-04-01T00:21:27Z",
            "display": "table"
          }
        ],
        "services": {
          "status": "string",
          "running": [
            "string"
          ],
          "not_running": [
            "string"
          ],
          "partial": [
            "string"
          ],
          "optional": [
            "string"
          ],
          "unknown": [
            "string"
          ]
        },
        "generated_at": null
      }
    ],
    "network": {
      "replication": [
        {
          "type": "string",
          "details": {
            "database_name": "string",
            "primary_fqdn": "string",
            "replica_fqdn": "string"
          },
          "value": {
            "status": "string",
            "lag_seconds": 0
          }
        }
      ]
    },
    "groups": [
      {
        "group": "string",
        "status": "normal",
        "components": [
          {
            "section": "string",
            "contents": [
              {
                "metric": "string",
                "entries": [
                  {
                    "values": []
                  }
                ],
                "last_updated_at": "2025-04-01T00:21:27Z",
                "display": "table"
              }
            ]
          }
        ]
      }
    ],
    "generated_at": null
  }
]

Health information of PCE Cluster and its nodes

Properties

Name Type Required Restrictions Description
status string false none Health status of an entry or section.
type string false none Type of the PCE
fqdn string false none FQDN of the PCE
available_seconds number false none Seconds since this PCE has been available
notifications [object] false none Notifications for the PCE
» status health_get/items/properties/status true* none Health status of an entry or section.
» token string true* none Description token of this notification
» message string false none Description string of this notification
listen_only_mode_enabled_at string,null(date-time) false none Timestamp at which PCE Listen Only Mode was enabled
nodes [object] false none Nodes in the PCE
» hostname string,null true* none Hostname of the node
» ip_address string,null true* none IP address of the node
» runlevel number,null false none Runlevel of the node
» uptime_seconds number,null false none Seconds since this node cluster has been rebooted
» cpu object false none none
»» status string true* none none
»» percent number true* none none
» disk [object] false none Disk usage of this node per individual location
»» location string true* none none
»» value health_get/items/properties/nodes/items/properties/cpu true* none none
» memory health_get/items/properties/nodes/items/properties/cpu false none none
» metrics [object] false none Additional reported metrics
»» metric string false none none
»» entries [object] false none none
»»» values [object] true* none none
»»»» status string false none Health status of an entry or section.
»»»» name string false none none
»»»» value any false none none

anyOf

Name Type Required Restrictions Description
»»»»» anonymous number false none none

or

Name Type Required Restrictions Description
»»»»» anonymous string false none none

continued

Name Type Required Restrictions Description
»»»» unit string false none Available unit types.
»»»» frequency string false none Unit frequency.
»»»» display string false none none
»»» last_updated_at string(date-time) false none none
»»» display string false none An optional hint for the UI to display the metric's data in a specific table form.
»» services object true* none Status of all the PCE Services of this node
»»» status string false none Overall Service status of the PCE
»»» running [string] false none none
»»» not_running [string] false none none
»»» partial [string] false none none
»»» optional [string] false none none
»»» unknown [string] false none none
»» generated_at string,null(date-time) true* none Timestamp of when this node information was generated
» network object false none Network information of the PCE
»» replication [object] true* none Replication information for databases
»»» type string true* none Type of replication
»»» details object true* none none

oneOf

Name Type Required Restrictions Description
»»»» anonymous object false none none
»»»»» database_name string true* none Name of the Database being replicated
»»»»» primary_fqdn string true* none FQDN of the primary database node
»»»»» replica_fqdn string true* none FQDN of the replica database node

xor

Name Type Required Restrictions Description
»»»» anonymous object false none none
»»»»» fqdn string true* none FQDN of the PCE for replication

continued

Name Type Required Restrictions Description
»»»» value object true* none none
»»»»» status string true* none Lag status
»»»»» lag_seconds number true* none The number of lag seconds
»»»» groups [object] false none Additional metric groups.
»»»»» group string true* none none
»»»»» status string false none Health status of an entry or section.
»»»»» components [object] true* none none
»»»»»» section string true* none none
»»»»»» contents [anyOf] true* none none

