Finds Attack discovery schedules that match the search criteria Technical Preview; added in 9.2.0

View as Markdown
GET /api/attack_discovery/schedules/_find

Spaces method and path for this operation:

get /s/{space_id}/api/attack_discovery/schedules/_find

Refer to Spaces for more information.

Finds Attack discovery schedules that match the search criteria. Supports pagination and sorting by various fields. Technical preview

Query parameters

  • page number

    Page number to return (used for pagination). Defaults to 1.

  • per_page number

    Number of Attack discovery schedules to return per page (used for pagination). Defaults to 10.

  • sort_field string(nonempty)

    Field used to sort results. Common fields include 'name', 'created_at', 'updated_at', and 'enabled'.

    Minimum length is 1.

  • sort_direction string

    Sort order direction. Use 'asc' for ascending or 'desc' for descending. Defaults to 'asc'.

    Values are asc or desc.

Responses

  • 200 application/json

    Successful response

    Hide response attributes Show response attributes object
    • data array[object] Required

      Array of matched Attack discovery schedule objects.

      An attack discovery schedule

      Hide data attributes Show data attributes object
      • actions array[object] Required

        The attack discovery schedule actions

        One of:
      • created_at string(date-time) Required

        The date the schedule was created

      • created_by string Required

        The name of the user that created the schedule

      • enabled boolean Required

        Indicates whether the schedule is enabled

      • id string Required

        UUID of attack discovery schedule

      • last_execution object

        An attack discovery schedule execution information

        Hide last_execution attributes Show last_execution attributes object
        • date string(date-time) Required

          Date of the execution

        • duration number

          Duration of the execution

        • message string
        • status string Required

          An attack discovery schedule execution status

          Values are ok, active, error, unknown, or warning.

      • name string Required

        The name of the schedule

      • params object Required

        An attack discovery schedule params

        Hide params attributes Show params attributes object
        • alerts_index_pattern string Required

          The index pattern to get alerts from

        • api_config object Required

          LLM API configuration.

          Hide api_config attributes Show api_config attributes object
          • actionTypeId string Required

            Action type ID

          • connectorId string Required

            Connector ID

          • defaultSystemPromptId string

            Default system prompt ID

          • model string

            Model

          • provider string

            Provider

            Values are OpenAI, Azure OpenAI, or Other.

          • name string Required

            The name of the connector

        • combined_filter object

          Additional properties are allowed.

        • end string
        • filters array

          The filter array used to define the conditions for when alerts are selected as an attack discovery context. Defaults to an empty array.

        • query object

          An query condition to filter alerts

          Hide query attributes Show query attributes object
        • size number Required
        • start string
      • schedule object Required
        Hide schedule attribute Show schedule attribute object
        • interval string Required

          The schedule interval

      • updated_at string(date-time) Required

        The date the schedule was updated

      • updated_by string Required

        The name of the user that updated the schedule

    • page number Required

      Current page number of the paginated result set.

    • per_page number Required

      Number of items requested per page.

    • total number Required

      Total number of Attack discovery schedules matching the query (across all pages).

  • 400 application/json

    Generic Error

    Hide response attributes Show response attributes object
    • error string

      Error type

    • message string

      Human-readable error message

    • status_code number

      HTTP status code

GET /api/attack_discovery/schedules/_find
curl \
 --request GET 'http://localhost:5601/api/attack_discovery/schedules/_find' \
 --header "Authorization: $API_KEY" \
 --header "Content-Type: application/json"