ves-io-schema-app_security-AppSecurityMonitoringAPI-SuspiciousUserLogsScrollQuery
On This Page:
Examples of performing app_security AppSecurityMonitoringAPI SuspiciousUserLogsScrollQuery
Usecase:
Suspicious user logs scroll request for virtual host vhost1
in namespace ns1
Request:
Request using vesctl:
vesctl request rpc app_security.AppSecurityMonitoringAPI.SuspiciousUserLogsScrollQuery -i request.yaml --uri /public/namespaces/ns1/app_security/suspicious_user_logs/scroll --http-method GET
where file request.yaml has following contents:
scrollId: DXF1ZXJ5QW5kRmV0Y2gBAAAAAAAAAD4WYm9laVYtZndUQlNsdDcwakFMNjU1QQ==
vesctl yaml response:
aggs: {}
logs: []
Request using curl:
curl -X 'GET' -H 'Content-Type: application/json' -H 'X-Volterra-Useragent: v1/pgm=_tmp_go-build1372770011_b001_apidocs.test/host=docker-desktop' 'https://acmecorp.console.ves.volterra.io/api/data/namespaces/ns1/app_security/suspicious_user_logs/scroll?namespace=&scroll_id=DXF1ZXJ5QW5kRmV0Y2gBAAAAAAAAAD4WYm9laVYtZndUQlNsdDcwakFMNjU1QQ