Contains the configuration options for preventing disk fill-up.
GET https://<IP-address-of-SPS>/api/configuration/management/disk_fillup_prevention
Cookie name | Description | Required | Values |
---|---|---|---|
session_id | Contains the authentication token of the user | Required |
The value of the session ID cookie received from the REST server in the authentication response, for example, a1f71d030e657634730b9e887cb59a5e56162860. For details on authentication, see Authenticate to the SPS REST API. Note that this session ID refers to the connection between the REST client and the SPS REST API. It is not related to the sessions that SPS records (and which also have a session ID, but in a different format). |
The following command lists disk fill-up prevention options.
curl --cookie cookies https://<IP-address-of-SPS>/api/configuration/management/disk_fillup_prevention
The following is a sample response received when listing disk fill-up prevention settings.
For details of the meta object, see Message format.
{ "body": { "archiving_enabled": false, "enabled": true, "used_space_ratio_limit": 80 }, "key": "disk_fillup_prevention", "meta": { "first": "/api/configuration/management/certificates", "href": "/api/configuration/management/disk_fillup_prevention", "last": "/api/configuration/management/webinterface", "next": "/api/configuration/management/email", "parent": "/api/configuration/management", "previous": "/api/configuration/management/certificates", "transaction": "/api/transaction" } }
To modify the disk fill-up prevention settings, you have to:
For details, see Open a transaction.
PUT the modified JSON object to the https://<IP-address-of-SPS>/api/configuration/management/disk_fillup_prevention endpoint. You can find a detailed description of the available parameters listed in Element .
For details, see Commit a transaction.
The following table lists the typical status and error codes for this request. For a complete list of error codes, see Application level error codes.
Code | Description | Notes |
---|---|---|
201 | Created | The new resource was successfully created. |
401 | Unauthenticated | The requested resource cannot be retrieved because the client is not authenticated and the resource requires authorization to access it. The details section contains the path that was attempted to be accessed, but could not be retrieved. |
401 | AuthenticationFailure | Authenticating the user with the given credentials has failed. |
404 | NotFound | The requested object does not exist. |
Configuration settings for SMTP server address and authentication, administrator e-mail, and e-mail addresses for alerts and reports.
GET https://<IP-address-of-SPS>/api/configuration/management/email
Cookie name | Description | Required | Values |
---|---|---|---|
session_id | Contains the authentication token of the user | Required |
The value of the session ID cookie received from the REST server in the authentication response, for example, a1f71d030e657634730b9e887cb59a5e56162860. For details on authentication, see Authenticate to the SPS REST API. Note that this session ID refers to the connection between the REST client and the SPS REST API. It is not related to the sessions that SPS records (and which also have a session ID, but in a different format). |
The following command lists mail settings.
curl --cookie cookies https://<IP-address-of-SPS>/api/configuration/management/email
The following is a sample response received when listing mail settings.
For details of the meta object, see Message format.