anyOf

Name Type Required Restrictions Description
»»»»»»» anonymous object false none One or more entries encompassing the metric.
»»»»»»»» metric string false none none
»»»»»»»» entries [object] false none none
»»»»»»»»» values [object] true* none none
»»»»»»»»»» status health_get/items/properties/groups/items/properties/status false none Health status of an entry or section.
»»»»»»»»»» name string false none none
»»»»»»»»»» value any false none none

anyOf

Name Type Required Restrictions Description
»»»»»»»»»»» anonymous number false none none

or

Name Type Required Restrictions Description
»»»»»»»»»»» anonymous string false none none

continued

Name Type Required Restrictions Description
»»»»»»»»»» unit string false none Available unit types.
»»»»»»»»»» frequency string false none Unit frequency.
»»»»»»»»»» display string false none none
»»»»»»»»» last_updated_at string(date-time) false none none
»»»»»»»»» display string false none An optional hint for the UI to display the metric's data in a specific table form.

or

Name Type Required Restrictions Description
»»»»»»»» anonymous any false none none

continued

Name Type Required Restrictions Description
»»»»»»» generated_at string,null(date-time) false none Timestamp of when this PCE information was generated

Enumerated Values

Property Value
status normal
status warning
status critical
status normal
status warning
status critical
status normal
status warning
status critical
unit millisecond
unit second
unit minute
unit hour
unit day
unit percent
unit byte
unit kilobyte
unit megabyte
unit gigabyte
unit terabyte
unit request
frequency second
frequency minute
frequency hour
frequency day
display enclosed
display table
display join
status normal
status warning
status critical
unit millisecond
unit second
unit minute
unit hour
unit day
unit percent
unit byte
unit kilobyte
unit megabyte
unit gigabyte
unit terabyte
unit request
frequency second
frequency minute
frequency hour
frequency day
display enclosed
display table
display join

detected_core_services_summary_get

[
  {
    "href": "http://example.com",
    "core_service_type": null,
    "recommended": 0,
    "accepted": 0,
    "rejected": 0
  }
]

The list of core services

Properties

Name Type Required Restrictions Description
href string(uri) false none The href of detected core service summary
core_service_type any true* none none
recommended integer false none Total number of detected core services which are skipped or no decision has been made yet
accepted integer false none Number of accepted recommendations
rejected integer false none Number of recommendations rejected by the user

detected_core_services_get

{
  "ip_address": "string",
  "workload": {
    "href": "string",
    "hostname": "string",
    "name": "string",
    "os_type": "windows",
    "enforcement_mode": "idle",
    "labels": [
      {
        "href": "string"
      }
    ],
    "managed": true
  },
  "href": "string",
  "core_service_type": null,
  "confidence": 50,
  "feedback": "string",
  "action": "string",
  "method_name": "string",
  "labels_applied": true,
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "last_detected_at": "2025-04-01T00:21:27Z"
}

Properties

Name Type Required Restrictions Description
ip_address string true* none The ip address which is detected as core service
workload object false none Workload details of the traffic-flow endpoint
» href string true* none Workload URI
» hostname string true* none The hostname of the workload
» name string false none The name of the workload
» os_type string false none The operating system type of the workload
» enforcement_mode container_clusters_container_workload_profiles_get/properties/enforcement_mode false none Workload enforcement mode
» labels [object] false none Assigned labels
»» href string true* none Label URI
» managed boolean true* none True if the workload is managed, else false
href string true* none The href of this detected core service
core_service_type any true* none none
confidence integer false none Confidence of the detected core service
feedback string false none The feedback provided for this core service recommendation, if any
action string false none The user can accept, skip or reject the core service determination.
method_name string true* none The method by which this core service was detected
labels_applied boolean false none Indicates if the end user applied labels for this workload
created_at string(date-time) true* none Date at which core service was detected
updated_at string(date-time) true* none Date core service was updated with action information
last_detected_at string(date-time) false none Date core service was last recommended by core service detection algorithm

Enumerated Values

Property Value
os_type windows
os_type linux
os_type unknown

detected_core_services_put

{
  "action": "accept",
  "feedback": "string",
  "labels_applied": true,
  "workload": {
    "href": "http://example.com"
  }
}

