diff --git a/docs/api-generated/rules/rule-apis-passthru.asciidoc b/docs/api-generated/rules/rule-apis-passthru.asciidoc index 2b193c2c20201..45a6ab4c4f43a 100644 --- a/docs/api-generated/rules/rule-apis-passthru.asciidoc +++ b/docs/api-generated/rules/rule-apis-passthru.asciidoc @@ -18,10 +18,52 @@ Any modifications made to this file will be overwritten.
delete /s/{spaceId}/api/alerting/rule/{ruleId}
get /s/{spaceId}/api/alerting/rules/_find
get /s/{spaceId}/api/alerting/rule/{ruleId}
put /s/{spaceId}/api/alerting/rule/{ruleId}
delete /s/{spaceId}/api/alerting/rule/{ruleId}
all
privileges for the appropriate Kibana features, depending on the consumer
and rule_type_id
of the rule you're deleting. For example, the Management > Stack Rules feature, Analytics > Discover or Machine Learning features, Observability, or Security features. WARNING: After you delete a rule, you cannot recover it./s/
and the identifier are omitted from the path, the default space is used. default: null {
- "per_page" : 2,
- "total" : 7,
+ "per_page" : 6,
+ "total" : 1,
"data" : [ {
"throttle" : "10m",
"created_at" : "2022-12-05T23:36:58.284Z",
"last_run" : {
"alerts_count" : {
- "new" : 0,
"ignored" : 6,
- "recovered" : 1,
- "active" : 5
+ "new" : 1,
+ "recovered" : 5,
+ "active" : 0
},
"outcome_msg" : "outcome_msg",
"warning" : "warning",
@@ -136,10 +178,10 @@ Any modifications made to this file will be overwritten.
"created_at" : "2022-12-05T23:36:58.284Z",
"last_run" : {
"alerts_count" : {
- "new" : 0,
"ignored" : 6,
- "recovered" : 1,
- "active" : 5
+ "new" : 1,
+ "recovered" : 5,
+ "active" : 0
},
"outcome_msg" : "outcome_msg",
"warning" : "warning",
@@ -185,7 +227,7 @@ Any modifications made to this file will be overwritten.
} ],
"consumer" : "alerts"
} ],
- "page" : 5
+ "page" : 0
}
get /s/{spaceId}/api/alerting/rule/{ruleId}
read
privileges for the appropriate Kibana features, depending on the consumer
and rule_type_id
of the rules you're seeking. For example, the Management > Stack Rules feature, Analytics > Discover and Machine Learning features, Observability features, or Security features. To get rules associated with the Stack Monitoring feature, use the monitoring_user
built-in role./s/
and the identifier are omitted from the path, the default space is used. default: null {
+ "throttle" : "10m",
+ "created_at" : "2022-12-05T23:36:58.284Z",
+ "last_run" : {
+ "alerts_count" : {
+ "ignored" : 6,
+ "new" : 1,
+ "recovered" : 5,
+ "active" : 0
+ },
+ "outcome_msg" : "outcome_msg",
+ "warning" : "warning",
+ "outcome" : "succeeded"
+ },
+ "params" : {
+ "key" : ""
+ },
+ "created_by" : "elastic",
+ "enabled" : true,
+ "muted_alert_ids" : [ "muted_alert_ids", "muted_alert_ids" ],
+ "rule_type_id" : "monitoring_alert_cluster_health",
+ "tags" : [ "tags", "tags" ],
+ "api_key_owner" : "elastic",
+ "schedule" : {
+ "interval" : "1m"
+ },
+ "notify_when" : "onActiveAlert",
+ "next_run" : "2022-12-06T00:14:43.818Z",
+ "updated_at" : "2022-12-05T23:36:58.284Z",
+ "execution_status" : {
+ "last_execution_date" : "2022-12-06T00:13:43.89Z",
+ "last_duration" : 55,
+ "status" : "ok"
+ },
+ "name" : "cluster_health_rule",
+ "updated_by" : "elastic",
+ "scheduled_task_id" : "b530fed0-74f5-11ed-9801-35303b735aef",
+ "id" : "b530fed0-74f5-11ed-9801-35303b735aef",
+ "mute_all" : false,
+ "actions" : [ {
+ "id" : "9dca3e00-74f5-11ed-9801-35303b735aef",
+ "params" : {
+ "key" : ""
+ },
+ "group" : "default"
+ }, {
+ "id" : "9dca3e00-74f5-11ed-9801-35303b735aef",
+ "params" : {
+ "key" : ""
+ },
+ "group" : "default"
+ } ],
+ "consumer" : "alerts"
+}
+
+ application/json
put /s/{spaceId}/api/alerting/rule/{ruleId}
all
privileges for the appropriate Kibana features, depending on the consumer
and rule_type_id
of the rule you're updating. For example, you must have privileges for the Management > Stack rules feature, Analytics > Discover and Machine Learning features, Observability features, or Security features. If the rule has actions, you must also have read
privileges for the Management > Actions and Connectors feature. NOTE: This API supports only token-based authentication. When you update a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If you have different privileges than the user that created or most recently updated the rule, you might change its behavior. Though some properties are optional, when you update the rule the existing property values are overwritten with default values. Therefore, it is recommended to explicitly set all property values./s/
