NSX-T Data Center Global Manager REST API
Associated URIs:
API Description | API Path |
---|---|
List policy draftsList policy drafts. |
GET /global-manager/api/v1/global-infra/drafts
|
Delete a manual draftDelete a manual draft. |
DELETE /global-manager/api/v1/global-infra/drafts/{draft-id}
|
Read draftRead a draft for a given draft identifier. |
GET /global-manager/api/v1/global-infra/drafts/{draft-id}
|
Patch a manual draftCreate a new manual draft if the specified draft id does not correspond to an existing draft. Update the manual draft otherwise. Auto draft can not be updated. |
PATCH /global-manager/api/v1/global-infra/drafts/{draft-id}
|
Publish a draftRead a draft and publish it by applying changes onto current configuration. If there are additional changes on top of draft configuration, pass it as a request body, in form of Infra object. Otherwise, if there are no additional changes, then pass empty Infra object as a request body. |
POST /global-manager/api/v1/global-infra/drafts/{draft-id}?action=publish
|
Create or update a manual draftCreate a new manual draft if the specified draft id does not correspond to an existing draft. Update the manual draft otherwise. Auto draft can not be updated. |
PUT /global-manager/api/v1/global-infra/drafts/{draft-id}
|
Get an aggregated configuration for the draftGet an aggregated configuration that will get applied onto current configuration during publish of this draft. The response is a hierarchical payload containing the aggregated configuration differences from the latest auto draft till the specified draft. |
GET /global-manager/api/v1/global-infra/drafts/{draft-id}/aggregated
|
Get paginated aggregated configuration for the draftGet a paginated aggregated configuration of a given draft. This aggregated configuration is the differnece between the current published firewall configuration and a firewall configuration stored in a given draft. For an initial API call, if request_id is present in a response, then this is a paginated aggregated configuration of a given draft, containing all the security policies from the aggregated configuration. Using this request_id, more granular aggregated configuration, at security policy level, can be fetched from subsequent API calls. Absence of request_id suggests that whole aggregated configuration has been returned as a response to initial API call, as the size of aggregated configuration is not big enough to need pagination. |
GET /global-manager/api/v1/global-infra/drafts/{draft-id}/aggregated_with_pagination
|
Get a preview of a configuration after publish of a draftGet a preview of a configuration which will be present after publish of a specified draft. The response essentially is a hierarchical payload containing the configuration, which will be in active after a specified draft gets published onto current configuration. |
GET /global-manager/api/v1/global-infra/drafts/{draft-id}/complete
|
Get PolicyFirewallSchedulersGet all PolicyFirewallSchedulers |
GET /global-manager/api/v1/global-infra/firewall-schedulers
|
Delete Policy Firewall SchedulerDeletes the specified PolicyFirewallScheduler. If scheduler is consumed in a security policy, it won't get deleted. |
DELETE /global-manager/api/v1/global-infra/firewall-schedulers/{firewall-scheduler-id}
|
Get PolicyFirewallSchedulerGet a PolicyFirewallScheduler by id |
GET /global-manager/api/v1/global-infra/firewall-schedulers/{firewall-scheduler-id}
|
Create or Update PolicyFirewallSchedulerCreates/Updates a PolicyFirewallScheduler, which can be set at security policy. Note that at least one property out of "days", "start_date", "time_interval", "end_date" is required if "recurring" field is true. Also "start_time" and "end_time" should not be present. And if "recurring" field is false then "start_date" and "end_date" is mandatory, "start_time" and "end_time" is optional. Also the fields "days" and "time_interval" should not be present. |
PATCH /global-manager/api/v1/global-infra/firewall-schedulers/{firewall-scheduler-id}
|
Create or Update PolicyFirewallSchedulerUpdates a PolicyFirewallScheduler, which can be set at security policy. Note that at least one property out of "days", "start_date", "time_interval", "end_date" is required if "recurring" field is true. Also "start_time" and "end_time" should not be present. And if "recurring" field is false then "start_date" and "end_date" is mandatory, "start_time" and "end_time" is optional. Also the fields "days" and "time_interval" should not be present. |
PUT /global-manager/api/v1/global-infra/firewall-schedulers/{firewall-scheduler-id}
|
Get dfw firewall configurationGet the current dfw firewall configurations. |
GET /global-manager/api/v1/global-infra/settings/firewall/security
|
Update dfw firewall configurationUpdate dfw firewall related configurations. Turning off distributed services ("enable_firewall": false) will turn off Distributed Firewall, Identity Firewall, Distributed Intrusion Detection and Prevention Service, Distributed Load Balancer. |
PATCH /global-manager/api/v1/global-infra/settings/firewall/security
|
Update dfw firewall configurationUpdate dfw firewall related configurations. Turning off distributed services ("enable_firewall": false) will turn off Distributed Firewall, Identity Firewall, Distributed Intrusion Detection and Prevention Service, Distributed Load Balancer. |
PUT /global-manager/api/v1/global-infra/settings/firewall/security
|
Get the list of distributed firewall dependent servicesGet the list of distributed firewall dependent services |
GET /global-manager/api/v1/global-infra/settings/firewall/security/dependent-services
|
Read security policy exclude listRead exclude list for firewall |
GET /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list
|
Read security policy exclude list including system and user excluded membersRead security policy exclude list including system and user excluded members. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list?system_owned=true
|
Patch exclusion list for security policyPatch exclusion list for security policy. |
PATCH /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list
|
Filter the firewall exclude listFilter the firewall exclude list by the given object, to check whether the object is a member of this exclude list. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list?action=filter
|
Create or update exclusion list for security policyUpdate the exclusion list for security policy |
PUT /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list
|