Properties

Name Type Required Restrictions Description
action string false none Accept, skip or reject the core service detection
feedback string false none Feedback from user about the detected core service
labels_applied boolean false none Indicates if the end user applied the suggested labels for this detected core service
workload object false none none
» href string(uri) true* none The workload URI to be associated with this core service recommendation

Enumerated Values

Property Value
action accept
action skip
action reject
action recommended

core_service_types_get

{
  "href": "http://example.com",
  "name": "string",
  "required_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "optional_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "labels": [
    {}
  ],
  "created_at": "2025-04-01T00:21:27Z",
  "updated_at": "2025-04-01T00:21:27Z",
  "priority": 0,
  "num_optional_ports_required": 0
}

Properties

Name Type Required Restrictions Description
href string(uri) true* none The href of this core service type
name string true* none The name of the core service type
required_ports [object] false none Core Service Ports
» port integer true* none Port number, or the starting port of a range.
» to_port integer false none Upper end of port range; this field should not be included if specifying an individual port.
optional_ports core_service_types_get/properties/required_ports false none Core Service Ports
labels [oneOf] true* none Suggested labels
» value string false none Label name
» key string false none Label type
» href string(uri) false none Label URI

oneOf

Name Type Required Restrictions Description
» anonymous object false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none

continued

Name Type Required Restrictions Description
created_at string(date-time) true* none Timestamp at which this core service type was created
updated_at string(date-time) true* none Timestamp at which this core service type was updated
priority integer false none Each IP/workload is identified for 1 core service type and they are ordered by priority
num_optional_ports_required integer false none Number of optional ports required

core_service_types_put

{
  "labels": [
    {}
  ],
  "required_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "optional_ports": [
    {
      "port": 0,
      "to_port": 0
    }
  ],
  "num_optional_ports_required": 0,
  "provider": true,
  "priority": 1
}

modify labels

Properties

Name Type Required Restrictions Description
labels core_service_types_get/properties/labels false none Suggested labels
required_ports core_service_types_get/properties/required_ports false none Core Service Ports
optional_ports core_service_types_get/properties/required_ports false none Core Service Ports
num_optional_ports_required integer false none Number of optional ports required
provider boolean false none To indicate whether the provider is a core service. Default value is true which means provider is a core service
priority integer false none Each IP/workload is identified for 1 core service type and they are ordered by priority

events_get

{
  "href": "string",
  "org_id": 0,
  "version": "string",
  "event_id": "string",
  "event_type": "string",
  "status": "string",
  "severity": "string",
  "timestamp": "2025-04-01T00:21:27Z",
  "pce_fqdn": "string",
  "created_by": {},
  "action": null,
  "resource_changes": [
    {
      "href": "string",
      "version": "string",
      "org_id": 0,
      "uuid": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "resource": null,
      "changes": {},
      "change_type": "string"
    }
  ],
  "notifications": [
    {
      "href": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "notification_type": "string",
      "severity": "err",
      "info": null
    }
  ]
}

Properties

Name Type Required Restrictions Description
href string false none Unique href for this event, which can be used for event lookup via the events API
org_id integer false none org_id for this event.
version string false none The event version of this event for the category it falls under
event_id string false none Unique request/transaction identifier of the API request / context from which this event was generated
event_type string true* none Event name that clearly describes the event
status string true* none Status of the event; usually a mapping of api_status_code to a generic result string; nil if no action. For presentation purposes only.
severity string true* none This event's level of importance
timestamp string(date-time) true* none RFC 3339 timestamp at which this event was originally created
pce_fqdn string true* none Fully qualified domain name of the PCE, where this event originated
created_by object true* none The entity responsible for the creation of this event
» user object false none The user responsible for the creation of this event
»» href string true* none This user's href
»» username null,string true* none This user's username
» agent object false none The agent responsible for the creation of this event
»» href string false none This agent's href
»» hostname string false none Hostname of this agent
» container_cluster object false none The container_cluster responsible for the creation of this event
»» href string false none This container_cluster's href
»» name string false none Name of this container_cluster
» system object false none The system generated this event