{ "body": { "admin_address": "<admin-email>", "alerting_address": "<alerts-target-email>", "reporting_address": "<reports-target-email>", "sender_address": null, "smtp_auth": { "enabled": false }, "smtp_encryption": { "selection": "disabled" }, "smtp_server": { "selection": "ip", "value": "<smtp-server-ip>" } }, "key": "email", "meta": { "first": "/api/configuration/management/certificates", "href": "/api/configuration/management/email", "last": "/api/configuration/management/webinterface", "next": "/api/configuration/management/health_monitoring", "parent": "/api/configuration/management", "previous": "/api/configuration/management/disk_fillup_prevention", "transaction": "/api/transaction" } }
Element | Type | Description | ||
---|---|---|---|---|
key | string | Top level element, contains the ID of the endpoint. | ||
body | Top level element (string) | Contains the configuration options for e-mail. | ||
admin_address | string | The e-mail address of the administrator of SPS. | ||
alerting_address | string | The e-mail address where monitoring alerts are sent. | ||
reporting_address | string | The e-mail address where traffic reports are sent. | ||
sender_address | string | The address of the sender (SPS). | ||
smtp_auth | Top level item | Configures authentication to the SMTP server. | ||
enabled | boolean | Set to true to enable authenticating to the SMTP server. | ||
password | string |
References the password of the authenticating user. You configure passwords at the /api/configuration/passwords/ endpoint. To modify or add a password, use the value of the returned key as the value of the password element, and remove any child elements (including the key). | ||
username | string | The username for authenticating to the SMTP server. | ||
smtp_encryption | Top level item | Configuration settings for encrypting the communication between SPS and the SMTP server. | ||
smtp_server | Top level item | Contains the address of the SMTP server. | ||
selection | string |
Defines the address type (IP or domain name). Possible values are:
| ||
value | string | The address of the SMTP server. |
Elements of smtp_encryption | Type | Description | |
---|---|---|---|
client_authentication | Top level item |
Configures authenticating as a client with an X.509 certificate. Can only be enabled if the value of the selection element is set to starttls. | |
enabled | boolean |
Set to true to enable authenticating as a client with an X.509 certificate. Can only be enabled if the value of the selection element of snmp_encryption is set to starttls. | |
x509_identity |
References the identifier of the authenticating client's X.509 certificate. You can configure certificates at the /api/configuration/x509/ endpoint. To modify or add an X.509 certificate, use the value of the returned key as the value of the x509_identity element, and remove any child elements (including the key). For details, see Certificates stored on SPS. | ||
selection | string |
Configures encrypted communication with the SMTP server. The following values are possible:
| |
server_certificate_check | Top level item |
Configuration settings for validating the SMTP server's certificate. Can only be enabled if the value of the selection element is set to starttls. | |
enabled | boolean |
Set to true to enable validating the SMTP server's certificate. Can only be enabled if the value of the selection element of snmp_encryption is set to starttls. | |
server_certificate_ca | string | The CA certificate of the Certificate Authority. |
Enable authentication to the SMTP server.
{ "admin_address": "<admin-email>", "alerting_address": "<alerts-target-email>", "reporting_address": "<reports-target-email>", "sender_address": null, "smtp_auth": { "enabled": true, "password": { "key": "aec663b5-f5bd-4c93-bb51-36fea3328e58", "meta": { "href": "/api/configuration/passwords/aec663b5-f5bd-4c93-bb51-36fea3328e58" } }, "username": "<smtp-username>" }, "smtp_encryption": { "selection": "disabled" }, "smtp_server": { "selection": "ip", "value": "<smtp-server-ip>" } }
Configure STARTTLS encryption without certificate checks.
{ "admin_address": "<admin-email>", "alerting_address": "<alerts-target-email>", "reporting_address": "<reports-target-email>", "sender_address": null, "smtp_auth": { "enabled": true, "password": { "key": "0210848a-b301-47d5-9023-779c5fe951f7", "meta": { "href": "/api/configuration/passwords/0210848a-b301-47d5-9023-779c5fe951f7" } }, "username": "<smtp-username>" }, "smtp_encryption": { "client_authentication": { "enabled": false }, "selection": "starttls", "server_certificate_check": { "enabled": false } }, "smtp_server": { "selection": "ip", "value": "<smtp-server-ip>" } }
Configure STARTTLS encryption with server certificate check, and authenticate as client with an X.509 certificate.
{ "admin_address": "<admin-email>", "alerting_address": "<alerts-target-email>", "reporting_address": "<reports-target-email>", "sender_address": null, "smtp_auth": { "enabled": true, "password": { "key": "37716c4f-759d-4900-9740-ea22211498cf", "meta": { "href": "/api/configuration/passwords/37716c4f-759d-4900-9740-ea22211498cf" } }, "username": "<smtp-username>" }, "smtp_encryption": { "client_authentication": { "enabled": true, "x509_identity": { "key": "c3a23e32-d75b-461e-afc0-14d1f6692879", "meta": { "href": "/api/configuration/x509/c3a23e32-d75b-461e-afc0-14d1f6692879" } } }, "selection": "starttls", "server_certificate_check": { "enabled": true, "server_certificate_ca": "<ca-cert>" } }, "smtp_server": { "selection": "ip", "value": "<smtp-server-ip>" } }
CA certificates must not contain any metadata. SPS uses only the key part of the certificate.
