Admission Control Policies - CrowdStrike/falconpy GitHub Wiki
| Operation ID | Description | ||||
|---|---|---|---|---|---|
|
Get admission control policies. | ||||
|
Create an admission control policy. | ||||
|
Update an admission control policy. | ||||
|
Delete an admission control policy. | ||||
|
Add one or more host groups to an admission control policy. | ||||
|
Remove one or more host groups from an admission control policy. | ||||
|
Update admission control policy precedence. | ||||
|
Add one or more custom Rego rules to a rule group in an admission control policy. | ||||
|
Delete one or more custom Rego rules from all rule groups in an admission control policy. | ||||
|
Change precedence of rule groups within an admission control policy. | ||||
|
Replace labels and/or namespaces of a rule group within an admission control policy. | ||||
|
Create one or more rule groups and add them to an existing admission control policy. | ||||
|
Update a rule group. | ||||
|
Delete rule groups. | ||||
|
Search admission control policies. | ||||
WARNING
client_idandclient_secretare keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Get admission control policies.
get_policies
| Method | Route |
|---|---|
/admission-control-policies/entities/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids | query | string or list of strings | The list of policies to return (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.get_policies(ids=id_list)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.admission_control_get_policies(ids=id_list)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("admission_control_get_policies", ids=id_list)
print(response)Back to Table of Contents
Create an admission control policy.
create_policy
| Method | Route |
|---|---|
/admission-control-policies/entities/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| description | body | string | Policy description. | ||
| name | body | string | Policy name. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.create_policy(description="string", name="string")
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_create_policy(description="string", name="string")
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"description": "string",
"name": "string"
}
response = falcon.command("admission_control_create_policy", body=body_payload)
print(response)Back to Table of Contents
Update an admission control policy.
update_policy
| Method | Route |
|---|---|
/admission-control-policies/entities/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids | query | string | The id of the admission control policy to update. | ||
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| description | body | string | Policy description. | ||
| is_enabled | body | boolean | Flag indicating if the policy is enabled. | ||
| name | body | string | Policy name. | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.update_policy(ids="string",
description="string",
is_enabled=boolean,
name="string"
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_update_policy(ids="string",
description="string",
is_enabled=boolean,
name="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"description": "string",
"is_enabled": boolean,
"name": "string"
}
response = falcon.command("admission_control_update_policy", ids="string", body=body_payload)
print(response)Back to Table of Contents
Delete an admission control policy.
delete_policies
| Method | Route |
|---|---|
/admission-control-policies/entities/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| ids | query | string or list of strings | The ids of the policies to delete (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.delete_policies(ids=id_list)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.admission_control_delete_policies(ids=id_list)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("admission_control_delete_policies", ids=id_list)
print(response)Back to Table of Contents
Add one or more host groups to an admission control policy.
add_host_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-host-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| host_groups | body | string or list of strings | Host group IDs to add. | ||
| id | body | string | The policy ID to modify. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.add_host_groups(host_groups=["string", "string"],
id="string"
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_add_host_groups(host_groups=["string", "string"],
id="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"host_groups": [
"string"
],
"id": "string"
}
response = falcon.command("admission_control_add_host_groups", body=body_payload)
print(response)Back to Table of Contents
Remove one or more host groups from an admission control policy.
remove_host_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-host-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| policy_id | query | string | The id of the policy to modify. | ||
| host_group_ids | query | string or list of strings | The ids of the host groups to remove (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.remove_host_groups(policy_id="string",
host_group_ids=["string", "string"]
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_remove_host_groups(policy_id="string",
host_group_ids=["string", "string"]
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("admission_control_remove_host_groups",
policy_id="string",
host_group_ids=["string", "string"]
)
print(response)Back to Table of Contents
Update admission control policy precedence.
update_policy_precedence
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-precedence/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| precedence | body | integer | Policy precedence. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.update_policy_precedence(id="string", precedence=integer)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_update_policy_precedence(id="string",
precedence=integer
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"precedence": integer
}
response = falcon.command("admission_control_update_policy_precedence", body=body_payload)
print(response)Back to Table of Contents
Add one or more custom Rego rules to a rule group in an admission control policy. The requested custom rules are also added to all other unspecified rule groups in the policy with action 'Disabled'.
add_custom_rules
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-group-custom-rules/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | Rule groups containing custom rules to add. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"id": "string"
}
]
response = falcon.add_custom_rules(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"id": "string"
}
]
response = falcon.admission_control_add_rule_group_custom_rule(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"id": "string"
}
]
}
response = falcon.command("admission_control_add_rule_group_custom_rule", body=body_payload)
print(response)Back to Table of Contents
Delete one or more custom Rego rules from all rule groups in an admission control policy.
delete_custom_rules
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-group-custom-rules/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| policy_id | query | string | The id of the policy to modify. | ||
| custom_rule_ids | query | string or list of strings | The ids of the custom Rego rules to delete (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.delete_custom_rules(policy_id="string",
custom_rule_ids=["string", "string"]
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_remove_rule_group_custom_rule(policy_id="string",
custom_rule_ids=["string", "string"]
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("admission_control_remove_rule_group_custom_rule",
policy_id="string",
custom_rule_ids=["string", "string"]
)
print(response)Back to Table of Contents
Change precedence of rule groups within an admission control policy.