oneOf

Name Type Required Restrictions Description
» anonymous object false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none

continued

Name Type Required Restrictions Description
action any false none none

oneOf

Name Type Required Restrictions Description
» anonymous null false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none
»» href string false none Unique href for this action log event, which can be used for event lookup via the events API
»» event string false none Correlation href identifying the API request / context from which events originated
»» timestamp string(date-time) false none RFC 3339 timestamp at which this event was originally created
»» pce_fqdn string false none Fully qualified domain name of the PCE, where this event originated
»» created_by object false none The entity responsible for the creation of this event

oneOf

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

continued

Name Type Required Restrictions Description
»» event_type string false none Event name that clearly describes the action log event
»» status string false none Status of the event; usually a mapping of api_status_code to a generic result string. For presentation purposes only.
»» severity string false none This event's level of importance
»» task_name string false none The name of the timed worker job from which this event originated
»» api_endpoint null,string false none URI of the API invoked
»» api_method null,string false none Name of API method invoked on some target resource(s)
»» http_status_code null,integer false none HTTP status code returned from the API call.
»» src_ip string false none Source IP of the request for which the event was generated. If the request is coming from the PCE itself, then we should log the IP of the PCE.
»» errors [object] false none Extra information regarding the reason for failure. This property is only for failure events and will not appear in successful events
»»» token string false none Machine readable error message
»»» message string false none Human readable error message
»» info object false none Extra information about the action log event in json format
» resource_changes [object] false none Array of resource log events that were generated during this event
»» href string false none Unique href for this resource log event, which can be used for event lookup via the events API
»» version string false none The event version of this event for the category it falls under
»» org_id integer false none org_id for this event.
»» uuid string false none Unique identifier for this event.
»» event string false none Correlation href identifying the API request / context from which events originated
»» timestamp string(date-time) false none RFC 3339 timestamp at which this event was originally created
»» pce_fqdn string false none Fully qualified domain name of the PCE, where this event originated
»» created_by object false none The entity responsible for the creation of this event

oneOf

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

continued

Name Type Required Restrictions Description
»» resource object true* none Canonical representations of a resource

oneOf

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

continued

Name Type Required Restrictions Description
»» changes object false none Properties of the resource that were changed as a result of the event, with their updated values
»» change_type string true* none Type of change, which occurred for this resource(s)
» notifications [object] false none Array of notification log events that were generated during this event
»» href string false none Unique href for this notification log event, which can be used for event lookup via the events API
»» event string false none Correlation href identifying the API request / context from which events originated
»» timestamp string(date-time) false none RFC 3339 timestamp at which this event was originally created
»» pce_fqdn string false none Fully qualified domain name of the PCE, where this event originated
»» created_by object false none The entity responsible for the creation of this event

oneOf

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

xor

Name Type Required Restrictions Description
»»» anonymous any false none none

continued

Name Type Required Restrictions Description
»» notification_type string false none Notification name that clearly describes the notification log event
»» severity string false none This event's level of importance
»» info null,object false none Extra information about the notification in json format

Enumerated Values

Property Value
severity err
severity warning
severity info

system_events_get

{
  "href": "string",
  "org_id": 0,
  "version": "string",
  "event_id": "string",
  "event_type": "string",
  "status": "string",
  "severity": "string",
  "timestamp": "2025-04-01T00:21:27Z",
  "pce_fqdn": "string",
  "created_by": {},
  "action": null,
  "resource_changes": [
    {
      "href": "string",
      "version": "string",
      "org_id": 0,
      "uuid": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "resource": null,
      "changes": {},
      "change_type": "string"
    }
  ],
  "notifications": [
    {
      "href": "string",
      "event": "string",
      "timestamp": "2025-04-01T00:21:27Z",
      "pce_fqdn": "string",
      "created_by": null,
      "notification_type": "string",
      "severity": "err",
      "info": null
    }
  ]
}