To use a certificate with the SPS API, remove all metadata, and substitute line breaks with \n.
The following is an example certificate, as used on the SPS web interface:
-----BEGIN CERTIFICATE----- MIIDnDCCAoQCCQDc536Ob5tPQTANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMC Q0ExEDAOBgNVBAgTB09udGFyaW8xEDAOBgNVBAcTB1Rvcm9udG8xEDAOBgNVBAoT B0JhbGFiaXQxFjAUBgNVBAsTDURvY3VtZW50YXRpb24xEDAOBgNVBAMTB2JhbGFi aXQxIDAeBgkqhkiG9w0BCQEWEWNhdGFpbEBiYWxhYml0Lmh1MB4XDTE2MDQyMjE2 MDAyNloXDTE3MDQyMjE2MDAyNlowgY8xCzAJBgNVBAYTAkNBMRAwDgYDVQQIEwdP bnRhcmlvMRAwDgYDVQQHEwdUb3JvbnRvMRAwDgYDVQQKEwdCYWxhYml0MRYwFAYD VQQLEw1Eb2N1bWVudGF0aW9uMRAwDgYDVQQDEwdiYWxhYml0MSAwHgYJKoZIhvcN AQkBFhFjYXRhaWxAYmFsYWJpdC5odTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBAOGa9I2jmVlVdVWEI/Wy7ahTeyaIjK52FQUXqxG8okOSD+nV74ZFUuiS 59X+2Ow1aDqVGrDMgPNhSVpYXUvDUAUOILJW4rAIoxDY6vDU9/4v9dDiQfEPlauw 0qNRjPS1MLzjSOQDSKqPkdivkS6HKZeX3+TFq3OxO+vIrF9zFfp9T+eDG2oSobPc 3mV2zkvtD61CXzbezAVdArDl6WnysRyzxyH8WEhFwZepWxFD9Y5N1dzKody7Hncs X5kVIv0+Z6bBHfg/7wHWysJdwNuLr0ByTOvPM6WdA83k3Fy2gYNk7Rc0BbRFbQTX hJVfUzSUWHVhFQtAb4diKU5voqepfNMCAwEAATANBgkqhkiG9w0BAQUFAAOCAQEA R5DIwOHsEKoGkiI3cHC2VMnxP2rRhpTneh6El+DFnQPdjrXa+tnqV4TdnNaD+FvP AB1kqbmC4hJAsjMLU2b1ne6m+SLmzhRuMxcA6x+fnYvcQT57IbRdq2E/4oJGeyuy 0jQE+nmoVD3lDytIOxCfQvZhl1tcbBE5hp5USme4PmNhY6QfUlgjsFjPfoVG7XDB uNaUoWS6RvZPmL5IuvF9tqe96ES6DTjC8rBfQYvSoVNjjPnUMx0C8xstRSEG7oJc N5+4ImYnFNxSG20hZpFy0OFDf2g7Fx+W50/NtXamUF1Sf8WlPZc03oVl1/Fzo7mt qYyyD1ld89OUEYZ+aJQd/A== -----END CERTIFICATE-----
The same certificate, as accepted by the SPS API:
"certificate": "-----BEGIN CERTIFICATE-----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\nqYyyD1ld89OUEYZ+aJQd/A==\n-----END CERTIFICATE-----\n"
To modify mail settings, you have to:
For details, see Open a transaction.
PUT the modified JSON object to the https://<IP-address-of-SPS>/api/configuration/management/email endpoint. You can find a detailed description of the available parameters listed in Element .
For details, see Commit a transaction.
The following table lists the typical status and error codes for this request. For a complete list of error codes, see Application level error codes.
Code | Description | Notes |
---|---|---|
201 | Created | The new resource was successfully created. |
401 | Unauthenticated | The requested resource cannot be retrieved because the client is not authenticated and the resource requires authorization to access it. The details section contains the path that was attempted to be accessed, but could not be retrieved. |
401 | AuthenticationFailure | Authenticating the user with the given credentials has failed. |
404 | NotFound | The requested object does not exist. |
Configuration settings for monitoring the utilization of SPS.