and the identifier are omitted from the path, the default space is used. default: null application/json
{
+ "throttle" : "10m",
+ "created_at" : "2022-12-05T23:36:58.284Z",
+ "last_run" : {
+ "alerts_count" : {
+ "ignored" : 6,
+ "new" : 1,
+ "recovered" : 5,
+ "active" : 0
+ },
+ "outcome_msg" : "outcome_msg",
+ "warning" : "warning",
+ "outcome" : "succeeded"
+ },
+ "params" : {
+ "key" : ""
+ },
+ "created_by" : "elastic",
+ "enabled" : true,
+ "muted_alert_ids" : [ "muted_alert_ids", "muted_alert_ids" ],
+ "rule_type_id" : "monitoring_alert_cluster_health",
+ "tags" : [ "tags", "tags" ],
+ "api_key_owner" : "elastic",
+ "schedule" : {
+ "interval" : "1m"
+ },
+ "notify_when" : "onActiveAlert",
+ "next_run" : "2022-12-06T00:14:43.818Z",
+ "updated_at" : "2022-12-05T23:36:58.284Z",
+ "execution_status" : {
+ "last_execution_date" : "2022-12-06T00:13:43.89Z",
+ "last_duration" : 55,
+ "status" : "ok"
+ },
+ "name" : "cluster_health_rule",
+ "updated_by" : "elastic",
+ "scheduled_task_id" : "b530fed0-74f5-11ed-9801-35303b735aef",
+ "id" : "b530fed0-74f5-11ed-9801-35303b735aef",
+ "mute_all" : false,
+ "actions" : [ {
+ "id" : "9dca3e00-74f5-11ed-9801-35303b735aef",
+ "params" : {
+ "key" : ""
+ },
+ "group" : "default"
+ }, {
+ "id" : "9dca3e00-74f5-11ed-9801-35303b735aef",
+ "params" : {
+ "key" : ""
+ },
+ "group" : "default"
+ } ],
+ "consumer" : "alerts"
+}
+
+ application/json
actions_inner
- findRules_200_response
- findRules_200_response_data_inner
- findRules_200_response_data_inner_actions_inner
- findRules_200_response_data_inner_execution_status
- findRules_200_response_data_inner_last_run
- findRules_200_response_data_inner_last_run_alerts_count
- findRules_200_response_data_inner_schedule
- findRules_has_reference_parameter
- findRules_search_fields_parameter
- notify_when
- rule_response_properties
- Rule response propertiesrule_response_properties_execution_status
- rule_response_properties_last_run
- rule_response_properties_last_run_alerts_count
- schedule
- update_rule_request
- Update rule requestactions_inner
- Updefault
. params
are handled as Mustache templates and passed a default set of context. findRules_200_response
- UpfindRules_200_response_data_inner
- UpfindRules_has_reference_parameter
- Upalerts
, apm
, discover
, infrastructure
, logs
, metrics
, ml
, monitoring
, securitySolution
, siem
, stackAlerts
, or uptime
. .es-query
, .index-threshold
, logs.alert.document.count
, monitoring_alert_cluster_health
, siem.thresholdRule
, or xpack.ml.anomaly_detection_alert
. notify_when
is set to onThrottleInterval
. It is specified in seconds, minutes, hours, or days. findRules_200_response_data_inner_actions_inner
- UpfindRules_search_fields_parameter
- Upnotify_when
- UponActionGroupChange
: Actions run when the alert status changes; onActiveAlert
: Actions run when the alert becomes active and at each check interval while the rule conditions are met; onThrottleInterval
: Actions run when the alert becomes active and at the interval specified in the throttle property while the rule conditions are met.rule_response_properties
- Rule response properties Upalerts
, apm
, discover
, infrastructure
, logs
, metrics
, ml
, monitoring
, securitySolution
, siem
, stackAlerts
, or uptime
. .es-query
, .index-threshold
, logs.alert.document.count
, monitoring_alert_cluster_health
, siem.thresholdRule
, or xpack.ml.anomaly_detection_alert
. notify_when
is set to onThrottleInterval
. It is specified in seconds, minutes, hours, or days. findRules_200_response_data_inner_execution_status
- Uprule_response_properties_execution_status
- UpfindRules_200_response_data_inner_last_run
- Uprule_response_properties_last_run
- UpfindRules_200_response_data_inner_last_run_alerts_count
- Uprule_response_properties_last_run_alerts_count
- UpfindRules_200_response_data_inner_schedule
- Upschedule
- UpfindRules_has_reference_parameter
- Upupdate_rule_request
- Update rule request Upnotify_when
is set to onThrottleInterval
. It is specified in seconds, minutes, hours, or days. findRules_search_fields_parameter
- Up