Properties

Name Type Required Restrictions Description
href string false none Unique href for this event, which can be used for event lookup via the events API
org_id integer false none org_id for this event.
version string false none The event version of this event for the category it falls under
event_id string false none Unique request/transaction identifier of the API request / context from which this event was generated
event_type string true* none Event name that clearly describes the event
status string true* none Status of the event; usually a mapping of api_status_code to a generic result string; nil if no action. For presentation purposes only.
severity string true* none This event's level of importance
timestamp string(date-time) true* none RFC 3339 timestamp at which this event was originally created
pce_fqdn string true* none Fully qualified domain name of the PCE, where this event originated
created_by object true* none The entity responsible for the creation of this event
» user object false none The user responsible for the creation of this event
»» href string true* none This user's href
»» username null,string true* none This user's username
» agent object false none The agent responsible for the creation of this event
»» href string false none This agent's href
»» hostname string false none Hostname of this agent
» container_cluster object false none The container_cluster responsible for the creation of this event
»» href string false none This container_cluster's href
»» name string false none Name of this container_cluster
» system object false none The system generated this event

oneOf

Name Type Required Restrictions Description
» anonymous object false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none

xor

Name Type Required Restrictions Description
» anonymous object false none none

continued

Name Type Required Restrictions Description
action any false none none

oneOf

Name Type Required Restrictions Description
» anonymous null false none none

xor

Name Type Required Restrictions Description
» anonymous events_get/properties/action/oneOf/1 false none none

continued

Name Type Required Restrictions Description
resource_changes [events_get/properties/resource_changes/items] false none Array of resource log events that were generated during this event
notifications [events_get/properties/notifications/items] false none Array of notification log events that were generated during this event

jobs_get

{
  "href": "string",
  "job_type": "string",
  "description": null,
  "status": "string",
  "requested_at": "2025-04-01T00:21:27Z",
  "requested_by": {
    "href": "string"
  },
  "terminated_at": "2025-04-01T00:21:27Z",
  "result": null
}

Properties

Name Type Required Restrictions Description
href string true* none The job URI.
job_type string false none An arbitrary designator for the job type or kind, typically supplied by the job requestor.
description string,null false none An arbitrary free-form description of the job, as supplied by the job requestor.
status string true* none The current state of the job, to the effect of its success, failure, etc.
requested_at string(date-time) false none The time (rfc3339 timestamp) at which this job was requested or submitted.
requested_by object false none none
» href string true* none The URI of the user who requested this job.
terminated_at string(date-time) false none The time (rfc3339 timestamp) at which this job terminated, either successfully or failingly.
result object,null false none The result produced by the job, typically a URI (with 'href' sub-property), or an error in case of failure.
» href string false none The href to collect the response body

report_templates_get

{
  "href": "http://example.com",
  "name": "string",
  "enabled": true,
  "show_in_ui": true,
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  }
}

Template for a report type

Properties

Name Type Required Restrictions Description
href string(uri) true* none Report Template URI
name string true* none Display name for this report template
enabled boolean false none Determines whether the report template is enabled for this org
show_in_ui boolean false none Determines whether this report is to be shown in the PCE UI
report_parameters object true* none Any specific parameters required for this report template

anyOf

Name Type Required Restrictions Description
» anonymous object false none Report parameters for executive summary report
»» report_time_range object true* none Time range the report is built across

oneOf

Name Type Required Restrictions Description
»»» anonymous object false none none
»»»» start_date string(date-time) true* none Start date for the range
»»»» end_date string(date-time) true* none End date for the range

xor

Name Type Required Restrictions Description
»»» anonymous object false none none
»»»» last_num_days integer true* none Last x number of days the report is built across

or

Name Type Required Restrictions Description
»»» anonymous object false none Report parameters for traffic flow query report
»»»» report_time_range object true* none Time range the report is built across

oneOf

Name Type Required Restrictions Description
»»»»» anonymous report_templates_get/properties/report_parameters/anyOf/0/properties/report_time_range/oneOf/0 false none none

xor

Name Type Required Restrictions Description
»»»»» anonymous report_templates_get/properties/report_parameters/anyOf/0/properties/report_time_range/oneOf/1 false none none