GET https://<IP-address-of-SPS>/api/configuration/management/health_monitoring
Cookie name | Description | Required | Values |
---|---|---|---|
session_id | Contains the authentication token of the user | Required |
The value of the session ID cookie received from the REST server in the authentication response, for example, a1f71d030e657634730b9e887cb59a5e56162860. For details on authentication, see Authenticate to the SPS REST API. Note that this session ID refers to the connection between the REST client and the SPS REST API. It is not related to the sessions that SPS records (and which also have a session ID, but in a different format). |
The following command lists health monitoring settings.
curl --cookie cookies https://<IP-address-of-SPS>/api/configuration/management/health_monitoring
The following is a sample response received when listing health monitoring settings.
For details of the meta object, see Message format.
{ "body": { "maximum_disk_utilization_ratio": 80, "maximum_load1": null, "maximum_load15": null, "maximum_load5": null, "maximum_swap_utilization_ratio": 70 }, "key": "health_monitoring", "meta": { "first": "/api/configuration/management/certificates", "href": "/api/configuration/management/health_monitoring", "last": "/api/configuration/management/webinterface", "next": "/api/configuration/management/snmp", "parent": "/api/configuration/management", "previous": "/api/configuration/management/email", "transaction": "/api/transaction" } }
To modify health monitoring settings, you have to:
For details, see Open a transaction.
PUT the modified JSON object to the https://<IP-address-of-SPS>/api/configuration/management/health_monitoring endpoint.You can find a detailed description of the available parameters listed in Element .
For details, see Commit a transaction.
The following table lists the typical status and error codes for this request. For a complete list of error codes, see Application level error codes.
Code | Description | Notes |
---|---|---|
201 | Created | The new resource was successfully created. |
401 | Unauthenticated | The requested resource cannot be retrieved because the client is not authenticated and the resource requires authorization to access it. The details section contains the path that was attempted to be accessed, but could not be retrieved. |
401 | AuthenticationFailure | Authenticating the user with the given credentials has failed. |
404 | NotFound | The requested object does not exist. |
Contains the configuration endpoints for SNMP settings.
GET https://<IP-address-of-SPS>/api/configuration/management/snmp
Cookie name | Description | Required | Values |
---|---|---|---|
session_id | Contains the authentication token of the user | Required |
The value of the session ID cookie received from the REST server in the authentication response, for example, a1f71d030e657634730b9e887cb59a5e56162860. For details on authentication, see Authenticate to the SPS REST API. Note that this session ID refers to the connection between the REST client and the SPS REST API. It is not related to the sessions that SPS records (and which also have a session ID, but in a different format). |
The following command lists the endpoints for SNMP configuration settings.
curl --cookie cookies https://<IP-address-of-SPS>/api/configuration/management/snmp
The following is a sample response received when listing SNMP configuration endpoints.
For details of the meta object, see Message format.
{ "items": [ { "key": "trap", "meta": { "href": "/api/configuration/management/snmp/trap" } } ], "meta": { "first": "/api/configuration/management/certificates", "href": "/api/configuration/management/snmp", "last": "/api/configuration/management/webinterface", "next": "/api/configuration/management/soap", "parent": "/api/configuration/management", "previous": "/api/configuration/management/health_monitoring", "transaction": "/api/transaction" } }
Element | Description |
---|---|
trap | Configuration settings for SNMP traps. |
The following table lists the typical status and error codes for this request. For a complete list of error codes, see Application level error codes.
Code | Description | Notes |
---|---|---|
401 | Unauthenticated | The requested resource cannot be retrieved because the client is not authenticated and the resource requires authorization to access it. The details section contains the path that was attempted to be accessed, but could not be retrieved. |
401 | AuthenticationFailure | Authenticating the user with the given credentials has failed. |
404 | NotFound | The requested object does not exist. |
© ALL RIGHTS RESERVED. Termini di utilizzo Privacy Cookie Preference Center