set_rule_group_precedence
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-group-precedence/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | List of rule groups in precedence order. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"id": "string"
}
]
response = falcon.set_rule_group_precedence(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"id": "string"
}
]
response = falcon.admission_control_set_rule_group_precedence(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"id": "string"
}
]
}
response = falcon.command("admission_control_set_rule_group_precedence", body=body_payload)
print(response)Back to Table of Contents
Replace labels and/or namespaces of a rule group within an admission control policy.
replace_rule_group_selectors
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-group-selectors/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | Rule groups with labels and/or namespaces to replace. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"id": "string",
"labels": [
{
"key": "string",
"operator": "string",
"value": "string"
}
],
"namespaces": [
{
"value": "string"
}
]
}
]
response = falcon.replace_rule_group_selectors(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"id": "string",
"labels": [
{
"key": "string",
"operator": "string",
"value": "string"
}
],
"namespaces": [
{
"value": "string"
}
]
}
]
response = falcon.admission_control_replace_rule_group_selectors(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"id": "string",
"labels": [
{
"key": "string",
"operator": "string",
"value": "string"
}
],
"namespaces": [
{
"value": "string"
}
]
}
]
}
response = falcon.command("admission_control_replace_rule_group_selectors", body=body_payload)
print(response)Back to Table of Contents
Create one or more rule groups and add them to an existing admission control policy.
create_rule_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. | ||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | Rule groups to create. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"description": "string",
"name": "string"
}
]
response = falcon.create_rule_groups(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"description": "string",
"name": "string"
}
]
response = falcon.admission_control_create_rule_groups(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"description": "string",
"name": "string"
}
]
}
response = falcon.command("admission_control_create_rule_groups", body=body_payload)
print(response)Back to Table of Contents
Update a rule group. Change rule group name, description, deny on error, Image Assessment settings, default rule actions, and custom rule actions.
update_rule_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| body | body | dictionary | Full body payload as JSON formatted dictionary. Valid rule action values: Disabled, Prevent, Alert. Valid image assessment unassessed handling values: Prevent, Alert, Allow Without Alert. |
||
| id | body | string | Policy ID. | ||
| rule_groups | body | list of dictionaries | Rule groups to update. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"default_rules": [
{
"action": "string",
"code": "string"
}
],
"deny_on_error": {
"deny": boolean
},
"description": "string",
"id": "string",
"image_assessment": {
"enabled": boolean,
"unassessed_handling": "string"
},
"name": "string"
}
]
response = falcon.update_rule_groups(id="string", rule_groups=rule_groups)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
rule_groups = [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"default_rules": [
{
"action": "string",
"code": "string"
}
],
"deny_on_error": {
"deny": boolean
},
"description": "string",
"id": "string",
"image_assessment": {
"enabled": boolean,
"unassessed_handling": "string"
},
"name": "string"
}
]
response = falcon.admission_control_update_rule_groups(id="string",
rule_groups=rule_groups
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
body_payload = {
"id": "string",
"rule_groups": [
{
"custom_rules": [
{
"action": "string",
"id": "string"
}
],
"default_rules": [
{
"action": "string",
"code": "string"
}
],
"deny_on_error": {
"deny": boolean
},
"description": "string",
"id": "string",
"image_assessment": {
"enabled": boolean,
"unassessed_handling": "string"
},
"name": "string"
}
]
}
response = falcon.command("admission_control_update_rule_groups", body=body_payload)
print(response)Back to Table of Contents
Delete rule groups.
delete_rule_groups
| Method | Route |
|---|---|
/admission-control-policies/entities/policy-rule-groups/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| policy_id | query | string | The id of the policy to modify. | ||
| rule_group_ids | query | string or list of strings | The ids of the rule groups to delete (maximum 100 IDs allowed). | ||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.delete_rule_groups(policy_id="string",
rule_group_ids=["string", "string"]
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_delete_rule_groups(policy_id="string",
rule_group_ids=["string", "string"]
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("admission_control_delete_rule_groups",
policy_id="string",
rule_group_ids=["string", "string"]
)
print(response)Back to Table of Contents
Search admission control policies.
query_policies
| Method | Route |
|---|---|
/admission-control-policies/queries/policies/v1 |
- Produces: application/json
| Name | Service | Uber | Type | Data type | Description |
|---|---|---|---|---|---|
| filter | query | string | FQL filter. Allowed properties: precedence, created_timestamp, modified_timestamp, name, description. |
||
| limit | query | integer | The maximum number of resources to return. The maximum allowed is 500. [Default: 100] | ||
| offset | query | integer | The number of results to skip before starting to return results. [Default: 0] | ||
| sort | query | string | Field to sort on. Sortable fields: precedence, created_timestamp, modified_timestamp. Use the |asc or |desc suffix to specify sort direction. |
||
| parameters | query | dictionary | Full set of query string parameters in a JSON formatted dictionary. |
from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.query_policies(filter="string",
limit=integer,
offset=integer,
sort="string"
)
print(response)from falconpy import AdmissionControlPolicies
# Do not hardcode API credentials!
falcon = AdmissionControlPolicies(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.admission_control_query_policies(filter="string",
limit=integer,
offset=integer,
sort="string"
)
print(response)from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("admission_control_query_policies",
filter="string",
limit=integer,
offset=integer,
sort="string"
)
print(response)Back to Table of Contents