continued

Name Type Required Restrictions Description
»»»» app_groups [array] true* none App Group Schema for reports
»»»»» label object true* none none
»»»»»» href string true* none Label URI

or

Name Type Required Restrictions Description
»»»»» anonymous object false none Report parameters for explorer report
»»»»»» report_time_range report_templates_get/properties/report_parameters/anyOf/0/properties/report_time_range/oneOf/1 true* none none
»»»»»» filters object true* none none
»»»»»»» query_name string true* none Query Name
»»»»»»» start_date string(date) false none Starting date for query
»»»»»»» end_date string(date) false none Ending date for query
»»»»»»» sources_destinations_query_op string false none Query logical operator between sources and destinations
»»»»»»» sources object true* none Source labels, workloads, IP addresses to include or exclude
»»»»»»»» include traffic_flows_async_queries_post/properties/sources/properties/include true* none List of included sources or targets
»»»»»»»» exclude traffic_flows_async_queries_post/properties/sources/properties/exclude true* none List of excluded sources or targets
»»»»»»» destinations object true* none Target labels, workloads, IP addresses, domain names, transmission to include or exclude
»»»»»»»» include traffic_flows_async_queries_post/properties/destinations/properties/include true* none List of included sources or targets
»»»»»»»» exclude traffic_flows_async_queries_post/properties/destinations/properties/exclude true* none List of excluded sources or targets
»»»»»»» data_sources object false none Data sources of the flows to include or exclude
»»»»»»»» include [string] false none List of included services
»»»»»»»» exclude [string] false none List of excluded data sources
»»»»»»» services object true* none Services (5-tuple of port/to_port/proto/process/service) to include or exclude
»»»»»»»» include [object] true* none List of included services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»» port integer false none Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»» proto integer false none protocol number
»»»»»»»»» process_name string false none Process Name
»»»»»»»»» windows_service_name string false none Windows Service Name
»»»»»»»» exclude [object] true* none List of excluded services (5-tuple of port/to_port/proto/process/service)
»»»»»»»»» port integer false none Port Number (integer 0-65535). Also the starting port when specifying a range.
»»»»»»»»» to_port integer false none High end of port range inclusive if specifying a range. If not specifying a range then don't send this.
»»»»»»»»» proto integer false none protocol number
»»»»»»»»» process_name string false none Process Name
»»»»»»»»» windows_service_name string false none Windows Service Name
»»»»»»»» policy_decisions [string] true* none List of policy decisions
»»»»»»»» boundary_decisions [string] false none List of boundary decisions
»»»»»»»» max_results integer true* none maximum number of flows to return
»»»»»»»» exclude_workloads_from_ip_list_query boolean false none exclude workload traffic when IP List is provided either in consumer or provider part of traffic query

or

Name Type Required Restrictions Description
»»»»»»» anonymous object false none Report parameters for VES report

or

Name Type Required Restrictions Description
»»»»»»» anonymous object false none Returns the rule hit count stats for all the rules in a ruleset during the specified time-range
»»»»»»»» report_time_range object true* none Time range the report is built across

oneOf

Name Type Required Restrictions Description
»»»»»»»»» anonymous report_templates_get/properties/report_parameters/anyOf/0/properties/report_time_range/oneOf/0 false none none

xor

Name Type Required Restrictions Description
»»»»»»»»» anonymous report_templates_get/properties/report_parameters/anyOf/0/properties/report_time_range/oneOf/1 false none none

continued

Name Type Required Restrictions Description
»»»»»»»» rule_sets [object] true* none Returns the rule hit count stats for all the rules in a ruleset during the specified time-range
»»»»»»»»» href string true* none HREF of the ruleset
»»»»»»»» max_results integer false none maximum number of rules to return in the specified time-range in descending order of rule creation time

or

Name Type Required Restrictions Description
»»»»»»» anonymous object false none Report parameters for ransomware risk report
»»»»»»»» report_time_range report_templates_get/properties/report_parameters/anyOf/0/properties/report_time_range/oneOf/1 true* none none

