AppWithTiersRequest
AppWithTiersRequest
JSON Example
{
"name": "fbad_app1",
"entity_id": "18230:561:264351372",
"source_group_entity_id": [
"18230:565:264351372"
],
"enable_intent": true,
"tiers": [
{
"name": "fbad-tier-1",
"entity_id": "18230:562:264351372",
"source_group_entity_id": [
"18230:566:264351372"
],
"group_membership_criteria": [
{
"membership_type": "SearchMembershipCriteria",
"search_membership_criteria": {
"entity_type": "VirtualMachine",
"filter": "security_groups.entity_id = '18230:82:604573173'"
}
},
{
"membership_type": "IPAddressMembershipCriteria",
"ip_address_membership_criteria": {
"ip_addresses": [
"10.0.0.1",
"10.0.0.1/24",
"10.0.0.1-10.0.0.200"
]
}
}
],
"member_list": {
"vms": [
{
"key": {
"entity_id": "18230:1:1158969162",
"entity_type": "VIRTUALMACHINE"
},
"name": "VM1"
},
{
"key": {
"entity_id": "18230:601:863301375",
"entity_type": "EC2INSTANCE"
},
"name": "EC2-VM1"
},
{
"key": {
"entity_id": "18230:1702:264351372",
"entity_type": "AZUREVM"
},
"name": "Azure-VM1"
}
]
},
"physical_ips": [
{
"key": {
"entity_id": "18230:541:365252372",
"entity_type": "IPENDPOINT"
},
"name": "52.35.41.245"
}
],
"kubernetes_services": [
{
"key": {
"entity_id": "18230:1504:263252172",
"entity_type": "KUBERNETESSERVICE"
},
"name": "KS"
}
]
}
]
}
string
name
Optional
name
string
entity_id
Optional
entity_id
array of string
source_group_entity_id
Optional
Entity ID of corresponding discovered application. It's recommended to not merge tiers and use only one source group.
boolean
enable_intent
Optional
Enabling intent will enable 2 intents which will creates a dynamic threshold configuration that analyses "Application flow health" and "Application flow utilization" for all VMs belonging to the application at tier level and generates alerts if violation is detected for any of them based on their historic behavior.