ves-io-schema-app_security-AppSecurityMonitoringAPI-SuspiciousUserLogsScrollQuery
On This Page:
Examples of performing app_security AppSecurityMonitoringAPI SuspiciousUserLogsScrollQuery
Usecase:
Suspicious user logs scroll request for virtual host vhost1
in namespace ns1
Request:
Request using vesctl:
vesctl request rpc app_security.AppSecurityMonitoringAPI.SuspiciousUserLogsScrollQuery -i request.yaml --uri /public/namespaces/ns1/app_security/suspicious_user_logs/scroll --http-method GET
where file request.yaml has following contents:
scrollId: DXF1ZXJ5QW5kRmV0Y2gBAAAAAAAAAD4WYm9laVYtZndUQlNsdDcwakFMNjU1QQ==
vesctl yaml response:
aggs: {}
logs: []
Request using curl:
curl -X 'GET' -H 'Content-Type: application/json' -H 'X-Volterra-Useragent: v1/pgm=_var_folders_2__8qnt6fwd5dvglr1xqq6l8b7w0000gp_T_go-build2547058132_b001_apidocs.test/host=C02FN35BMD6R/svc=S:examplesvc/site=mytestce01' 'https://acmecorp.console.ves.volterra.io/api/data/namespaces/ns1/app_security/suspicious_user_logs/scroll?namespace=&scroll_id=DXF1ZXJ5QW5kRmV0Y2gBAAAAAAAAAD4WYm9laVYtZndUQlNsdDcwakFMNjU1QQ%3D%3D'
curl response:
HTTP/1.1 200 OK
Content-Length: 76
Content-Type: application/json
Date: Fri, 08 Sep 2023 16:01:23 GMT
Vary: Accept-Encoding
{
"logs": [
],
"total_hits": "0",
"aggs": {
},
"scroll_id": ""
}