Enumerated Values

Property Value
sources_destinations_query_op and
sources_destinations_query_op or

report_templates_put

{
  "enabled": true
}

Properties

Name Type Required Restrictions Description
enabled boolean false none Determines whether this report template is enabled for this org

report_schedules_get

{
  "href": "http://example.com",
  "report_template": {
    "href": "http://example.com",
    "name": "string"
  },
  "name": "string",
  "report_generation_frequency": "string",
  "scheduled_at": "2025-04-01T00:21:27Z",
  "send_by_email": true,
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  },
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "http://example.com"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "http://example.com"
  }
}

Properties

Name Type Required Restrictions Description
href string(uri) true* none Report Schedule URI
report_template object true* none Template for the report
» href string(uri) true* none Report Template URI
» name string false none Name of the report template
name string true* none Name of the report schedule
report_generation_frequency string true* none Report generation frequency
scheduled_at string(date-time) false none Timestamp in UTC for report generation
send_by_email boolean false none Flag for whether to send user report by email
report_parameters object true* none Any specific parameters required for this report template

anyOf

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/0 false none Report parameters for executive summary report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/1 false none Report parameters for traffic flow query report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/2 false none Report parameters for explorer report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/3 false none Report parameters for VES report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/4 false none Returns the rule hit count stats for all the rules in a ruleset during the specified time-range

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/5 false none Report parameters for ransomware risk report

continued

Name Type Required Restrictions Description
created_at string(date-time) false none Timestamp (rfc3339 timestamp) in UTC when this report schedule was created
created_by object false none none
» href string(uri) true* none The URI of the user who created this report schedule
updated_at string(date-time) false none Timestamp (rfc3339 timestamp) when this report schedule was last updated.
updated_by object false none none
» href string(uri) true* none The URI of the user who updated this report schedule

report_schedules_post

{
  "report_template": {
    "href": "http://example.com"
  },
  "name": "string",
  "send_by_email": true,
  "report_generation_frequency": "daily",
  "scheduled_at": "2025-04-01T00:21:27Z",
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  }
}

Properties

Name Type Required Restrictions Description
report_template object true* none Template for the report
» href string(uri) true* none Report Template URI
name string true* none Name of the report schedule
send_by_email boolean false none Flag for whether to send user report by email
report_generation_frequency string true* none Report generation frequency
scheduled_at string(date-time) false none Timestamp in UTC for report generation
report_parameters object true* none Any specific parameters required for this report template

anyOf

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/0 false none Report parameters for executive summary report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/1 false none Report parameters for traffic flow query report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/2 false none Report parameters for explorer report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/3 false none Report parameters for VES report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/4 false none Returns the rule hit count stats for all the rules in a ruleset during the specified time-range

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/5 false none Report parameters for ransomware risk report

Enumerated Values

Property Value
report_generation_frequency daily
report_generation_frequency weekly
report_generation_frequency monthly
report_generation_frequency quarterly
report_generation_frequency once

report_schedules_put

{
  "report_template": {
    "href": "http://example.com"
  },
  "name": "string",
  "report_format": "pdf",
  "report_generation_frequency": "once",
  "send_by_email": true,
  "scheduled_at": "2025-04-01T00:21:27Z",
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  }
}

Properties

Name Type Required Restrictions Description
report_template object false none Template for the report
» href string(uri) true* none Report Template URI
name string false none Name of the report schedule
report_format string false none Format in which the report should be generated
report_generation_frequency string false none Report generation frequency
send_by_email boolean false none Flag for whether to send user report by email
scheduled_at string(date-time) false none Time stamp in UTC for report generation
report_parameters object false none Any specific parameters required for this report template

anyOf

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/0 false none Report parameters for executive summary report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/1 false none Report parameters for traffic flow query report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/2 false none Report parameters for explorer report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/3 false none Report parameters for VES report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/4 false none Returns the rule hit count stats for all the rules in a ruleset during the specified time-range

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/5 false none Report parameters for ransomware risk report

Enumerated Values

Property Value
report_format pdf
report_format json
report_generation_frequency once
report_generation_frequency daily
report_generation_frequency weekly
report_generation_frequency monthly
report_generation_frequency quarterly

reports_get

{
  "href": "http://example.com",
  "report_template": {
    "href": "http://example.com",
    "name": "string"
  },
  "description": "string",
  "send_by_email": true,
  "progress_percentage": 0,
  "generated_at": null,
  "status": "string",
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  },
  "created_at": "2025-04-01T00:21:27Z",
  "created_by": {
    "href": "http://example.com"
  },
  "updated_at": "2025-04-01T00:21:27Z",
  "updated_by": {
    "href": "http://example.com"
  }
}

Properties

Name Type Required Restrictions Description
href string(uri) true* none Report URI
report_template object true* none Template for the report
» href string(uri) true* none Report Template URI
» name string false none Name of the report template
description string false none Description of the report
send_by_email boolean false none Flag for whether to send user report by email
progress_percentage integer false none Progress percentage for this report
generated_at string,null(date-time) false none Report generation timestamp in UTC
status string true* none Current status of this report
report_parameters object true* none Any specific parameters required for this report template

anyOf

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/0 false none Report parameters for executive summary report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/1 false none Report parameters for traffic flow query report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/2 false none Report parameters for explorer report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/3 false none Report parameters for VES report

or

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/5 false none Report parameters for ransomware risk report

continued

Name Type Required Restrictions Description
created_at string(date-time) false none Timestamp in UTC when this report was created
created_by object false none none
» href string(uri) true* none User who created this report
updated_at string(date-time) false none Timestamp in UTC when this report was last updated.
updated_by object false none none
» href string(uri) true* none User who last updated this report

reports_time_series_statistics_post

[
  {
    "property": "num_managed_workloads",
    "resolution": "day",
    "max_results": 5
  }
]

Properties

Name Type Required Restrictions Description
property string true* none The property for which time series data is requested.
resolution string false none The granularity for the time series data. E.g. day, week, month, quarter
max_results integer false none none

Enumerated Values

Property Value
property num_managed_workloads
property ransomware_protection_coverage_percent
property num_workloads_by_exposure
resolution day
resolution week
resolution month
resolution quarter

reports_post

{
  "report_template": {
    "href": "http://example.com"
  },
  "send_by_email": true,
  "description": "string",
  "report_parameters": {
    "report_time_range": {
      "start_date": "2025-04-01T00:21:27Z",
      "end_date": "2025-04-01T00:21:27Z"
    }
  }
}

Properties

Name Type Required Restrictions Description
report_template object true* none Template for the report
» href string(uri) true* none Report Template URI
send_by_email boolean false none Flag for whether to send user report by email
description string false none Description for the report
report_parameters object true* none Any specific parameters required for this report template

oneOf

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/0 false none Report parameters for executive summary report

xor

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/1 false none Report parameters for traffic flow query report

xor

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/2 false none Report parameters for explorer report

xor

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/3 false none Report parameters for VES report

xor

Name Type Required Restrictions Description
» anonymous report_templates_get/properties/report_parameters/anyOf/4 false none Returns the rule hit count stats for all the rules in a ruleset during the specified time-range

reports_put

{
  "status": "cancel_requested"
}

Properties

Name Type Required Restrictions Description
status string false none State of the report

Enumerated Values

Property Value
status cancel_requested

settings_reports_get

{
  "href": "http://example.com",
  "max_queued_reports": 0,
  "report_retention_days": 1
}

Properties

Name Type Required Restrictions Description
href string(uri) false none Report Setting URI
max_queued_reports integer false none maximum number of queued reports at anytime per org
report_retention_days integer false none Number of days a report would be retained for

settings_reports_put

{
  "max_queued_reports": 1,
  "report_retention_days": 1
}

Properties

Name Type Required Restrictions Description
max_queued_reports integer false none maximum number of queued reports at anytime per org
report_retention_days integer false none Number of days a report would be retained for

product_version_get

{
  "product_version": {
    "version": "string",
    "build": 0,
    "release_info": "string",
    "engineering_info": "string",
    "long_display": "string",
    "short_display": "string",
    "product_name": "string"
  }
}

Properties

None

noop_get

{}

Properties

None

--

Copyright 2018-2025 Illumio, Inc. All rights reserved.